{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:51Z","timestamp":1750221051285,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T00:00:00Z","timestamp":1541116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,2]]},"DOI":"10.1145\/3290480.3290489","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T13:37:41Z","timestamp":1544103461000},"page":"100-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Multiple Eavesdropper-Based Physical Layer Security in TAS\/MRC System With Antenna Correlation"],"prefix":"10.1145","author":[{"given":"Gangcan","family":"Sun","sequence":"first","affiliation":[{"name":"School of Information Engineering and, Industrial Technology Research Institute, Zhengzhou University, Zhengzhou, China"}]},{"given":"Mengge","family":"Liu","sequence":"additional","affiliation":[{"name":"Industrial Technology Research Institute, Zhengzhou University, Zhengzhou, China"}]},{"given":"Zhuo","family":"Han","sequence":"additional","affiliation":[{"name":"Industrial Technology Research Institute, Zhengzhou University, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Y. S. Shiu S. Y. Chang H. C. Wu S. C. H. Huang and H. H. Chen. 2011. Physical layer security in wireless networks: a tutorial. In IEEE Wireless Communications(April 2011) 66--74.  Y. S. Shiu S. Y. Chang H. C. Wu S. C. H. Huang and H. H. Chen. 2011. Physical layer security in wireless networks: a tutorial. In IEEE Wireless Communications(April 2011) 66--74.","DOI":"10.1109\/MWC.2011.5751298"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"H. Alves R. D. Souza M. Debbah and M. Bennis. 2012. Performance of Transmit Antenna Selection Physical Layer Security Schemes. In IEEE Signal Processing Letters (June 2012) 372--375.  H. Alves R. D. Souza M. Debbah and M. Bennis. 2012. Performance of Transmit Antenna Selection Physical Layer Security Schemes. In IEEE Signal Processing Letters (June 2012) 372--375.","DOI":"10.1109\/LSP.2012.2195490"},{"key":"e_1_3_2_1_3_1","volume":"201","author":"Yang N.","unstructured":"N. Yang , P. L. Yeoh , M. Elkashlan , R. Schober and J. Yuan. 201 3. MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining. In IEEE Communications Letters (September 2013), 1754--1757. N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober and J. Yuan. 2013. MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining. In IEEE Communications Letters (September 2013), 1754--1757.","journal-title":"J. Yuan."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"L. Wang M. Elkashlan J. Huang R. Schober and R. K. Mallik. 2014. Secure Transmission With Antenna Selection in MIMO Nakagami- m Fading Channels. In IEEE Transactions on Wireless Communications (Nov. 2014) 6054--6067.  L. Wang M. Elkashlan J. Huang R. Schober and R. K. Mallik. 2014. Secure Transmission With Antenna Selection in MIMO Nakagami- m Fading Channels. In IEEE Transactions on Wireless Communications (Nov. 2014) 6054--6067.","DOI":"10.1109\/TWC.2014.2359877"},{"key":"e_1_3_2_1_5_1","volume-title":"2013 13th International Symposium on Communications and Information Technologies (Surat Thani","author":"Shrestha A. P.","year":"2013","unstructured":"A. P. Shrestha , J. Jung and K. S. Kwak . 2013. Secure wireless multicasting in presence of multiple eavesdroppers . 2013 13th International Symposium on Communications and Information Technologies (Surat Thani , 2013 ), 814--817. A. P. Shrestha, J. Jung and K. S. Kwak. 2013. Secure wireless multicasting in presence of multiple eavesdroppers. 2013 13th International Symposium on Communications and Information Technologies (Surat Thani, 2013), 814--817."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"N. Yang P. L. Yeoh M. Elkashlan R. Schober and I. B. Collings. 2013. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels. In IEEE Transactions on Communications (January 2013) 144--154.  N. Yang P. L. Yeoh M. Elkashlan R. Schober and I. B. Collings. 2013. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels. In IEEE Transactions on Communications (January 2013) 144--154.","DOI":"10.1109\/TCOMM.2012.12.110670"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"J. Xiong Y. Tang D. Ma P. Xiao and K. K. Wong. 2015. Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback. In IEEE Transactions on Information Forensics and Security (Aug. 2015) 1617--1629.  J. Xiong Y. Tang D. Ma P. Xiao and K. K. Wong. 2015. Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback. In IEEE Transactions on Information Forensics and Security (Aug. 2015) 1617--1629.","DOI":"10.1109\/TIFS.2015.2421358"},{"key":"e_1_3_2_1_8_1","volume":"201","author":"Huang Y.","unstructured":"Y. Huang , F. S. Al-Qahtani , T. Q. Duong and J. Wang. 201 5. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI. In IEEE Transactions on Communications (Aug. 2015), 2959--2971. Y. Huang, F. S. Al-Qahtani, T. Q. Duong and J. Wang. 2015. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI. In IEEE Transactions on Communications (Aug. 2015), 2959--2971.","journal-title":"J. Wang."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"E. A. Jorswieck and A. Sezgin. 2004. Impact of spatial correlation on the performance of orthogonal space-time block codes. In IEEE Communications Letters (Jan. 2004) 21--23.  E. A. Jorswieck and A. Sezgin. 2004. Impact of spatial correlation on the performance of orthogonal space-time block codes. In IEEE Communications Letters (Jan. 2004) 21--23.","DOI":"10.1109\/LCOMM.2003.822516"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080807"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159491"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2015.106"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223681"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"G. Sun Z. Han J. Jiao Z. Wang and D. Wang. 2017. Physical layer security in MIMO wiretap channels with antenna correlation. In China Communications (Aug. 2017) 149--156.  G. Sun Z. Han J. Jiao Z. Wang and D. Wang. 2017. Physical layer security in MIMO wiretap channels with antenna correlation. In China Communications (Aug. 2017) 149--156.","DOI":"10.1109\/CC.2017.8014375"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_3_2_1_16_1","volume-title":"New Jersey: John Wiley and Sons","author":"David H. A.","year":"2005","unstructured":"H. A. David and H. N. Nagaraja . 2005 . Order Statistics. 3 rd ed. Hoboken , New Jersey: John Wiley and Sons (2005). H. A. David and H. N. Nagaraja. 2005. Order Statistics. 3rd ed. Hoboken, New Jersey: John Wiley and Sons (2005).","edition":"3"},{"key":"e_1_3_2_1_17_1","series-title":"Series and Products","volume-title":"Table of Integrals","author":"Gradshteyn I. S.","year":"2007","unstructured":"I. S. Gradshteyn , I. M. Ryzhik . 2007. Table of Integrals , Series and Products . 7 th ed. San Diego, CA, USA : Academic ( 2007 ). I. S. Gradshteyn, I. M. Ryzhik. 2007. Table of Integrals, Series and Products. 7th ed. San Diego, CA, USA: Academic (2007).","edition":"7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.360361"}],"event":{"name":"ICCNS 2018: 2018 the 8th International Conference on Communication and Network Security","acronym":"ICCNS 2018","location":"Qingdao China"},"container-title":["Proceedings of the 8th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290480.3290489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290480.3290489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:17Z","timestamp":1750207457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290480.3290489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,2]]},"references-count":18,"alternative-id":["10.1145\/3290480.3290489","10.1145\/3290480"],"URL":"https:\/\/doi.org\/10.1145\/3290480.3290489","relation":{},"subject":[],"published":{"date-parts":[[2018,11,2]]},"assertion":[{"value":"2018-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}