{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:42:01Z","timestamp":1766580121043},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11432-020-2970-y","type":"journal-article","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:06:13Z","timestamp":1634861173000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Self-interference cancellation for cooperative jamming communications with nonideal alignment and channel equalization"],"prefix":"10.1007","volume":"64","author":[{"given":"Wenbo","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yimin","family":"He","sequence":"additional","affiliation":[]},{"given":"Hongzhi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Shihai","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Youxi","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,13]]},"reference":[{"key":"2970_CR1","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel S, Negi R. Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun, 2008, 7: 2180\u20132189","journal-title":"IEEE Trans Wirel Commun"},{"key":"2970_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MCOM.2015.7355565","volume":"53","author":"H M Wang","year":"2015","unstructured":"Wang H M, Xia X G. Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun Mag, 2015, 53: 47\u201353","journal-title":"IEEE Commun Mag"},{"key":"2970_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2017.1700220","volume":"55","author":"T Riihonen","year":"2017","unstructured":"Riihonen T, Korpi D, Rantula O, et al. Inband full-duplex radio transceivers: a paradigm shift in tactical communications and electronic warfare? IEEE Commun Mag, 2017, 55: 30\u201336","journal-title":"IEEE Commun Mag"},{"key":"2970_CR4","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/LWC.2019.2950303","volume":"9","author":"W Guo","year":"2020","unstructured":"Guo W, Zhao H, Tang Y. Testbed for cooperative jamming cancellation in physical layer security. IEEE Wirel Commun Lett, 2020, 9: 240\u2013243","journal-title":"IEEE Wirel Commun Lett"},{"key":"2970_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2018.1700563","volume":"57","author":"Q Du","year":"2019","unstructured":"Du Q, Song H, Zhu X. Social-feature enabled communications among devices toward the smart IoT community. IEEE Commun Mag, 2019, 57: 130\u2013137","journal-title":"IEEE Commun Mag"},{"key":"2970_CR6","doi-asserted-by":"publisher","first-page":"2793","DOI":"10.1109\/JIOT.2018.2830880","volume":"5","author":"K Lee","year":"2018","unstructured":"Lee K, Hong J P, Choi H H, et al. Adaptive wireless-powered relaying schemes with cooperative jamming for two-hop secure communication. IEEE Internet Things J, 2018, 5: 2793\u20132803","journal-title":"IEEE Internet Things J"},{"key":"2970_CR7","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TVT.2017.2756877","volume":"67","author":"G Zhang","year":"2018","unstructured":"Zhang G, Xu J, Wu Q, et al. Wireless powered cooperative jamming for secure OFDM system. IEEE Trans Veh Technol, 2018, 67: 1331\u20131346","journal-title":"IEEE Trans Veh Technol"},{"key":"2970_CR8","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/LCOMM.2019.2936845","volume":"23","author":"C Li","year":"2019","unstructured":"Li C, Liu Y, Xu Q, et al. Self-interference cancellation with frequency offset and nonlinear distortion suppression for cooperative jamming communications. IEEE Commun Lett, 2019, 23: 2091\u20132094","journal-title":"IEEE Commun Lett"},{"key":"2970_CR9","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1360\/112012-310","volume":"43","author":"M Luo","year":"2013","unstructured":"Luo M, Wang H M, Yin Q Y. Hybrid relaying and jamming for wireless physical layer security based on cooperative beam-forming. Sci Sin Inform, 2013, 43: 445\u2013458","journal-title":"Sci Sin Inform"},{"key":"2970_CR10","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1360\/N112014-00048","volume":"44","author":"H Deng","year":"2014","unstructured":"Deng H, Wang H M, Wang W J. Grouping cooperative jamming for wireless physical layer security. Sci Sin Inform, 2014, 44: 1482\u20131494","journal-title":"Sci Sin Inform"},{"key":"2970_CR11","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/LWC.2016.2601100","volume":"5","author":"L Tang","year":"2016","unstructured":"Tang L, Li Q. Wireless power transfer and cooperative jamming for secrecy throughput maximization. IEEE Wirel Commun Lett, 2016, 5: 556\u2013559","journal-title":"IEEE Wirel Commun Lett"},{"key":"2970_CR12","doi-asserted-by":"crossref","unstructured":"Wang C L, Cho T N, Liu F. Power allocation and jammer selection of a cooperative jamming strategy for physical-layer security. In: Proceedings of IEEE Vehicular Technology Conference (VTC Spring), Seoul, 2014. 