{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:WUMVNNV24QUZOU46AV2B3RPYVH","short_pith_number":"pith:WUMVNNV2","canonical_record":{"source":{"id":"1601.01183","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-06T14:10:33Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"8bd39936d3d5c70d3609c23b25802c77d74b6b505cbc0999e9e68233c3e0b649","abstract_canon_sha256":"e53769b5cd1bf20293dba914eb8a60fc64995ce723ccd2c71a8fcab9fbd9447e"},"schema_version":"1.0"},"canonical_sha256":"b51956b6bae42997539e05741dc5f8a9f0cae830a35d9443e1b42aebdcefc9d5","source":{"kind":"arxiv","id":"1601.01183","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1601.01183","created_at":"2026-05-18T01:23:17Z"},{"alias_kind":"arxiv_version","alias_value":"1601.01183v1","created_at":"2026-05-18T01:23:17Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1601.01183","created_at":"2026-05-18T01:23:17Z"},{"alias_kind":"pith_short_12","alias_value":"WUMVNNV24QUZ","created_at":"2026-05-18T12:30:51Z"},{"alias_kind":"pith_short_16","alias_value":"WUMVNNV24QUZOU46","created_at":"2026-05-18T12:30:51Z"},{"alias_kind":"pith_short_8","alias_value":"WUMVNNV2","created_at":"2026-05-18T12:30:51Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:WUMVNNV24QUZOU46AV2B3RPYVH","target":"record","payload":{"canonical_record":{"source":{"id":"1601.01183","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-06T14:10:33Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"8bd39936d3d5c70d3609c23b25802c77d74b6b505cbc0999e9e68233c3e0b649","abstract_canon_sha256":"e53769b5cd1bf20293dba914eb8a60fc64995ce723ccd2c71a8fcab9fbd9447e"},"schema_version":"1.0"},"canonical_sha256":"b51956b6bae42997539e05741dc5f8a9f0cae830a35d9443e1b42aebdcefc9d5","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:23:17.664149Z","signature_b64":"Cacba6DF0PdKfcJJOVi0MxQNVtbZWUOyAGFiDe60I74pCHc0feZ2eyrVXh8ur7nyzuofqC5Ql5/JLCPbKSaHDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b51956b6bae42997539e05741dc5f8a9f0cae830a35d9443e1b42aebdcefc9d5","last_reissued_at":"2026-05-18T01:23:17.663480Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:23:17.663480Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1601.01183","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:23:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Knru2ssZtymNEMLEoEtHlQb63lOBKYHdc+Duj1Vux9tQbXGAczfw7d/urh3FiUGhKvCh9+gTwBbb5SLF7bvdCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T16:54:34.622850Z"},"content_sha256":"59f47edab76b33cfb091aff7ca387d5f5af15dba6a820b05eee863d9d9381555","schema_version":"1.0","event_id":"sha256:59f47edab76b33cfb091aff7ca387d5f5af15dba6a820b05eee863d9d9381555"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:WUMVNNV24QUZOU46AV2B3RPYVH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Hui-Ming Wang, Tong-Xing Zheng","submitted_at":"2016-01-06T14:10:33Z","abstract_excerpt":"In this correspondence, we study the secure multiantenna transmission with artificial noise (AN) under imperfect channel state information in the presence of spatially randomly distributed eavesdroppers. We derive the optimal solutions of the power allocation between the information signal and the AN for minimizing the secrecy outage probability (SOP) under a target secrecy rate and for maximizing the secrecy rate under a SOP constraint, respectively. Moreover, we provide an interesting insight that channel estimation error affects the optimal power allocation strategy in opposite ways for the"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1601.01183","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:23:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"H5EbPrY7+19BnQvdv2LMNBAt2fT9Pz2Vn6u0ck1sxy2u4CL67koglyn5ZYyLfc7i3j0XX5Mz3ZsCSlI8KIG0Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T16:54:34.623511Z"},"content_sha256":"f8bce2a2e76ff9b3bfce00ab16747618808f3a7604330d22e730519efa480e89","schema_version":"1.0","event_id":"sha256:f8bce2a2e76ff9b3bfce00ab16747618808f3a7604330d22e730519efa480e89"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/WUMVNNV24QUZOU46AV2B3RPYVH/bundle.json","state_url":"https://pith.science/pith/WUMVNNV24QUZOU46AV2B3RPYVH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