{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T15:17:15Z","timestamp":1681226235061},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T00:00:00Z","timestamp":1494201600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11432-015-0942-8","type":"journal-article","created":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T11:58:41Z","timestamp":1494503921000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection"],"prefix":"10.1007","volume":"60","author":[{"given":"Rui","family":"Zhao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongxin","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yu-Cheng","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong-Hua","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yongming","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,5,8]]},"reference":[{"key":"942_CR1","doi-asserted-by":"crossref","first-page":"3062","DOI":"10.1109\/TIT.2004.838089","volume":"50","author":"J N Laneman","year":"2004","unstructured":"Laneman J N, Tse D N, Wornell G W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans Inf Theory, 2004, 50: 3062\u20133080","journal-title":"IEEE Trans Inf Theory"},{"key":"942_CR2","volume-title":"IEEE Trans Commun","author":"R Zhao","year":"2016","unstructured":"Zhao R, Yuan Y, Fan L S, et al. Secrecy Perfor-mance analysis of cognitive decode-and-forward relay networks in Nakagami-m fading channels. IEEE Trans Commun, 2016, doi: 10.1109\/TCOMM.2016.2618793"},{"key":"942_CR3","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong L, Han Z, Petropulu A P, et al. Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process, 2010, 58: 1875\u20131888","journal-title":"IEEE Trans Signal Process"},{"key":"942_CR4","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1109\/TWC.2011.040511.101694","volume":"10","author":"Z G Ding","year":"2011","unstructured":"Ding Z G, Leung K K, Goeckel D L, et al. Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting. IEEE Trans Wirel Commun, 2011, 10: 1725\u20131729","journal-title":"relay chatting. IEEE Trans Wirel Commun"},{"key":"942_CR5","doi-asserted-by":"crossref","first-page":"2537","DOI":"10.1109\/TWC.2015.2504526","volume":"15","author":"R Zhao","year":"2016","unstructured":"Zhao R, Huang Y M, Wang W, et al. Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming. IEEE Trans Wirel Commun, 2016, 15: 2537\u20132551","journal-title":"IEEE Trans Wirel Commun"},{"key":"942_CR6","doi-asserted-by":"crossref","first-page":"3298","DOI":"10.1109\/TCOMM.2012.081412.110463","volume":"60","author":"N Yang","year":"2012","unstructured":"Yang N, Elkashlan M, Yeoh P L, et al. Multiuser MIMO relay networks in Nakagami-m fading channels. IEEE Trans Commun, 2012, 60: 3298\u20133310","journal-title":"IEEE Trans Commun"},{"key":"942_CR7","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/WCL.2013.051513.130110","volume":"2","author":"N E Wu","year":"2013","unstructured":"Wu N E, Li H J. Effect of feedback delay on secure cooperative networks with joint relay and jammer selection. IEEE Wirel Commun Lett, 2013, 2: 415\u2013418","journal-title":"IEEE Wirel Commun Lett"},{"key":"942_CR8","volume-title":"Table of Integrals, Series and Products","author":"I S Gradshteyn","year":"2007","unstructured":"Gradshteyn I S, Ryzhik I M. Table of Integrals, Series and Products. 7th ed. New York: Academic, 2007"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0942-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0942-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0942-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T11:58:44Z","timestamp":1494503924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0942-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,8]]},"references-count":8,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["942"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0942-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,8]]},"article-number":"069303"}}