[1] |
JUNTTI M , KANTOLA R , KY?STI P ,et al. Key drivers and research challenges for 6G ubiquitous wireless intelligence[R]. Finland:University of Oulu, 2019.
|
[2] |
WU Q H , QING G R , XU Y H ,et al. Cognitive Internet of things:a new paradigm beyond connection[J]. IEEE Internet of Things Journal, 2014,1(2): 129-143.
|
[3] |
ZHU J , SONG Y H , JIANG D D ,et al. A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of things[J]. IEEE Internet of Things Journal, 2018,5(4): 2375-2385.
|
[4] |
ZHU Z , YU B , CHU X ,et al. Design and optimization of physical layer security transmission scheme in random cognitive Internet of things[C]// 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2019: 2325-3746.
|
[5] |
DENG Z , LI Q , ZHANG Q ,et al. Beamforming design for physical layer security in a two-way cognitive radio IoT network with SWIPT[J]. IEEE Internet of Things Journal, 2019,6(6): 10786-10798.
|
[6] |
BANY H A , ALMAJALI S , AYYASH M ,et al. Spectrum assignment in cognitive radio networks for Internet of things delay-sensitive applications under jamming attacks[J]. IEEE Internet of Things Journal, 2018,5(3): 1904-1913.
|
[7] |
SOLTANI R , GOECKEL D , TOWSLEY D ,et al. Covert wireless communication with artificial noise generation[J]. IEEE Transactions on Wireless Communications, 2018,17(11): 7252-7267.
|
[8] |
BASH B A , GOECKEL D , TOWSLEY D . Limits of reliable communication with low probability of detection on AWGN channels[J]. IEEE Journal on Selected Areas in Communications, 2013,31(9): 1921-1930.
|
[9] |
WANG J Q , TANG W B , ZHU Q Q ,et al. Covert communication with the help of relay and channel uncertainty[J]. IEEE Wireless Communications Letters, 2019,8(1): 317-320.
|
[10] |
LIU Z , LIU J , ZENG Y ,et al. On covert communication with interference uncertainty[C]// 2018 IEEE International Conference on Communications (ICC). IEEE, 2018: 1-6.
|
[11] |
HE B , YAN S H , ZHOU X Y ,et al. Covert wireless communication with a Poisson field of interferers[J]. IEEE Transactions on Wireless Communications, 2018,17(9): 6005-6017.
|
[12] |
MENG R H , CUI Q , ZHOU Z L ,et al. A steganography algorithm based on CycleGAN for covert communication in the Internet of things[J]. IEEE Access, 2019,7: 90574-90584.
|
[13] |
LI F Y , SHINDE A , SHI Y ,et al. System statistics learning-based IoT security:feasibility and suitability[J]. IEEE Internet of Things Journal, 2019,6(4): 6396-6403.
|
[14] |
ROOPAK M , TIAN G Y , CHAMBERS J . Deep learning models for cyber security in IoT networks[C]// 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019: 452-457.
|
[15] |
HU J S , YAN S H , SHU F ,et al. Covert transmission with a self-sustained relay[J]. IEEE Transactions on Wireless Communications, 2019,18(8): 4089-4102.
|
[16] |
SHI X , WU D , YUE C ,et al. Resource allocation for covert communication in D2D content sharing:a matching game approach[J]. IEEE Access, 2019,7: 72835-72849.
|
[17] |
HAGAN M T , DEMUTH H B , BEALE M H ,et al. Neural network design (2nd Edition)[M]. USA: Martin HaganPress, 2014.
|