/WUMVNNV24QUZOU46AV2B3RPYVH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T16:54:34Z","links":{"resolver":"https://pith.science/pith/WUMVNNV24QUZOU46AV2B3RPYVH","bundle":"https://pith.science/pith/WUMVNNV24QUZOU46AV2B3RPYVH/bundle.json","state":"https://pith.science/pith/WUMVNNV24QUZOU46AV2B3RPYVH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/WUMVNNV24QUZOU46AV2B3RPYVH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:WUMVNNV24QUZOU46AV2B3RPYVH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e53769b5cd1bf20293dba914eb8a60fc64995ce723ccd2c71a8fcab9fbd9447e","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-06T14:10:33Z","title_canon_sha256":"8bd39936d3d5c70d3609c23b25802c77d74b6b505cbc0999e9e68233c3e0b649"},"schema_version":"1.0","source":{"id":"1601.01183","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1601.01183","created_at":"2026-05-18T01:23:17Z"},{"alias_kind":"arxiv_version","alias_value":"1601.01183v1","created_at":"2026-05-18T01:23:17Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1601.01183","created_at":"2026-05-18T01:23:17Z"},{"alias_kind":"pith_short_12","alias_value":"WUMVNNV24QUZ","created_at":"2026-05-18T12:30:51Z"},{"alias_kind":"pith_short_16","alias_value":"WUMVNNV24QUZOU46","created_at":"2026-05-18T12:30:51Z"},{"alias_kind":"pith_short_8","alias_value":"WUMVNNV2","created_at":"2026-05-18T12:30:51Z"}],"graph_snapshots":[{"event_id":"sha256:f8bce2a2e76ff9b3bfce00ab16747618808f3a7604330d22e730519efa480e89","target":"graph","created_at":"2026-05-18T01:23:17Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this correspondence, we study the secure multiantenna transmission with artificial noise (AN) under imperfect channel state information in the presence of spatially randomly distributed eavesdroppers. We derive the optimal solutions of the power allocation between the information signal and the AN for minimizing the secrecy outage probability (SOP) under a target secrecy rate and for maximizing the secrecy rate under a SOP constraint, respectively. Moreover, we provide an interesting insight that channel estimation error affects the optimal power allocation strategy in opposite ways for the","authors_text":"Hui-Ming Wang, Tong-Xing Zheng","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-06T14:10:33Z","title":"Optimal Power Allocation for Artificial Noise under Imperfect CSI against Spatially Random Eavesdroppers"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1601.01183","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:59f47edab76b33cfb091aff7ca387d5f5af15dba6a820b05eee863d9d9381555","target":"record","created_at":"2026-05-18T01:23:17Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e53769b5cd1bf20293dba914eb8a60fc64995ce723ccd2c71a8fcab9fbd9447e","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-01-06T14:10:33Z","title_canon_sha256":"8bd39936d3d5c70d3609c23b25802c77d74b6b505cbc0999e9e68233c3e0b649"},"schema_version":"1.0","source":{"id":"1601.01183","kind":"arxiv","version":1}},"canonical_sha256":"b51956b6bae42997539e05741dc5f8a9f0cae830a35d9443e1b42aebdcefc9d5","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b51956b6bae42997539e05741dc5f8a9f0cae830a35d9443e1b42aebdcefc9d5","first_computed_at":"2026-05-18T01:23:17.663480Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:23:17.663480Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Cacba6DF0PdKfcJJOVi0MxQNVtbZWUOyAGFiDe60I74pCHc0feZ2eyrVXh8ur7nyzuofqC5Ql5/JLCPbKSaHDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:23:17.664149Z","signed_message":"canonical_sha256_bytes"},"source_id":"1601.01183","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:59f47edab76b33cfb091aff7ca387d5f5af15dba6a820b05eee863d9d9381555","sha256:f8bce2a2e76ff9b3bfce00ab16747618808f3a7604330d22e730519efa480e89"],"state_sha256":"bae1d3a86094ac0bddefc2eff953b7888ecba463cded4134fb33d5e638133459"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hbQpST6+L75ur7k0yKcyyMIDaC8PmkoUfowADZDuBhxAeAfMNrq44Hq3hVpHv0e8/Xuf/Y67PK/FFeD491snAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T16:54:34.627205Z","bundle_sha256":"bd1daa623dac15a7cd57039698155472c66cdfca868f12ea97fd1a7030d11e23"}}