Articles with "based suspicious" as a keyword



Photo by poseidonx from unsplash

Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2022.3223364

Abstract: This paper investigates the wireless surveillance with a legitimate monitor (E) over hybrid automatic repeat request (HARQ) based suspicious communications between a suspicious transmitter (S) and a suspicious destination (D). Specifically, with the HARQ protocol,… read more here.

Keywords: suspicious communications; harq based; tex math; based suspicious ... See more keywords