Results 1 to 10 of about 84,456 (273)
Disguised Full-Duplex Covert Communications [PDF]
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security.
Jihwan Moon
exaly +4 more sources
Gaussian-Distributed Spread-Spectrum for Covert Communications [PDF]
Covert communication techniques play a crucial role in military and commercial applications to maintain the privacy and security of wireless transmissions from prying eyes.
Weimin Zhang
exaly +4 more sources
Performance Comparison of Relay-Based Covert Communications: DF, CF and AF [PDF]
In this paper, we investigate the performance of covert communications in different types of a relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and-forward (AF).
Jihwan Moon
exaly +4 more sources
Covert Communications via Full-Duplex User Relaying [PDF]
In this paper, we investigate a covert communication system with a full-duplex decode-and-forward (DF) relay and introduce a user-relaying scheme that maximizes the covert rate while ensuring the covertness requirement.
Jong Yeol Ryu, Jung Hoon Lee
doaj +2 more sources
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas [PDF]
This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest.
Brian Kim +4 more
doaj +2 more sources
Covert Communications in a Hybrid DF/AF Relay System [PDF]
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on ...
Jihwan Moon
doaj +2 more sources
USBcat - Towards an Intrusion Surveillance Toolset [PDF]
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chris Chapman, Scott Knight, Tom Dean
doaj +4 more sources
Cooperative Jamming and Relay Selection for Covert Communications Based on Reinforcement Learning [PDF]
To overcome the obstacles of maintaining covert transmissions in wireless networks employing collaborative wardens, we develop a reinforcement learning framework that jointly optimizes cooperative jamming strategies and relay selection mechanisms.
Jin Qian +5 more
doaj +2 more sources
Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels [PDF]
This paper introduces an explicit covert communication code for binary-input asynchronous discrete memoryless channels based on binary polar codes, in which legitimate parties exploit uncertainty created by both the channel noise and the time of ...
Guillaume Frèche +2 more
doaj +2 more sources
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to ...
Yiqing Zhou +2 more
exaly +3 more sources

