{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:16:16Z","timestamp":1761581776531,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/wcsp.2018.8555525","type":"proceedings-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T19:04:40Z","timestamp":1544641480000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Secrecy Outage Analysis for DF Buffer-Aided Multi-Antenna Underlay CRNs"],"prefix":"10.1109","author":[{"given":"Chen","family":"Wei","sequence":"first","affiliation":[]},{"given":"Wendong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xuanxuan","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Pu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2015.7448612"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2015.7387621"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.032712.111970"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2695500"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2217327"},{"key":"ref15","first-page":"704","article-title":"Secrecy outage in MISO systems with partial channel information","volume":"7","author":"sabrina","year":"2012","journal-title":"IEEE Trans Inf Theory"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464703"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2156788"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2497308"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2412152"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2377239"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130816"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2016.7581500"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.011012.110682"}],"event":{"name":"2018 10th International Conference on Wireless Communications and Signal Processing (WCSP)","start":{"date-parts":[[2018,10,18]]},"location":"Hangzhou","end":{"date-parts":[[2018,10,20]]}},"container-title":["2018 10th International Conference on Wireless Communications and Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8520598\/8555523\/08555525.pdf?arnumber=8555525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:38:22Z","timestamp":1598225902000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8555525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2018.8555525","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}