Keyless Covert Communication in the Presence of Channel State Information
暂无分享,去创建一个
[1] Aria Nosratinia,et al. Keyless Covert Communication via Channel State Information , 2020, ArXiv.
[2] Matthieu R. Bloch,et al. Covert secret key generation , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[3] Matthieu R. Bloch,et al. First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.
[4] Gregory W. Wornell,et al. Covert Communication With Channel-State Information at the Transmitter , 2017, IEEE Transactions on Information Forensics and Security.
[5] Haim H. Permuter,et al. Wiretap channels with random states non-causally available at the encoder , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[6] Hachiro Fujita. On the Secrecy Capacity of Wiretap Channels With Side Information at the Transmitter , 2016, IEEE Transactions on Information Forensics and Security.
[7] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.
[8] Eduard A. Jorswieck,et al. Stealthy keyless secret key generation from degraded sources , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.
[9] Abbas El Gamal,et al. Wiretap Channel With Causal State Information , 2012, IEEE Transactions on Information Theory.
[10] Haim H. Permuter,et al. Arbitrarily Varying Wiretap Channels with Type Constrained States , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[11] Ghosheh Abed Hodtani,et al. Wiretap channel with strictly causal side information at encoder , 2014, 2014 Iran Workshop on Communication and Information Theory (IWCIT).
[12] Suhas N. Diggavi,et al. Secret key agreement using asymmetry in channel state knowledge , 2009, 2009 IEEE International Symposium on Information Theory.
[13] Aria Nosratinia,et al. Keyless Covert Communication in the Presence of Non-causal Channel State Information , 2019, 2019 IEEE Information Theory Workshop (ITW).
[14] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[15] Bin Dai,et al. Wiretap Channel With Side Information , 2006, ArXiv.
[16] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[17] Eduard A. Jorswieck,et al. Stealthy Secret Key Generation , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[18] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[19] H. Vincent Poor,et al. The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.
[20] Masahide Sasaki,et al. Wiretap Channels With Causal State Information: Strong Secrecy , 2019, IEEE Transactions on Information Theory.
[21] Vincent Y. F. Tan,et al. Covert Communication Over a Compound Channel , 2019, ArXiv.
[22] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.