{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:40:19Z","timestamp":1761745219776,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R007934\/1"],"award-info":[{"award-number":["EP\/R007934\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/jiot.2019.2958420","type":"journal-article","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T20:32:50Z","timestamp":1584045170000},"page":"2293-2308","source":"Crossref","is-referenced-by-count":15,"title":["Device-Centric Distributed Antenna Transmission: Secure Precoding and Antenna Selection With Interference Exploitation"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0584-5566","authenticated-orcid":false,"given":"Zhongxiang","family":"Wei","sequence":"first","affiliation":[]},{"given":"Christos","family":"Masouros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2560815"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2815541"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2720733"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2695448"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2088395"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080053"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2551618"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2781647"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2528243"},{"journal-title":"Interference Exploitation Precoding Made Practical Optimal Closed-Form Solution for PSK Modulations","year":"2017","author":"li","key":"ref34"},{"journal-title":"Towards Optimal Secure Distributed Storage Systems with Exact Repair","year":"2013","author":"tandon","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2512919"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2267738"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2789293"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2078810"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2558164"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2664860"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2354312"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2007.896196"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070425"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2008.2005542"},{"journal-title":"Rethinking Secure Precoding via Interference Exploitation A Smart Eavesdropper Perspective","year":"2019","author":"xu","key":"ref69"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761728"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683680"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2474390"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2094610"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2253771"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825944"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2776114"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2612636"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2587323"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2552165"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"ref59","first-page":"148","article-title":"ComSen: A detection system for identifying compromised nodes in wireless sensor networks","author":"wang","year":"2012","journal-title":"Proc IEEE Int Conf Emerg Security Inf Syst Technol"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127463"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2222386"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2498934"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850123"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"journal-title":"D2 3 Energy Efficiency Analysis of the Reference Systems Areas of Improvements and Target Breakdown","year":"2010","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2309942"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref13","first-page":"2321","article-title":"Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel","author":"sakoorian","year":"2012","journal-title":"Proc Int Symp Inf Theory"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2824310"},{"key":"ref15","article-title":"On secure transmission mixed RF-FSO system with TAS and imperfect CSI","author":"lei","year":"2018","journal-title":"arVix 1809 01503"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref17","first-page":"1906","article-title":"Secret communication using artificial noise","author":"negi","year":"2012","journal-title":"Proc Veh Technol Conf Fall"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2059057"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2238687"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2814047"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2432753"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2796124"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2462350"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2497678"},{"journal-title":"Federal Communications Commission Order 11&#x2013;50 (PDF)","year":"2014","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2015.2396901"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2","year":"2008","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.241"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120012"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2844403"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9034528\/08928979.pdf?arnumber=8928979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:26:13Z","timestamp":1651080373000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8928979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":69,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2958420","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}