Covert Communications in Multi-Channel Slotted ALOHA Systems | 0 | 0.34 | 2022 |
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems | 1 | 0.37 | 2021 |
Sequence Obfuscation to Thwart Pattern Matching Attacks | 0 | 0.34 | 2020 |
Optimal PHY Configuration in Wireless Networks | 0 | 0.34 | 2020 |
Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information | 3 | 0.37 | 2020 |
Practical Traffic Analysis Attacks on Secure Messaging Applications | 1 | 0.35 | 2020 |
Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms | 0 | 0.34 | 2020 |
Fundamental Limits of Covert Packet Insertion. | 2 | 0.37 | 2020 |
Fundamental Limits of Covert Packet Insertion. | 0 | 0.34 | 2019 |
Achievable Information-Theoretic Secrecy in the Presence of a Radar | 0 | 0.34 | 2019 |
Asymptotic Limits of Privacy in Bayesian Time Series Matching | 0 | 0.34 | 2019 |
Mitigation of spectral leakage for single carrier, block-processing cognitive radio receivers | 0 | 0.34 | 2018 |
Privacy Against Statistical Matching: Inter-User Correlation | 3 | 0.39 | 2018 |
Multi-Hop Routing in Covert Wireless Networks. | 4 | 0.41 | 2018 |
Privacy against matching under anonymization and obfuscation in the Gaussian case | 0 | 0.34 | 2018 |
Fundamental Limits of Invisible Flow Fingerprinting. | 1 | 0.36 | 2018 |
Statistical matching in the presence of anonymization and obfuscation: Non-asymptotic results in the discrete case | 0 | 0.34 | 2018 |
Fundamental Limits of Covert Bit Insertion in Packets. | 1 | 0.35 | 2018 |
Covert Wireless Communication with Artificial Noise Generation. | 8 | 0.45 | 2018 |
Towards provably invisible network flow fingerprints | 3 | 0.39 | 2017 |
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming. | 0 | 0.34 | 2017 |
Fundamental limits of location privacy using anonymization | 3 | 0.39 | 2017 |
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming. | 3 | 0.38 | 2016 |
Covert Communications When the Warden Does Not Know the Background Noise Power. | 17 | 0.85 | 2016 |
Covert Communication Gains From Adversary's Ignorance of Transmission Time. | 9 | 0.48 | 2016 |
Covert communications on Poisson packet channels. | 5 | 0.45 | 2016 |
Covert communications on renewal packet channels | 6 | 0.48 | 2016 |
Optimal Dynamic Routing for the Wireless Relay Channel. | 0 | 0.34 | 2016 |
Covert Communication With The Help Of An Uninformed Jammer Achieves Positive Rate | 10 | 0.67 | 2015 |
Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers | 14 | 0.58 | 2015 |
Hiding information in noise: fundamental limits of covert wireless communication. | 35 | 1.13 | 2015 |
Quantum-noise limited communication with low probability of detection. | 1 | 0.35 | 2014 |
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments | 2 | 0.38 | 2014 |
Covert Optical Communication. | 0 | 0.34 | 2014 |
Jamming-aware minimum energy routing in wireless networks | 8 | 0.53 | 2014 |
Minimum Energy Routing in Wireless Networks in the Presence of Jamming. | 0 | 0.34 | 2014 |
Impact of In-Network Aggregation on Target Tracking Quality Under Network Delays | 0 | 0.34 | 2013 |
Signal-flow-based analysis of wireless security protocols. | 6 | 0.42 | 2013 |
Efficient algorithms for neighbor discovery in wireless networks | 30 | 0.91 | 2013 |
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy | 5 | 0.46 | 2013 |
Efficient wireless security through jamming, coding and routing | 7 | 0.47 | 2013 |
Endhost-Based Shortest Path Routing In Dynamic Networks: An Online Learning Approach | 4 | 0.41 | 2013 |
Broadcast Analysis for Extended Cooperative Wireless Networks | 6 | 0.48 | 2013 |
Quantum Noise Limited Optical Communication With Low Probability Of Detection | 8 | 0.58 | 2013 |
Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. | 90 | 3.95 | 2013 |
A markov chain model for coarse timescale channel variation in an 802.16e wireless network | 4 | 0.39 | 2012 |
On the Application of Cooperative Transmission to Secrecy Communications. | 76 | 2.24 | 2012 |
Network coding for facilitating secrecy in large wireless networks. | 8 | 0.50 | 2012 |
Peak Minimization for Reference-Based Ultra-Wideband (UWB) Radio. | 0 | 0.34 | 2012 |
Secret communication in large wireless networks without eavesdropper location information | 31 | 1.10 | 2012 |