{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:57:39Z","timestamp":1725778659966},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iccchina.2018.8641174","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T23:51:51Z","timestamp":1550188311000},"page":"168-173","source":"Crossref","is-referenced-by-count":4,"title":["Secrecy Outage Performance of Buffer-Aided Underlay Cognitive Relay Networks with Outdated CSI"],"prefix":"10.1109","author":[{"given":"Chen","family":"Wei","sequence":"first","affiliation":[]},{"given":"Wendong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xuanxuan","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Tinghui","family":"Yin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387621"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2187691"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2015.12.018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2695500"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.081561"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2364576"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2217327"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158487"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464703"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2564380"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4653131"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2365808"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2016.7581500"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.032712.111970"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2529704"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015717"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2015.7448612"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2011.5779318"}],"event":{"name":"2018 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2018,8,16]]},"location":"Beijing, China","end":{"date-parts":[[2018,8,18]]}},"container-title":["2018 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8636844\/8641082\/08641174.pdf?arnumber=8641174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:57:12Z","timestamp":1643270232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8641174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2018.8641174","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}