{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:21:55Z","timestamp":1740140515601,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T00:00:00Z","timestamp":1567382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T00:00:00Z","timestamp":1567382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the school-enterprise cooperation projects of Zhejiang Province","award":["FG2016049"],"award-info":[{"award-number":["FG2016049"]}]},{"DOI":"10.13039\/501100008867","name":"Department of Education of Zhejiang Province","doi-asserted-by":"publisher","award":["2016SCG184"],"award-info":[{"award-number":["2016SCG184"]}],"id":[{"id":"10.13039\/501100008867","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Subject of Department of Education of Zhejiang Province","award":["Y201636730"],"award-info":[{"award-number":["Y201636730"]}]},{"name":"key research project of Wenzhou Vocational and Technical College","award":["WZ 2016008"],"award-info":[{"award-number":["WZ 2016008"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1527-9","type":"journal-article","created":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T18:08:04Z","timestamp":1567447684000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure transmission of correlated sources over broadcast channels with ultra-low latency"],"prefix":"10.1186","volume":"2019","author":[{"given":"Hehe","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ping","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,2]]},"reference":[{"issue":"5","key":"1527_CR1","doi-asserted-by":"publisher","first-page":"3796","DOI":"10.1109\/TVT.2015.2441879","volume":"65","author":"C. Li","year":"2016","unstructured":"C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L Yang, Multiuser overhearing for cooperative two-way multiantenna relays. IEEE Trans. Veh. Technol. 65(5), 3796\u20133802 (2016).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"11","key":"1527_CR2","doi-asserted-by":"publisher","first-page":"10055","DOI":"10.1109\/TVT.2017.2744982","volume":"66","author":"W. Wu","year":"2017","unstructured":"W. Wu, B. Wang, Y. Zeng, H. Zhang, Z. Yang, Z. Deng, Robust secure beamforming for wireless powered full-duplex systems with self-energy recycling. IEEE Trans. Veh. Technol. 66(11), 10055\u201310069 (2017).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"4","key":"1527_CR3","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JSAC.2018.2824622","volume":"36","author":"F. Zhou","year":"2018","unstructured":"F. Zhou, Z. Chu, H. Sun, R. Q. Hu, L. Hanzo, Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT. IEEE J. Sel. Areas Commun.36(4), 918\u2013931 (2018).","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"1527_CR4","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TVT.2015.2389826","volume":"65","author":"C. Li","year":"2016","unstructured":"C. Li, S. Zhang, P. Liu, F. Sun, J. M. Cioffi, L. Yang, Overhearing protocol design exploiting inter-cell interference in cooperative green networks. IEEE Trans. Veh. Technol. 65(1), 441\u2013446 (2016).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"1","key":"1527_CR5","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TWC.2018.2883563","volume":"18","author":"Z. Chu","year":"2019","unstructured":"Z. Chu, et al., Resource allocation for secure wireless powered integrated multicast and unicast services with full duplex self-energy recycling. IEEE Trans. Wirel. Commun.18(1), 620\u2013636 (2019).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"1527_CR6","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MWC.2014.7000981","volume":"21","author":"L. Wei","year":"2014","unstructured":"L. Wei, R. Q. Hu, Y. Qian, G. Wu, Key elements to enable millimeter wave communications for 5G wireless systems. IEEE Wirel. Commun.21(6), 136\u2013143 (2014).","journal-title":"IEEE Wirel. Commun."},{"issue":"8","key":"1527_CR7","doi-asserted-by":"publisher","first-page":"6765","DOI":"10.1109\/TVT.2015.2472456","volume":"65","author":"C. Li","year":"2016","unstructured":"C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, L. Yang, Spectral-efficient cellular communications with coexistent one- and two-hop transmissions. IEEE Trans. Veh. Technol. 