{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:11:09Z","timestamp":1725736269328},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500799","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:49:21Z","timestamp":1628282961000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Reinforce Security: A Model-Free Approach Towards Secure Wiretap Coding"],"prefix":"10.1109","author":[{"given":"Rick","family":"Fritschek","sequence":"first","affiliation":[{"name":"Freie Universit&#x00E4;t Berlin,Heisenberg Communications and Information Theory Group"}]},{"given":"Rafael F.","family":"Schaefer","sequence":"additional","affiliation":[{"name":"Universit&#x00E4;t Siegen,Lehrstuhl f&#x00FC;r Nachrichtentechnik\/Kryptographie und Sicherheit"}]},{"given":"Gerhard","family":"Wunder","sequence":"additional","affiliation":[{"name":"Freie Universit&#x00E4;t Berlin,Heisenberg Communications and Information Theory Group"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553233"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053216"},{"article-title":"MINE: Mutual information neural estimation","year":"2018","author":"belghazi","key":"ref12"},{"key":"ref13","first-page":"5025","article-title":"Conditional mutual information neural estimator","author":"molavipour","year":"2020","journal-title":"Proc IEEE Int Conf Acoustics Speech Signal Process"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645416"},{"article-title":"Deep reinforcement learning autoencoder with noisy feedback","year":"2018","author":"goutay","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-053018-023825"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154239"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815464"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024579"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683409"},{"key":"ref8","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761681"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644250"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref22","article-title":"Incorporating Nesterov momentum into Adam","author":"dozat","year":"2016","journal-title":"Proc 4th Int Conf Learning Representations Workshops"},{"journal-title":"Reinforcement Learning An Introduction","year":"2018","author":"sutton","key":"ref21"},{"article-title":"Simulations ICC 2021","year":"2021","author":"fritschek","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2494594"},{"key":"ref25","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"dean","year":"2015","journal-title":"Software Available"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500799.pdf?arnumber=9500799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:08:16Z","timestamp":1659485296000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500799","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}