Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1109/access.2024.3454349
Non-Orthogonal Artificial Noise (NORAN) has garnered significant attention in modern communication systems as a substitute for traditional Artificial Noise (AN), due to its independence from channel degrees of freedom. However, the design of NORAN leads to a reduction in the channel capacity of legitimate channels, thereby limiting its application in practical systems. Pilot-based Codebook Non-Orthogonal Artificial Noise (PCAN) leverages pilot signals exchanged between the receiver and transmitter as encryption keys. This allows the receiver to retrieve the upcoming PCAN from the codebook via the pilot signals, effectively transitioning from NORAN to AN in form, demonstrating high adaptability. Consequently, this paper investigates the deployment of PCAN in Massive MIMO systems to achieve secure communication. Considering the eavesdropper as an illegitimate user, whose channel state information matrix is unknown to the legitimate receiver and does not follow a simple distribution pattern, this study employs random matrix theory to model the channel of an unknown eavesdropper. It uses the successive convex approximation algorithm to analyze the optimal power allocation strategy and the maximum number of eavesdropper antennas that the system can tolerate under these conditions. The findings indicate that as the number of eavesdropper antennas increases, the eavesdropper channel modeling based on random matrix theory increasingly approximates the actual channel characteristics of the eavesdropper. Notably, when the number of eavesdropper antennas , the consistency between the modeled channel and the actual channel reaches 87.2%, and the optimal power allocation factor at this point is . However, as the number of eavesdropper antennas continues to increase, the effectiveness of PCAN becomes more pronounced. Nevertheless, when the number of eavesdropper antennas approaches infinity, the efficacy of PCAN significantly decreases, failing to adequately ensure the system’s security.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2024.3454349
- OA Status
- gold
- References
- 27
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4402216235
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4402216235Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2024.3454349Digital Object Identifier
- Title
-
Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper ChannelsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-01-01Full publication date if available
- Authors
-
Yi Zhang, Yebo Gu, Tao Zhao, Bo WangList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2024.3454349Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1109/access.2024.3454349Direct OA link when available
- Concepts
-
Codebook, Artificial noise, Physical layer, Computer science, Secrecy, Channel (broadcasting), Noise (video), Computer network, Computer security, Algorithm, Telecommunications, Wireless, Artificial intelligence, Image (mathematics)Top concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
27Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4402216235 |
|---|---|
| doi | https://doi.org/10.1109/access.2024.3454349 |
| ids.doi | https://doi.org/10.1109/access.2024.3454349 |
| ids.openalex | https://openalex.org/W4402216235 |
| fwci | 0.0 |
| type | article |
| title | Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels |
| biblio.issue | |
| biblio.volume | 12 |
| biblio.last_page | 126773 |
| biblio.first_page | 126762 |
| topics[0].id | https://openalex.org/T10964 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | Wireless Communication Security Techniques |
| topics[1].id | https://openalex.org/T10148 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9970999956130981 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Advanced MIMO Systems Optimization |
| topics[2].id | https://openalex.org/T10796 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9955000281333923 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Cooperative Communication and Network Coding |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C127759330 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9399589896202087 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q637416 |
| concepts[0].display_name | Codebook |
| concepts[1].id | https://openalex.org/C2780909371 |
| concepts[1].level | 4 |
| concepts[1].score | 0.8659418821334839 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q4801092 |
