{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:27:14Z","timestamp":1763458034242,"version":"3.37.3"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500554","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:49:21Z","timestamp":1628282961000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["PLS for V2I Communications Using Friendly Jammer and Double kappa-mu Shadowed Fading"],"prefix":"10.1109","author":[{"given":"Neji","family":"Mensi","sequence":"first","affiliation":[{"name":"Howard University,Dept. of Electrical Engineering & Computer Science,Washington, DC,USA,20059"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,Dept. of Electrical Engineering & Computer Science,Washington, DC,USA,20059"}]},{"given":"Elyes","family":"Balti","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin,Wireless Networking and Communications Group,Austin,TX,USA"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.811182"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2722499"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842124"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254526"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15299-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCIENG.2011.6007944"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CEIT.2016.7929040"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841571"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2017.8269745"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CEIT.2016.7929081"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2332164"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2013.6531475"},{"year":"2020","key":"ref28","article-title":"Mathematica, Version 12.1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2945945"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2818697"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIT47043.2019.8987282"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3001340"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF03049732"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2776261"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IC_ASET49463.2020.9318295"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997092"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891073"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2017.7939143"},{"journal-title":"Smart Cities Cybersecurity and Privacy","year":"2018","author":"rawat","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44494-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2894824"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045117"},{"key":"ref24","first-page":"1","article-title":"The double shadowed ? ?&#x00B5; fading model","author":"simmons","year":"2019","journal-title":"2019 International Conference on Wireless and Mobile Computing Networking and Communications (WiMob)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2691352"},{"journal-title":"Table of Integrals Series and Products","year":"2007","author":"gradshteyn","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2008.36"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500554.pdf?arnumber=9500554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:08:45Z","timestamp":1659485325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500554\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500554","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}