1\u20135","DOI":"10.1109\/VTCSpring.2014.7023057"},{"key":"2970_CR13","doi-asserted-by":"crossref","unstructured":"Sarikaya Y, Ercetin O, Gurbuz O. Dynamic control for cooperative jamming with a non-altruistic node. In: Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, 2013. 381\u2013382","DOI":"10.1109\/CNS.2013.6682738"},{"key":"2970_CR14","doi-asserted-by":"publisher","first-page":"3284","DOI":"10.1007\/s00034-015-0204-4","volume":"35","author":"S Zhong","year":"2016","unstructured":"Zhong S, Xia W, He Z. Joint estimation of time delay and clock error in the incoherent reception systems. Circ Syst Signal Process, 2016, 35: 3284\u20133309","journal-title":"Circ Syst Signal Process"},{"key":"2970_CR15","doi-asserted-by":"publisher","first-page":"3024","DOI":"10.1109\/TCOMM.2009.10.080169","volume":"57","author":"F F Gao","year":"2009","unstructured":"Gao F F, Zhang R, Liang Y C. Optimal channel estimation and training design for two-way relay networks. IEEE Trans Commun, 2009, 57: 3024\u20133033","journal-title":"IEEE Trans Commun"},{"key":"2970_CR16","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/LWC.2014.2322097","volume":"3","author":"Z He","year":"2014","unstructured":"He Z, Shao S, Shen Y, et al. Performance analysis of RF self-interference cancellation in full-duplex wireless communications. IEEE Wirel Commun Lett, 2014, 3: 405\u2013408","journal-title":"IEEE Wirel Commun Lett"},{"key":"2970_CR17","doi-asserted-by":"crossref","unstructured":"Guo W, Zhao H, Ma W, et al. Effect of frequency offset on cooperative jamming cancellation in physical layer security. In: Proceedings of IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, 2018. 1\u20135","DOI":"10.1109\/GLOCOMW.2018.8644513"},{"key":"2970_CR18","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"Zheng G, Choo L C, Wong K K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans Signal Process, 2011, 59: 1317\u20131322","journal-title":"IEEE Trans Signal Process"},{"key":"2970_CR19","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/TVT.2015.2395725","volume":"65","author":"H Xing","year":"2016","unstructured":"Xing H, Liu L, Zhang R. Secrecy wireless information and power transfer in fading wiretap channel. IEEE Trans Veh Technol, 2016, 65: 180\u2013190","journal-title":"IEEE Trans Veh Technol"},{"key":"2970_CR20","doi-asserted-by":"publisher","first-page":"4296","DOI":"10.1109\/TWC.2012.102612.111278","volume":"11","author":"M Duarte","year":"2012","unstructured":"Duarte M, Dick C, Sabharwal A. Experiment-driven characterization of full-duplex wireless systems. IEEE Trans Wirel Commun, 2012, 11: 4296\u20134307","journal-title":"IEEE Trans Wirel Commun"},{"key":"2970_CR21","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TCOMM.2017.2653112","volume":"65","author":"N Zlatanov","year":"2017","unstructured":"Zlatanov N, Sippel E, Jamali V, et al. Capacity of the Gaussian two-hop full-duplex relay channel with residual self-interference. IEEE Trans Commun, 2017, 65: 1005\u20131021","journal-title":"IEEE Trans Commun"},{"key":"2970_CR22","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1109\/TCOMM.2015.2397886","volume":"63","author":"A C Cirik","year":"2015","unstructured":"Cirik A C, Wang R, Hua Y, et al. Weighted sum-rate maximization for full-duplex MIMO interference channels. IEEE Trans Commun, 2015, 63: 801\u2013815","journal-title":"IEEE Trans Commun"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2970-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-2970-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2970-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T21:04:40Z","timestamp":1671570280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-2970-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":22,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["2970"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-2970-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"11 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"212302"}}