| concepts[1].display_name | Artificial noise |
| concepts[2].id | https://openalex.org/C19247436 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7655895948410034 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q192727 |
| concepts[2].display_name | Physical layer |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.655659019947052 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C2776452267 |
| concepts[4].level | 2 |
| concepts[4].score | 0.640304684638977 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1503443 |
| concepts[4].display_name | Secrecy |
| concepts[5].id | https://openalex.org/C127162648 |
| concepts[5].level | 2 |
| concepts[5].score | 0.44305580854415894 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q16858953 |
| concepts[5].display_name | Channel (broadcasting) |
| concepts[6].id | https://openalex.org/C99498987 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4339098036289215 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2210247 |
| concepts[6].display_name | Noise (video) |
| concepts[7].id | https://openalex.org/C31258907 |
| concepts[7].level | 1 |
| concepts[7].score | 0.40737369656562805 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[7].display_name | Computer network |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.29745718836784363 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C11413529 |
| concepts[9].level | 1 |
| concepts[9].score | 0.2650644779205322 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[9].display_name | Algorithm |
| concepts[10].id | https://openalex.org/C76155785 |
| concepts[10].level | 1 |
| concepts[10].score | 0.21003863215446472 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[10].display_name | Telecommunications |
| concepts[11].id | https://openalex.org/C555944384 |
| concepts[11].level | 2 |
| concepts[11].score | 0.19744250178337097 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[11].display_name | Wireless |
| concepts[12].id | https://openalex.org/C154945302 |
| concepts[12].level | 1 |
| concepts[12].score | 0.166521817445755 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[12].display_name | Artificial intelligence |
| concepts[13].id | https://openalex.org/C115961682 |
| concepts[13].level | 2 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[13].display_name | Image (mathematics) |
| keywords[0].id | https://openalex.org/keywords/codebook |
| keywords[0].score | 0.9399589896202087 |
| keywords[0].display_name | Codebook |
| keywords[1].id | https://openalex.org/keywords/artificial-noise |
| keywords[1].score | 0.8659418821334839 |
| keywords[1].display_name | Artificial noise |
| keywords[2].id | https://openalex.org/keywords/physical-layer |
| keywords[2].score | 0.7655895948410034 |
| keywords[2].display_name | Physical layer |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.655659019947052 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/secrecy |
| keywords[4].score | 0.640304684638977 |
| keywords[4].display_name | Secrecy |
| keywords[5].id | https://openalex.org/keywords/channel |
| keywords[5].score | 0.44305580854415894 |
| keywords[5].display_name | Channel (broadcasting) |
| keywords[6].id | https://openalex.org/keywords/noise |
| keywords[6].score | 0.4339098036289215 |
| keywords[6].display_name | Noise (video) |
| keywords[7].id | https://openalex.org/keywords/computer-network |
| keywords[7].score | 0.40737369656562805 |
| keywords[7].display_name | Computer network |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.29745718836784363 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/algorithm |
| keywords[9].score | 0.2650644779205322 |
| keywords[9].display_name | Algorithm |
| keywords[10].id | https://openalex.org/keywords/telecommunications |
| keywords[10].score | 0.21003863215446472 |
| keywords[10].display_name | Telecommunications |
| keywords[11].id | https://openalex.org/keywords/wireless |
| keywords[11].score | 0.19744250178337097 |
| keywords[11].display_name | Wireless |
| keywords[12].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[12].score | 0.166521817445755 |
| keywords[12].display_name | Artificial intelligence |
| language | en |
| locations[0].id | doi:10.1109/access.2024.3454349 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2024.3454349 |
| locations[1].id | pmh:oai:doaj.org/article:1e9a13abd9e7470d99bc266ac5a19ed1 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Access, Vol 12, Pp 126762-126773 (2024) |
