{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T09:08:00Z","timestamp":1778663280509,"version":"3.51.4"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Japan JSPS","award":["15H02692"],"award-info":[{"award-number":["15H02692"]}]},{"name":"National Key R&D Program of China","award":["2017YFB1400700"],"award-info":[{"award-number":["2017YFB1400700"]}]},{"name":"Shaanxi Science & Technology Co-ordination & Innovation Project","award":["2016KTZDGY05-07-01"],"award-info":[{"award-number":["2016KTZDGY05-07-01"]}]},{"name":"China NSFC","award":["U1536202"],"award-info":[{"award-number":["U1536202"]}]},{"name":"China NSFC","award":["61571352"],"award-info":[{"award-number":["61571352"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/tcomm.2018.2865930","type":"journal-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T18:39:15Z","timestamp":1534531155000},"page":"623-638","source":"Crossref","is-referenced-by-count":54,"title":["Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3248-5909","authenticated-orcid":false,"given":"Yuanyu","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-705X","authenticated-orcid":false,"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9739-1930","authenticated-orcid":false,"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9785-8350","authenticated-orcid":false,"given":"Shoji","family":"Kasahara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"abramowitz","year":"1972","journal-title":"Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables"},{"key":"ref38","author":"bibinger","year":"2013","journal-title":"Notes on the Sum and Maximum of Independent Exponentially Distributed Random Variables With Different Scale Parameters"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2689759"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564730"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2360202"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2340879"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807945"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2463280"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2580153"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2366136"},{"key":"ref10","first-page":"113","article-title":"Eavesdropper-tolerance capability in two-hopwireless networks via cooperative jamming","volume":"29","author":"zhang","year":"2015","journal-title":"Wireless Adhoc and Sensor Networks"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.145"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/TSC.2015.2478453","article-title":"On secure wireless communications for service oriented computing","volume":"11","author":"zhang","year":"2015","journal-title":"IEEE Trans Services Comput"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2497663"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2501461"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815897"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2600674"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2773059"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.092813.131367"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2611614"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883669"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2634559"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163598"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2700438"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6549288"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2505715"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7143326"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2260875"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736746"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2565579"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2566298"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417123"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/TWC.2011.060811.102120","article-title":"Resource sharing optimization for device-to-device communication underlaying cellular networks","volume":"10","author":"yu","year":"2011","journal-title":"IEEE Trans Wireless Commun"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825484"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2477998"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2789022"},{"key":"ref44","year":"2018","journal-title":"C++ Simulator for Mode Selection and Spectrum Partition in D2D Communications Underlaying Cellular Networks With PHY Security Consideration"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2498171"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2476075"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2379633"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/8612982\/08438892.pdf?arnumber=8438892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:08:06Z","timestamp":1657746486000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8438892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":44,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2018.2865930","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}