{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:40:03Z","timestamp":1750210803615,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316687","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"529-532","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DC programming and DCA for Secure Guarantee with Null Space Beamforming in Two-Way Relay Networks"],"prefix":"10.1145","author":[{"given":"Nguyen The","family":"Duy","sequence":"first","affiliation":[{"name":"ICT Dept., FPT University, Vietnam"}]},{"given":"Tran Thi","family":"Thuy","sequence":"additional","affiliation":[{"name":"ICT Dept., FPT University, Vietnam"}]},{"given":"Luong Thuy","family":"Chung","sequence":"additional","affiliation":[{"name":"ICT Dept., FPT University, Vietnam"}]},{"given":"Ngo Tung","family":"Son","sequence":"additional","affiliation":[{"name":"ICT Dept., FPT University, Vietnam"}]},{"given":"Tran","family":"Van Dinh","sequence":"additional","affiliation":[{"name":"Dept. of Computer, University of Freiburg"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2303942"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_3_2_1_4_1","volume-title":"169: 5","author":"Thi Le","year":"2018","unstructured":"Le Thi , H.A. & Pham Dinh , T. Math . Program. ( 2018 ) 169: 5 . Le Thi, H.A. & Pham Dinh, T. Math. Program. (2018) 169: 5."},{"key":"e_1_3_2_1_5_1","unstructured":"DC programming and DCA - Theory Algorithms and Applications: http:\/\/www.lita.univ-lorraine.fr\/~lethi\/index.php\/en\/research\/dc-programming-and-dca.html.  DC programming and DCA - Theory Algorithms and Applications: http:\/\/www.lita.univ-lorraine.fr\/~lethi\/index.php\/en\/research\/dc-programming-and-dca.html."}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:12Z","timestamp":1750208532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":5,"alternative-id":["10.1145\/3316615.3316687","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316687","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}