Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3167835
Abstract: In this letter, we consider the covert communications under precoded faster-than-Nyquist (FTN) signaling. We first propose a general framework to analyze the detection performance of an illegal adversary for the precoded FTN signaling, and then…
read more here.
Keywords:
covert communications;
optimal precoded;
precoded faster;
ftn signaling ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3206229
Abstract: In this letter, a reconfigurable intelligent surface (RIS)-based passive covert communication scheme is proposed, where source node Alice covertly transmits information to receiver Bob by using a RIS and reflecting the incident signals from an…
read more here.
Keywords:
passive covert;
covert communications;
intelligent surface;
communications based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2021.3071602
Abstract: In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the…
read more here.
Keywords:
beamformer;
design covert;
robust beamforming;
beamforming design ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3203310
Abstract: In this paper, we investigate the optimal probabilistic constellation shaping design for covert communication systems from a practical view. Different from conventional covert communications with equiprobable constellations modulation, we propose non-equiprobable constellations modulation schemes to…
read more here.
Keywords:
covert communications;
optimal probabilistic;
probabilistic constellation;
rate ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2020.3036022
Abstract: The fundamental limits of covert communication, where a message is sent from transmitter Alice to intended recipient Bob without detection by an attentive adversary warden Willie, has been considered extensively in recent years at the…
read more here.
Keywords:
slotted aloha;
system;
communications multi;
covert throughput ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2022.3188829
Abstract: If it is necessary to punish the legitimate transmitter Alice in time, warden Willie must make a corresponding decision before the end of the transmission. Therefore, in the binary hypothesis test framework, we consider the…
read more here.
Keywords:
covert communications;
communications warden;
warden wants;
finite blocklength ... See more keywords