{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:19:18Z","timestamp":1767989958275,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62101384"],"award-info":[{"award-number":["62101384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Key Laboratory of Mobile Communication Technology","award":["cqupt-mct-202101"],"award-info":[{"award-number":["cqupt-mct-202101"]}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R007934\/1"],"award-info":[{"award-number":["EP\/R007934\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/S028455\/1"],"award-info":[{"award-number":["EP\/S028455\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["21511102400"],"award-info":[{"award-number":["21511102400"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62171161"],"award-info":[{"award-number":["62171161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2021A1515011832"],"award-info":[{"award-number":["2021A1515011832"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Key Laboratory","award":["ZDSYS20210623091808025"],"award-info":[{"award-number":["ZDSYS20210623091808025"]}]},{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324133009027\/KQTD20190929172545139"],"award-info":[{"award-number":["JCYJ20210324133009027\/KQTD20190929172545139"]}]},{"DOI":"10.13039\/100010097","name":"Young Elite Scientist Sponsorship Program by the China Association for Science and Technology","doi-asserted-by":"publisher","award":["2020QNRC001."],"award-info":[{"award-number":["2020QNRC001."]}],"id":[{"id":"10.13039\/100010097","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF2110071"],"award-info":[{"award-number":["W911NF2110071"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1109\/jsac.2022.3211556","type":"journal-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:37:33Z","timestamp":1665603453000},"page":"3224-3238","source":"Crossref","is-referenced-by-count":8,"title":["Physical Layer Anonymous Precoding Design: From the Perspective of Anonymity Entropy"],"prefix":"10.1109","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0584-5566","authenticated-orcid":false,"given":"Zhongxiang","family":"Wei","sequence":"first","affiliation":[{"name":"College of Electronic and Information Engineering, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8259-6615","authenticated-orcid":false,"given":"Christos","family":"Masouros","sequence":"additional","affiliation":[{"name":"Department of Electronic and Electrical Engineering, University College London, London, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6917-6050","authenticated-orcid":false,"given":"Ping","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Tongji University, Shanghai, China"}]},{"given":"Xu","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3170-8952","authenticated-orcid":false,"given":"Jingjing","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-7815","authenticated-orcid":false,"given":"Athina P.","family":"Petropulu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rutgers University, New Brunswick, NJ, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.12.081710"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref33","article-title":"Computational workloads for commonly used signal processing kernels","author":"arakawa","year":"2006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2496592"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref30","volume":"1","author":"kay","year":"1993","journal-title":"Fundamental of Statistical Signal Processing Estimation Theory"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2354312"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2869382"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2004.840638"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946818"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.103.2100283"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2939472"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2935768"},{"key":"ref13","first-page":"41","article-title":"Towards an information theoretic metric for anonymity","author":"serjantov","year":"2002","journal-title":"Proc Int Workshop Privacy Enhancing Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2865558"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2962804"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2386658"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2763145"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.06.070402"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55366-1_6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2400131"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958420"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2183771"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2552165"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2776114"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3062755"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838649"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900716"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.145"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2886349"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498472"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3093722"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/778445.778449"},{"key":"ref26","author":"danezis","year":"2006","journal-title":"Introducing anonymous communications properties threat models systems and attack"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070119"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/9946926\/09917463.pdf?arnumber=9917463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:30:12Z","timestamp":1670873412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9917463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":39,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2022.3211556","relation":{},"ISSN":["0733-8716","1558-0008"],"issn-type":[{"value":"0733-8716","type":"print"},{"value":"1558-0008","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11]]}}}