{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T05:06:41Z","timestamp":1725167201917},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401401"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015T80779"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004605","name":"Zhengzhou University","doi-asserted-by":"publisher","award":["1521318001"],"id":[{"id":"10.13039\/501100004605","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"ERC\u2019s Advanced Fellow Grant QuantCom","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N004558\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcomm.2018.2831687","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T18:33:07Z","timestamp":1525113187000},"page":"4087-4102","source":"Crossref","is-referenced-by-count":39,"title":["Optical Jamming Enhances the Secrecy Performance of the Generalized Space-Shift-Keying-Aided Visible-Light Downlink"],"prefix":"10.1109","volume":"66","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0208-4642","authenticated-orcid":false,"given":"Fasong","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2128-528X","authenticated-orcid":false,"given":"Chaowen","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2645-5807","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5316-1711","authenticated-orcid":false,"given":"Jiankang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1602-4133","authenticated-orcid":false,"given":"Rong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2032-9327","authenticated-orcid":false,"given":"Lie-Liang","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2636-5214","authenticated-orcid":false,"given":"Lajos","family":"Hanzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/5.554222"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.091215"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.050713.120730"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2459705"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842062"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247367"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.022713.120501"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.120512.110578"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.3.000234"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633387"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2723387"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2690279"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027522"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2524569"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2497694"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2621743"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2709314"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2544598"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2643632"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2417576"},{"key":"ref6","first-page":"19","article-title":"Opportunities and pitfalls in securing visible light communication on the physical layer","author":"classen","year":"2016","journal-title":"Proc ACM VLCS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2413791"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2432513"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-4560-14-6","author":"hong","year":"2014","journal-title":"Signal Processing Approaches to Secure Physical Layer Communications in Multi-antenna Wireless Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6011734"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189788"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063485"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2466539"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2605000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2015.7418381"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12162"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2603964"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799658"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2017.2761301"},{"key":"ref43","author":"gallager","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2016.2598684"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/8466051\/08352846.pdf?arnumber=8352846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:02:23Z","timestamp":1643187743000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8352846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":45,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2018.2831687","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}