{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:12:55Z","timestamp":1771330375900,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1806903"],"award-info":[{"award-number":["2020YFB1806903"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation","doi-asserted-by":"publisher","award":["U1834210"],"award-info":[{"award-number":["U1834210"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005023","name":"State Key Laboratory of Rail Traffic Control and Safety","doi-asserted-by":"publisher","award":["RCS2019ZT011"],"award-info":[{"award-number":["RCS2019ZT011"]}],"id":[{"id":"10.13039\/501100005023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007085","name":"Research Plan Program of National University of Defense Technology","doi-asserted-by":"publisher","award":["ZK20-40"],"award-info":[{"award-number":["ZK20-40"]}],"id":[{"id":"10.13039\/501100007085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/twc.2021.3049312","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T19:36:20Z","timestamp":1614281780000},"page":"3350-3364","source":"Crossref","is-referenced-by-count":40,"title":["Reconfigurable Intelligent Surface: Reflection Design Against Passive Eavesdropping"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4151-5126","authenticated-orcid":false,"given":"Junshan","family":"Luo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2014-7611","authenticated-orcid":false,"given":"Fanggang","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4132-8750","authenticated-orcid":false,"given":"Shilian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7017-8259","authenticated-orcid":false,"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.122012.122414"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149292"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120813"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2961357"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2905197"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2689769"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2525777"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2924214"},{"key":"ref11","article-title":"Physical layer security enhancement exploiting intelligent reflecting surface","author":"feng","year":"2019","journal-title":"arXiv 1911 02766"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2943559"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992613"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2969629"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007043"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1109\/LCOMM.2013.040213.122870","article-title":"Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels","volume":"17","author":"li","year":"2013","journal-title":"IEEE Commun Lett"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2834301"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2948632"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2958916"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900107"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2195339"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3004197"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2772261"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007057"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000811"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007060"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700659"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2919685"},{"key":"ref1","author":"aho","year":"2019","journal-title":"Key drivers and research challenges for 6G ubiquitous wireless intelligence"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TIFS.2010.2052253","article-title":"Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis","volume":"5","author":"wal","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080910"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2147314"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/9781119375692"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2347297"},{"key":"ref25","author":"john proakis","year":"2008","journal-title":"Digital Communications"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/9426619\/09328149.pdf?arnumber=9328149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T14:08:21Z","timestamp":1634652501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9328149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":36,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/twc.2021.3049312","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}