Results 251 to 260 of about 349,876 (317)
Some of the next articles are maybe not open access.

RIS-Assisted Covert Transmission in Satellite–Terrestrial Communication Systems

IEEE Internet of Things Journal, 2023
With the development of the sixth-generation wireless communication technology, the difficulty of covert communication in the satellite communications system (SCS) is further increased.
Dae-Geon Song   +4 more
semanticscholar   +1 more source

Covert Attack Detection for LFC Systems of Electric Vehicles: A Dual Time-Varying Coding Method

IEEE/ASME transactions on mechatronics, 2023
In recent years, electric vehicles (EVs) have been widely used due to their remarkable decrease in carbon emissions and gasoline consumption. When the EVs are incorporated into the load frequency control (LFC) system, which can be seen as both the power ...
Zhihua Wu, E. Tian, Hongtian Chen
semanticscholar   +1 more source

Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems

IEEE Transactions on Communications, 2023
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect ...
Chan Gao   +4 more
semanticscholar   +1 more source

Covert Ambient Backscatter Communications With Multi-Antenna Tag

IEEE Transactions on Wireless Communications, 2023
This paper presents a unicast beamforming network for covert ambient backscatter communications (AmBC). Different from the prior covert backscatter works using artificial noise or a power-variable RF source, our work achieves covertness by arming the ...
Jiahao Liu   +5 more
semanticscholar   +1 more source

Covert Communication With Time Uncertainty in Time-Critical Wireless Networks

IEEE Transactions on Wireless Communications, 2023
In this work, we investigate the status packet covert communication with time uncertainty in time-critical wireless networks. We model the packet generation as a Poisson process that concatenates the information timeliness and communication covertness ...
Xingbo Lu   +4 more
semanticscholar   +1 more source

Covert Consciousness and Covert Ethics

Perspectives in Biology and Medicine, 2020
Rights Come to Mind: Brain Injury, Ethics, and the Struggle for Consciousness (2015) by Joseph J. Fins offers rich narratives of families and patients who experience disorders of consciousness in flawed health-care systems that are not clinically, structurally, financially, or ethically prepared to respond to the inherent complexities of these ...
openaire   +2 more sources

Optimal Hovering Height and Power Allocation for UAV-Aided NOMA Covert Communication System

IEEE Wireless Communications Letters, 2023
In this letter, we consider an unmanned aerial vehicle (UAV) aided covert communication system in which the UAV provides downlink transmission to the public user and covert user with non-orthogonal multiple access (NOMA).
Yingping Su   +5 more
semanticscholar   +1 more source

DF Relay Assisted Covert Communications: Analysis and Optimization

IEEE Transactions on Vehicular Technology, 2023
Covert communication is crucial to preventing the warder's detection of wireless transmission. In general, small transmit power is required to satisfy the covertness requirement, which limits the system performance between the transceivers.
Manlin Wang   +4 more
semanticscholar   +1 more source

Covert Communication for Spatially Sparse mmWave Massive MIMO Channels

IEEE Transactions on Communications, 2023
Covert communication, also known as communication with low probability of detection, aims to provide reliable communication for legal users and prevent any other user from detecting the occurrence of legal communication.
Lin Bai, Jinpeng Xu, Lin Zhou
semanticscholar   +1 more source

Optimal Height of UAV in Covert Visible Light Communications

IEEE Communications Letters, 2023
This letter focuses on an unmanned aerial vehicle (UAV)-based covert visible light communication system. In the system, the UAV (Alice) sends information to a legitimate user (Bob) covertly while avoiding being detected by a warden (Willie).
Jin-yuan Wang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy