{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:32:02Z","timestamp":1729675922229,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/iccchinaw.2015.7961590","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T17:35:54Z","timestamp":1499708154000},"page":"110-114","source":"Crossref","is-referenced-by-count":0,"title":["Joint cooperative jamming and beamforming for secure transmission in two-cell networks"],"prefix":"10.1109","author":[{"family":"Lin Hu","sequence":"first","affiliation":[]},{"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Tang","sequence":"additional","affiliation":[]},{"family":"Zhen-Qing He","sequence":"additional","affiliation":[]},{"family":"Jian Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288501"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2111750"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158487"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2293979"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2336092"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9540-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2367415"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TIFS.2011.2144585","article-title":"An information secrecy game in cognitive radio networks","volume":"6","author":"wu","year":"2011","journal-title":"IEEE Trans Inf Forensics Security"},{"journal-title":"Physical Layer Security in Wireless Communications","year":"2013","author":"zhou","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6510-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2012.0300"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523806"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.010912.110283"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2014.030514.140092"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2269617"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2094612"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.904811"}],"event":{"name":"2015 IEEE\/CIC International Conference on Communications in China - Workshops (CIC\/ICCC)","start":{"date-parts":[[2015,11,2]]},"location":"Shenzhen, China","end":{"date-parts":[[2015,11,4]]}},"container-title":["2015 IEEE\/CIC International Conference on Communications in China - Workshops (CIC\/ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7954561\/7961565\/07961590.pdf?arnumber=7961590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T06:08:50Z","timestamp":1569737330000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7961590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iccchinaw.2015.7961590","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}