Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Covert communications: A comprehensive survey
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …
secure techniques, covert communication emerges as a potential solution to security for …
Physical layer covert communication in B5G wireless networks—its research, applications, and challenges
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …
enables a transmitter to convey information covertly to a recipient without being detected by …
Achieving covert wireless communications using a full-duplex receiver
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
Covert communications for STAR-RIS-assisted industrial networks with a full duplex receiver and RSMA
In this article, we investigate covert communication in simultaneously transmitting and
reflecting reconfigurable intelligent surface (STAR-RIS)-assisted networks with rate-splitting …
reflecting reconfigurable intelligent surface (STAR-RIS)-assisted networks with rate-splitting …
Wireless covert communications aided by distributed cooperative jamming over slow fading channels
In this paper, we study covert communications between a pair of legitimate transmitter-
receiver against a watchful warden over slow fading channels. There coexist multiple …
receiver against a watchful warden over slow fading channels. There coexist multiple …
Delay-intolerant covert communications with either fixed or random transmit power
In this paper, we study delay-intolerant covert communications in additive white Gaussian
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …
Multi-antenna covert communications in random wireless networks
This paper studies multi-antenna-aided covert communications coexisting with randomly
located wardens and interferers, considering both centralized and distributed antenna …
located wardens and interferers, considering both centralized and distributed antenna …
Performance analysis and optimization for jammer-aided multiantenna UAV covert communication
Unmanned aerial vehicles (UAVs) have attracted a lot of research attention because of their
high mobility and low cost in serving as temporary aerial base stations (BSs) and providing …
high mobility and low cost in serving as temporary aerial base stations (BSs) and providing …
Delay-constrained covert communications with a full-duplex receiver
In this letter, we consider delay-constrained covert communications with the aid of a full-
duplex (FD) receiver. Without delay constraints, it has been shown that the transmit power of …
duplex (FD) receiver. Without delay constraints, it has been shown that the transmit power of …
Covert rate optimization of millimeter wave full-duplex communications
In this paper, we consider the problem of full-duplex covert millimeter wave (mmWave)
communications, where a mmWave transmitter (Alice) sends information signals to its …
communications, where a mmWave transmitter (Alice) sends information signals to its …