{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T07:30:44Z","timestamp":1767079844510,"version":"3.48.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ETH Research Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Signal Process."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tsp.2025.3624986","type":"journal-article","created":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T18:01:12Z","timestamp":1761242472000},"page":"5152-5167","source":"Crossref","is-referenced-by-count":0,"title":["Universal MIMO Jammer Mitigation via Subspace Hiding"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6848-0213","authenticated-orcid":false,"given":"Gian","family":"Marti","sequence":"first","affiliation":[{"name":"Department of Information Technology and Electrical Engineering, ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8950-6267","authenticated-orcid":false,"given":"Christoph","family":"Studer","sequence":"additional","affiliation":[{"name":"Department of Information Technology and Electrical Engineering, ETH Zurich, Zurich, Switzerland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF59524.2023.10476844"},{"journal-title":"5G NR The Next Generation Wireless Access Technology.","year":"2020","author":"Dahlman","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756977"},{"year":"2021","key":"ref5","article-title":"Potential threat vectors to 5G infrastructure"},{"article-title":"Means for and method of secret signaling","year":"1946","author":"Guanella","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/26.339839"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_26355"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1985.1096223"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21522"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741871"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF53345.2021.9723334"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2932068"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3051974"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7649"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OJCAS.2021.3105228"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3172989"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3177665"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2746007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2902074"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2978192"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228622"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997478"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2535906"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3109031"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771672"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2023.3246226"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278647"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2025.3536012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/9781108303453"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288367"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/78.934138"},{"article-title":"The matrix cookbook","year":"2012","author":"Petersen","key":"ref35"},{"article-title":"Joint jammer mitigation and data detection","year":"2025","author":"Marti","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/imanum\/8.1.141"},{"article-title":"\u201cA field guide to forward-backward splitting with a FASTA implementation,\u201d","year":"2016","author":"Goldstein","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907970"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-014-9632-3"},{"key":"ref42","first-page":"1","article-title":"Practical and optimal LSH for angular distance","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"28","author":"Andoni","year":"2015"},{"volume-title":"Introduction G\u00e9om\u00e9trique \u00e0 Quelques Th\u00e9ories Physiques.","year":"1914","author":"Borel","key":"ref43"},{"article-title":"\u201cThe stochastic operator approach to random matrix theory,\u201d","year":"2005","author":"Sutton","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2014.2310220"},{"key":"ref46","article-title":"Study on channel model for frequencies from 0.5 to 100 GHz"},{"key":"ref47","article-title":"5G; NR; Base station (BS) radio transmission and reception"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3319818"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1421929"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.10073"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1561\/2200000079"}],"container-title":["IEEE Transactions on Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/78\/10807692\/11215831.pdf?arnumber=11215831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T07:26:17Z","timestamp":1767079577000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11215831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/tsp.2025.3624986","relation":{},"ISSN":["1053-587X","1941-0476"],"issn-type":[{"type":"print","value":"1053-587X"},{"type":"electronic","value":"1941-0476"}],"subject":[],"published":{"date-parts":[[2025]]}}}