65(8), 6765\u20136772 (2016).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"1","key":"1527_CR8","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/JIOT.2017.2782367","volume":"5","author":"Z. Chu","year":"2018","unstructured":"Z. Chu, F. Zhou, Z. Zhu, R. Q. Hu, P. Xiao, Wireless Powered Sensor Networks for Internet of Things: Maximum Throughput and Optimal Power Allocation. IEEE Internet Things J. 5(1), 310\u2013321 (2018).","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"1527_CR9","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2014.6815898","volume":"52","author":"R. Q. Hu","year":"2014","unstructured":"R. Q. Hu, Y. Qian, An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems. IEEE Commun. Mag. 52(5), 94\u2013101 (2014).","journal-title":"IEEE Commun. Mag"},{"issue":"7","key":"1527_CR10","first-page":"531","volume":"61","author":"C. Li","year":"2014","unstructured":"C. Li, F. Sun, J. M. Cioffi, L Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst.61(7), 531\u2013535 (2014).","journal-title":"IEEE Trans. Circ. Syst."},{"doi-asserted-by":"crossref","unstructured":"W. Wu, F. Zhou, P. Li, P. Deng, B. Wang, V. C. M. Leung, in 2019 International Conference on Communications. Energy-Efficient Secure NOMA-Enabled Mobile Edge Computing Networks (Shanghai, China, 2019).","key":"1527_CR11","DOI":"10.1109\/ICC.2019.8761823"},{"issue":"1","key":"1527_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/LSP.2015.2504559","volume":"23","author":"C. Li","year":"2016","unstructured":"C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L Yang, Adaptive overhearing in two-way multi-antenna relay channels. IEEE Signal Process. Lett. 23(1), 117\u2013120 (2016).","journal-title":"IEEE Signal Process. Lett"},{"issue":"2","key":"1527_CR13","first-page":"22","volume":"19","author":"Q. Li","year":"2012","unstructured":"Q. Li, R. Q. Hu, Y. Qian, G. Hu, Cooperative communications for wireless networks: techniques and applications in LTE-advanced systems. IEEE Wirel. Commun.19(2), 22\u201329 (2012).","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"1527_CR14","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MWC.2018.1700113","volume":"25","author":"F Zhou","year":"2018","unstructured":"F Zhou, Y Wu, Y Liang, Z Li, Y Wang, K. -K Wong, State of the art, taxonomy, and open issues on NOMA in cognitive radio networks. IEEE Wirel. Commun.25(2), 100\u2013108 (2018).","journal-title":"IEEE Wirel. Commun."},{"issue":"8","key":"1527_CR15","doi-asserted-by":"publisher","first-page":"6765","DOI":"10.1109\/TVT.2015.2472456","volume":"65","author":"C Li","year":"2016","unstructured":"C Li, P Liu, C Zou, F Sun, J. M Cioffi, L Yang, Spectral-efficient cellular communications with coexistent one- and two-hop transmissions. IEEE Trans. Veh. Technol. 65(8), 6765\u20136772 (2016).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"12","key":"1527_CR16","doi-asserted-by":"publisher","first-page":"2861","DOI":"10.1109\/TIFS.2017.2721908","volume":"12","author":"Z Zhu","year":"2017","unstructured":"Z Zhu, Z Chu, N Wang, S Huang, Z Wang, I Lee, Beamforming and power splitting designs for AN-aided secure multi-user MIMO SWIPT systems. IEEE Trans. Inf. Forensics Secur.12(12), 2861\u20132874 (2017).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"1527_CR17","first-page":"531","volume":"61","author":"C Li","year":"2014","unstructured":"C Li, F Sun, J. M Cioffi, L Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst. 61(7), 531\u2013535 (2014).","journal-title":"IEEE Trans. Circ. Syst"},{"issue":"3","key":"1527_CR18","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/LWC.2017.2780830","volume":"7","author":"Z Zhu","year":"2018","unstructured":"Z Zhu, Z Chu, F Zhou, H Niu, Z Wang, I Lee, Secure Beamforming Designs for Secrecy MIMO SWIPT Systems. IEEE Wirel. Commun. Lett. 7(3), 424\u2013427 (2018).","journal-title":"IEEE Wirel. Commun. Lett"},{"issue":"3","key":"1527_CR19","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/TCOMM.2017.2772273","volume":"66","author":"D Wan","year":"2018","unstructured":"D Wan, M Wen, F Ji, Y Liu, Y Huang, Cooperative NOMA systems With partial channel state information over Nakagami- m Fading Channels. IEEE Trans. Commun. 