{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:54:44Z","timestamp":1771520084478,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11432-020-3048-9","type":"journal-article","created":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T04:20:52Z","timestamp":1638073252000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Directional modulation with distributed receiver selection for secure wireless communications"],"prefix":"10.1007","volume":"64","author":[{"given":"Hongyan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yue","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Wanbin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xiaotian","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,24]]},"reference":[{"key":"3048_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang N, Wang L F, Geraci G, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag, 2015, 53: 20\u201327","journal-title":"IEEE Commun Mag"},{"key":"3048_CR2","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y L Zou","year":"2016","unstructured":"Zou Y L, Zhu J, Wang X B, et al. A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE, 2016, 104: 1727\u20131765","journal-title":"Proc IEEE"},{"key":"3048_CR3","doi-asserted-by":"publisher","first-page":"121301","DOI":"10.1007\/s11432-019-2650-4","volume":"63","author":"Q Qi","year":"2020","unstructured":"Qi Q, Chen X M, Zhong C J, et al. Physical layer security for massive access in cellular Internet of Things. Sci China Inf Sci, 2020, 63: 121301","journal-title":"Sci China Inf Sci"},{"key":"3048_CR4","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1109\/TIFS.2013.2287046","volume":"8","author":"H M Wang","year":"2013","unstructured":"Wang H M, Luo M, Yin Q, et al. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inform Forensic Secur, 2013, 8: 2007\u20132020","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3048_CR5","doi-asserted-by":"publisher","first-page":"080304","DOI":"10.1007\/s11432-019-9928-5","volume":"62","author":"Z Y Lu","year":"2019","unstructured":"Lu Z Y, Sun L L, Zhang S, et al. Optimal power allocation for secure directional modulation networks with a full-duplex UAV user. Sci China Inf Sci, 2019, 62: 080304","journal-title":"Sci China Inf Sci"},{"key":"3048_CR6","doi-asserted-by":"publisher","first-page":"180302","DOI":"10.1007\/s11432-019-2921-x","volume":"63","author":"Z H Zhuang","year":"2020","unstructured":"Zhuang Z H, Xu L, Li J Y, et al. Machine-learning-based high-resolution DOA measurement and robust directional modulation for hybrid analog-digital massive MIMO transceiver. Sci China Inf Sci, 2020, 63: 180302","journal-title":"Sci China Inf Sci"},{"key":"3048_CR7","doi-asserted-by":"publisher","first-page":"2674","DOI":"10.1109\/JSSC.2008.2004864","volume":"43","author":"A Babakhani","year":"2008","unstructured":"Babakhani A, Rutledge D B, Hajimiri A. Transmitter architectures based on near-field direct antenna modulation. IEEE J Solid-State Circ, 2008, 43: 2674\u20132692","journal-title":"IEEE J Solid-State Circ"},{"key":"3048_CR8","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.1109\/TAP.2009.2027047","volume":"57","author":"M P Daly","year":"2009","unstructured":"Daly M P, Bernhard J T. Directional modulation technique for phased arrays. IEEE Trans Antenna Propagat, 2009, 57: 2633\u20132640","journal-title":"IEEE Trans Antenna Propagat"},{"key":"3048_CR9","doi-asserted-by":"publisher","first-page":"3231","DOI":"10.1109\/TCOMM.2013.061013.120459","volume":"61","author":"N Valliappan","year":"2013","unstructured":"Valliappan N, Lozano A, Heath R W. Antenna subset modulation for secure millimeter-wave wireless communication. IEEE Trans Commun, 2013, 61: 3231\u20133245","journal-title":"IEEE Trans Commun"},{"key":"3048_CR10","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TCOMM.2016.2519403","volume":"64","author":"N N Alotaibi","year":"2016","unstructured":"Alotaibi N N, Hamdi K A. Switched phased-array transmission architecture for secure millimeter-wave wireless communication. IEEE Trans Commun, 2016, 64: 1303\u20131312","journal-title":"IEEE Trans Commun"},{"key":"3048_CR11","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TAP.2013.2287001","volume":"62","author":"Y