| locations[1].landing_page_url | https://doaj.org/article/1e9a13abd9e7470d99bc266ac5a19ed1 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5112447318 |
| authorships[0].author.orcid | https://orcid.org/0009-0009-9735-7498 |
| authorships[0].author.display_name | Yi Zhang |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210155969 |
| authorships[0].affiliations[0].raw_affiliation_string | Tianjin Vocational College of Mechanics and Electricity School of Electrical, Tianjin, China |
| authorships[0].institutions[0].id | https://openalex.org/I4210155969 |
| authorships[0].institutions[0].ror | https://ror.org/04h9hnm31 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210155969 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Tianjin Metallurgical Vocational Technical College |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yi Zhang |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Tianjin Vocational College of Mechanics and Electricity School of Electrical, Tianjin, China |
| authorships[1].author.id | https://openalex.org/A5012831842 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-4847-7567 |
| authorships[1].author.display_name | Yebo Gu |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I10660446 |
| authorships[1].affiliations[0].raw_affiliation_string | Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China |
| authorships[1].institutions[0].id | https://openalex.org/I10660446 |
| authorships[1].institutions[0].ror | https://ror.org/00xyeez13 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I10660446 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Kunming University of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Yebo Gu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China |
| authorships[2].author.id | https://openalex.org/A5060353884 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Tao Zhao |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I10660446 |
| authorships[2].affiliations[0].raw_affiliation_string | Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China |
| authorships[2].institutions[0].id | https://openalex.org/I10660446 |
| authorships[2].institutions[0].ror | https://ror.org/00xyeez13 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I10660446 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Kunming University of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Tao Zhao |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China |
| authorships[3].author.id | https://openalex.org/A5100408029 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-9092-3252 |
| authorships[3].author.display_name | Bo Wang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210136246, https://openalex.org/I4387153335 |
| authorships[3].affiliations[0].raw_affiliation_string | China Telecom Heilongjiang Branch, Harbin, China |
| authorships[3].institutions[0].id | https://openalex.org/I4387153335 |
| authorships[3].institutions[0].ror | https://ror.org/05p67dv18 |
| authorships[3].institutions[0].type | company |
| authorships[3].institutions[0].lineage | https://openalex.org/I4387153335 |
| authorships[3].institutions[0].country_code | |
| authorships[3].institutions[0].display_name | China Telecom |
| authorships[3].institutions[1].id | https://openalex.org/I4210136246 |
| authorships[3].institutions[1].ror | https://ror.org/03jgnzt20 |
| authorships[3].institutions[1].type | company |
| authorships[3].institutions[1].lineage | https://openalex.org/I4210136246 |
| authorships[3].institutions[1].country_code | CN |
| authorships[3].institutions[1].display_name | China Telecom (China) |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Bo Wang |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | China Telecom Heilongjiang Branch, Harbin, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1109/access.2024.3454349 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10964 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | Wireless Communication Security Techniques |
| related_works | https://openalex.org/W4391308034, https://openalex.org/W2765236478, https://openalex.org/W2951619176, https://openalex.org/W4360996312, https://openalex.org/W2529506699, https://openalex.org/W4390240227, https://openalex.org/W3036307543, https://openalex.org/W2290997318, https://openalex.org/W4237311310, https://openalex.org/W4256489728 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1109/access.2024.3454349 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2024.3454349 |
| primary_location.id | doi:10.1109/access.2024.3454349 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2024.3454349 |
