On Resource Allocation in Covert Wireless Communication With Channel Estimation
暂无分享,去创建一个
Feng Shu | Shihao Yan | Linlin Sun | Xian Yu | Tingzhen Xu | Jinsong Hu | Jinsong Hu | Shihao Yan | F. Shu | Xianglong Yu | Linlin Sun | Tingzhen Xu
[1] Joseph Lipka,et al. A Table of Integrals , 2010 .
[2] Vincent Y. F. Tan,et al. Time-Division is Optimal for Covert Communication over Some Broadcast Channels , 2017, 2018 IEEE Information Theory Workshop (ITW).
[3] Matthieu R. Bloch,et al. Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.
[4] Lorenzo Rubio,et al. Evaluation of Nakagami fading behaviour based on measurements in urban scenarios , 2007 .
[5] Xiangyun Zhou,et al. Covert Communication in Backscatter Radio , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[6] Saikat Guha,et al. Multi-Hop Routing in Covert Wireless Networks , 2018, IEEE Transactions on Wireless Communications.
[7] Jun Li,et al. Covert Wireless Communications With Channel Inversion Power Control in Rayleigh Fading , 2018, IEEE Transactions on Vehicular Technology.
[8] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[9] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.
[10] Matthieu R. Bloch,et al. Second-order asymptotics of covert communications over noisy channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[11] Mustafa Cenk Gursoy,et al. On the Capacity and Energy Efficiency of Training-Based Transmissions Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[12] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[13] Donald F. Towsley,et al. Covert active sensing of linear systems , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.
[14] Mary Ann Weitnauer,et al. Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.
[15] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[16] Jun Li,et al. Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.
[17] Jun Li,et al. Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).
[18] Ronald F. Boisvert,et al. NIST Handbook of Mathematical Functions , 2010 .
[19] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[20] Zhiguo Ding,et al. Short-Packet Downlink Transmission With Non-Orthogonal Multiple Access , 2017, IEEE Transactions on Wireless Communications.
[21] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[22] Tong-Xing Zheng,et al. Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks , 2018, IEEE Transactions on Communications.
[23] Feng Shu,et al. Pilot-Based Channel Estimation Design in Covert Wireless Communication , 2019, ArXiv.
[24] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[25] Xiangyun Zhou,et al. Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).
[26] Xiangyun Zhou,et al. Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.
[27] Riqing Chen,et al. Physical Layer Security for Ultra-Reliable and Low-Latency Communications , 2019, IEEE Wireless Communications.
[28] Amr Abdelaziz,et al. Fundamental limits of covert communication over MIMO AWGN channel , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[29] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[30] Feng Shu,et al. Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.
[31] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[32] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[33] Xiangyun Zhou,et al. Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.
[34] Gregory W. Wornell,et al. Covert Communication With Channel-State Information at the Transmitter , 2017, IEEE Transactions on Information Forensics and Security.
[35] Donald F. Towsley,et al. Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.
[36] Jun Li,et al. Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.
[37] Shihao Yan,et al. Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints , 2019, IEEE Transactions on Vehicular Technology.
[38] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[39] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[40] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[41] Feng Shu,et al. Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.
[42] Babak Hassibi,et al. How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.
[43] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[44] Donald F. Towsley,et al. Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes , 2012, IEEE Wireless Communications Letters.
[45] Derrick Wing Kwan Ng,et al. Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.