Gaussian Signalling for Covert Communications
暂无分享,去创建一个
Xiangyun Zhou | Shihao Yan | Stephen V. Hanly | Yirui Cong | S. Hanly | Xiangyun Zhou | Shihao Yan | Yirui Cong
[1] Matthieu R. Bloch,et al. Covert secret key generation , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[2] Matthieu R. Bloch,et al. Error exponent for covert communications over discrete memoryless channels , 2017, 2017 IEEE Information Theory Workshop (ITW).
[3] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[4] Donald F. Towsley,et al. Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] M. Bloch,et al. Second-Order Asymptotics in Covert Communication. , 2017 .
[6] Saikat Guha,et al. Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.
[7] Joseph Lipka,et al. A Table of Integrals , 2010 .
[8] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[9] Xiangyun Zhou,et al. Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[10] Trung Q. Duong. Keynote talk #1: Trusted communications with physical layer security for 5G and beyond , 2017, 2017 International Conference on Advanced Technologies for Communications (ATC).
[11] Feng Shu,et al. Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[12] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[13] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[14] Mayank Bakshi,et al. Reliable, deniable and hidable communication: A quick survey , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[15] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[16] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[17] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[18] Sidharth Jaggi,et al. Multipath Stealth Communication with Jammers , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[19] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[20] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.
[21] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[22] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[23] Donald F. Towsley,et al. Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.
[24] Bernard C. Levy,et al. Principles of Signal Detection and Parameter Estimation , 2008 .
[25] Xiaohong Jiang,et al. Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[26] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[27] Matthieu R. Bloch,et al. Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.
[28] Matthieu R. Bloch,et al. Second-order asymptotics of covert communications over noisy channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[29] Gerhard Kramer,et al. Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.
[30] Mary Ann Weitnauer,et al. Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.
[31] Matthieu R. Bloch,et al. Keyless covert communication over Multiple-Access Channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[32] Shihao Yan,et al. Location Verification Systems Under Spatially Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.
[33] Adelchi Azzalini,et al. The Skew-Normal and Related Families , 2018 .
[34] Matthieu R. Bloch,et al. Covert communication over broadcast channels , 2017, 2017 IEEE Information Theory Workshop (ITW).
[35] S. Brendle,et al. Calculus of Variations , 1927, Nature.
[36] Marvin K. Simon,et al. Spread Spectrum Communications Handbook , 1994 .
[37] Donald F. Towsley,et al. Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.
[38] Matthieu R. Bloch,et al. First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.
[39] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.
[40] Xiangyun Zhou,et al. Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).
[41] Matthieu R. Bloch,et al. Optimal covert communications using pulse-position modulation , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).