Author of the publication

Hiding information in noise: fundamental limits of covert wireless communication.

, , , and . IEEE Communications Magazine, 53 (12): 26-31 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-user diversity for secrecy in wireless networks., , , , , and . ITA, page 482-490. IEEE, (2010)Covert communications on renewal packet channels., , , and . Allerton, page 548-555. IEEE, (2016)Connectivity in cooperative wireless ad hoc networks., , , , and . MobiHoc, page 121-130. ACM, (2008)Security-capacity trade-off in large wireless networks using keyless secrecy., , and . MobiHoc, page 21-30. ACM, (2010)Optimal Obfuscation to Protect Client Privacy in Federated Learning., , , , and . CISS, page 1-6. IEEE, (2024)Revisiting utility metrics for location privacy-preserving mechanisms., , , and . ACSAC, page 313-327. ACM, (2019)Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting., , , and . IEEE Trans. Wirel. Commun., 10 (6): 1725-1729 (2011)Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks., , , , , and . IEEE J. Sel. Areas Commun., 29 (10): 2067-2076 (2011)Bounds on the throughput gain of network coding in unicast and multicast wireless networks., , and . IEEE J. Sel. Areas Commun., 27 (5): 582-592 (2009)Practical Traffic Analysis Attacks on Secure Messaging Applications., , , , and . NDSS, The Internet Society, (2020)