{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:02:28Z","timestamp":1769727748471,"version":"3.49.0"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Tianjin Municipal Bureau of Finance","award":["EJE220122"],"award-info":[{"award-number":["EJE220122"]}]},{"name":"Yunnan Provincial Basic Research Program","award":["202401CF070108"],"award-info":[{"award-number":["202401CF070108"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3454349","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:19:43Z","timestamp":1725473983000},"page":"126762-126773","source":"Crossref","is-referenced-by-count":1,"title":["Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4099-9360","authenticated-orcid":false,"given":"Yi","family":"Zhang","sequence":"first","affiliation":[{"name":"Tianjin Vocational College of Mechanics and Electricity School of Electrical, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-7567","authenticated-orcid":false,"given":"Yebo","family":"Gu","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2224-3941","authenticated-orcid":false,"given":"Tao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China"}]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"China Telecom Heilongjiang Branch, Harbin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref2","volume-title":"Principles of Information Security","author":"Whitman","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2969629"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3024621"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3256001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3057661"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3109943"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3261308"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3081803"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2979175"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905764"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2024.3357652"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.112310.101008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3047926"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3017570"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3268443"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2723565"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2949501"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2811733"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5256-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3419093"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2404839"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3272769"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2947520"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1561\/0100000001"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10664641.pdf?arnumber=10664641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:42:37Z","timestamp":1744911757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10664641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3454349","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}