Results 1 to 10 of about 83,847 (160)
Disguised Full-Duplex Covert Communications [PDF]
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security.
Jihwan Moon
doaj +4 more sources
Gaussian-Distributed Spread-Spectrum for Covert Communications [PDF]
Covert communication techniques play a crucial role in military and commercial applications to maintain the privacy and security of wireless transmissions from prying eyes.
Ismail Shakeel +3 more
doaj +2 more sources
Performance Comparison of Relay-Based Covert Communications: DF, CF and AF [PDF]
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
doaj +2 more sources
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas [PDF]
This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest.
Brian Kim +4 more
doaj +2 more sources
Covert Communications via Full-Duplex User Relaying [PDF]
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement.
Jong Yeol Ryu, Jung Hoon Lee
doaj +2 more sources
Covert Communications in a Hybrid DF/AF Relay System [PDF]
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on ...
Jihwan Moon
doaj +2 more sources
Secret key expansion from covert communication [PDF]
Covert communication allows us to transmit messages in such a way that it is not possible to detect that the communication is occurring. This provides protection in situations where knowledge that people are talking to each other may be incriminating to ...
Amiri, Ryan, Arrazola, Juan Miguel
core +2 more sources
USBcat - Towards an Intrusion Surveillance Toolset [PDF]
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chris Chapman, Scott Knight, Tom Dean
doaj +4 more sources
Cooperative Jamming and Relay Selection for Covert Communications Based on Reinforcement Learning [PDF]
To overcome the obstacles of maintaining covert transmissions in wireless networks employing collaborative wardens, we develop a reinforcement learning framework that jointly optimizes cooperative jamming strategies and relay selection mechanisms.
Jin Qian +5 more
doaj +2 more sources
Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels [PDF]
This paper introduces an explicit covert communication code for binary-input asynchronous discrete memoryless channels based on binary polar codes, in which legitimate parties exploit uncertainty created by both the channel noise and the time of ...
Guillaume Frèche +2 more
doaj +2 more sources

