Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is needed, which in turn increases the detection probability. Relay is an effective technique to tackle this problem, and various relaying strategies have been proposed for long-distance covert communication in these years. In this article, we first offer a tutorial on the relaying strategies utilized in covert transmission. With the emergence of reflecting intelligent surface and its application in covert communications, we propose a hybrid relay-reflecting intelligent surface (HR-RIS)-assisted str...
An intelligent reflecting surface (IRS) is proposed to enhance the physical layer security in the Ri...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Driven by the rapidly growing demand for information security, covert wireless communication has bec...
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. ...
Covert communication aims to shield the very existence of wireless transmissions in order to guarant...
Covert wireless communication aims to hide the very existence of wireless transmissions in order to ...
Covert wireless communication aims to hide the very existence of wireless transmissions in order to...
This paper investigates the multi-antenna covert communications assisted by a simultaneously transmi...
A covert communication system under block fading channels is considered, where users experience unc...
In this work, we propose a covert communication scheme where the transmitter attempts to hide its t...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
We explore the influence of cooperative jamming on covert communication for integrated satellite–ter...
Covert communication can hide the information transmission process from the warden to prevent advers...
This article examines secrecy coding aided wireless communications from a source to a destination in...
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wir...
An intelligent reflecting surface (IRS) is proposed to enhance the physical layer security in the Ri...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Driven by the rapidly growing demand for information security, covert wireless communication has bec...
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. ...
Covert communication aims to shield the very existence of wireless transmissions in order to guarant...
Covert wireless communication aims to hide the very existence of wireless transmissions in order to ...
Covert wireless communication aims to hide the very existence of wireless transmissions in order to...
This paper investigates the multi-antenna covert communications assisted by a simultaneously transmi...
A covert communication system under block fading channels is considered, where users experience unc...
In this work, we propose a covert communication scheme where the transmitter attempts to hide its t...
Traditional approaches to wireless communication security (e.g., encryption) focus on maintaining th...
We explore the influence of cooperative jamming on covert communication for integrated satellite–ter...
Covert communication can hide the information transmission process from the warden to prevent advers...
This article examines secrecy coding aided wireless communications from a source to a destination in...
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wir...
An intelligent reflecting surface (IRS) is proposed to enhance the physical layer security in the Ri...
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alic...
Driven by the rapidly growing demand for information security, covert wireless communication has bec...