{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:52:38Z","timestamp":1744217558568,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024594","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T16:26:54Z","timestamp":1504542414000},"page":"602-607","source":"Crossref","is-referenced-by-count":5,"title":["Communication with partial noisy feedback"],"prefix":"10.1109","author":[{"given":"Gang","family":"Wang","sequence":"first","affiliation":[]},{"family":"Yanyuan Qin","sequence":"additional","affiliation":[]},{"family":"Chengjuan Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TWC.2013.010214.130929"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TVT.2015.2501461"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3933","DOI":"10.1109\/TWC.2009.081049","article-title":"Improving efficiency of resource usage in two-hop full duplex relay systems based on resource sharing and interference cancellation","volume":"8","author":"ju","year":"2009","journal-title":"IEEE Trans Wireless Commun"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TWC.2009.080542"},{"key":"ref14","first-page":"2351","article-title":"Study of relay selection in a multi-cell cognitive network","volume":"11","author":"chen","year":"2012","journal-title":"IEEE Wireless Commun Lett"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.2008.928990"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/MCOM.2015.7081071"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SECON.2004.1287906"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2008.921861"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.2008.921908"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIFS.2014.2307672"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2015.2390136"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCOMM.2013.111213.130235"},{"key":"ref7","article-title":"Impact of interence on secrecy capacity in a cognitive radio network","author":"shu","year":"2011","journal-title":"Proc IEEE Globecom"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MWC.2008.4653131"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JPROC.2009.2015717"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TIFS.2011.2144585","article-title":"An information secrecy game in cognitive ratio networks","volume":"6","author":"wu","year":"2011","journal-title":"IEEE Trans Inform Forensics and Security"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2017,7,3]]},"location":"Heraklion, Greece","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024594.pdf?arnumber=8024594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T23:52:27Z","timestamp":1570060347000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024594","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}