{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:50:20Z","timestamp":1740181820288,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Luxembourg National Research Fund Project, titled Exploiting Interference for Physical Layer Security in 5G Networks"},{"name":"ECLECTIC FNR Project, Energy and Complexity Efficient Millimeter-Wave Large-Array Communications"},{"DOI":"10.13039\/501100000781","name":"European Research Council under Horizon 2020","doi-asserted-by":"publisher","award":["742648, AGNOSTIC"],"award-info":[{"award-number":["742648, AGNOSTIC"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/ojcoms.2020.2989738","type":"journal-article","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:10:07Z","timestamp":1588032607000},"page":"535-549","source":"Crossref","is-referenced-by-count":7,"title":["Learning-Assisted Eavesdropping and Symbol-Level Precoding Countermeasures for Downlink MU-MISO Systems"],"prefix":"10.1109","volume":"1","author":[{"given":"Abderrahmane","family":"Mayouche","sequence":"first","affiliation":[]},{"given":"Danilo","family":"Spano","sequence":"additional","affiliation":[]},{"given":"Christos G.","family":"Tsinos","sequence":"additional","affiliation":[]},{"given":"Symeon","family":"Chatzinotas","sequence":"additional","affiliation":[]},{"given":"Bjorn","family":"Ottersten","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019"},{"journal-title":"Communication without interception Defense against deep-learning-based modulation detection","year":"2019","author":"hameed","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875926"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2926625"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2404302"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2781647"},{"journal-title":"Deep learning for the gaussian wiretap channel","year":"2018","author":"fritschek","key":"ref35"},{"key":"ref34","article-title":"Wiretap code design by neural network autoencoders","author":"besser","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref10","article-title":"Physical layer based message authentication with secure channel codes","author":"chen","year":"2018","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/atsip.2013.9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700392"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802835"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014244"},{"journal-title":"Rethinking Secure Precoding via Interference Exploitation A Smart Eavesdropper Perspective","year":"2019","author":"xu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.862421"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890905"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2222946"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.821107"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2837001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2815541"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090354"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2600521"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825159"},{"journal-title":"Cisco visual networking index Forecast and trends 2017&#x2013;2022","year":"2019","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2148715"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2841349"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080053"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2712604"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2088395"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2626279"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2360514"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963857"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2528243"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/8816718\/09079474.pdf?arnumber=9079474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:07:54Z","timestamp":1641949674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9079474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2020.2989738","relation":{},"ISSN":["2644-125X"],"issn-type":[{"type":"electronic","value":"2644-125X"}],"subject":[],"published":{"date-parts":[[2020]]}}}