Covert Communications Without Channel State Information at Receiver in IoT systems
暂无分享,去创建一个
Xiaobo Zhou | Shihao Yan | Jiangzhou Wang | Feng Shu | Jinsong Hu | Jinsong Hu | Shihao Yan | F. Shu | Jiangzhou Wang | Xiaobo Zhou | Jiangzhou Wang
[1] Sherali Zeadally,et al. Internet of Things (IoT): Research, Simulators, and Testbeds , 2018, IEEE Internet of Things Journal.
[2] Shihao Yan,et al. TAS-Based Incremental Hybrid Decode–Amplify–Forward Relaying for Physical Layer Security Enhancement , 2017, IEEE Transactions on Communications.
[3] Feng Shu,et al. Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.
[4] Derrick Wing Kwan Ng,et al. Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.
[5] Derrick Wing Kwan Ng,et al. Robust Beamforming for NOMA-Based Cellular Massive IoT With SWIPT , 2020, IEEE Transactions on Signal Processing.
[6] Ekram Hossain,et al. On Stochastic Geometry Modeling of Cellular Uplink Transmission With Truncated Channel Inversion Power Control , 2014, IEEE Transactions on Wireless Communications.
[7] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[8] Jun Li,et al. Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.
[9] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[10] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[11] Xiangyun Zhou,et al. Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.
[12] Kwok-Yan Lam,et al. Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.
[13] Vincent Y. F. Tan,et al. Time-Division is Optimal for Covert Communication over Some Broadcast Channels , 2017, 2018 IEEE Information Theory Workshop (ITW).
[14] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[15] Jianfeng Ma,et al. Covert Wireless Communications in IoT Systems: Hiding Information in Interference , 2018, IEEE Wireless Communications.
[16] Xiangyun Zhou,et al. Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[17] Matthieu R. Bloch,et al. First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.
[18] Xiangyun Zhou,et al. Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.
[19] Jun Li,et al. Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.
[20] Anant Sahai,et al. SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.
[21] Jun Li,et al. Covert Wireless Communications With Channel Inversion Power Control in Rayleigh Fading , 2018, IEEE Transactions on Vehicular Technology.
[22] Dominic J. A. Welsh,et al. Complexity and cryptography - an introduction , 2006 .
[23] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[24] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[25] Feng Shu,et al. Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.
[26] Derrick Wing Kwan Ng,et al. Key technologies for 5G wireless systems , 2017 .
[27] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[28] Jianfeng Ma,et al. On Covert Communication with Interference Uncertainty , 2018, 2018 IEEE International Conference on Communications (ICC).
[29] Dan Wu,et al. Resource Allocation for Covert Communication in D2D Content Sharing: A Matching Game Approach , 2019, IEEE Access.
[30] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[31] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[32] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[33] Yueming Cai,et al. Secure Transmission Design With Feedback Compression for the Internet of Things , 2018, IEEE Transactions on Signal Processing.
[34] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[35] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[36] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[37] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[38] Yueming Cai,et al. Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed? , 2018, IEEE Journal on Selected Areas in Communications.