Results 41 to 50 of about 83,946 (258)

Covert Optical Communication

open access: yes, 2014
Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary.
Bash, Boulat A.   +6 more
openaire   +2 more sources

Covert communications on renewal packet channels [PDF]

open access: yes2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016
Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest.
Soltani, Ramin   +3 more
openaire   +2 more sources

Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

open access: yesApplied Sciences, 2023
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao   +5 more
doaj   +1 more source

Fundamental limits of quantum-secure covert optical sensing [PDF]

open access: yes, 2017
We present a square root law for active sensing of phase $\theta$ of a single pixel using optical probes that pass through a single-mode lossy thermal-noise bosonic channel.
Bash, Boulat A.   +3 more
core   +1 more source

Performance Analysis for UAV-Jammer Aided Covert Communication

open access: yesIEEE Access, 2020
This paper investigates the performance analysis for a novel covert communication system, where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob against the eavesdropping from Dave.
Wei Liang   +3 more
doaj   +1 more source

Covert communications on Poisson packet channels [PDF]

open access: yes2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015
Allerton 2015 submission, minor edits ...
Soltani, Ramin   +3 more
openaire   +2 more sources

Covert Communications through Imperfect Cancellation

open access: yesProceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security, 2022
We propose a method for covert communications using an IEEE 802.11 OFDM/QAM packet as a carrier. We show how to hide the covert message so that the transmitted signal does not violate the spectral mask specified by the standard, and we determine its impact on the OFDM packet error rate. We show conditions under which the hidden signal is not usable and
Chew, Daniel   +4 more
openaire   +2 more sources

Meta‐analysis fails to show any correlation between protein abundance and ubiquitination changes

open access: yesFEBS Open Bio, EarlyView.
We analyzed over 50 published proteomics datasets to explore the relationship between protein levels and ubiquitination changes across multiple experimental conditions and biological systems. Although ubiquitination is often associated with protein degradation, our analysis shows that changes in ubiquitination do not globally correlate with changes in ...
Nerea Osinalde   +3 more
wiley   +1 more source

A Qualitative Analysis of Patient Perspectives and Preferences in Lupus Management to Guide Lupus Guidelines Development

open access: yesArthritis Care &Research, EarlyView.
Objective A patient‐centered approach for chronic disease management, including systemic lupus erythematosus (SLE), aligns treatment with patients’ values and preferences, leading to improved outcomes. This paper summarizes how patient experiences, perspectives, and priorities informed the American College of Rheumatology (ACR) 2024 Lupus Nephritis (LN)
Shivani Garg   +20 more
wiley   +1 more source

Joint jammer selection and power optimization in covert communications against a warden with uncertain locations

open access: yesDigital Communications and Networks
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to ...
Zhijun Han   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy