{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:13:15Z","timestamp":1720624395295},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61201086"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201506375060"],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007162","name":"Guangdong Provincial Science and Technology","doi-asserted-by":"publisher","award":["2013B090500007"],"id":[{"id":"10.13039\/501100007162","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Integration of Industry, Education and Research","award":["2014509102205"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1016\/j.adhoc.2018.07.013","type":"journal-article","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T04:20:08Z","timestamp":1532060408000},"page":"174-182","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting"],"prefix":"10.1016","volume":"81","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8221-2060","authenticated-orcid":false,"given":"Kun","family":"Tang","sequence":"first","affiliation":[]},{"given":"Ronghua","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Heyuan","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9513-9990","authenticated-orcid":false,"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Entao","family":"Luo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.adhoc.2018.07.013_bib0001","first-page":"731","article-title":"Cyber-physical systems: the next computing revolution","volume":"14","author":"Rajkumar","year":"2010","journal-title":"IEEE Des. Autom. Conf."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.013_bib0002","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1109\/TII.2012.2216537","article-title":"An online optimization approach for control and communication co-design in networked cyber-physical systems","volume":"9","author":"Cao","year":"2013","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"9","key":"10.1016\/j.adhoc.2018.07.013_bib0003","doi-asserted-by":"crossref","DOI":"10.1109\/TPDS.2012.151","article-title":"Radio resource management for qos guarantees in cyber-physical systems","volume":"23","author":"Lien","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.013_bib0004","first-page":"1","article-title":"A hierarchical hybrid model for intelligent cyber-physical systems","volume":"3","author":"Claudi","year":"2013","journal-title":"IEEE Worksh. Intell. Sol. Embed. Syst."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.013_bib0005","article-title":"Cyber-cphysical security of a smart grid infrastructure","volume":"100","author":"Mo","year":"2012","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.adhoc.2018.07.013_bib0006","doi-asserted-by":"crossref","first-page":"27679","DOI":"10.1109\/ACCESS.2017.2767701","article-title":"A secure collaborative spectrum sensing strategy in cyber-physical systems","volume":"5","author":"Lin","year":"2017","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.013_bib0007","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","article-title":"Cognitive radio: brain-emppwered wireless communications","volume":"23","author":"Haykin","year":"2005","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"7","key":"10.1016\/j.adhoc.2018.07.013_bib0008","doi-asserted-by":"crossref","first-page":"3386","DOI":"10.1109\/TVT.2011.2158673","article-title":"Cognitive radio networking and communications: an overview","volume":"60","author":"Liang","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0009","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.adhoc.2017.04.003","article-title":"Cognitive radio selection and scheduling for multi-channel dynamic spectrum access networks considering qos levels","volume":"62","author":"Uyanik","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.013_sbref0010","series-title":"Heterogeneous dynamic spectrum access in cognitive radio enabled vehicular networks using network softwarization","author":"Reddy","year":"2016"},{"issue":"8","key":"10.1016\/j.adhoc.2018.07.013_bib0011","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/JSTSP.2016.2607692","article-title":"Secure multiple amplify-and-forward relaying with cochannel interference","volume":"10","author":"Fan","year":"2016","journal-title":"IEEE J. Sel. Top Signal Process."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0012","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","article-title":"Insight of the protection for data security under selective opening attacks","volume":"412\u2013413","author":"Huang","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0013","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2017.2751105","article-title":"DF Relaying networks with randomly distributed interferers","volume":"5","author":"Lai","year":"2017","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.013_bib0014","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","article-title":"Dependable structural health monitoring using wireless sensor networks","volume":"14","author":"Bhuiyan","year":"2017","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.013_bib0015","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/JIOT.2017.2742663","article-title":"Internet of hybrid energy harvesting things","volume":"5","author":"Akan","year":"2018","journal-title":"J. Internet Things"},{"issue":"11","key":"10.1016\/j.adhoc.2018.07.013_bib0016","doi-asserted-by":"crossref","first-page":"4754","DOI":"10.1109\/TCOMM.2013.13.120855","article-title":"Wireless information and power transfer: architecture design and rate-energy tradeoff","volume":"61","author":"Zhou","year":"2013","journal-title":"IEEE Trans. Commun."},{"issue":"12","key":"10.1016\/j.adhoc.2018.07.013_bib0017","doi-asserted-by":"crossref","first-page":"3232","DOI":"10.1109\/TSP.2014.2321733","article-title":"Optimal energy allocation for energy harvesting transmitters with hybrid energy storage and processing cost","volume":"62","author":"Ozel","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.013_bib0018","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2015.7120024","article-title":"Wireless energy harvesting for the internet of things","volume":"53","author":"Kamalinejad","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0019","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1016\/j.rser.2015.11.010","article-title":"Energy harvesting in wireless sensor networks: a comprehensive review","volume":"55","author":"Shaikh","year":"2016","journal-title":"Renew. Sustainable Energy Rev."