{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:04:12Z","timestamp":1767211452387,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2017YFB0801702"],"award-info":[{"award-number":["2017YFB0801702"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871045"],"award-info":[{"award-number":["61871045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"111 Project of China","award":["B16006"],"award-info":[{"award-number":["B16006"]}]},{"name":"BUPT Excellent Ph.D. Students Foundation","award":["CX2019308"],"award-info":[{"award-number":["CX2019308"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/jsyst.2018.2890039","type":"journal-article","created":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T19:42:25Z","timestamp":1547235745000},"page":"2476-2487","source":"Crossref","is-referenced-by-count":29,"title":["Joint Power and Sub-Channel Allocation for Secure Transmission in NOMA-Based mMTC Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6257-7732","authenticated-orcid":false,"given":"Shujun","family":"Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4245-5989","authenticated-orcid":false,"given":"Xiaodong","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9518-1622","authenticated-orcid":false,"given":"Xiaofeng","family":"Tao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0269-104X","authenticated-orcid":false,"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2650992"},{"article-title":"A quantitative measure of fairness and discrimination for resource allocation in shared computer systems","year":"1984","author":"jain","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2725698"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2696527"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2539162"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2650987"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.879350"},{"journal-title":"Parallel and Distributed Computation Numerical Methods","year":"1989","author":"bertsekas","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2452908"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718778215"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s40595-013-0010-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2765344"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2606103"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700410"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565189"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7022998"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2014.6933459"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2521374"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2780172"},{"year":"2015","key":"ref4","article-title":"Internet of Things research study"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600141WC"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2778766"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2695525"},{"year":"2017","key":"ref5","article-title":"study on new radio (NR) access technology (Release 14)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600618"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2641423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500284WC"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2724442"},{"year":"2015","key":"ref1","article-title":"Framework and overall objectives of the future development of IMT for 2020 and beyond [R] ITU-R M.2083-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355579"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600113NM"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"journal-title":"Game Theory in Wireless and Communication Networks","year":"2012","author":"han","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e19080420"},{"journal-title":"Convex optimization","year":"2008","author":"boyd","key":"ref41"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2011","author":"stallings","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2466548"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.021611.101376"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2575863"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/8811839\/08610151.pdf?arnumber=8610151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:13:58Z","timestamp":1657746838000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8610151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":43,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2018.2890039","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2019,9]]}}}