{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:27Z","timestamp":1772905407910,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3272769","type":"journal-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T18:44:45Z","timestamp":1683139485000},"page":"2945-2960","source":"Crossref","is-referenced-by-count":26,"title":["Physical Layer Security in Downlink of Cell-Free Massive MIMO With Imperfect CSI"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1950-0083","authenticated-orcid":false,"given":"Deeb Assad","family":"Tubail","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, Lakehead University, Thunder Bay, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0237-8002","authenticated-orcid":false,"given":"Malek","family":"Alsmadi","sequence":"additional","affiliation":[{"name":"School of Engineering Technology, Trades, and Aviation, Confederation College, Thunder Bay, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3868-4447","authenticated-orcid":false,"given":"Salama","family":"Ikki","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Lakehead University, Thunder Bay, ON, Canada"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.072612.110686"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2014-85"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037045"},{"key":"ref34","volume":"11","author":"bj\u00f6rnson","year":"2017","journal-title":"Massive MIMO Networks Spectral Energy and Hardware Efficiency"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254184"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/T-VT.1984.24001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3227284"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2008.4641674"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2655515"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2698449"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref33","volume":"1","author":"kay","year":"1993","journal-title":"Fundamentals of Statistical Signal Processing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2021.3060974"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316799895"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872715"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000810"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2883150"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2008254"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2018.8478872"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885682"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2901825"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2500578"},{"key":"ref24","first-page":"1","article-title":"Optimal downlink transmission for cell-free SWIPT massive MIMO systems with active eavesdropping","volume":"15","author":"alageli","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/9781118032701"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2919584"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2303942"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824259"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2837132"},{"key":"ref47","author":"grant","year":"2014","journal-title":"CVX Matlab Software for Disciplined Convex Programming Version 2 1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2551685"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646666"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.12.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647876"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.936019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP49889.2020.9299675"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/nla.2246"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564988"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2006.354768"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817264"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2703159"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992629"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981967"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2990709"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2987311"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10114982.pdf?arnumber=10114982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:01:06Z","timestamp":1686592866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10114982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3272769","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}