{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:02:14Z","timestamp":1760598134714,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801115,61941115"],"award-info":[{"award-number":["61801115,61941115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/vtc2021-fall52928.2021.9625252","type":"proceedings-article","created":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T20:44:53Z","timestamp":1639169093000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Secret Key Generation for FDD Systems Based on Complex-Valued Neural Network"],"prefix":"10.1109","author":[{"given":"Xinwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guyue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zongyue","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3027774"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761962"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2934851"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3109272"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2005.1543924"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934895"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9048929"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref19","first-page":"410","article-title":"Secret-Key Reconciliation by Public Discussion","author":"brassard","year":"1993","journal-title":"Proc EUROCRYPT &#x2018;93"},{"key":"ref4","article-title":"Method and apparatus for performing JRNSO in FDD, TDD and MIMO communications","author":"goldberg","year":"2013","journal-title":"U S Patent"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2924420"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594143"},{"key":"ref5","first-page":"1297","article-title":"A secret key generation method based on CSI in OFDM-FDD system","author":"wu","year":"2013","journal-title":"Proc IEEE GLOBECOM Workshops (GC Wkshps)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2842215"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5120\/cae2017652715","article-title":"Channel-based secret key establishment for FDD wireless communication systems","volume":"7","author":"allam","year":"2017","journal-title":"Commun Appl Electron"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4570-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2875708"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"journal-title":"Remcom Wireless Insite","year":"0","key":"ref22"},{"key":"ref21","first-page":"1","article-title":"DeepMIMO: A Generic Deep Learning Dataset for Millimeter Wave and Massive MIMO Applications","author":"alkhateeb","year":"2019","journal-title":"Proc Inf Theory Appl Workshop (ITA)"},{"journal-title":"Complex-Valued Neural Networks in Keras with Tensorflow","year":"2019","author":"dramsch","key":"ref24"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref23"},{"key":"ref25","article-title":"Deep complex networks","author":"trabelsi","year":"2017","journal-title":"ArXiv Preprint"}],"event":{"name":"2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall)","start":{"date-parts":[[2021,9,27]]},"location":"Norman, OK, USA","end":{"date-parts":[[2021,9,30]]}},"container-title":["2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624467\/9625043\/09625252.pdf?arnumber=9625252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:41Z","timestamp":1652201621000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9625252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/vtc2021-fall52928.2021.9625252","relation":{},"subject":[],"published":{"date-parts":[[2021,9]]}}}