Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Sep 30, 2022 · We design a beamforming scheme to maximize the secure rate for the CCS, where the leakage of covert information can be minimized while the ...
Jan 24, 2023 · In this arti- cle, we propose a wireless covert communication system (CCS), where the transmit antennas are selected and coded to generate a.
In this paper, we propose a wireless covert communication system (CCS), where the transmit antennas are selected and coded to generate a covert codebook.
In this paper, we propose a wireless covert communication system, where data streams from the antennas of the transmitter are coded according to a code book to ...
Missing: Optimization | Show results with:Optimization
Motivated by this, this paper considers the covert communication based on non-orthogonal multiple access (NOMA), which consists of a transmitter, a legal user, ...
In this work, covert communication in the presence of a multi-antenna adversary and under delay constraints is considered. Under the assumption of quasi-static ...
Jan 24, 2024 · Abstract—This paper studies an extremely large-scale recon- figurable intelligent surface (XL-RIS) empowered covert commu- nication system ...
Missing: Coding | Show results with:Coding
Sep 30, 2022 · The covert communication technology has emerged as a novel method for network authentication, copyright protection, and providing the ...
This work analyzes the possibilities to establish covert channels in WiFi systems with emphasis on exploiting physical layer characteristics, and discusses ...
May 27, 2024 · This paper explores covert broadcast communication in a challenging situation in which the transmitter, Alice, faces uncertainty regarding ...
Missing: Coding | Show results with:Coding