{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T15:35:47Z","timestamp":1759160147561,"version":"3.41.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,10]],"date-time":"2016-05-10T00:00:00Z","timestamp":1462838400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61371122"],"award-info":[{"award-number":["61371122"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61471393"],"award-info":[{"award-number":["61471393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Postdoctoral Science Foundation under a Special Financial Grant","award":["2013T60912"],"award-info":[{"award-number":["2013T60912"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0621-5","type":"journal-article","created":{"date-parts":[[2016,5,10]],"date-time":"2016-05-10T01:37:58Z","timestamp":1462844278000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Opportunistic relaying and jamming with robust design in hybrid full\/half-duplex relay system"],"prefix":"10.1186","volume":"2016","author":[{"given":"Zhi","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,10]]},"reference":[{"issue":"8","key":"621_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"issue":"11","key":"621_CR2","doi-asserted-by":"publisher","first-page":"3791","DOI":"10.1109\/TCOMM.2014.2365704","volume":"62","author":"GF Pivaro","year":"2014","unstructured":"GF Pivaro, G Fraidenraich, CF Dias, Outage probability for MIMO relay channel. IEEE Trans. Commun. 62(11), 3791\u20133800 (2014)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"621_CR3","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1109\/TVT.2013.2285164","volume":"63","author":"C Chien","year":"2014","unstructured":"C Chien, H Su, H Li, Joint beamforming and power allocation for MIMO relay broadcast channel with individual sinr constraints. IEEE Trans. Veh. Technol. 63(4), 1660\u20131677 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"621_CR4","first-page":"589","volume":"14","author":"C Wang","year":"2015","unstructured":"C Wang, H Wang, X Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans. Inf. Theory 14(2), 589\u2013605 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"621_CR5","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","volume":"54","author":"E Tekin","year":"2008","unstructured":"E Tekin, A Yener, The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 54(6), 2735\u20132751 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"621_CR6","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"G Zheng, LC Choo, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317\u20131322 (2011)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"621_CR7","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TIFS.2011.2166386","volume":"7","author":"JC Chen","year":"2012","unstructured":"JC Chen, RQ Zhang, LY Song, Z Han, BL Jiao, Joint relay and jammer selection for secure two-way relay networks. IEEE Trans. Inf. Fore. Theory 7(1), 310\u2013320 (2012)","journal-title":"IEEE Trans. Inf. Fore. Theory"},{"issue":"20","key":"621_CR8","doi-asserted-by":"publisher","first-page":"4962","DOI":"10.1109\/TSP.2013.2269049","volume":"61","author":"G Zheng","year":"2013","unstructured":"G Zheng, I Krikidis, J Li, Joint relay and jammer selection for secure two-way relay networks. IEEE Trans. Signal Process. 61(20), 4962\u20134974 (2013)","journal-title":"IEEE Trans. Signal Process."},{"issue":"24","key":"621_CR9","first-page":"6391","volume":"62","author":"F Zhu","year":"2014","unstructured":"F Zhu, F Gao, M Yao, H Zou, Joint information- and jamming-beamforming for physical layer security with full duplex base station. IEEE Commun. Lett. 62(24), 6391\u20136401 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"9","key":"621_CR10","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TWC.2011.071411.102266","volume":"10","author":"T Riihonen","year":"2011","unstructured":"T Riihonen, S Werner, R Wichman, Hybrid full-duplex\/half-duplex relaying with transmit power adaptation. IEEE Trans. Wireless Commun. 10(9), 3074\u20133085 (2011)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"621_CR11","first-page":"2883","volume":"14","author":"J Lee","year":"2015","unstructured":"J Lee, TQS Quek, Hybrid full-\/half-duplex system analysis in heterogeneous wireless networks. IEEE Trans. Wireless Commun. 14(5), 2883\u20132895 (2015)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"3","key":"621_CR12","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/TSP.2011.2182344","volume":"60","author":"J Huang","year":"2012","unstructured":"J Huang, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 60(3), 1696\u20131707 (2012)","journal-title":"IEEE Trans. Signal Process."},{"doi-asserted-by":"crossref","unstructured":"C Wang, H Wang, Joint relay selection and artificial jamming power allocation for secure DF relay networks. IEEE International Conference on Communication (ICC2014), 819\u2013824 (2015)","key":"621_CR13","DOI":"10.1109\/ICCW.2014.6881301"},{"key":"621_CR14","volume-title":"Handbook of Antennas in Wireless Communications, Florida, U. S","author":"M Bengtsson","year":"2001","unstructured":"M Bengtsson, B Ottersten, Optimal and suboptimal transmit beamforming, in Handbook of Antennas in Wireless Communications, Florida, U. S, 2001"},{"issue":"6","key":"621_CR15","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"M Bloch, J Barros, MRD Rodrigues, SW McLaughlin, Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515\u20132534 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"621_CR16","doi-asserted-by":"publisher","first-page":"6076","DOI":"10.1109\/TWC.2013.110813.121671","volume":"12","author":"VNQ Bao","year":"2013","unstructured":"VNQ Bao, NL Trung, M Debbah, Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wireless Commun. 12(12), 6076\u20136085 (2013)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"10","key":"621_CR17","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Y Zou, X Wang, W Shen, Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Select. Areas Commun. 31(10), 2099\u20132111 (2013)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"621_CR18","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1080\/10556789908805766","volume":"11\u201312","author":"J Sturm","year":"1999","unstructured":"J Sturm, Using sedumi 1.02: a Matlab toolbox for optimization over symmetric cones. Opt. Meth. Software 11\u201312, 625\u2013653 (1999)","journal-title":"Meth. Software"},{"issue":"10","key":"621_CR19","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"I Krikidis, JS Thompson, Relay selection for secure cooperative networks with jamming. IEEE Trans. Wireless Commun. 8(10), 5003\u20135011 (2009)","journal-title":"IEEE Trans. Wireless Commun."},{"unstructured":"Y Nesterov, A Nemirovsky, Interior-point polynomial methods in convex programming. Studies in Applied Mathematics 13, 8\u201330 (1994)","key":"621_CR20"},{"issue":"9","key":"621_CR21","doi-asserted-by":"publisher","first-page":"3450","DOI":"10.1109\/TWC.2007.06020050","volume":"6","author":"A Bletsas","year":"2007","unstructured":"A Bletsas, H Shin, MZ Win, Cooperative communications with outage-optimal opportunistic relaying. IEEE Trans. Wireless Commun. 6(9), 3450\u20133460 (2007)","journal-title":"IEEE Trans. Wireless Commun."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0621-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0621-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0621-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0621-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T02:26:14Z","timestamp":1748917574000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0621-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,10]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["621"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0621-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,5,10]]},"article-number":"129"}}