Results 1 to 10 of about 84,456 (273)

Disguised Full-Duplex Covert Communications [PDF]

open access: yesSensors, 2023
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security.
Jihwan Moon
exaly   +4 more sources

Gaussian-Distributed Spread-Spectrum for Covert Communications [PDF]

open access: yesSensors, 2023
Covert communication techniques play a crucial role in military and commercial applications to maintain the privacy and security of wireless transmissions from prying eyes.
Weimin Zhang
exaly   +4 more sources

Performance Comparison of Relay-Based Covert Communications: DF, CF and AF [PDF]

open access: yesSensors, 2023
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
exaly   +4 more sources

Covert Communications via Full-Duplex User Relaying [PDF]

open access: yesSensors
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement.
Jong Yeol Ryu, Jung Hoon Lee
doaj   +2 more sources

Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas [PDF]

open access: yesEntropy, 2022
This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest.
Brian Kim   +4 more
doaj   +2 more sources

Covert Communications in a Hybrid DF/AF Relay System [PDF]

open access: yesSensors
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on ...
Jihwan Moon
doaj   +2 more sources

USBcat - Towards an Intrusion Surveillance Toolset [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chris Chapman, Scott Knight, Tom Dean
doaj   +4 more sources

Cooperative Jamming and Relay Selection for Covert Communications Based on Reinforcement Learning [PDF]

open access: yesSensors
To overcome the obstacles of maintaining covert transmissions in wireless networks employing collaborative wardens, we develop a reinforcement learning framework that jointly optimizes cooperative jamming strategies and relay selection mechanisms.
Jin Qian   +5 more
doaj   +2 more sources

Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels [PDF]

open access: yesEntropy, 2017
This paper introduces an explicit covert communication code for binary-input asynchronous discrete memoryless channels based on binary polar codes, in which legitimate parties exploit uncertainty created by both the channel noise and the time of ...
Guillaume Frèche   +2 more
doaj   +2 more sources

Joint jammer selection and power optimization in covert communications against a warden with uncertain locations

open access: yesDigital Communications and Networks
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to ...
Yiqing Zhou   +2 more
exaly   +3 more sources

Home - About - Disclaimer - Privacy