},{"issue":"11","key":"10.1016\/j.adhoc.2018.07.013_bib0020","doi-asserted-by":"crossref","first-page":"1412","DOI":"10.1049\/iet-com.2014.1100","article-title":"Energy cooperation in multi-user wireless-powered relay networks","volume":"9","author":"Yang","year":"2015","journal-title":"IET Commun."},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.013_bib0021","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/JSAC.2014.1403002","article-title":"Cognitive radio based state estimation in cyber-physical systems","volume":"32","author":"Cao","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0022","series-title":"IEEE Wireless Communications and Networking Conference (WCNC), 1942\u20131947, New Orleans LA USA, 9\u201312 March","article-title":"Cloud-assisted GPS-Driven Dynamic Spectrum Access in Cognitive Radio Vehicular Networks for Transportation Cyber Physical Systems","author":"Rawat","year":"2015"},{"issue":"5","key":"10.1016\/j.adhoc.2018.07.013_bib0023","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1109\/WCL.2012.071612.120304","article-title":"Sensing and transmit energy optimization for an energy harvesting cognitive radio","volume":"1","author":"Sultan","year":"2012","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"9","key":"10.1016\/j.adhoc.2018.07.013_bib0024","doi-asserted-by":"crossref","first-page":"4788","DOI":"10.1109\/TWC.2013.072613.130323","article-title":"Opportunistic wireless energy harvesting in cognitive radio networks","volume":"12","author":"Lee","year":"2013","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.013_bib0025","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1109\/TCOMM.2017.2739738","article-title":"Opportunistic spectrum sharing with wireless energy transfer in stochastic networks","volume":"66","author":"Zhai","year":"2018","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.013_bib0026","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.1109\/TWC.2015.2504581","article-title":"Cognitive relay networks with energy harvesting and information transfer: design, analysis, and optimization","volume":"15","author":"Wang","year":"2016","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0027","article-title":"Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting","author":"Tang","year":"2017","journal-title":"Fut. Generat. Comput. Syst."},{"issue":"99","key":"10.1016\/j.adhoc.2018.07.013_bib0028","first-page":"1","article-title":"Cooperative strategies for wireless-powered communications: an overview","author":"Chen","year":"2018","journal-title":"IEEE Wireless Commun."},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.013_bib0029","doi-asserted-by":"crossref","first-page":"2704","DOI":"10.1109\/TSP.2013.2253771","article-title":"Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization","volume":"61","author":"Li","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.013_bib0030","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/LCOMM.2016.2514353","article-title":"Secure beamforming in wireless-powered cooperative cognitive radio networks","volume":"20","author":"Jiang","year":"2016","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.013_bib0031","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/LWC.2017.2650224","article-title":"Physical layer security in cooperative energy harvesting networks with a friendly jammer","volume":"6","author":"Huang","year":"2017","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"8","key":"10.1016\/j.adhoc.2018.07.013_bib0032","doi-asserted-by":"crossref","first-page":"5586","DOI":"10.1109\/TWC.2016.2562109","article-title":"An adaptive transmission scheme for cognitive decode-and-forward relaying networks: half duplex, full duplex, or no cooperation","volume":"15","author":"Olivo","year":"2016","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.013_bib0033","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/TVT.2014.2320283","article-title":"Cooperative spectrum sharing with bidirectional secondary transmissions","volume":"64","author":"Pei","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2018.07.013_bib0034","unstructured":"I. CVX Research, CVC: Matlab software for disciplined convex programming, version 2.0[EB\/OL], 2012. http:\/\/cvxr.com\/cvxAug."},{"issue":"11","key":"10.1016\/j.adhoc.2018.07.013_bib0035","doi-asserted-by":"crossref","first-page":"10055","DOI":"10.1109\/TVT.2017.2744982","article-title":"Robust secure beamforming for wireless powered full-duplex systems with self-energy recycling","volume":"66","author":"Wu","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"10.1016\/j.adhoc.2018.07.013_bib0036","doi-asserted-by":"crossref","first-page":"2498","DOI":"10.1109\/TWC.2013.032513.121464","article-title":"Full-duplex cooperative cognitive radio with transmit imperfections","volume":"12","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"9","key":"10.1016\/j.adhoc.2018.07.013_bib0037","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1109\/TSP.2014.2310433","article-title":"Information and energy cooperation in cognitive radio networks","volume":"62","author":"Zheng","year":"2014","journal-title":"IEEE Trans. Sig. Process."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870518305006?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870518305006?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,11,13]],"date-time":"2020-11-13T11:38:37Z","timestamp":1605267517000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870518305006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":37,"alternative-id":["S1570870518305006"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2018.07.013","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2018.07.013","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}