Ding","year":"2014","unstructured":"Ding Y, Fusco V F. A vector approach for the analysis and synthesis of directional modulation transmitters. IEEE Trans Antenna Propagat, 2014, 62: 361\u2013370","journal-title":"IEEE Trans Antenna Propagat"},{"key":"3048_CR12","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/LAWP.2015.2404818","volume":"14","author":"Y Ding","year":"2015","unstructured":"Ding Y, Fusco V F. Orthogonal vector approach for synthesis of multi-beam directional modulation transmitters. Antenn Wirel Propag Lett, 2015, 14: 1330\u20131333","journal-title":"Antenn Wirel Propag Lett"},{"key":"3048_CR13","doi-asserted-by":"publisher","first-page":"34992","DOI":"10.1109\/ACCESS.2018.2849098","volume":"6","author":"Y P Xiao","year":"2018","unstructured":"Xiao Y P, Tang W P, Xiao Y, et al. Directional modulation with cooperative receivers. IEEE Access, 2018, 6: 34992\u201335000","journal-title":"IEEE Access"},{"key":"3048_CR14","doi-asserted-by":"publisher","first-page":"100694","DOI":"10.1016\/j.phycom.2019.04.008","volume":"35","author":"Q You","year":"2019","unstructured":"You Q, Xiao Y P. Spatial and directional modulation with scrambling. Phys Commun, 2019, 35: 100694","journal-title":"Phys Commun"},{"key":"3048_CR15","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TVT.2007.912136","volume":"57","author":"R Y Mesleh","year":"2008","unstructured":"Mesleh R Y, Haas H, Sinanovic S, et al. Spatial modulation. IEEE Trans Veh Technol, 2008, 57: 2228\u20132241","journal-title":"IEEE Trans Veh Technol"},{"key":"3048_CR16","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/COMST.2014.2327066","volume":"17","author":"P Yang","year":"2015","unstructured":"Yang P, Renzo M D, Xiao Y, et al. Design guidelines for spatial modulation. IEEE Commun Surv Tut, 2015, 17: 6\u201326","journal-title":"IEEE Commun Surv Tut"},{"key":"3048_CR17","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/LCOMM.2017.2783955","volume":"22","author":"X Q Jiang","year":"2018","unstructured":"Jiang X Q, Wen M W, Hai H, et al. Secrecy-enhancing scheme for spatial modulation. IEEE Commun Lett, 2018, 22: 550\u2013553","journal-title":"IEEE Commun Lett"},{"key":"3048_CR18","doi-asserted-by":"publisher","first-page":"5434","DOI":"10.1109\/TWC.2013.100213.130848","volume":"12","author":"R Zhang","year":"2013","unstructured":"Zhang R, Yang L L, Hanzo L. Generalised pre-coding aided spatial modulation. IEEE Trans Wirel Commun, 2013, 12: 5434\u20135443","journal-title":"IEEE Trans Wirel Commun"},{"key":"3048_CR19","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TWC.2014.2347297","volume":"14","author":"R Zhang","year":"2015","unstructured":"Zhang R, Yang L L, Hanzo L. Error probability and capacity analysis of generalised pre-coding aided spatial modulation. IEEE Trans Wirel Commun, 2015, 14: 364\u2013375","journal-title":"IEEE Trans Wirel Commun"},{"key":"3048_CR20","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/LWC.2015.2413396","volume":"4","author":"J P Zheng","year":"2015","unstructured":"Zheng J P. Fast receive antenna subset selection for pre-coding aided spatial modulation. IEEE Wirel Commun Lett, 2015, 4: 317\u2013320","journal-title":"IEEE Wirel Commun Lett"},{"key":"3048_CR21","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch M, Barros J, Rodrigues M R D, et al. Wireless information-theoretic security. IEEE Trans Inform Theor, 2008, 54: 2515\u20132534","journal-title":"IEEE Trans Inform Theor"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3048-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-3048-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3048-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T12:15:34Z","timestamp":1674821734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-3048-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,24]]},"references-count":21,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["3048"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-3048-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,24]]},"assertion":[{"value":"25 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"222303"}}