| publication_date | 2024-01-01 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2109394932, https://openalex.org/W2043769961, https://openalex.org/W2007529001, https://openalex.org/W3004201425, https://openalex.org/W3087782700, https://openalex.org/W4324125416, https://openalex.org/W3129121776, https://openalex.org/W3196422707, https://openalex.org/W4360897645, https://openalex.org/W3162776744, https://openalex.org/W3011729188, https://openalex.org/W2921730081, https://openalex.org/W4391305810, https://openalex.org/W2163185922, https://openalex.org/W3120441551, https://openalex.org/W3065608242, https://openalex.org/W4366386419, https://openalex.org/W2726729862, https://openalex.org/W2981465242, https://openalex.org/W2793190854, https://openalex.org/W2262314904, https://openalex.org/W4400033179, https://openalex.org/W2142015064, https://openalex.org/W4368232716, https://openalex.org/W2980950489, https://openalex.org/W2072184935, https://openalex.org/W1742813727 |
| referenced_works_count | 27 |
| abstract_inverted_index.= | 221, 249 |
| abstract_inverted_index.a | 13, 36, 135 |
| abstract_inverted_index.AN | 91 |
| abstract_inverted_index.It | 153 |
| abstract_inverted_index.an | 117, 150 |
| abstract_inverted_index.as | 12, 67, 116, 186, 253 |
| abstract_inverted_index.at | 242 |
| abstract_inverted_index.in | 8, 38, 49, 92, 105 |
| abstract_inverted_index.is | 125, 245 |
| abstract_inverted_index.of | 27, 32, 42, 103, 149, 171, 189, 208, 215, 256, 264, 273, 280 |
| abstract_inverted_index.on | 198 |
| abstract_inverted_index.to | 21, 35, 74, 90, 109, 127, 145, 160, 260, 285 |
| abstract_inverted_index.The | 182 |
| abstract_inverted_index.and | 65, 131, 167, 230, 236 |
| abstract_inverted_index.can | 177 |
| abstract_inverted_index.due | 20 |
| abstract_inverted_index.for | 15 |
| abstract_inverted_index.has | 4 |
| abstract_inverted_index.its | 22, 47 |
| abstract_inverted_index.not | 133 |
| abstract_inverted_index.the | 30, 39, 63, 72, 76, 80, 83, 101, 114, 128, 147, 155, 162, 168, 175, 187, 193, 204, 209, 213, 224, 227, 231, 237, 254, 262, 271, 278, 288 |
| abstract_inverted_index.via | 82 |
| abstract_inverted_index.0.5$ | 250 |
| abstract_inverted_index.128$ | 222 |
| abstract_inverted_index.MIMO | 107 |
| abstract_inverted_index.PCAN | 78, 104, 265, 281 |
| abstract_inverted_index.This | 70 |
| abstract_inverted_index.does | 132 |
| abstract_inverted_index.from | 24, 79, 88 |
| abstract_inverted_index.high | 95 |
| abstract_inverted_index.more | 267 |
| abstract_inverted_index.that | 174, 185 |
| abstract_inverted_index.this | 98, 139, 243 |
| abstract_inverted_index.uses | 154 |
| abstract_inverted_index.when | 212, 270 |
| abstract_inverted_index.(AN), | 19 |
| abstract_inverted_index.NORAN | 33, 89 |
| abstract_inverted_index.Noise | 2, 18, 56 |
| abstract_inverted_index.based | 197 |
| abstract_inverted_index.form, | 93 |
| abstract_inverted_index.keys. | 69 |
| abstract_inverted_index.leads | 34 |
| abstract_inverted_index.model | 146 |
| abstract_inverted_index.paper | 99 |
| abstract_inverted_index.pilot | 59, 84 |
| abstract_inverted_index.point | 244 |
| abstract_inverted_index.power | 164, 239 |
| abstract_inverted_index.state | 122 |
| abstract_inverted_index.study | 140 |
| abstract_inverted_index.these | 180 |
| abstract_inverted_index.under | 179 |
| abstract_inverted_index.user, | 119 |
| abstract_inverted_index.whose | 120 |
| abstract_inverted_index.(PCAN) | 57 |
| abstract_inverted_index.87.2%, | 235 |
| abstract_inverted_index.actual | 205, 232 |
| abstract_inverted_index.allows | 71 |
| abstract_inverted_index.convex | 157 |
| abstract_inverted_index.design | 31 |
| abstract_inverted_index.ensure | 287 |
| abstract_inverted_index.factor | 241 |
| abstract_inverted_index.follow | 134 |
| abstract_inverted_index.matrix | 124, 143, 200 |
| abstract_inverted_index.modern | 9 |
| abstract_inverted_index.number | 170, 188, 214, 255, 272 |
| abstract_inverted_index.random | 142, 199 |
| abstract_inverted_index.secure | 111 |
| abstract_inverted_index.simple | 136 |
| abstract_inverted_index.system | 176 |
| abstract_inverted_index.theory | 144, 201 |
| abstract_inverted_index.(NORAN) | 3 |
| abstract_inverted_index.Massive | 106 |
| abstract_inverted_index.achieve | 110 |
| abstract_inverted_index.analyze | 161 |
| abstract_inverted_index.becomes | 266 |
| abstract_inverted_index.between | 62, 226 |
| abstract_inverted_index.channel | 25, 40, 121, 148, 195, 206, 229, 233 |
