Covert communications on renewal packet channels
暂无分享,去创建一个
Donald F. Towsley | Dennis Goeckel | Amir Houmansadr | Ramin Soltani | D. Towsley | A. Houmansadr | D. Goeckel | Ramin Soltani
[1] Solomon Kullback,et al. Information Theory and Statistics , 1970, The Mathematical Gazette.
[2] J. Grandell. Aspects of Risk Theory , 1991 .
[3] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[4] Sergio Verdú,et al. A general formula for channel capacity , 1994, IEEE Trans. Inf. Theory.
[5] Sergio Verdú,et al. Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[6] R. N. Pillai,et al. On Geometric Infinite Divisibility , 2014, 1409.4022.
[7] Guillermo Morales-Luna,et al. On the Existence of Perfect Stegosystems , 2005, IWDW.
[8] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[9] Evgueni A. Haroutunian,et al. Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.
[10] Donald F. Towsley,et al. Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[11] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.
[12] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[13] Donald F. Towsley,et al. Covert single-hop communication in a wireless network with distributed artificial noise generation , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[14] Donald F. Towsley,et al. LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.
[15] On Geometric Infinite Divisibility p-thinning and Cox Processes , 2014, 1409.5948.
[16] Gerhard Kramer,et al. Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.
[17] Donald F. Towsley,et al. Covert communication with the help of an uninformed jammer achieves positive rate , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[18] Lizhong Zheng,et al. Limits of low-probability-of-detection communication over a discrete memoryless channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[19] Donald F. Towsley,et al. Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.
[20] Donald F. Towsley,et al. Covert communications on Poisson packet channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Donald F. Towsley,et al. Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.