{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:IAQL6CO5LXCYQGM6NZXGNEPSI7","short_pith_number":"pith:IAQL6CO5","canonical_record":{"source":{"id":"1601.01427","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-07T07:42:42Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"85e3b612cb9732f05ebab27fcee5553463c5d294b71c4a80799a153b1bfed2e0","abstract_canon_sha256":"9670099cc411c0260ee0e072276014ce263d02316f142600f73e0a3046359bb4"},"schema_version":"1.0"},"canonical_sha256":"4020bf09dd5dc588199e6e6e6691f247f20f4a5ae076814d632d3be68ee17563","source":{"kind":"arxiv","id":"1601.01427","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1601.01427","created_at":"2026-05-18T01:23:13Z"},{"alias_kind":"arxiv_version","alias_value":"1601.01427v1","created_at":"2026-05-18T01:23:13Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1601.01427","created_at":"2026-05-18T01:23:13Z"},{"alias_kind":"pith_short_12","alias_value":"IAQL6CO5LXCY","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_16","alias_value":"IAQL6CO5LXCYQGM6","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_8","alias_value":"IAQL6CO5","created_at":"2026-05-18T12:30:22Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:IAQL6CO5LXCYQGM6NZXGNEPSI7","target":"record","payload":{"canonical_record":{"source":{"id":"1601.01427","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-07T07:42:42Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"85e3b612cb9732f05ebab27fcee5553463c5d294b71c4a80799a153b1bfed2e0","abstract_canon_sha256":"9670099cc411c0260ee0e072276014ce263d02316f142600f73e0a3046359bb4"},"schema_version":"1.0"},"canonical_sha256":"4020bf09dd5dc588199e6e6e6691f247f20f4a5ae076814d632d3be68ee17563","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:23:13.702959Z","signature_b64":"Z0f/OIm7+PwLkdjP1WtLBMMZ0O74ng1V3W8GkVbM0CB4oq3BQpqncL9B4YXBcNfjRoBP88Jw0U3yfo6FU834CA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"4020bf09dd5dc588199e6e6e6691f247f20f4a5ae076814d632d3be68ee17563","last_reissued_at":"2026-05-18T01:23:13.702349Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:23:13.702349Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1601.01427","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:23:13Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SKBxfUkueO/OeF8AM3sV/UG4A65+plQ4K25RhCvQsaX7IZXyQhB5BY6gso8t3WNYln4POdx7CDjtUbLiy6UFAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T00:20:54.217493Z"},"content_sha256":"087c04a7c0fd23f26b66cdde8d8cafe3fd72fd9824b441a86795688ca3950819","schema_version":"1.0","event_id":"sha256:087c04a7c0fd23f26b66cdde8d8cafe3fd72fd9824b441a86795688ca3950819"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:IAQL6CO5LXCYQGM6NZXGNEPSI7","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Physical Layer Security in Heterogeneous Cellular Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Don Towsley, Hui-Ming Wang, Jinhong Yuan, Moon Ho Lee, Tong-Xing Zheng","submitted_at":"2016-01-07T07:42:42Z","abstract_excerpt":"The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multi-tier HCN where base stations (BSs), authorized users and eavesdroppers are all randomly located. We first propose an access threshold based secrecy mobile association policy that associates each user with the BS providing the maximum \\emph{truncated average received signal power} beyond a threshold. Under the proposed policy, we investigate the connection probability and secrecy probability of a randomly located