{"id":"https://openalex.org/W2812621610","doi":"https://doi.org/10.1109/iccw.2018.8403766","title":"Secure Beamformer Designs in MU-MIMO Systems: An Interference Exploitation Approach","display_name":"Secure Beamformer Designs in MU-MIMO Systems: An Interference Exploitation Approach","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2812621610","doi":"https://doi.org/10.1109/iccw.2018.8403766","mag":"2812621610"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2018.8403766","pdf_url":null,"source":{"id":"https://openalex.org/S4363608034","display_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100351507","display_name":"Ming Li","orcid":"https://orcid.org/0000-0003-1849-8241"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"funder","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["Dalian University of Technology, Dalian, Liaoning, CN"],"affiliations":[{"raw_affiliation_string":"Dalian University of Technology, Dalian, Liaoning, CN","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055198347","display_name":"Guangyu Ti","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"funder","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangyu Ti","raw_affiliation_strings":["School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101696821","display_name":"Xiaowen Tian","orcid":"https://orcid.org/0000-0002-2034-5028"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"funder","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowen Tian","raw_affiliation_strings":["School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864340","display_name":"Zihuan Wang","orcid":"https://orcid.org/0000-0002-1270-3251"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"funder","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihuan Wang","raw_affiliation_strings":["School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100318597","display_name":"Qian Liu","orcid":"https://orcid.org/0000-0003-2282-4572"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"funder","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Liu","raw_affiliation_strings":["School of Computer Science and Technology Dalian, University of Technology, Dalian, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology Dalian, University of Technology, Dalian, Liaoning, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":62},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9706,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9643,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial Noise","score":0.7591032},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.55873},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.50639546},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure Communication","score":0.42117816},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4102878}],"concepts":[{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.76742744},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.7591032},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7134345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7046786},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.61074233},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.59309405},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.55873},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.53006095},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.51492226},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.50639546},{"id":"https://openalex.org/C91330434","wikidata":"https://www.wikidata.org/wiki/Q738298","display_name":"Multi-user MIMO","level":4,"score":0.48624483},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.47817737},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.476435},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.44331986},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.42117816},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4193832},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4102878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3277551},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28230518},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.22361174},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13590577},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2018.8403766","pdf_url":null,"source":{"id":"https://openalex.org/S4363608034","display_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.48,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1568096262","https://openalex.org/W1675936167","https://openalex.org/W1996215314","https://openalex.org/W2007529001","https://openalex.org/W2034443306","https://openalex.org/W2096293234","https://openalex.org/W2103781722","https://openalex.org/W2124071994","https://openalex.org/W2133406100","https://openalex.org/W2135137654","https://openalex.org/W2344631021","https://openalex.org/W2586599018","https://openalex.org/W2597474792","https://openalex.org/W2949672874","https://openalex.org/W3102073571","https://openalex.org/W4250589301"],"related_works":["https://openalex.org/W4287776800","https://openalex.org/W4285103104","https://openalex.org/W3026778509","https://openalex.org/W2972651196","https://openalex.org/W2786811319","https://openalex.org/W2462883630","https://openalex.org/W2376754011","https://openalex.org/W2154174517","https://openalex.org/W2047759772","https://openalex.org/W1993671760"],"abstract_inverted_index":{"Physical":[0],"layer":[1],"security":[2,70],"has":[3],"drawn":[4],"significant":[5],"attention":[6],"in":[7,14,30],"recent":[8],"years":[9],"because":[10],"of":[11,46,64,71,82,103,118,147,162],"its":[12],"advances":[13],"preventing":[15],"confidential":[16,44],"information":[17,45],"leakage":[18],"to":[19,41,55,60,87,100],"eavesdroppers.":[20],"In":[21],"this":[22],"paper,":[23],"we":[24,53],"focus":[25],"on":[26],"secure":[27,83,107,128,168],"beamformer":[28,84,108,165],"designs":[29,109,166],"multi-user":[31,58,131],"multi-input":[32],"multi-output":[33],"(MU-MIMO)":[34],"systems":[35],"with":[36,96],"a":[37,47],"multi-antenna":[38],"eavesdropper":[39,66],"attempting":[40],"overhear":[42],"the":[43,62,65,69,80,89,111,116,126,130,145,148,160,163],"particular":[48],"user.":[49],"Unlike":[50],"existing":[51],"works,":[52],"aim":[54],"exploit":[56],"inherent":[57],"interference":[59],"disrupt":[61],"reception":[63,146],"and":[67,120,158],"enhance":[68],"wireless":[72],"communications.":[73],"Particularly,":[74],"utilizing":[75],"practical":[76],"signal-to-interference-noise":[77],"(SINR)":[78],"metrics,":[79],"objective":[81],"design":[85],"is":[86],"minimize":[88],"eavesdropper's":[90,122],"SINR,":[91],"while":[92],"providing":[93],"legitimate":[94],"users":[95],"required":[97],"pre-specified":[98],"SINRs":[99],"guarantee":[101],"quality":[102],"service":[104],"(QoS).We":[105],"propose":[106],"for":[110,167],"downlink":[112],"transmission":[113],"situation,":[114],"under":[115],"conditions":[117],"known":[119],"unknown":[121],"channels,":[123],"respectively.":[124],"With":[125],"proposed":[127,164],"beamformers,":[129],"signal":[132],"behaves":[133],"like":[134],"artificial":[135],"noise":[136],"or":[137],"distributed":[138],"friendly":[139],"jamming,":[140],"which":[141],"can":[142],"further":[143],"degrade":[144],"eavesdropper.":[149],"Extensive":[150],"simulation":[151],"studies":[152],"confirm":[153],"our":[154],"analytical":[155],"performance":[156],"predictions":[157],"illustrate":[159],"advantages":[161],"MU-MIMO":[169],"transmissions.":[170]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2812621610","counts_by_year":[],"updated_date":"2025-01-26T12:38:42.219303","created_date":"2018-07-19"}