Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2021.3071602
Abstract: In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the…
read more here.
Keywords:
beamformer;
design covert;
robust beamforming;
beamforming design ... See more keywords