{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:09:29Z","timestamp":1761581369634,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/wcsp.2015.7341249","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T16:11:29Z","timestamp":1449159089000},"page":"1-5","source":"Crossref","is-referenced-by-count":17,"title":["Power control and channel access for physical-layer security of D2D underlay communication"],"prefix":"10.1109","author":[{"given":"Yijie","family":"Luo","sequence":"first","affiliation":[]},{"given":"Li","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks","volume":"17","author":"jianting","year":"2013","journal-title":"IEEE Communications Letters"},{"article-title":"Secrecy-based Channel Assignment for Device-to-Device Communication: An Auction Approach","year":"2013","author":"jianting","key":"ref11"},{"key":"ref12","first-page":"229","article-title":"Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective","volume":"63","author":"chuan","year":"2015","journal-title":"IEEE Transactions on Communications"},{"key":"ref13","article-title":"Secure Communications of Cellular Users in Device-to-Device Communication Underlaying Cellular Networks","author":"yuhang","year":"2014","journal-title":"WCSP"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSPA.2015.7081278"},{"key":"ref4","first-page":"133","article-title":"Delay-Aware Cross-Layer Design for Device-to-Device Communications in Future Cellular Systems","volume":"6","author":"wei","year":"2014","journal-title":"IEEE Communications Magazine"},{"key":"ref3","first-page":"90","article-title":"Enable Device-to-Device Communications Underlaying Cellular Networks: Challenges and Research Aspects","volume":"6","author":"lili","year":"2014","journal-title":"IEEE Communications Magazine"},{"key":"ref6","first-page":"136","article-title":"Game-theoretic Resource Allocation Methods for Device-to-Device Communication","volume":"6","author":"lingyang","year":"2014","journal-title":"IEEE Wireless Communications"},{"article-title":"Transmission Capacity of D2D Communication Under Heterogeneous Networks with Multi-Bands","year":"2013","author":"ziyang","key":"ref5"},{"key":"ref8","first-page":"66","article-title":"Secure Device-to-Device Communication in LTE-A","volume":"4","author":"muhammad","year":"2014","journal-title":"IEEE Communications Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554552"},{"key":"ref2","first-page":"20","article-title":"Cellular Traffic Offloading onto Network-Assisted Device-to-Device Connections","author":"sergey","year":"2014","journal-title":"IEEE Communications Magazine"},{"key":"ref1","article-title":"Resource Sharing of Underlaying Device-to-Device and Uplink Cellular Communications. IEEE Communications Letters","volume":"17","author":"jiaheng","year":"2013"},{"key":"ref9","article-title":"Radio Resource Allocation for Physical-Layer Security in D2D Underlay Communications","author":"hang","year":"2014","journal-title":"IEEE ICC"}],"event":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","start":{"date-parts":[[2015,10,15]]},"location":"Nanjing, China","end":{"date-parts":[[2015,10,17]]}},"container-title":["2015 International Conference on Wireless Communications &amp; Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322957\/7340966\/07341249.pdf?arnumber=7341249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:47:34Z","timestamp":1490392054000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7341249\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2015.7341249","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}