{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T06:35:33Z","timestamp":1718519733950},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/tvt.2016.2645702","type":"journal-article","created":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T19:06:47Z","timestamp":1482952007000},"page":"6449-6460","source":"Crossref","is-referenced-by-count":8,"title":["Minimizing Secrecy Outage Probability in Multiuser Wireless Systems With Stochastic Traffic"],"prefix":"10.1109","volume":"66","author":[{"given":"Xuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2572681"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/06067746X"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842226"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195669"},{"key":"ref11","first-page":"956","article-title":"Physical layer built-in security analysis and enhancement of CDMA systems","author":"li","year":"2005","journal-title":"Proc IEEE Military Commun Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.832029"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605889"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195477"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921861"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Found Trends Commun Inf Theory"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79995-2","author":"neely","year":"2010","journal-title":"Stochastic Network Optimization with Application to Communication and Queueing Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.011811.102433"},{"key":"ref27","first-page":"9","article-title":"Cross-layer scheduling for physical layer secrecy and queue stability in a multi-user system","author":"wang","year":"2013","journal-title":"Proc IEEE Globecom"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"ref7","first-page":"25","article-title":"Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks","author":"liu","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848161"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158487"},{"key":"ref22","first-page":"249","article-title":"Wireless broadcast networks: Reliability, security, and stability","author":"liang","year":"2008","journal-title":"Proc Inf Theory Appl Workshop"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683470"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462158"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757464"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2155650"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2011.5743591"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/7981437\/07801163.pdf?arnumber=7801163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T04:24:11Z","timestamp":1658291051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7801163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":32,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2016.2645702","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}