暂无分享,去创建一个
Feng Shu | Xiangyun Zhou | Shihao Yan | Jiangzhou Wang | Jinsong Hu | Xiangyun Zhou | Jinsong Hu | Shihao Yan | F. Shu | Jiangzhou Wang
[1] Walter L. Smith. Probability and Statistics , 1959, Nature.
[2] Dominic J. A. Welsh,et al. Complexity and cryptography - an introduction , 2006 .
[3] Khaled Ben Letaief,et al. On the diversity gain in cooperative relaying channels with imperfect CSIT , 2010, IEEE Transactions on Communications.
[4] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[5] Mohamad Sawan,et al. A High-Efficiency Low-Voltage CMOS Rectifier for Harvesting Energy in Implantable Devices , 2012, IEEE Transactions on Biomedical Circuits and Systems.
[6] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[7] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.
[8] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[9] He Chen,et al. Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.
[10] Donald F. Towsley,et al. Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[11] Mary Ann Weitnauer,et al. Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.
[12] Donald F. Towsley,et al. Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.
[13] Hsiao-Hwa Chen,et al. Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.
[14] Lifeng Wang,et al. Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.
[15] Saman Atapattu,et al. Optimal Energy Harvesting Protocols for Wireless Relay Networks , 2016, IEEE Transactions on Wireless Communications.
[16] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.
[17] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.
[18] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[19] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[20] Jun Li,et al. Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.
[21] Xiangyun Zhou,et al. Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).
[22] Feng Shu,et al. Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[23] Xiangyun Zhou,et al. On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.
[24] Xiangyun Zhou,et al. Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[25] Saikat Guha,et al. Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.
[26] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[27] Jun Li,et al. Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[28] Jun Li,et al. Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels , 2017, 2018 IEEE International Conference on Communications (ICC).
[29] Saikat Guha,et al. Multi-Hop Routing in Covert Wireless Networks , 2018, IEEE Transactions on Wireless Communications.