Articles with "covert communications" as a keyword



Joint Resource Allocation and 3-D Deployment for Multi-UAV Covert Communications

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2023.3287838

Abstract: Unmanned aerial vehicles (UAVs)-assisted wireless communication will play an important role in the next-generation mobile communication network. However, the inherent open nature of the signal propagation environment may cause illegal eavesdropping and surveillance from adversaries.… read more here.

Keywords: bandwidth allocation; joint resource; covert communications; allocation ... See more keywords

Movable-Antenna-Assisted Covert Communications With Reconfigurable Intelligent Surfaces

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3520710

Abstract: This article proposes a novel covert communication framework utilizing movable antennas (MAs) to enable covert communications in which the evading detection eavesdropper aided by a reconfigurable intelligent surface (RIS). The trajectories of the MAs over… read more here.

Keywords: communications reconfigurable; covert communications; reconfigurable intelligent; antenna assisted ... See more keywords

The Optimal Precoded Faster-Than-Nyquist Signaling for Covert Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3167835

Abstract: In this letter, we consider the covert communications under precoded faster-than-Nyquist (FTN) signaling. We first propose a general framework to analyze the detection performance of an illegal adversary for the precoded FTN signaling, and then… read more here.

Keywords: covert communications; optimal precoded; precoded faster; ftn signaling ... See more keywords

Passive Covert Communications Based on Reconfigurable Intelligent Surface

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3206229

Abstract: In this letter, a reconfigurable intelligent surface (RIS)-based passive covert communication scheme is proposed, where source node Alice covertly transmits information to receiver Bob by using a RIS and reflecting the incident signals from an… read more here.

Keywords: passive covert; covert communications; intelligent surface; communications based ... See more keywords

Covert Communications for Text Semantic With Finite Blocklength

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2024.3448614

Abstract: Semantic communication, by the extraction of essential semantic information from source data, reduces data volume and enhances transmission efficiency, making it increasingly popular among candidate technologies in 6G. In this letter, a covert transmission scheme… read more here.

Keywords: covert communications; tex math; text semantic; inline formula ... See more keywords

Sum Rate Maximization for Movable Antenna Enhanced Multiuser Covert Communications

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2024.3514199

Abstract: In this letter, we propose to employ movable antenna (MA) to enhance covert communications with noise uncertainty, where the confidential data is transmitted from an MA-aided access point (AP) to multiple users with a warden… read more here.

Keywords: rate; rate maximization; covert communications; movable antenna ... See more keywords

Grouping Enhanced Cooperative Covert Communications in RIS-Aided Multi-User Systems

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2024.3447911

Abstract: In this paper, we aim at reconfigurable intelligent surfaces (RIS) aided multi-user communication systems including multiple user pairs, where an important target user pair needs to guarantee covertness in the presence of an adversarial warden… read more here.

Keywords: ris aided; multi user; aided multi; covert communications ... See more keywords

Robust Beamforming Design for Covert Communications

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2021.3071602

Abstract: In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the… read more here.

Keywords: beamformer; design covert; robust beamforming; beamforming design ... See more keywords

Optimal Probabilistic Constellation Shaping for Covert Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3203310

Abstract: In this paper, we investigate the optimal probabilistic constellation shaping design for covert communication systems from a practical view. Different from conventional covert communications with equiprobable constellations modulation, we propose non-equiprobable constellations modulation schemes to… read more here.

Keywords: covert communications; optimal probabilistic; probabilistic constellation; rate ... See more keywords

Covert Communications in Multi-Channel Slotted ALOHA Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2020.3036022

Abstract: The fundamental limits of covert communication, where a message is sent from transmitter Alice to intended recipient Bob without detection by an attentive adversary warden Willie, has been considered extensively in recent years at the… read more here.

Keywords: slotted aloha; system; communications multi; covert throughput ... See more keywords

Finite Blocklength Covert Communications: When the Warden Wants to Detect the Communications Quickly

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2022.3188829

Abstract: If it is necessary to punish the legitimate transmitter Alice in time, warden Willie must make a corresponding decision before the end of the transmission. Therefore, in the binary hypothesis test framework, we consider the… read more here.

Keywords: covert communications; communications warden; warden wants; finite blocklength ... See more keywords