{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:48:23Z","timestamp":1767772103248,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icct46805.2019.8947305","type":"proceedings-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:42:22Z","timestamp":1578012142000},"page":"113-117","source":"Crossref","is-referenced-by-count":4,"title":["A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels"],"prefix":"10.1109","author":[{"given":"Li","family":"Yao","sequence":"first","affiliation":[]},{"given":"Linning","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Guyue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2814607"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972559"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1007\/s11227-014-1247-1","article-title":"Efficient and secure key extraction using channel state information","volume":"70","author":"zhi","year":"2014","journal-title":"Journal of Supercomputing"},{"key":"ref13","article-title":"Efficient and secure key extraction using csi without chasing down errors","author":"zhao","year":"2012","journal-title":"arXiv preprint arXiv 1208 0688"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2842215"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref17","article-title":"Guidelines for evaluation of radio transmission technologies for imt-2000","author":"recommendation","year":"1997","journal-title":"ITU-R Rec M 1225"},{"key":"ref18","article-title":"Experimental study of ofdm implementation utilizing gnu radio and usrp -sdr","author":"marwanto","year":"2010","journal-title":"IEEE Malaysia International Conference on Communications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9781119057246.ch1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.651026"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TIFS.2010.2052253","article-title":"Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis","volume":"5","author":"wallace","year":"2010","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"ref5","first-page":"332","article-title":"A survey on secret key generation mechanisms on the physical layer in wireless networks,&#x201D; Security & Communication Networks","volume":"8","author":"shehadeh","year":"2015"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"4962","DOI":"10.1109\/TSP.2013.2269049","article-title":"Improving physical layer secrecy using full-duplex jamming receivers","volume":"61","author":"gan","year":"2013","journal-title":"IEEE Transactions on Signal Processing"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"4464","DOI":"10.1109\/ACCESS.2016.2604618","article-title":"Experimental study on key generation for physical layer security in wireless communications","volume":"4","author":"zhang","year":"2017","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2016.7444407"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2780172"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2875708"}],"event":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2019,10,16]]},"location":"Xi'an, China","end":{"date-parts":[[2019,10,19]]}},"container-title":["2019 IEEE 19th International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8943077\/8946993\/08947305.pdf?arnumber=8947305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:47Z","timestamp":1658094527000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8947305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icct46805.2019.8947305","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}