{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:53:22Z","timestamp":1771703602014,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,3,16]],"date-time":"2016-03-16T00:00:00Z","timestamp":1458086400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s11432-015-5451-2","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T20:12:34Z","timestamp":1458331954000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Physical-layer secrecy outage of spectrum sharing CR systems over fading channels"],"prefix":"10.1007","volume":"59","author":[{"given":"Hequn","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Chaoqing","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Gaofeng","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Tingting","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"5451_CR1","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"D Wyner","year":"1975","unstructured":"Wyner D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355\u20131367","journal-title":"Bell Syst Tech J"},{"key":"5451_CR2","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch M, Barros J, Rodrigues M R D, et al. Wireless information theoretic security. IEEE Trans Inf Theory, 2008, 54: 2515\u20132534","journal-title":"IEEE Trans Inf Theory"},{"key":"5451_CR3","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1109\/TIT.2009.2018322","volume":"55","author":"T Liu","year":"2009","unstructured":"Liu T, Shamai S. A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans Inf Theory, 2009, 55: 2547\u20132553","journal-title":"IEEE Trans Inf Theory"},{"key":"5451_CR4","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1109\/LCOMM.2013.040213.122870","volume":"17","author":"Q Li","year":"2013","unstructured":"Li Q, Song H, Huang K. Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels. IEEE Commu Lett, 2013, 17: 892\u2013895","journal-title":"IEEE Commu Lett"},{"key":"5451_CR5","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/LSP.2013.2293884","volume":"21","author":"Q Li","year":"2014","unstructured":"Li Q, Ma W-K, Man-Cho So A. A safe approximation approach to secrecy outage design for MIMO wiretap channels. IEEE Sig Process Lett, 2014, 21: 118\u2013121","journal-title":"IEEE Sig Process Lett"},{"key":"5451_CR6","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/LSP.2012.2203302","volume":"19","author":"X Sun","year":"2012","unstructured":"Sun X, Wang J, Xu W, et al. Performance of secure communications over correlated fading channels. IEEE Sig Process Lett, 2012, 19: 479\u2013482","journal-title":"IEEE Sig Process Lett"},{"key":"5451_CR7","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/ChinaCom.2012.6417469","volume-title":"Proceedings of 7th International Conference on Communications and Networking in China","author":"X Liu","year":"2012","unstructured":"Liu X. Secrecy capacity of wireless links subject to log-normal fading. In: Proceedings of 7th International Conference on Communications and Networking in China, Kunming, 2012. 167\u2013172"},{"key":"5451_CR8","first-page":"23","volume-title":"Proceedings of Australasian Telecommunication Networks and Applications Conference","author":"X Zhang","year":"2014","unstructured":"Zhang X, Pan G, Tang C, et al. Performance analysis of physical layer security over independent\/correlated lognormal fading channels. In: Proceedings of Australasian Telecommunication Networks and Applications Conference, Melbourne, 2014. 23\u201327"},{"key":"5451_CR9","first-page":"883","volume-title":"Proceedings of IEEE International Conference on Communications","author":"M Zahurul","year":"2012","unstructured":"Zahurul M, Sarkar I, Ratnarajah T. Secrecy capacity over correlated log-normal fading channel. In: Proceedings of IEEE International Conference on Communications, Ottawa, 2012. 883\u2013887"},{"key":"5451_CR10","volume-title":"Dissertation for Ph.D. Degree","author":"J Mitola","year":"2000","unstructured":"Mitola J. Cognitive radio: an integrated agent architecture for software defined radio. Dissertation for Ph.D. Degree. Stockholm: KTH, 2000"},{"key":"5451_CR11","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MNET.2013.6523805","volume":"27","author":"Z Shu","year":"2013","unstructured":"Shu Z, Qian Y, Ci S. On physical layer security for cognitive radio networks. IEEE Netw, 2013, 27: 28\u201333","journal-title":"IEEE Netw"},{"key":"5451_CR12","doi-asserted-by":"crossref","first-page":"5103","DOI":"10.1109\/TCOMM.2013.111213.130235","volume":"61","author":"Y Zou","year":"2013","unstructured":"Zou Y, Wang X, Shen W. Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commu, 2013, 61: 5103\u20135113","journal-title":"IEEE Trans Commu"},{"key":"5451_CR13","doi-asserted-by":"crossref","first-page":"2676","DOI":"10.1049\/iet-com.2011.0638","volume":"6","author":"H Sakran","year":"2012","unstructured":"Sakran H, Shokair M, Nasr O, et al. Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun, 2012, 6: 2676\u20132687","journal-title":"IET Commun"},{"key":"5451_CR14","first-page":"34","volume":"27","author":"H Wen","year":"2013","unstructured":"Wen H, Li S, Zhu X, et al. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks. IEEE Netw, 2013, 27: 34\u201339","journal-title":"IEEE Netw"},{"key":"5451_CR15","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1109\/LWC.2014.2350501","volume":"3","author":"C Tang","year":"2014","unstructured":"Tang C, Pan G, Li T. Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels. IEEE Wirel Commun Lett, 2014, 3: 609\u2013612","journal-title":"IEEE Wirel Commun Lett"},{"key":"5451_CR16","doi-asserted-by":"crossref","first-page":"3790","DOI":"10.1109\/TVT.2014.2358624","volume":"64","author":"M Elkashlan","year":"2015","unstructured":"Elkashlan M, Wang L, Duong T Q, et al. On the security of cognitive radio networks. IEEE Trans Veh Techol, 2015, 64: 3790\u20133795","journal-title":"IEEE Trans Veh Techol"},{"key":"5451_CR17","volume-title":"Probability, Random Variables and Stochastic Processes","author":"A Papoulis","year":"2001","unstructured":"Papoulis A. Probability, Random Variables and Stochastic Processes. 4th ed. New York: McGraw Hill, 2001"},{"key":"5451_CR18","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/LCOMM.2011.030911.102343","volume":"15","author":"F He","year":"2011","unstructured":"He F, Man H, Wang W. Maximal ratio diversity combining enhanced security. IEEE Commun Lett, 2011, 15: 509\u2013511","journal-title":"IEEE Commun Lett"},{"key":"5451_CR19","doi-asserted-by":"crossref","DOI":"10.1201\/9781420011371","volume-title":"Handbook of Statistical Distributions with Applications","author":"K Krishnamoorthy","year":"2006","unstructured":"Krishnamoorthy K. Handbook of Statistical Distributions with Applications. New York: Chapman & Hall, 2006"},{"key":"5451_CR20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/TCOM.1960.1097606","volume":"8","author":"L Fenton","year":"1960","unstructured":"Fenton L. The sum of log-normal probability distributions in scatter transmission systems. IRE Trans Commun Syst, 1960, 8: 57\u201367","journal-title":"IRE Trans Commun Syst"},{"key":"5451_CR21","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1109\/TVT.2015.2412140","volume":"65","author":"G Pan","year":"2016","unstructured":"Pan G, Tang C, Zhang X, et al. Physical layer security over non-small scale fading channels. IEEE Trans Veh Tech, 2016, 65: 1326\u20131339","journal-title":"IEEE Trans Veh Tech"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5451-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5451-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5451-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:38:04Z","timestamp":1559403484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5451-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,16]]},"references-count":21,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["5451"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5451-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,16]]},"article-number":"102308"}}