{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:43:12Z","timestamp":1755801792208,"version":"3.44.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda??o para a Ci?ncia e a Tecnologia","doi-asserted-by":"publisher","award":["B-0109-24","LA\/P\/0109\/2020","SFRH\/BD\/08221\/2021","UIDP\/50008\/2020","https:\/\/doi.org\/10.54499\/UIDB\/50008\/2020"],"award-info":[{"award-number":["B-0109-24","LA\/P\/0109\/2020","SFRH\/BD\/08221\/2021","UIDP\/50008\/2020","https:\/\/doi.org\/10.54499\/UIDB\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000921","name":"European Cooperation in Science and Technology","doi-asserted-by":"publisher","award":["CA22168"],"award-info":[{"award-number":["CA22168"]}],"id":[{"id":"10.13039\/501100000921","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3598502","type":"journal-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T17:35:26Z","timestamp":1755106526000},"page":"143576-143590","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Eavesdropper Detection Through PHY-Aware Cell-Free AP Selection"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9358-9509","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Martins","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7994-6090","authenticated-orcid":false,"given":"Filipe","family":"Concei\u00e7\u00e3o","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-525X","authenticated-orcid":false,"given":"Marco","family":"Gomes","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2439-1184","authenticated-orcid":false,"given":"Vitor","family":"Silva","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8520-7267","authenticated-orcid":false,"given":"Rui","family":"Dinis","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930208"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2655515"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2987311"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2024.3393514"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2017.2770215"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3144989"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837919"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2734893"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3135119"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3123267"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3453388"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"volume-title":"Cryptography and Network Security: Principles and Practice","year":"2022","author":"Stallings","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MBITS.2023.3338569"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.003.2200974"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom61746.2024.10646260"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570817"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3272769"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228660"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796694"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3072569"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom61057.2024.10621220"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437915"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543592"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3389570"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4108\/eai.29-11-2018.155998"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC55456.2022.9880834"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001270"},{"key":"ref32","first-page":"1","article-title":"Deep reinforcement learning for dynamic access point activation in cell-free MIMO networks","volume-title":"Proc. WSA; 25th Int. ITG Workshop Smart Antennas","author":"Mendoza"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3300358"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647876"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2837132"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3188279"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3459628"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3098693"},{"volume-title":"Handbook of Genetic Algorithms","year":"1991","author":"Davis","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860974"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11060876"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3382327"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880921"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2941478"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1561\/2000000093"},{"volume-title":"Study on Scenarios and Requirements for Next Generation Access Technologies","year":"2017","key":"ref46"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11123823.pdf?arnumber=11123823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:43:29Z","timestamp":1755715409000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11123823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3598502","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}