Covert Communication Achieved by a Greedy Relay in Wireless Networks
暂无分享,去创建一个
Jun Li | Feng Shu | Xiangyun Zhou | Shihao Yan | Jiangzhou Wang | Jinsong Hu | Jun Yu Li | Xiangyun Zhou | Jinsong Hu | Shihao Yan | F. Shu | Jiangzhou Wang | Jiangzhou Wang
[1] Mayank Bakshi,et al. Reliable, deniable and hidable communication: A quick survey , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[2] George K. Karagiannidis,et al. Full-duplex spectrum sharing in cooperative single carrier systems , 2015, WCNC.
[3] Donald F. Towsley,et al. Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.
[4] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[5] Norbert Goertz,et al. An Analytical Approach to the Outage Probability of Amplify-and-Forward Relaying with an MRC Receiver , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[6] ElkashlanMaged,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2017 .
[7] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Jun Li,et al. Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.
[10] Chintha Tellambura,et al. Power delay profile and noise variance estimation for OFDM , 2006, IEEE Communications Letters.
[11] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[12] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[13] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[14] Shihao Yan,et al. Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.
[15] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[16] Mary Ann Weitnauer,et al. Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.
[17] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[18] Robert J. Baxley,et al. Achieving positive rate with undetectable communication Over MIMO rayleigh channels , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[19] Dominic J. A. Welsh,et al. Complexity and cryptography - an introduction , 2006 .
[20] Xiangyun Zhou,et al. Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).
[21] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.
[22] Donald F. Towsley,et al. LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.
[23] Amr Abdelaziz,et al. Fundamental limits of covert communication over MIMO AWGN channel , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[24] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[25] Donald F. Towsley,et al. Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[26] Feng Shu,et al. Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[27] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[28] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.
[29] Lifeng Wang,et al. Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.
[30] Xiangyun Zhou,et al. Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[31] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[32] Shihao Yan,et al. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.