{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:58:59Z","timestamp":1774954739014,"version":"3.50.1"},"reference-count":35,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"vor","delay-in-days":89,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1807203"],"award-info":[{"award-number":["2020YFB1807203"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2026,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Directional modulation (DM) has been widely studied as a promising technique for enhancing physical layer security (PLS). In particular, DM combined with frequency diverse arrays (FDA) enables directional transmission on the two\u2010dimensional plane. However, the inevitable presence of sidelobes in FDA patterns still poses a risk of information leakage to eavesdroppers. To address this limitation, we propose an artificial\u2010noise\u2010aided DM scheme based on a multilog frequency diverse array (AN\u2010DM\u2010MFDA). Unlike conventiona methods that uniformly transmit artificial noise (AN), the proposed scheme strategically allocates AN to the leakage sidelobes, thereby reducing their vulnerability to interception. Furthermore, we derive the theoretical expressions for the average bit error rate (BER) and the secrecy capacity of the developed system. Simulation results confirm that the proposed scheme achieves stronger secrecy protection while maintaining reliable detection performance for the legitimate user, outperforming existing AN\u2010aided DM\u00a0approaches.<\/jats:p>","DOI":"10.1049\/cmu2.70140","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:04:24Z","timestamp":1774951464000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artificial Noise Aided Directional Modulation with Multilog Frequency Diverse Array"],"prefix":"10.1049","volume":"20","author":[{"given":"Ji","family":"Liu","sequence":"first","affiliation":[{"name":"School of Telecommunications Engineering Xidian University Xi'an China"},{"name":"China Academy of Space Technology (Xi\u2019an) Xi'an China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2127-8947","authenticated-orcid":false,"given":"Yue","family":"Xiao","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China  Chengdu China"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Telecommunications Engineering Xidian University Xi'an China"}]},{"given":"Xia","family":"Lei","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China  Chengdu China"}]}],"member":"265","published-online":{"date-parts":[[2026,3,31]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3574824"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.2004864"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2009.2027047"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet\u2010map.2012.0644"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3382324"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet\u2010map.2013.0282"},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"Y.DingandV.Fusco \u201cDirectional Modulation Transmitter Synthesis Using Particle Swarm Optimization \u201d inLoughborough Antennas & Propagation Conference (LAPC)(IEEE Nov. 2013) 500\u2013503.","DOI":"10.1109\/LAPC.2013.6711950"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2013.2287001"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"Y.DingandV.Fusco \u201cVector Representation of Directional Modulation Transmitters \u201d inEuropean Conference on Antennas and Propagation(IEEE Apr. 2014) 367\u2013371.","DOI":"10.1109\/EuCAP.2014.6901768"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2015.2404818"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1759078715001099"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3485594"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3610758"},{"issue":"13","key":"e_1_2_10_15_1","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.1049\/cmu2.12414","article-title":"Artificial Noise Aided Directional Modulation via Reconfigurable Intelligent Surface: Secrecy Guarantee in Range Domain","volume":"16","author":"Chen J.","year":"2022","journal-title":"IET Communications"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2025.3598493"},{"key":"e_1_2_10_17_1","doi-asserted-by":"crossref","unstructured":"P.Antonik M. C.Wicks H. D.Griffiths andC. J.Baker \u201cFrequency Diverse Array Radars \u201d inIEEE Conference on Radar(IEEE Apr. 2006) 215\u2013217.","DOI":"10.1109\/RADAR.2006.1631800"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2627182"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2015.2414692"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2024.3390177"},{"issue":"8","key":"e_1_2_10_21_1","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1049\/iet-map.2015.0658","article-title":"Decoupled Frequency Diverse Array Range\u2010Angle\u2010Dependent Beampattern Synthesis Using Nonlinearly Increasing Frequency Offsets","volume":"10","author":"Gao K. D.","year":"2016","journal-title":"IET Microwaves, Antennas and Propagation"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2627183"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3263939"},{"issue":"3","key":"e_1_2_10_24_1","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1049\/iet-map.2016.0303","article-title":"DM Using FDA Antenna for Secure Transmission","volume":"11","author":"Wang W.\u2010Q.","year":"2017","journal-title":"IET Microwaves, Antennas and Propagation"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900942"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2016.2527818"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984643"},{"key":"e_1_2_10_28_1","first-page":"447","volume-title":"Proceedings of MILCOM","author":"Scholtz R.","year":"1993"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3610758"},{"key":"e_1_2_10_31_1","doi-asserted-by":"crossref","unstructured":"O. N.AlrabadiandG. F.Pedersen \u201cDirectional Space\u2010Time Modulation: A Novel Approach for Secured Wireless Communication \u201d inProceedings of IEEE International Conference on Communications (ICC)(IEEE Jun. 2012) 3554\u20133558.","DOI":"10.1109\/ICC.2012.6364574"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet\u2010map.2014.0331"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2653182"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.843135"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815779"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.70140","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/cmu2.70140","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.70140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:04:26Z","timestamp":1774951466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/cmu2.70140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10.1049\/cmu2.70140"],"URL":"https:\/\/doi.org\/10.1049\/cmu2.70140","archive":["Portico"],"relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"value":"1751-8628","type":"print"},{"value":"1751-8636","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"2025-05-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70140"}}