On Likelihood Functions to Minimize KL Divergence in Binary Hypothesis Testing
暂无分享,去创建一个
[1] Xiangyun Zhou,et al. Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.
[2] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[3] Shihao Yan,et al. Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.
[4] Lawrence Wai-Choong Wong,et al. Geo-Spatial Location Spoofing Detection for Internet of Things , 2016, IEEE Internet of Things Journal.
[5] S. Brendle,et al. Calculus of Variations , 1927, Nature.
[6] Jun Li,et al. Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.
[7] Xiaobo Zhou,et al. Covert Communications Without Channel State Information at Receiver in IoT systems , 2020, IEEE Internet of Things Journal.
[8] Xiangyun Zhou,et al. Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.
[9] Xiangyun Zhou,et al. Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.
[10] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[11] Shihao Yan,et al. Location Verification for Emerging Wireless Vehicular Networks , 2019, IEEE Internet of Things Journal.
[12] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[13] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[14] Jianfeng Ma,et al. On Covert Communication with Interference Uncertainty , 2018, 2018 IEEE International Conference on Communications (ICC).
[15] Xiaohong Jiang,et al. Limits of Covert Communication on Two-Hop AWGN Channels , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[16] Feng Shu,et al. Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.
[17] Ido Nevat,et al. Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things , 2017, IEEE Internet of Things Journal.
[18] C. Ren,et al. Closed‐form approximations to the error and complementary error functions and their applications in atmospheric science , 2007 .
[19] Shihao Yan,et al. Location Verification Systems Under Spatially Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.