{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:33:43Z","timestamp":1730284423112,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/nana.2018.8648704","type":"proceedings-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T02:36:15Z","timestamp":1551148575000},"page":"14-21","source":"Crossref","is-referenced-by-count":2,"title":["Cooperative Jamming for Secrecy of Wireless Communications"],"prefix":"10.1109","author":[{"given":"Baihe","family":"Ma","sequence":"first","affiliation":[]},{"given":"Zhihong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s18020331"},{"key":"ref11","first-page":"23","article-title":"Gaining insight on friendly jamming in a real-world ieee 802.11 network","author":"berger","year":"2014","journal-title":"ACM WiSec"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2059057"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.061511.102257"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2778185"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524448"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600119NM"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","article-title":"Deep learning in neural networks: An overview","volume":"61","year":"2015","journal-title":"Neural Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355562"},{"journal-title":"Post-quantum crypto project","year":"2016","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155875"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref8","article-title":"3d wireless network monitoring using virtual reality and augmented reality","author":"siddiqi","year":"2018","journal-title":"US Patent App"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1618130114"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038394"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313426"},{"key":"ref21","first-page":"56","article-title":"An overview of genetic algorithms: Part 1, fundamentals","volume":"15","author":"beasley","year":"1993","journal-title":"University Computing"}],"event":{"name":"2018 International Conference on Networking and Network Applications (NaNA)","start":{"date-parts":[[2018,10,12]]},"location":"Xi'an, China","end":{"date-parts":[[2018,10,15]]}},"container-title":["2018 International Conference on Networking and Network Applications (NaNA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8638646\/8648703\/08648704.pdf?arnumber=8648704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:04:53Z","timestamp":1643267093000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8648704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/nana.2018.8648704","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}