| abstract_inverted_index.degrees | 26 |
| abstract_inverted_index.employs | 141 |
| abstract_inverted_index.failing | 284 |
| abstract_inverted_index.maximum | 169 |
| abstract_inverted_index.modeled | 228 |
| abstract_inverted_index.optimal | 163, 238 |
| abstract_inverted_index.reaches | 234 |
| abstract_inverted_index.signals | 60 |
| abstract_inverted_index.systems | 11, 108 |
| abstract_inverted_index.thereby | 45 |
| abstract_inverted_index.unknown | 126, 151 |
| abstract_inverted_index.Codebook | 53 |
| abstract_inverted_index.However, | 29, 252 |
| abstract_inverted_index.Notably, | 211 |
| abstract_inverted_index.antennas | 173, 191, 217, 258, 275 |
| abstract_inverted_index.capacity | 41 |
| abstract_inverted_index.codebook | 81 |
| abstract_inverted_index.efficacy | 279 |
| abstract_inverted_index.findings | 183 |
| abstract_inverted_index.freedom. | 28 |
| abstract_inverted_index.garnered | 5 |
| abstract_inverted_index.indicate | 184 |
| abstract_inverted_index.limiting | 46 |
| abstract_inverted_index.modeling | 196 |
| abstract_inverted_index.pattern, | 138 |
| abstract_inverted_index.receiver | 64, 73, 130 |
| abstract_inverted_index.retrieve | 75 |
| abstract_inverted_index.signals, | 85 |
| abstract_inverted_index.strategy | 166 |
| abstract_inverted_index.systems. | 51 |
| abstract_inverted_index.tolerate | 178 |
| abstract_inverted_index.upcoming | 77 |
| abstract_inverted_index.<tex-math | 219, 247 |
| abstract_inverted_index.algorithm | 159 |
| abstract_inverted_index.attention | 7 |
| abstract_inverted_index.channels, | 44 |
| abstract_inverted_index.continues | 259 |
| abstract_inverted_index.exchanged | 61 |
| abstract_inverted_index.increase, | 261 |
| abstract_inverted_index.infinity, | 277 |
| abstract_inverted_index.leverages | 58 |
| abstract_inverted_index.practical | 50 |
| abstract_inverted_index.reduction | 37 |
| abstract_inverted_index.security. | 290 |
| abstract_inverted_index.Artificial | 1, 17, 55 |
| abstract_inverted_index.adequately | 286 |
| abstract_inverted_index.allocation | 165, 240 |
| abstract_inverted_index.approaches | 276 |
| abstract_inverted_index.decreases, | 283 |
| abstract_inverted_index.deployment | 102 |
| abstract_inverted_index.encryption | 68 |
| abstract_inverted_index.increases, | 192 |
| abstract_inverted_index.legitimate | 43, 129 |
| abstract_inverted_index.substitute | 14 |
| abstract_inverted_index.successive | 156 |
| abstract_inverted_index.Considering | 113 |
| abstract_inverted_index.Pilot-based | 52 |
| abstract_inverted_index.application | 48 |
| abstract_inverted_index.conditions. | 181 |
| abstract_inverted_index.consistency | 225 |
| abstract_inverted_index.effectively | 86 |
| abstract_inverted_index.information | 123 |
| abstract_inverted_index.pronounced. | 268 |
| abstract_inverted_index.significant | 6 |
| abstract_inverted_index.traditional | 16 |
| abstract_inverted_index.transmitter | 66 |
| abstract_inverted_index.approximates | 203 |
| abstract_inverted_index.distribution | 137 |
| abstract_inverted_index.eavesdropper | 115, 172, 190, 194, 216, 257, 274 |
| abstract_inverted_index.illegitimate | 118 |
| abstract_inverted_index.increasingly | 202 |
| abstract_inverted_index.independence | 23 |
| abstract_inverted_index.investigates | 100 |
| abstract_inverted_index.Consequently, | 97 |
| abstract_inverted_index.Nevertheless, | 269 |
| abstract_inverted_index.adaptability. | 96 |
| abstract_inverted_index.approximation | 158 |
| abstract_inverted_index.communication | 10 |
| abstract_inverted_index.demonstrating | 94 |
| abstract_inverted_index.eavesdropper. | 152, 210 |
| abstract_inverted_index.effectiveness | 263 |
| abstract_inverted_index.significantly | 282 |
| abstract_inverted_index.transitioning | 87 |
| abstract_inverted_index.Non-Orthogonal | 0, 54 |
| abstract_inverted_index.communication. | 112 |
| abstract_inverted_index.characteristics | 207 |
| abstract_inverted_index.system’s | 289 |
| abstract_inverted_index.<inline-formula> | 218, 246 |
| abstract_inverted_index.notation="LaTeX">$N_{E} | 220 |
| abstract_inverted_index.notation="LaTeX">$\theta | 248 |
| abstract_inverted_index.</tex-math></inline-formula>, | 223 |
| abstract_inverted_index.</tex-math></inline-formula>. | 251 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/13 |
| sustainable_development_goals[0].score | 0.49000000953674316 |
| sustainable_development_goals[0].display_name | Climate action |
| citation_normalized_percentile.value | 0.15501072 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |