{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:34:44Z","timestamp":1763202884716,"version":"3.37.3"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"College of Engineering of Kennesaw State University and Howard University\u2019s NSF","award":["2200640"],"award-info":[{"award-number":["2200640"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2024.3373476","type":"journal-article","created":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T19:24:27Z","timestamp":1709666667000},"page":"2884-2902","source":"Crossref","is-referenced-by-count":5,"title":["Physical-Layer Security in Mixed UOWC-RF Networks With Energy Harvesting Relay Against Multiple Eavesdroppers"],"prefix":"10.1109","volume":"5","author":[{"given":"Moloy Kumar","family":"Ghosh","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5151-8545","authenticated-orcid":false,"given":"Milton","family":"Kumar Kundu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3812-8635","authenticated-orcid":false,"given":"MD.","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Institute of Information and Communication Technology, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0895-4450","authenticated-orcid":false,"given":"A. S. M.","family":"Badrudduza","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6986-6847","authenticated-orcid":false,"given":"MD. Shamim","family":"Anower","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8461-6547","authenticated-orcid":false,"given":"Imran Shafique","family":"Ansari","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow, U.K."}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Annie","family":"Solomon","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Kennesaw State University, Kennesaw, GA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sumit","family":"Chakravarty","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Kennesaw State University, Kennesaw, GA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6465-532X","authenticated-orcid":false,"given":"Imtiaz","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8046-2376","authenticated-orcid":false,"given":"Heejung","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Electronics and Information Engineering, Korea University, Sejong, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.07.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/su9101848"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2023.12.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3012281"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2829747"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113128"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3139118"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2391531"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2515664"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2404777"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081079"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2812889"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2015.7127689"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2870377"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2020.126309","article-title":"Outage analysis of wireless-powered relaying FSO-RF systems with nonlinear energy harvesting","volume":"477","author":"Zhang","year":"2020","journal-title":"Opt. Commun."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2019.125219","article-title":"Wireless energy harvesting based asymmetric RF\/FSO system with transmit antenna selection and receive diversity over M-distribution channel and non-zero boresight pointing error","volume":"461","author":"Odeyemi","year":"2020","journal-title":"Opt. Commun."},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2020.125774","article-title":"Co-operative RF-UWOC link performance over hyperbolic tangent log-normal distribution channel with pointing errors","volume":"469","author":"Ramavath","year":"2020","journal-title":"Opt. Commun."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746368"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3029529"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3102837"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145142"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3118569"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3058670"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP50017.2020.9231044"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s21093197"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3357596"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3331575"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2859446"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3063446"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078062"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095852"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3331593"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2809695"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998742"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2020.126193","article-title":"Secrecy enhancement of RF backhaul system with parallel FSO communication link","volume":"475","author":"Ai","year":"2020","journal-title":"Opt. Commun."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2940569"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3113010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3078610"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2017.2785245"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1117\/1.oe.60.6.066102"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMMNET.2019.8742355"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053323"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3123515"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2497663"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206050"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2820709"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3123134"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2017.8076513"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE50131.2020.9260703"},{"issue":"8","key":"ref53","doi-asserted-by":"crossref","first-page":"205","DOI":"10.3390\/fi13080205","article-title":"Cascaded \u03ba-\u03bc fading channels with colluding and non-colluding eavesdroppers: Physical-layer security analysis","volume":"13","author":"Tashman","year":"2021","journal-title":"Future Internet"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-018-1565-2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2891542"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3214112"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMMNET.2019.8742387"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2281213"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048614"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2935047"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2925736"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2453418"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3128572"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2764387"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1115\/1.3452897"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3086026"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101177"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914227"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1201\/9780203487372"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2023.3253020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEEE54957.2022.9836431"},{"volume-title":"MeijerG","year":"2023","key":"ref72"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/10362961\/10460296.pdf?arnumber=10460296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T04:44:16Z","timestamp":1715748256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10460296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3373476","relation":{},"ISSN":["2644-125X"],"issn-type":[{"type":"electronic","value":"2644-125X"}],"subject":[],"published":{"date-parts":[[2024]]}}}