Performance analysis of covert wireless communication based on beam forming with noise uncertainty
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | Yuda LIN, Liang JIN, You ZHOU, Yangming LOU |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2020-07-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2020137 |
Similar Items
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
by: Yuda LIN, et al.
Published: (2020-07-01)
by: Yuda LIN, et al.
Published: (2020-07-01)
The Technique to Prevent the Data Leakage using Covert Channels
by: Anna Vasilievna Arkhangelskaya, et al.
Published: (2013-12-01)
by: Anna Vasilievna Arkhangelskaya, et al.
Published: (2013-12-01)
Optimization of Covert Communication in Multi-Sensor Asymmetric Noise Systems
by: Sen Qiao, et al.
Published: (2024-01-01)
by: Sen Qiao, et al.
Published: (2024-01-01)
Survey on key technologies of covert channel in ubiquitous network environment
by: Fenghua LI, et al.
Published: (2022-04-01)
by: Fenghua LI, et al.
Published: (2022-04-01)
Survey on key technologies of covert channel in ubiquitous network environment
by: Fenghua LI, et al.
Published: (2022-04-01)
by: Fenghua LI, et al.
Published: (2022-04-01)
Covert Communication Scheme for OOK in Asymmetric Noise Systems
by: Weicheng Xu, et al.
Published: (2025-05-01)
by: Weicheng Xu, et al.
Published: (2025-05-01)
A Blockchain-Enabled Group Covert Channel against Transaction Forgery
by: Tongzhou Shen, et al.
Published: (2024-01-01)
by: Tongzhou Shen, et al.
Published: (2024-01-01)
Hiding Messages in Secure Connection Transmissions with Full-Duplex Overt Receiver
by: Lap Luat Nguyen, et al.
Published: (2022-08-01)
by: Lap Luat Nguyen, et al.
Published: (2022-08-01)
Covert actions: 'Alternative approaches' of intelligence services' activity
by: Krstić Marko M.
Published: (2017-01-01)
by: Krstić Marko M.
Published: (2017-01-01)
Covert Communications via Full-Duplex User Relaying
by: Jong Yeol Ryu, et al.
Published: (2025-06-01)
by: Jong Yeol Ryu, et al.
Published: (2025-06-01)
Continuous noise covert transmission scheme based on QCSK
by: Ying HUANG, et al.
Published: (2022-04-01)
by: Ying HUANG, et al.
Published: (2022-04-01)
Continuous noise covert transmission scheme based on QCSK
by: Ying HUANG, et al.
Published: (2022-04-01)
by: Ying HUANG, et al.
Published: (2022-04-01)
Concept and Classification of Covert Embezzlement of the Property of Another
by: O. V. Haidar
Published: (2021-07-01)
by: O. V. Haidar
Published: (2021-07-01)
Combating Adversarial Covert Channels in Wi-Fi Networks
by: Hoorin Park, et al.
Published: (2022-01-01)
by: Hoorin Park, et al.
Published: (2022-01-01)
Relay Selection for Covert Communication with an Active Warden
by: Jong Yeol Ryu, et al.
Published: (2025-06-01)
by: Jong Yeol Ryu, et al.
Published: (2025-06-01)
Cooperative Jamming and Relay Selection for Covert Communications Based on Reinforcement Learning
by: Jin Qian, et al.
Published: (2025-10-01)
by: Jin Qian, et al.
Published: (2025-10-01)
Legal basis for the use of covert means
by: Géza Finszter
Published: (2024-06-01)
by: Géza Finszter
Published: (2024-06-01)
Research progress of blockchain network covert channel
by: Leixiao LI, et al.
Published: (2022-09-01)
by: Leixiao LI, et al.
Published: (2022-09-01)
Research progress of blockchain network covert channel
by: Leixiao LI, et al.
Published: (2022-09-01)
by: Leixiao LI, et al.
Published: (2022-09-01)
Overview of Covert Channel Research in Blockchain Environment
by: ZHANG Xuan, LI Leixiao, DU Jinze, SHI Jianping
Published: (2024-06-01)
by: ZHANG Xuan, LI Leixiao, DU Jinze, SHI Jianping
Published: (2024-06-01)
An opportunity lost? The declining role of authorised covert human intelligence sources in combating organised crime
by: Ian Stanier, et al.
Published: (2025-03-01)
by: Ian Stanier, et al.
Published: (2025-03-01)
Survey of capacity limits and implementation techniques in wireless covert communication
by: Weiyu CHEN, et al.
