Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive Survey
Adaptive schemes in physical layer security, designed to dynamically respond to the
evolving conditions of wireless channels, play a crucial role in fortifying the security of …
evolving conditions of wireless channels, play a crucial role in fortifying the security of …
When the warden does not know transmit power: Detection performance analysis and covertness strategy design
In this paper, we consider a novel covert communication scenario where the warden does
not have prior knowledge of the transmitter's power. In this scenario, the current widely …
not have prior knowledge of the transmitter's power. In this scenario, the current widely …
Channel-aware jammer selection and power control in covert communication
This paper considers a multi-jammer-assisted covert communication scenario, where a
transmitter communicates with a receiver without being detected by a warden under the …
transmitter communicates with a receiver without being detected by a warden under the …
Scheduling approaches for joint optimization of age and delay in industrial wireless networks
In industrial wireless networks (IWNs), age of information (AoI) and delay are two significant
metrics to measure data freshness and delivery timeliness. In this article, an IWN system with …
metrics to measure data freshness and delivery timeliness. In this article, an IWN system with …
Joint Covert and Secure Communication for SWIPT Assisted CNOMA Systems
With the rapid advancement of physical-layer security technology, the covert and secure
communication has become crucial in safeguarding wireless communication systems. In this …
communication has become crucial in safeguarding wireless communication systems. In this …
Energy Harvesting Jammer-Aided Covert Communications in Wireless Multi-Relay IoT Systems
H Lv, B Yang, X Sun, C Gao, B Gui… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
This paper investigates covert communications in a multi-relay Internet of Things (IoT)
system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to …
system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to …
[HTML][HTML] Joint jammer selection and power optimization in covert communications against a warden with uncertain locations
In covert communications, joint jammer selection and power optimization are important to
improve performance. However, existing schemes usually assume a warden with a known …
improve performance. However, existing schemes usually assume a warden with a known …
Joint Power and Beamformer Optimization in Multi-Antenna Relay Covert System: Exploiting Public Users as Shelter
The environmental shelters such as public links can enable covert communication by
covering covert transmission. To further exploit shelters, this paper focuses on a two-hop …
covering covert transmission. To further exploit shelters, this paper focuses on a two-hop …
Greedy Degree and Jamming Aided Covert Uplink Transmission in Cell-Free IoT Networks
R Chen, Z Chen, S Xu, K Ma, X Liu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The cell-free (CF) network architecture has promising applications in Internet of Things (IoT)
networks due to its dynamic and adaptive nature in resource allocation. However, due to the …
networks due to its dynamic and adaptive nature in resource allocation. However, due to the …
[HTML][HTML] On IRS-Assisted Covert Communication with a Friendly UAV
Driven by the rapidly growing demand for information security, covert wireless
communication has become an essential technology and attracted tremendous attention …
communication has become an essential technology and attracted tremendous attention …