[1] |
LIU Z , LIU J , ZENG Y ,et al. Covert wireless communications in IoT systems:hiding information in interference[J]. IEEE Wireless Communications, 2018,25(6): 46-52.
|
[2] |
BASH B A , GOECKEL D , TOWSLEY D ,et al. Hiding information in noise:fundamental limits of covert wireless communication[J]. IEEE Communications Magazine, 2015,53(12): 26-31.
|
[3] |
BASH B A , GOECKEL D , TOWSLEY D . Limits of reliable communication with low probability of detection on AWGN channels[J]. IEEE Journal on Selected Areas In Communications, 2013,31(9): 1921-1930.
|
[4] |
WANG L , WORNELL G W , ZHENG L . Limits of low-probabilityof-detection communication over a discrete memoryless channel[C]// 2015 IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2015: 2525-2529.
|
[5] |
BASH B A , GUHA S , GOECKEL D ,et al. Quantum noise limited optical communication with low probability of detection[C]// 2013 IEEE International Symposium on Information Theory. Piscataway:IEEE Press, 2013: 1715-1719.
|
[6] |
ARUMUGAM K S K , BLOCH M R . Covert communication over a k-user multiple access channel[J]. IEEE Transactions on Information Theory, 2019,DOI:10.1109/TIT.2019.2930484.
|
[7] |
ZHANG Q E , BAKSHI M , JAGGI S . Covert communication over adversarially jammed channels[C]// 2018 IEEE Information Theory Workshop. Piscataway:IEEE Press, 2018: 1-5.
|
[8] |
FRèCHE G , BLOCH M R , BARRET M . Polar codes for covert communications over asynchronous discrete memoryless channels[J]. Entropy, 2018,20(1):3.
|
[9] |
KADAMPOT I A , TAHMASBI M , BLOCH M R . Multilevel-coded pulse-position modulation for covert communications[C]// 2018 IEEE International Symposium on Information Theory (ISIT). Piscataway:IEEE Press, 2018: 1864-1868.
|
[10] |
LIN P H , JANDA C R , JORSWIECK E A . Stealthy secret key generation[C]// 2017 IEEE Global Conference on Signal and Information Processing. Piscataway:IEEE Press, 2017: 492-496.
|
[11] |
TAHMASBI M , BLOCH M R . Covert secret key generation with an active warden[J]. IEEE Transactions on Information Forensics and Security, 2019,DOI:10.1109/TIFS.2019.2932906.
|
[12] |
HE B , YAN S , ZHOU X ,et al. Covert wireless communication with a Poisson field of interferers[J]. IEEE Transactions on Wireless Communications, 2018,17(9): 6005-6017.
|
[13] |
SHI X , WU D , YUE C ,et al. Resource allocation for covert communication in D2D content sharing:a matching game approach[J]. IEEE Access, 2019,DOI:10.1109/ACCESS.2019.2919453.
|
[14] |
YAN S , HE B , ZHOU X ,et al. Delay-intolerant covert communications with either fixed or random transmit power[J]. IEEE Transactions on Information Forensics and Security, 2018,14(1): 129-140.
|
[15] |
GOECKEL D , BASH B , GUHA S ,et al. Covert communications when the warden does not know the background noise power[J]. IEEE Communications Letters, 2015,20(2): 236-239.
|
[16] |
LEE S , BAXLEY R J , WEITNAUER M A ,et al. Achieving undetectable communication[J]. IEEE Journal of Selected Topics in Signal Processing, 2015,9(7): 1195-1205.
|
[17] |
HE B , YAN S , ZHOU X ,et al. On covert communication with noise uncertainty[J]. IEEE Communications Letters, 2017,21(4): 941-944.
|
[18] |
ZHENG T X , WANG H M , NG D W K ,et al. Multi-antenna covert communications in random wireless networks[J]. IEEE Transactions on Wireless Communications, 2019,18(3): 1974-1987.
|
[19] |
TANDRA R , SAHAI A . SNR walls for signal detection[J]. IEEE Journal of selected topics in Signal Processing, 2008,2(1): 4-17.
|
[20] |
SOBERS T V , BASH B A , GUHA S ,et al. Covert communication in the presence of an uninformed jammer[J]. IEEE Transactions on Wireless Communications, 2017,16(9): 6193-6206.
|
[21] |
LU X B , YANG W W , CAI Y M ,et al. Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems[J]. IEEE Access, 2019,DOI:10.1109/ACCESS.2019.2948078.
|
[22] |
HU J , YAN S , ZHOU X ,et al. Covert communication achieved by a greedy relay in wireless networks[J]. IEEE Transactions on Wireless Communications, 2018,17(7): 4766-4779.
|
[23] |
SHEIKHOLESLAMI A , GHADERI M , TOWSLEY D ,et al. Multi-hop routing in covert wireless networks[J]. IEEE Transactions on Wireless Communications, 2018,17(6): 3656-3669.
|
[24] |
WANG J , TANG W , ZHU Q ,et al. Covert communication with the help of relay and channel uncertainty[J]. IEEE Wireless Communications Letters, 2018,8(1): 317-320.
|
[25] |
ZHOU X , YAN S , HU J ,et al. Joint optimization of a UAV’s trajectory and transmit power for covert communications[J]. IEEE Transactions on Signal Processing, 2019,67(16): 4276-4290.
|