暂无分享,去创建一个
[1] Feng Shu,et al. UAV-Enabled Covert Wireless Data Collection , 2019, IEEE Journal on Selected Areas in Communications.
[2] Branka Vucetic,et al. Timely Status Update in Internet of Things Monitoring Systems: An Age-Energy Tradeoff , 2019, IEEE Internet of Things Journal.
[3] A. Bobrowski. Functional Analysis for Probability and Stochastic Processes: An Introduction , 2005 .
[4] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[5] W. Marsden. I and J , 2012 .
[6] Jun Li,et al. Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).
[7] Xiangyun Zhou,et al. Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.
[8] Joseph Lipka,et al. A Table of Integrals , 2010 .
[9] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[10] Marian Codreanu,et al. Power Minimization in Wireless Sensor Networks With Constrained AoI Using Stochastic Optimization , 2019, 2019 53rd Asilomar Conference on Signals, Systems, and Computers.
[11] Marian Codreanu,et al. Optimal Sampling Cost in Wireless Networks with Age of Information Constraints , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[12] Feng Shu,et al. Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.
[13] Sanjit Krishnan Kaul,et al. Minimizing age of information in vehicular networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[14] Vangelis Angelakis,et al. Age of Information: A New Concept, Metric, and Tool , 2018, Found. Trends Netw..
[15] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[16] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[17] Qian Wang,et al. Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics , 2020, ArXiv.