{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:O64LSBE3PTUI2RQVSWQVP3TNRL","short_pith_number":"pith:O64LSBE3","schema_version":"1.0","canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","source":{"kind":"arxiv","id":"1901.07955","version":1},"attestation_state":"computed","paper":{"title":"A Survey of Optimization Approaches for Wireless Physical Layer Security","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Bo Bai, Dong Wang, Wenbo Zhao, Zhu Han","submitted_at":"2019-01-23T15:37:38Z","abstract_excerpt":"Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1901.07955","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-01-23T15:37:38Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"3793dd84c3c1af8e93121f126eab90fc46f13d7c47be7dc6dca28becb1db321c","abstract_canon_sha256":"9ce04d8757ccac41b3571b60ff9362e851ef1fb5d15c6032cad08f2970b82fdb"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:55:39.403981Z","signature_b64":"+xjQiLukKh2DZeqdvubb5mAhcAcCoUXQT/zeEYarvNA5S0H6TGuykt9Q9fMaeVgJeoVddS/cxu0oIqIn29QgDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","last_reissued_at":"2026-05-17T23:55:39.403631Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:55:39.403631Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"A Survey of Optimization Approaches for Wireless Physical Layer Security","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Bo Bai, Dong Wang, Wenbo Zhao, Zhu Han","submitted_at":"2019-01-23T15:37:38Z","abstract_excerpt":"Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.07955","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1901.07955","created_at":"2026-05-17T23:55:39.403691+00:00"},{"alias_kind":"arxiv_version","alias_value":"1901.07955v1","created_at":"2026-05-17T23:55:39.403691+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.07955","created_at":"2026-05-17T23:55:39.403691+00:00"},{"alias_kind":"pith_short_12","alias_value":"O64LSBE3PTUI","created_at":"2026-05-18T12:33:24.271573+00:00"},{"alias_kind":"pith_short_16","alias_value":"O64LSBE3PTUI2RQV","created_at":"2026-05-18T12:33:24.271573+00:00"},{"alias_kind":"pith_short_8","alias_value":"O64LSBE3","created_at":"2026-05-18T12:33:24.271573+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL","json":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL.json","graph_json":"https://pith.science/api/pith-number/O64LSBE3PTUI2RQVSWQVP3TNRL/graph.json","events_json":"https://pith.science/api/pith-number/O64LSBE3PTUI2RQVSWQVP3TNRL/events.json","paper":"https://pith.science/paper/O64LSBE3"},"agent_actions":{"view_html":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL","download_json":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL.json","view_paper":"https://pith.science/paper/O64LSBE3","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1901.07955&json=true","fetch_graph":"https://pith.science/api/pith-number/O64LSBE3PTUI2RQVSWQVP3TNRL/graph.json","fetch_events":"https://pith.science/api/pith-number/O64LSBE3PTUI2RQVSWQVP3TNRL/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/action/timestamp_anchor","attest_storage":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/action/storage_attestation","attest_author":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/action/author_attestation","sign_citation":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/action/citation_signature","submit_replication":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/action/replication_record"}},"created_at":"2026-05-17T23:55:39.403691+00:00","updated_at":"2026-05-17T23:55:39.403691+00:00"}