Results 231 to 240 of about 84,456 (273)
Long-term effects of working memory retrieval from prioritized and deprioritized states. [PDF]
Born F, Spitzer B.
europepmc +1 more source
Covert Communications With Constrained Age of Information [PDF]
5 pages, 3 ...
Yida Wang, Shihao Yan, Weiwei Yang
exaly +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Covert Communication With Cognitive Jammer
IEEE Wireless Communications Letters, 2020This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it determines whether to transmit the jamming signal.
Wenhui Xiong +3 more
openaire +1 more source
Keyless asynchronous covert communication
2016 IEEE Information Theory Workshop (ITW), 2016We consider a scenario in which Alice asynchronously communicates with Bob over a Discrete Memoryless Channel (DMC) while escaping detection from an adversary who observes their communication through another DMC. Specifically, Alice transmits codewords of length n and chooses the transmission epoch T uniformly at random among N available time epochs ...
Keerthi Suria Kumar Arumugam +1 more
openaire +1 more source
Covert and Deniable Communications
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus Simmons: that Alice and Bob are in jail and wish to hatch an escape plan without the fact of their ...
openaire +1 more source
Covert Communication in Backscatter Radio
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019Covert communication in backscatter radio systems is considered, where the transmitter controls its transmit power to keep the transponder's response hidden, while a warden tries to detect this covert communication. To achieve covertness, we propose a non-conventional transmission scheme where the transmitter emits noise-like signal with transmit power
Khurram Shahzad 0003, Xiangyun Zhou 0001
openaire +1 more source
Detecting covert communication on Android
37th Annual IEEE Conference on Local Computer Networks, 2012Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications.
Michael Hansen +2 more
openaire +1 more source
On Covert Communication with Interference Uncertainty
2018 IEEE International Conference on Communications (ICC), 2018Covert communication can prevent the opponent from knowing that a wireless communication has occurred. If only the additive white Gaussian noise (AWGN) channels and ambient noise are taken into consideration, a square root law was obtained and the result shows that the privacy rate approaches zero asymptotically.
Zhihong Liu +4 more
openaire +1 more source
Jamming Strategies in Covert Communication
2019Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be ...
Ori Shmuel +2 more
openaire +1 more source

