{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T02:49:31Z","timestamp":1771382971244,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/apcc.2015.7412531","type":"proceedings-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T05:44:17Z","timestamp":1462599857000},"page":"304-308","source":"Crossref","is-referenced-by-count":5,"title":["Intercept outage probability analysis of cognitive relay networks in presence of eavesdropping attack"],"prefix":"10.1109","author":[{"given":"Jing","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xuelong","family":"Hu","sequence":"additional","affiliation":[]},{"given":"P. Takis","family":"Mathiopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2292903"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HMWC.2013.6710314"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404758"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655320"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0638"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.111213.130235"},{"key":"ref16","article-title":"On the security of cognitive radio networks","author":"elkashlan","year":"2014","journal-title":"IEEE Trans Veh Technol"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/el.2011.2592"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2192488"},{"key":"ref19","author":"gradshteyn","year":"2007","journal-title":"Table of Integrals Series and Products"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2229988"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654851"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2339323"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2345763"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.110813.121671"},{"key":"ref2","first-page":"28c33","article-title":"On physical layer security for cognitive radio networks","volume":"27","author":"shu","year":"2013","journal-title":"IEEE Network"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.12.110670"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2275201"},{"key":"ref21","author":"abramowitz","year":"1972","journal-title":"Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables"}],"event":{"name":"2015 21st Asia-Pacific Conference on Communications (APCC)","location":"Kyoto","start":{"date-parts":[[2015,10,14]]},"end":{"date-parts":[[2015,10,16]]}},"container-title":["2015 21st Asia-Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7400333\/7412489\/07412531.pdf?arnumber=7412531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:00:42Z","timestamp":1490086842000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7412531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/apcc.2015.7412531","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}