{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2016:BIL336HXEMJGEMS4WOFGIFDYZJ","short_pith_number":"pith:BIL336HX","schema_version":"1.0","canonical_sha256":"0a17bdf8f7231262325cb38a641478ca79b3a78b549cb27b06459dc9473ca779","source":{"kind":"arxiv","id":"1610.06270","version":1},"attestation_state":"computed","paper":{"title":"Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Hui-Ming Wang, Moon Ho Lee, Qian Yang, Tong-Xing Zheng","submitted_at":"2016-10-20T03:05:33Z","abstract_excerpt":"In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing the physical-layer security of a two-tier decentralized wireless network with each tier deployed with a large number of pairs of a single-antenna transmitter and a multi-antenna receiver. In the underlying tier, the transmitter sends unclassified information, and the receiver works in the halfduplex (HD) mode receiving the desired signal. In the overlaid tier, the transmitter deliveries confidential information in the presence of randomly located eavesdroppers, and the receiver works in the FD mode radiating"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1610.06270","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-10-20T03:05:33Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"ecca873b62a965b682f312f9f8123c7454f77729faea986663742b029ef8417c","abstract_canon_sha256":"4f926f45f854fab80af3426f7e5cfc0c3b791cf29fa20d469672078e32fc0d99"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:56.451081Z","signature_b64":"xJLZhsjInrtuEGxpR3smgXZScUmhswbD+mBg4+S0GaQ3Em7zwPV9VaReEDs1t9DH+2+3nrekWz5GduJyiy0PBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"0a17bdf8f7231262325cb38a641478ca79b3a78b549cb27b06459dc9473ca779","last_reissued_at":"2026-05-18T00:58:56.450391Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:56.450391Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Hui-Ming Wang, Moon Ho Lee, Qian Yang, Tong-Xing Zheng","submitted_at":"2016-10-20T03:05:33Z","abstract_excerpt":"In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing the physical-layer security of a two-tier decentralized wireless network with each tier deployed with a large number of pairs of a single-antenna transmitter and a multi-antenna receiver. In the underlying tier, the transmitter sends unclassified information, and the receiver works in the halfduplex (HD) mode receiving the desired signal. In the overlaid tier, the transmitter deliveries confidential information in the presence of randomly located eavesdroppers, and the receiver works in the FD mode radiating"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.06270","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1610.06270","created_at":"2026-05-18T00:58:56.450506+00:00"},{"alias_kind":"arxiv_version","alias_value":"1610.06270v1","created_at":"2026-05-18T00:58:56.450506+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.06270","created_at":"2026-05-18T00:58:56.450506+00:00"},{"alias_kind":"pith_short_12","alias_value":"BIL336HXEMJG","created_at":"2026-05-18T12:30:07.202191+00:00"},{"alias_kind":"pith_short_16","alias_value":"BIL336HXEMJGEMS4","created_at":"2026-05-18T12:30:07.202191+00:00"},{"alias_kind":"pith_short_8","alias_value":"BIL336HX","created_at":"2026-05-18T12:30:07.202191+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ","json":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ.json","graph_json":"https://pith.science/api/pith-number/BIL336HXEMJGEMS4WOFGIFDYZJ/graph.json","events_json":"https://pith.science/api/pith-number/BIL336HXEMJGEMS4WOFGIFDYZJ/events.json","paper":"https://pith.science/paper/BIL336HX"},"agent_actions":{"view_html":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ","download_json":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ.json","view_paper":"https://pith.science/paper/BIL336HX","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1610.06270&json=true","fetch_graph":"https://pith.science/api/pith-number/BIL336HXEMJGEMS4WOFGIFDYZJ/graph.json","fetch_events":"https://pith.science/api/pith-number/BIL336HXEMJGEMS4WOFGIFDYZJ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ/action/storage_attestation","attest_author":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ/action/author_attestation","sign_citation":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ/action/citation_signature","submit_replication":"https://pith.science/pith/BIL336HXEMJGEMS4WOFGIFDYZJ/action/replication_record"}},"created_at":"2026-05-18T00:58:56.450506+00:00","updated_at":"2026-05-18T00:58:56.450506+00:00"}