Robust Beamforming Design for Covert Communications
暂无分享,去创建一个
Naofal Al-Dhahir | Shiyin Li | Yunqi Zhang | Songtao Lu | Shuai Ma | Hang Li | Sha Zhang | N. Al-Dhahir | Yunqi Zhang | Sha Zhang | Shiyin Li | Songtao Lu | Shuai Ma | Hang Li
[1] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[2] Donald F. Towsley,et al. Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[3] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[4] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[5] H. Vincent Poor,et al. LPD Communication: A Sequential Change-Point Detection Perspective , 2019, IEEE Transactions on Communications.
[6] Matthieu R. Bloch,et al. Covert Communication Over a $K$ -User Multiple-Access Channel , 2018, IEEE Transactions on Information Theory.
[7] Xiaohong Jiang,et al. Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[8] Jun Li,et al. Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.
[9] Dennis Goeckel,et al. Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information , 2019, IEEE Transactions on Vehicular Technology.
[10] Omer Gurewitz,et al. The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling - Order Optimality of Linear Receivers , 2018, IEEE Transactions on Information Theory.
[11] Dennis Goeckel,et al. Robust Power Allocation in Covert Communication: Imperfect CDI , 2019, IEEE Transactions on Vehicular Technology.
[12] Hui Zhao,et al. Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA , 2020, IEEE Systems Journal.
[13] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[14] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[15] Kai-Kit Wong,et al. A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer , 2020, IEEE Internet of Things Journal.
[16] Shihao Yan,et al. Covert Communication in Downlink NOMA Systems With Random Transmit Power , 2020, IEEE Wireless Communications Letters.
[17] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[18] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[19] Vincent Y. F. Tan,et al. Time-Division is Optimal for Covert Communication over Some Broadcast Channels , 2017, 2018 IEEE Information Theory Workshop (ITW).
[20] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[21] Donald F. Towsley,et al. Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Matthieu R. Bloch,et al. Keyless asynchronous covert communication , 2016, 2016 IEEE Information Theory Workshop (ITW).
[24] Mary Ann Weitnauer,et al. Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.
[25] Phee Lep Yeoh,et al. Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden , 2020, IEEE Internet of Things Journal.
[26] Phee Lep Yeoh,et al. Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens , 2020, IEEE Transactions on Communications.
[27] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[28] Saikat Guha,et al. Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.
[29] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[30] Eytan Modiano,et al. Efficient Scheduling of Multi-User Multi-Antenna Systems , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
[31] Cong Ling,et al. Covert Communications With a Full-Duplex Receiver in Non-Coherent Rayleigh Fading , 2021, IEEE Transactions on Communications.
[32] Vincent Y. F. Tan,et al. Time-Division is Optimal for Covert Communication Over Some Broadcast Channels , 2019, IEEE Transactions on Information Forensics and Security.
[33] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[34] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[35] Donald F. Towsley,et al. LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.
[36] Shaoqian Li,et al. Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.
[37] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[38] Babak Hassibi,et al. The Effect of Channel Estimation Error on the Throughput of Broadcast Channels , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[39] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[40] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[41] Mayank Bakshi,et al. Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[42] Xiangyun Zhou,et al. Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[43] Donald F. Towsley,et al. Covert Communication Gains From Adversary’s Ignorance of Transmission Time , 2014, IEEE Transactions on Wireless Communications.