[1] |
GOLDSMITH A. 无线通信[M]. 杨鸿文, 李卫东, 郭文彬, 等译. 北京: 人民邮电出版社, 2007: 23-44.
|
|
GOLDSMITH A. Wireless communication[M]. YANG H W, LI W D, GUO W B, et al. Beijing: People’s Post and Telecommunications Press, 2007: 23-44.
|
[2] |
MENEZES A J, VANSTONE S A, OORSCHOT P C V. 应用密码学手册[M]. 胡磊, 王鹏, 译. 北京, 电子工业出版社, 2005: 1-36.
|
|
MENEZES A J, VANSTONE S A, OORSCHOT P C V. Handbook of applied cryptography[M]. HU L, WANG P. Beijing: Electronic Industry Press, 2005: 1-36.
|
[3] |
ZHANG W, CHEN J, KUO Y H, et al. Artificial-noise-aided optimal beamforming in layered physical layer security[J]. IEEE Communications Letters, 2019, 23(1): 72-75.
DOI
URL
|
[4] |
KARAS D S, BOULOGEORGOS A A A, KARAGIANNIDIS G K, et al. Physical layer security in the presence of interference[J]. IEEE Wireless Communication Letters, 2018, 6(6): 802-805.
DOI
URL
|
[5] |
BOUABDELLAH M, BOUANANI F E, ALOUINI M S. A PHY layer security analysis of uplink cooperative jamming-based underlay CRNs with multi-eavesdroppers[J]. IEEE Transactions on Cognitive Communications and Networking, 2020, 6(2): 704-717.
DOI
URL
|
[6] |
FU Y Q, GUO S N, YU Z X. The modulation technology of chaotic multi-tone and its application in covert communication system[J]. IEEE Access, 2019, 7: 122289-122301.
DOI
URL
|
[7] |
BASH B A, GOECKEL D, TOWSLEY D. Limits of reliable communication with low probability of detection on AWGN channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1921-1930.
DOI
URL
|
[8] |
WANG J Q, TANG W B, ZHU Q Q, et al. Covert communication with the help of relay and channel uncertainty[J]. IEEE Wireless Communications Letters, 2019, 8(1): 317-320.
DOI
URL
|
[9] |
SOLTANI R, GOECKEL D, TOWSLEY D, et al. Covert wireless communication with artificial noise generation[J]. IEEE Transactions on Wireless Communications, 2017, 17(11): 7252-7267.
DOI
URL
|
[10] |
SHAHZAD K, ZHOU X Y, YAN S H, et al. Achieving covert wireless communications using a full-duplex receiver[J]. IEEE Transactions on Wireless Communications, 2018, 17(12): 8517-8530.
DOI
URL
|
[11] |
SHU F, XU T Z, HU J S, et al. Delay-constrained covert communications with a full-duplex receiver[J]. IEEE Communications Letters, 2019, 8(3): 813-816.
|
[12] |
HE B, YAN S H, ZHOU X Y, et al. On covert communication with noise uncertainty[J]. IEEE Communications Letters, 2017, 21(4): 941-944.
DOI
URL
|
[13] |
SHAHZAD K, ZHOU X Y, YAN S H. Covert communication in fading channels under channel uncertainty[C]// Proceedings of the 85th IEEE Vehicular Technology Conference, Sydney, Jun 4-7, 2017. Piscataway: IEEE, 2017: 1-5.
|
[14] |
EVERETT E, SAHAI A, SABHARWAL A. Passive self-interference suppression for full-duplex infrastructure nodes[J]. IEEE Transactions on Wireless Communications, 2014, 13(2): 680-694.
DOI
URL
|
[15] |
LEE S, BAXLEY R J, WEITNAUER M A, et al. Achieving undetectable communication[J]. IEEE Journal of Selected Topics in Signal Processing, 2015, 9(7): 1195-1205.
DOI
URL
|
[16] |
GRADSHTEYN I S, RYZHIK I M. Table of integrals, series and products[M]. San Diego: Academic Press Professional, Inc., 2007.
|
[17] |
ZHENG T X, WANG H M, YUAN J H, et al. Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers[J]. IEEE Transactions on Communications, 2015, 63(11): 4347-4362.
DOI
URL
|