{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:29:54Z","timestamp":1725784194791},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7248670","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T00:40:36Z","timestamp":1441932036000},"page":"2313-2317","source":"Crossref","is-referenced-by-count":3,"title":["Energy efficiency maximization for secure data transmission over DF relay networks"],"prefix":"10.1109","author":[{"given":"Dong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838089"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.13.7.492"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.13.120727"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-54455-2_1","article-title":"Recent advances in DC programming and DCA","author":"dinh","year":"2014","journal-title":"Transactions on Computational Intelligence XIII"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.120911.110139"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/ALLERTON.2008.4797687","article-title":"Secure wireless communications via cooperation","author":"dong","year":"2008","journal-title":"Proc 46th Annu Allerton Conf Commun Control Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2159598"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2161295"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2307276"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.021712.090634"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165948"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120219"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2363453"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2232910"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07248670.pdf?arnumber=7248670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T15:18:18Z","timestamp":1498231098000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7248670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7248670","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}