66(3), 947\u2013958 (2018).","journal-title":"IEEE Trans. Commun"},{"issue":"4","key":"1527_CR20","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TIT.2006.871609","volume":"52","author":"E. Tuncel","year":"2006","unstructured":"E. Tuncel, Slepian-Wolf coding over broadcast channels. IEEE Trans. Inf. Theory. 52(4), 1469\u20131482 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1527_CR21","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/TIT.2013.2288256","volume":"60","author":"J. Villard","year":"2014","unstructured":"J. Villard, P. Piantanida, S. Shamai (Shitz), Secure transmission of sources over noisy channels with side information at the receivers. IEEE Trans. Inf. Theory. 60(1), 713\u2013739 (2014).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"1527_CR22","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TIT.1987.1057353","volume":"33","author":"T. S. Han","year":"1987","unstructured":"T. S. Han, M. H. M. Costa, Broadcast channels with arbitrarily correlated sources. IEEE Trans. Inf. Theory. 33(5), 641\u2013650 (1987).","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"G. Kramer, Y. Liang, S. Shamai (Shitz), in 2009 Information Theory and Applications Workshop. Outer bounds on the admissible source region for broadcast channels with dependent sources (San Diego, 2009), pp. 169\u2013172.","key":"1527_CR23","DOI":"10.1109\/ITA.2009.5044940"},{"doi-asserted-by":"crossref","unstructured":"F. Lang, Z. Deng, B. Wang, in 2014 IEEE Information Theory Workshop. Secure communication of correlated sources over broadcast channels (Hobart, Australia, 2014), pp. 416\u2013420.","key":"1527_CR24","DOI":"10.1109\/ITW.2014.6970865"},{"issue":"9","key":"1527_CR25","doi-asserted-by":"publisher","first-page":"3927","DOI":"10.1109\/TIT.2009.2025566","volume":"55","author":"D. Gunduz","year":"2009","unstructured":"D. Gunduz, E. Erkip, A. Goldsmith, H. V. Poor, Source and channel coding for correlated sources over multiuser channels. IEEE Trans. Inf. Theory. 55(9), 3927\u20133944 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"W. Kang, G. Kramer, in 2008 IEEE International Symposium on Information Theory. Broadcast channel with degraded source random variables and receiver side information (Toronto, 2008), pp. 1711\u20131715.","key":"1527_CR26","DOI":"10.1109\/ISIT.2008.4595280"},{"doi-asserted-by":"crossref","unstructured":"R. Timo, A. Grant, T. Chan, G. Kramer, in 2008 IEEE International Symposium on Information Theory. Source coding for a simple network with receiver side information (Toronto, 2008), pp. 2307\u20132311.","key":"1527_CR27","DOI":"10.1109\/ISIT.2008.4595402"},{"issue":"6","key":"1527_CR28","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.1109\/TIT.2008.921858","volume":"54","author":"N. Merhav","year":"2008","unstructured":"N. Merhav, Shannon\u2019s secrecy system with informed receivers and its application to systematic coding for wiretapped channels. IEEE Trans. Inf. Theory. 54(6), 2723\u20132734 (2008).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"1527_CR29","doi-asserted-by":"publisher","first-page":"4529","DOI":"10.1109\/TIT.2009.2027500","volume":"55","author":"J. Xu","year":"2009","unstructured":"J. Xu, Y. Cao, B. Chen, Capacity bounds for broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 55(10), 4529\u20134542 (2009).","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1527-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1527-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1527-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T23:16:03Z","timestamp":1598915763000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1527-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,2]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1527"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1527-9","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,9,2]]},"assertion":[{"value":"18 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"216"}}