4.6 Article

D2D Covert Communications With Safety Area

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Dynamic Social-Aware Peer Selection for Cooperative Relay Management With D2D Communications

Yulan Gao et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Information Systems

First- and Second-Order Asymptotics in Covert Communication

Mehrdad Tahmasbi et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

Delay-Constrained Covert Communications With a Full-Duplex Receiver

Feng Shu et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Energy-Efficient Device Discovery in D2D Cellular Networks for Public Safety Scenario

Zeeshan Kaleem et al.

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

Covert Communication With the Help of Relay and Channel Uncertainty

Jianquan Wang et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

5G D2D Networks: Techniques, Challenges, and Future Prospects

Rafay Iqbal Ansari et al.

IEEE SYSTEMS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Covert Communication Achieved by a Greedy Relay in Wireless Networks

Jinsong Hu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Multi-Hop Routing in Covert Wireless Networks

Azadeh Sheikholeslami et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Covert Wireless Communication With Artificial Noise Generation

Ramin Soltani et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Achieving Covert Wireless Communications Using a Full-Duplex Receiver

Khurram Shahzad et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Telecommunications

On Covert Communication With Noise Uncertainty

Biao He et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Computer Science, Information Systems

Mode Selection and Resource Allocation in Device-to-Device Communications: A Matching Game Approach

S. M. Ahsan Kazmi et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Article Engineering, Electrical & Electronic

Covert Communication in the Presence of an Uninformed Jammer

Tamara V. Sobers et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Energy-Efficient D2D Overlaying Communications With Spectrum-Power Trading

Qingqing Wu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Limits of Covert Communication on Two-Hop AWGN Channels

Huihui Wu et al.

2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA) (2017)

Article Computer Science, Information Systems

A Survey of Resource Management Toward 5G Radio Access Networks

Thomas O. Olwal et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

Covert Communication Over Noisy Channels: A Resolvability Perspective

Matthieu R. Bloch

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Article Computer Science, Information Systems

Fundamental Limits of Communication With Low Probability of Detection

Ligong Wang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Article Engineering, Electrical & Electronic

Achieving Undetectable Communication

Seonwoo Lee et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2015)

Article Computer Science, Information Systems

A Survey of 5G Network: Architecture and Emerging Technologies

Akhil Gupta et al.

IEEE ACCESS (2015)

Article Engineering, Electrical & Electronic

Limits of Reliable Communication with Low Probability of Detection on AWGN Channels

Boulat A. Bash et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Engineering, Electrical & Electronic

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

Azadeh Sheikholeslami et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Automation & Control Systems

Dynamic Optimization and Learning for Renewal Systems

Michael J. Neely

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)

Article Computer Science, Hardware & Architecture

OPERATOR CONTROLLED DEVICE-TO-DEVICE COMMUNICATIONS IN LTE-ADVANCED NETWORKS

Lei Lei et al.

IEEE WIRELESS COMMUNICATIONS (2012)

Editorial Material Engineering, Electrical & Electronic

Internet of Things

Feng Xia et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Article Engineering, Electrical & Electronic

Weighted Sum-Rate Maximization for a Set of Interfering Links via Branch and Bound

Pradeep Chathuranga Weeraddana et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2011)

Article Computer Science, Information Systems

Channel Coding Rate in the Finite Blocklength Regime

Yury Polyanskiy et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2010)

Article Computer Science, Information Systems

Spectrum requirements for the future development of IMT-2000 and systems beyond IMT-2000

Hyun-Goo Yoon et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2006)