Is Gaussian Signalling Optimal for Covert Communications?
暂无分享,去创建一个
[1] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[2] Xiangyun Zhou,et al. Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.
[3] Jinhong Yuan,et al. Three Artificial-Noise-Aided Secure Transmission Schemes in Wiretap Channels , 2018, IEEE Transactions on Vehicular Technology.
[4] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[5] R. Bellman. Calculus of Variations (L. E. Elsgolc) , 1963 .
[6] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[7] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[8] Feng Shu,et al. Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[9] Adelchi Azzalini,et al. The Skew-Normal and Related Families , 2018 .
[10] Jun Li,et al. Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).
[11] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[12] Xiaohong Jiang,et al. Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[13] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[14] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[15] Joseph Lipka,et al. A Table of Integrals , 2010 .
[16] Jun Li,et al. Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.
[17] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.
[18] Xiangyun Zhou,et al. Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).
[19] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[20] Feng Shu,et al. Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.
[21] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[22] Donald F. Towsley,et al. Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.