SCIS Selected Articles on Covert Communication
SCIS Selected Articles on Satellite Communication
REVIEW
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 12
Applications and prospects of artificial intelligence in covert satellite communication: a review
Lu, Kun; Liu, Heng; Zeng, Liang; Wang, Jiayu; Zhang, Zhongshan; An, Jianping
Sci China Inf Sci, 2023, 66(2): 121301
Lu, Kun; Liu, Heng; Zeng, Liang; Wang, Jiayu; Zhang, Zhongshan; An, Jianping
Sci China Inf Sci, 2023, 66(2): 121301
Keywords: satellite communication; covert communication; secure communication; low probability of detection; artificial intelligence; machine learning
Cite as: Lu K, Liu H, Zeng L, et al. Applications and prospects of artificial intelligence in covert satellite communication: a review. Sci China Inf Sci, 2023, 66(2): 121301, doi: 10.1007/s11432-022-3566-4
SCIS Selected Articles on Covert Communication
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
Beamforming design for covert broadcast communication with hidden adversary
Chen, Weiyu; Ding, Haiyang; Wang, Shilian; Luo, Junshan; Gong, Fengkui
Sci China Inf Sci, 2024, 67(6): 162304
Chen, Weiyu; Ding, Haiyang; Wang, Shilian; Luo, Junshan; Gong, Fengkui
Sci China Inf Sci, 2024, 67(6): 162304
Keywords: low-probability-of-detection communication; multiple antennas; covertness performance; uncertain position; parameters optimization
Cite as: Chen W Y, Ding H Y, Wang S L, et al. Beamforming design for covert broadcast communication with hidden adversary. Sci China Inf Sci, 2024, 67(6): 162304, doi: 10.1007/s11432-023-3971-7
SCIS Selected Articles on Covert Communication
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
Legitimate monitor by proactive guarding for counter covert communications
Wang, Manlin; Xia, Bin; Wang, Jiangzhou
Sci China Inf Sci, 2024, 67(8): 182301
Wang, Manlin; Xia, Bin; Wang, Jiangzhou
Sci China Inf Sci, 2024, 67(8): 182301
Keywords: legitimate monitor; counter covert communication; full-duplex technology; outage probability; power allocation optimization
Cite as: Wang M L, Xia B, Wang J Z. Legitimate monitor by proactive guarding for counter covert communications. Sci China Inf Sci, 2024, 67(8): 182301, doi: 10.1007/s11432-023-4025-2