Results 41 to 50 of about 83,946 (258)
Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary.
Bash, Boulat A. +6 more
openaire +2 more sources
Covert communications on renewal packet channels [PDF]
Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest.
Soltani, Ramin +3 more
openaire +2 more sources
Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao +5 more
doaj +1 more source
Fundamental limits of quantum-secure covert optical sensing [PDF]
We present a square root law for active sensing of phase $\theta$ of a single pixel using optical probes that pass through a single-mode lossy thermal-noise bosonic channel.
Bash, Boulat A. +3 more
core +1 more source
Performance Analysis for UAV-Jammer Aided Covert Communication
This paper investigates the performance analysis for a novel covert communication system, where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob against the eavesdropping from Dave.
Wei Liang +3 more
doaj +1 more source
Covert communications on Poisson packet channels [PDF]
Allerton 2015 submission, minor edits ...
Soltani, Ramin +3 more
openaire +2 more sources
Covert Communications through Imperfect Cancellation
We propose a method for covert communications using an IEEE 802.11 OFDM/QAM packet as a carrier. We show how to hide the covert message so that the transmitted signal does not violate the spectral mask specified by the standard, and we determine its impact on the OFDM packet error rate. We show conditions under which the hidden signal is not usable and
Chew, Daniel +4 more
openaire +2 more sources
Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde +3 more
wiley +1 more source
Objective A patient‐centered approach for chronic disease management, including systemic lupus erythematosus (SLE), aligns treatment with patients’ values and preferences, leading to improved outcomes. This paper summarizes how patient experiences, perspectives, and priorities informed the American College of Rheumatology (ACR) 2024 Lupus Nephritis (LN)
Shivani Garg +20 more
wiley +1 more source
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to ...
Zhijun Han +5 more
doaj +1 more source