Published: (2022-08-01)
by: Weiyu CHEN, et al.
Published: (2022-08-01)
Survey of capacity limits and implementation techniques in wireless covert communication
by: Weiyu CHEN, et al.
Published: (2022-08-01)
by: Weiyu CHEN, et al.
Published: (2022-08-01)
StegoFrameOrder—MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks
by: Krzysztof Sawicki, et al.
Published: (2021-09-01)
by: Krzysztof Sawicki, et al.
Published: (2021-09-01)
Joint Power Allocation for Transmitter and Relay in a Full-Duplex Relay Covert Communication System
by: Gui Fang, et al.
Published: (2024-01-01)
by: Gui Fang, et al.
Published: (2024-01-01)
Covert communication method based on tripartite generative adversarial network
by: Jihong YU, et al.
Published: (2023-11-01)
by: Jihong YU, et al.
Published: (2023-11-01)
Covert communication method based on tripartite generative adversarial network
by: Jihong YU, et al.
Published: (2023-11-01)
by: Jihong YU, et al.
Published: (2023-11-01)
Disguised Full-Duplex Covert Communications
by: Jihwan Moon
Published: (2023-07-01)
by: Jihwan Moon
Published: (2023-07-01)
Covert communication in relay and RIS networks
by: Hu Jinsong, et al.
Published: (2023-01-01)
by: Hu Jinsong, et al.
Published: (2023-01-01)
Covert contraceptive use among women of reproductive age in Ibadan, Nigeria; Covert contraceptive in Ibadan, Nigeria
by: Olutosin A Awolude, et al.
Published: (2019-01-01)
by: Olutosin A Awolude, et al.
Published: (2019-01-01)
Research on multi-address time-based blockchain covert communication method
by: Dongyan HUANG, et al.
Published: (2023-02-01)
by: Dongyan HUANG, et al.
Published: (2023-02-01)
Research on multi-address time-based blockchain covert communication method
by: Dongyan HUANG, et al.
Published: (2023-02-01)
by: Dongyan HUANG, et al.
Published: (2023-02-01)
Optimization of Intelligent-Reflecting-Surface-Enabled Covert Communication in Multi-Sensor Systems
by: Huiru Feng, et al.
Published: (2024-02-01)
by: Huiru Feng, et al.
Published: (2024-02-01)
Detection of IP Covert Timing Channels
by: Konstantin Grigorievich Kogos, et al.
Published: (2015-03-01)
by: Konstantin Grigorievich Kogos, et al.
Published: (2015-03-01)
COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL
by: Shipulin P.M., et al.
Published: (2018-07-01)
by: Shipulin P.M., et al.
Published: (2018-07-01)
An Enlarging-the-Capacity Packet Sorting Covert Channel
by: Lejun Zhang, et al.
Published: (2019-01-01)
by: Lejun Zhang, et al.
Published: (2019-01-01)
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations
by: Zhijun Han, et al.
Published: (2025-08-01)
by: Zhijun Han, et al.
Published: (2025-08-01)
On the Limitation of Covert Channels Bandwidth in IP Networks
by: Anna Igorevna Belozubova, et al.
Published: (2015-03-01)
by: Anna Igorevna Belozubova, et al.
Published: (2015-03-01)
Performance Analysis of a Sound-Based Steganography Wireless Sensor Network to Provide Covert Communications
by: Ariadna I. Rodriguez-Gomez, et al.
Published: (2024-07-01)
by: Ariadna I. Rodriguez-Gomez, et al.
Published: (2024-07-01)
Design of Covert Communication Waveform Based on Phase Randomization
by: Wenjie Zhou, et al.
Published: (2025-05-01)
by: Wenjie Zhou, et al.
Published: (2025-05-01)
Similar Items
-
Performance analysis of covert wireless communication based on beam forming with noise uncertainty
by: Yuda LIN, et al.
Published: (2020-07-01) -
The Technique to Prevent the Data Leakage using Covert Channels
by: Anna Vasilievna Arkhangelskaya, et al.
Published: (2013-12-01) -
Optimization of Covert Communication in Multi-Sensor Asymmetric Noise Systems
by: Sen Qiao, et al.
Published: (2024-01-01) -
Survey on key technologies of covert channel in ubiquitous network environment
by: Fenghua LI, et al.
Published: (2022-04-01) -
Survey on key technologies of covert channel in ubiquitous network environment
by: Fenghua LI, et al.
Published: (2022-04-01)
