{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T05:04:47Z","timestamp":1748063087739,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icassp.2015.7178504","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T22:45:43Z","timestamp":1439419543000},"page":"2914-2918","source":"Crossref","is-referenced-by-count":17,"title":["An attack on antenna subset modulation for millimeter wave communication"],"prefix":"10.1109","author":[{"given":"Cristian","family":"Rusu","sequence":"first","affiliation":[]},{"given":"Nuria","family":"Gonzalez-Prelcic","sequence":"additional","affiliation":[]},{"given":"Robert W.","family":"Heath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TWC.2009.080910"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/PIMRC.2008.4699782"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIT.2010.2054593"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIT.2011.2158487"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TSP.2010.2078810"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.2012.2204534"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICASSP.2014.6854346"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JSTSP.2010.2042414"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s00041-012-9235-4"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-1-4419-1385-2"},{"key":"ref3","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Foundations and Trends in Communications and Information Theory"},{"year":"2013","author":"zhou","journal-title":"Physical Layer Security in Wireless Communications","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1017\/CBO9780511977985"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TAP.2009.2027047"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TCOMM.2013.061013.120459"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIT.2008.921908"},{"year":"2014","author":"rappaport","journal-title":"Millimeter Wave Wireless Communications","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TAP.2010.2046854"}],"event":{"name":"ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2015,4,19]]},"location":"South Brisbane, Queensland, Australia","end":{"date-parts":[[2015,4,24]]}},"container-title":["2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7158221\/7177909\/07178504.pdf?arnumber=7178504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T19:55:37Z","timestamp":1490385337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7178504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icassp.2015.7178504","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}