{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:21:40Z","timestamp":1759335700504},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icaiic57133.2023.10066997","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:38:05Z","timestamp":1679593085000},"page":"281-285","source":"Crossref","is-referenced-by-count":2,"title":["Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches"],"prefix":"10.1109","author":[{"given":"Kyusung","family":"Shim","sequence":"first","affiliation":[{"name":"School of Computer Engineering &#x0026; Applied Mathematics, Hankyong National University,Republic of Korea"}]},{"given":"Beongku","family":"An","sequence":"additional","affiliation":[{"name":"Hongik University,Dept. of Software and Communications Engineering,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010896"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958102"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080425"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2022.3195234"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.110813.121671"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ELINFOCOM.2016.7562946"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2771774"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2941932"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2963841"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s19245456"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1115\/1.3138251"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2787055"}],"event":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2023,2,20]]},"location":"Bali, Indonesia","end":{"date-parts":[[2023,2,23]]}},"container-title":["2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10066849\/10066958\/10066997.pdf?arnumber=10066997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:48:27Z","timestamp":1710395307000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10066997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icaiic57133.2023.10066997","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}