{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T05:54:15Z","timestamp":1648965255283},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T00:00:00Z","timestamp":1423526400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s11432-014-5256-8","type":"journal-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T06:13:48Z","timestamp":1423548828000},"page":"1-13","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Two-step transmission with artificial noise for secure wireless SIMO communications"],"prefix":"10.1007","volume":"58","author":[{"given":"Bo","family":"Wang","sequence":"first","affiliation":[]},{"given":"PengCheng","family":"Mu","sequence":"additional","affiliation":[]},{"given":"PeiZhi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"QinYe","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,10]]},"reference":[{"key":"5256_CR1","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A D Wyner","year":"1975","unstructured":"Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355\u20131387","journal-title":"Bell Syst Tech J"},{"key":"5256_CR2","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r I, K\u00f6rner J. Broadcast channels with confidential messages. IEEE Trans Inf Theory, 1978, 24: 339\u2013348.","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR3","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong S, Hellman M. The Gaussian wire-tap channel. IEEE Trans Inf Theory, 1978, 24: 451\u2013456","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR4","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch M, Barros J, Rodrigues M R D, et al. Wireless information-theoretic security. IEEE Trans Inf Theory, 2008, 54: 2515\u20132534","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR5","doi-asserted-by":"crossref","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"P K Gopala","year":"2008","unstructured":"Gopala P K, Lai L, El Gamal H. On the secrecy capacity of fading channels. IEEE Trans Inf Theory, 2008, 54: 4687\u20134698","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR6","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/TIT.2003.820010","volume":"49","author":"A O Hero III","year":"2003","unstructured":"Hero III A O. Secure space-time communication. IEEE Trans Inf Theory, 2003, 49: 3235\u20133249","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR7","first-page":"2152","volume-title":"Proceedings of IEEE ISIT 2005, Adelaide","author":"P Parada","year":"2005","unstructured":"Parada P, Blahut R. Secrecy capacity of SIMO and slow fading channels. In: Proceedings of IEEE ISIT 2005, Adelaide, 2005. 2152\u20132155"},{"key":"5256_CR8","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel S, Negi R. Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun, 2008, 7: 2180\u20132189","journal-title":"IEEE Trans Wirel Commun"},{"key":"5256_CR9","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 3088\u20133104","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR10","doi-asserted-by":"crossref","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell G W. Secure transmission with multiple antennas II: the MIMOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 5515\u20135532","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR11","doi-asserted-by":"crossref","first-page":"4961","DOI":"10.1109\/TIT.2011.2158487","volume":"57","author":"F Oggier","year":"2011","unstructured":"Oggier F, Hassibi B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory, 2011, 57: 4961\u20134972","journal-title":"IEEE Trans Inf Theory"},{"key":"5256_CR12","first-page":"IV","volume-title":"Proceedings of 40th IEEE International Conference on Acoustics, Speech and Signal Processing, Toulouse","author":"X Li","year":"2006","unstructured":"Li X, Hwu J, Ratazzi E P. Array redundancy and diversity for wireless transmissions with low probability of interception. In: Proceedings of 40th IEEE International Conference on Acoustics, Speech and Signal Processing, Toulouse, 2006. IV"},{"key":"5256_CR13","first-page":"102302","volume":"57","author":"Z S Fei","year":"2014","unstructured":"Fei Z S, Ni J Q, Zhao D, et al. Ergodic secrecy rate of two-user MISO interference channels with statistical CSI. Sci China Inf Sci, 2014, 57: 102302","journal-title":"Sci China Inf Sci"},{"key":"5256_CR14","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.1109\/TIFS.2014.2356339","volume":"9","author":"C Wang","year":"2014","unstructured":"Wang C, Wang H M. On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans Inf Forensics Secur, 2014, 9: 1814\u20131827","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5256_CR15","doi-asserted-by":"crossref","first-page":"3532","DOI":"10.1109\/TSP.2012.2191543","volume":"61","author":"H M Wang","year":"2012","unstructured":"Wang H M, Yin Q, Xia X G. Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans Signal Process, 2012, 61: 3532\u20133545","journal-title":"IEEE Trans Signal Process"},{"key":"5256_CR16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/LSP.2012.2227725","volume":"20","author":"H M Wang","year":"2013","unstructured":"Wang H M, Luo M, Xia X G, et al. Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper\u2019s CSI. IEEE Signal Process Lett, 2013, 20: 39\u201342","journal-title":"IEEE Signal Process Lett"},{"key":"5256_CR17","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TIFS.2013.2287046","volume":"8","author":"H M Wang","year":"2013","unstructured":"Wang H M, Luo M, Yin Q, et al. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inf Forensics Secur, 2013, 8: 2007\u20132020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5256_CR18","first-page":"1280","volume-title":"Proceedings of IEEE GLOBECOM 2013 Workshops, Atlanta","author":"P Mu","year":"2013","unstructured":"Mu P, Wang H M, Yin Q. Improving the secrecy rate of wireless SIMO systems via two-step transmission. In: Proceedings of IEEE GLOBECOM 2013 Workshops, Atlanta, 2013. 1280\u20131285"},{"key":"5256_CR19","first-page":"774","volume-title":"Proceedings of IEEE European Wireless Conference, Lucca","author":"M R D Rodrigues","year":"2010","unstructured":"Rodrigues M R D, Somekh-Baruch A, Bloch M. On Gaussian wiretap channels with M-PAM inputs. In: Proceedings of IEEE European Wireless Conference, Lucca, 2010. 774\u2013781"},{"key":"5256_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511921490","volume-title":"Complex-Valued Matrix Derivatives","author":"A Hj\u00f8rungnes","year":"2011","unstructured":"Hj\u00f8rungnes A. Complex-Valued Matrix Derivatives. Cambridge: Cambridge University Press, 2011"},{"key":"5256_CR21","first-page":"1","volume-title":"Proceedings of IEEE GLOBECOM, New Orleans","author":"C Xiao","year":"2008","unstructured":"Xiao C, Zheng Y R. On the mutual information and power allocation for vector Gaussian channels with finite discrete inputs. In: Proceedings of IEEE GLOBECOM, New Orleans, 2008. 1\u20135"},{"key":"5256_CR22","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1109\/MILCOM.1990.117518","volume-title":"Proceedings of Military Communications Conference, Monterey","author":"J M Geist","year":"1990","unstructured":"Geist J M. Capacity and cutoff rate for dense M-ary PSK constellations. In: Proceedings of Military Communications Conference, Monterey, 1990. 768\u2013770"},{"key":"5256_CR23","volume-title":"Elements of Information Theory","author":"T M Cover","year":"2006","unstructured":"Cover T M, Thomas J A. Elements of Information Theory. Hoboken: John Wiley & Sons, Inc., 2006"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5256-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5256-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5256-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:38:00Z","timestamp":1559403480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5256-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,10]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["5256"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5256-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,10]]}}}