Results 61 to 70 of about 154,545 (256)

Gaussian Signalling for Covert Communications [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2019
In this work, we examine the optimality of Gaussian signalling for covert communications with an upper bound on $\mathcal{D}(p_{_1}||p_{_0})$ or $\mathcal{D}(p_{_0}||p_{_1})$ as the covertness constraint, where $\mathcal{D}(p_{_1}||p_{_0})$ and $\mathcal{D}(p_{_0}||p_{_1})$ are different due to the asymmetry of Kullback-Leibler divergence, $p_{_0}(y ...
Shihao Yan   +3 more
openaire   +3 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Covert communication method based on tripartite generative adversarial network

open access: yesTongxin xuebao, 2023
A novel tripartite generative adversarial network (TripartiteGAN) and a covert communication method based on TripartiteGAN were designed for jointly optimizing the transmission covertness and the demodulation accuracy of the covert message.The ...
Jihong YU   +4 more
doaj   +2 more sources

Exploiting Temporal Variability in TCP Timestamps for Covert Channel Design

open access: yesIEEE Access
Information is a valuable asset for individuals, organizations, and governments, making secure transmission a critical concern. Cryptographic techniques are widely used to protect communication; however, in scenarios where the mere detection of ...
Silvio R. A. O. Filho   +3 more
doaj   +1 more source

Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

open access: yes, 2018
We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits ...
A Steane   +24 more
core   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Optimal Throughput for Covert Communication Over a Classical-Quantum Channel

open access: yes, 2016
This paper considers the problem of communication over a memoryless classical-quantum wiretap channel subject to the constraint that the eavesdropper on the channel should not be able to learn whether the legitimate parties are using the channel to ...
Wang, Ligong
core   +2 more sources

Computationally Efficient Covert Communication

open access: yes, 2016
In this paper, we design the first computationally efficient codes for simultaneously reliable and covert communication over Binary Symmetric Channels (BSCs). Our setting is as follows: a transmitter Alice wishes to potentially reliably transmit a message to a receiver Bob, while ensuring that the transmission taking place is covert with respect to an ...
Zhang, Qiaosheng   +2 more
openaire   +2 more sources

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy