Author of the publication

Hiding information in noise: fundamental limits of covert wireless communication.

, , , and . IEEE Communications Magazine, 53 (12): 26-31 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study of user behavior on an online dating site., , , , and . ASONAM, page 243-247. ACM, (2013)Caching Policies over Unreliable Channels., , , , , and . WiOpt, page 246-253. IEEE, (2020)The Online Knapsack Problem with Departures., , , , , , and . SIGMETRICS (Abstracts), page 59-60. ACM, (2023)A Necessary and Sufficient Condition for Throughput Scalability of Fork and Join Networks with Blocking., , , and . SIGMETRICS, page 25-36. ACM, (2016)On Optimal Packet Routing in Deterministic DTNs., , , , and . VTC Spring, page 1-5. IEEE, (2013)Multicast vs. unicast for loss tomography on tree topologies., , , , , , and . MILCOM, page 312-317. IEEE, (2015)Resource Allocation in One-Dimensional Distributed Service Networks., , , , , , and . MASCOTS, page 14-26. IEEE Computer Society, (2019)Complex network comparison using random walks., , , and . WWW (Companion Volume), page 727-730. ACM, (2014)Strategic reasoning about bundling in swarming systems., , , and . GAMENETS, page 611-620. IEEE, (2009)An adaptive directional MAC protocol for ad hoc networks using directional antennas., , , and . Sci. China Inf. Sci., 55 (6): 1360-1371 (2012)