{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T20:17:16Z","timestamp":1648671436368},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T00:00:00Z","timestamp":1451347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s11432-015-5463-y","type":"journal-article","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T10:14:20Z","timestamp":1451384060000},"page":"1-3","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Transmission frequency-band hidden technology in physical layer security"],"prefix":"10.1007","volume":"59","author":[{"given":"Xiangyu","family":"Li","sequence":"first","affiliation":[]},{"given":"Liang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Kaizhi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"5463_CR1","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A D Wyner","year":"1975","unstructured":"Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355\u20131387","journal-title":"Bell Syst Tech J"},{"key":"5463_CR2","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel S, Negi R. Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun, 2008, 7: 2180\u20132189","journal-title":"IEEE Trans Wirel Commun"},{"key":"5463_CR3","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/LCOMM.2013.060513.130802","volume":"17","author":"A Khisti","year":"2013","unstructured":"Khisti A, Zhang D. Artificial-noise alignment for secure multicast using multiple antennas. IEEE Commun Lett, 2013, 17: 1568\u20131571","journal-title":"IEEE Commun Lett"},{"key":"5463_CR4","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2013.130907","volume":"31","author":"P H Lin","year":"2013","unstructured":"Lin P H, Lai S H, Lin S C, et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J Sel Area Commun, 2013, 31: 1728\u20131740","journal-title":"IEEE J Sel Area Commun"},{"key":"5463_CR5","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 3088\u20133104","journal-title":"IEEE Trans Inf Theory"},{"key":"5463_CR6","first-page":"1571","volume-title":"Proceedings of IEEE International Conference on Information Science and Technology, Tangier","author":"L Liu","year":"2013","unstructured":"Liu L, Jin L, Huang K Z. Eavesdropping against artificial noise: hyperplane clustering. In: Proceedings of IEEE International Conference on Information Science and Technology, Tangier, 2013. 1571\u20131575"},{"key":"5463_CR7","first-page":"214","volume-title":"Proceedings of IEEE\/CIC International Conference on Communications in China,Wuhan","author":"F L Wu","year":"2013","unstructured":"Wu F L, Wang W J, Yao B L, et al. Effective eavesdropping in the artificial noise aided security scheme. In: Proceedings of IEEE\/CIC International Conference on Communications in China,Wuhan, 2013. 214\u2013218"},{"key":"5463_CR8","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2006.275200","volume":"13","author":"P Popovski","year":"2006","unstructured":"Popovski P, Yomo H, Prasad R. Strategies for adaptive frequency hopping in the unlicensed bands. IEEE Wirel Commun, 2006, 13: 60\u201367","journal-title":"IEEE Wirel Commun"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5463-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5463-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5463-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:38:04Z","timestamp":1559403484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5463-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,29]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["5463"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5463-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,29]]}}}