user, "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1601.01427","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:23:13Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"r4rmxu8VXrUgASIEUHJgbLgOPMN9H13oo69ToeSDu3vi708qLLmkbDrV0ambyIfZZtWJrh/bkPEQ5HS4VwO+Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T00:20:54.218157Z"},"content_sha256":"7790e3f839850ecc2a070155174136e3cea2822828142b933f4186c9edae448f","schema_version":"1.0","event_id":"sha256:7790e3f839850ecc2a070155174136e3cea2822828142b933f4186c9edae448f"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7/bundle.json","state_url":"https://pith.science/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T00:20:54Z","links":{"resolver":"https://pith.science/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7","bundle":"https://pith.science/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7/bundle.json","state":"https://pith.science/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7/state.json","well_known_bundle":"https://pith.science/.well-known/pith/IAQL6CO5LXCYQGM6NZXGNEPSI7/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:IAQL6CO5LXCYQGM6NZXGNEPSI7","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9670099cc411c0260ee0e072276014ce263d02316f142600f73e0a3046359bb4","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-07T07:42:42Z","title_canon_sha256":"85e3b612cb9732f05ebab27fcee5553463c5d294b71c4a80799a153b1bfed2e0"},"schema_version":"1.0","source":{"id":"1601.01427","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1601.01427","created_at":"2026-05-18T01:23:13Z"},{"alias_kind":"arxiv_version","alias_value":"1601.01427v1","created_at":"2026-05-18T01:23:13Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1601.01427","created_at":"2026-05-18T01:23:13Z"},{"alias_kind":"pith_short_12","alias_value":"IAQL6CO5LXCY","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_16","alias_value":"IAQL6CO5LXCYQGM6","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_8","alias_value":"IAQL6CO5","created_at":"2026-05-18T12:30:22Z"}],"graph_snapshots":[{"event_id":"sha256:7790e3f839850ecc2a070155174136e3cea2822828142b933f4186c9edae448f","target":"graph","created_at":"2026-05-18T01:23:13Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multi-tier HCN where base stations (BSs), authorized users and eavesdroppers are all randomly located. We first propose an access threshold based secrecy mobile association policy that associates each user with the BS providing the maximum \\emph{truncated average received signal power} beyond a threshold. Under the proposed policy, we investigate the connection probability and secrecy probability of a randomly located user, ","authors_text":"Don Towsley, Hui-Ming Wang, Jinhong Yuan, Moon Ho Lee, Tong-Xing Zheng","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-07T07:42:42Z","title":"Physical Layer Security in Heterogeneous Cellular Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1601.01427","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:087c04a7c0fd23f26b66cdde8d8cafe3fd72fd9824b441a86795688ca3950819","target":"record","created_at":"2026-05-18T01:23:13Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9670099cc411c0260ee0e072276014ce263d02316f142600f73e0a3046359bb4","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-07T07:42:42Z","title_canon_sha256":"85e3b612cb9732f05ebab27fcee5553463c5d294b71c4a80799a153b1bfed2e0"},"schema_version":"1.0","source":{"id":"1601.01427","kind":"arxiv","version":1}},"canonical_sha256":"4020bf09dd5dc588199e6e6e6691f247f20f4a5ae076814d632d3be68ee17563","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"4020bf09dd5dc588199e6e6e6691f247f20f4a5ae076814d632d3be68ee17563","first_computed_at":"2026-05-18T01:23:13.702349Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:23:13.702349Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Z0f/OIm7+PwLkdjP1WtLBMMZ0O74ng1V3W8GkVbM0CB4oq3BQpqncL9B4YXBcNfjRoBP88Jw0U3yfo6FU834CA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:23:13.702959Z","signed_message":"canonical_sha256_bytes"},"source_id":"1601.01427","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:087c04a7c0fd23f26b66cdde8d8cafe3fd72fd9824b441a86795688ca3950819","sha256:7790e3f839850ecc2a070155174136e3cea2822828142b933f4186c9edae448f"],"state_sha256":"a8f0a115d4280460e65a8160964d775f3ede4c8495e3a92562c19112108ea2f2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FNys4bTDU9auqZsY63f+8xRDfQjyLaLC94b/QHhK03yHY2XsL8x1j/A9k00X7ho/056qkL/WnUULc2rcuR26CQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T00:20:54.221800Z","bundle_sha256":"82565f495369b0cd6d437ef0af001ab5afaf81bcc4bb65d4f8407624b0cbc53e"}}