1. Ghosh A, Maeder A, Baker M, et al. 5G evolution: a view on 5G cellular technology beyond 3GPP release 15. IEEE Access, 2019,
7: 127639 -127651
2. Chen X M, Ng D W K, Gerstacker W H, et al. A survey on multiple-antenna techniques for physical layer security. IEEE
Communications Surveys & Tutorials, 2017, 19(2): 1027 -1053
3. Zhou X Y, Song L Y, Zhang Y. Physical layer security in wireless communications. Boca Raton, FL, USA: CRC Press, 2013
4. Zhang W, Chen J, Kuo Y H, et al. Artificial-noise-aided optimal beamforming in layered physical layer security. IEEE
Communications Letters, 2019, 23(1): 72 -75
5. Bullock M S, Gagatsos C N, Guha S, et al. Fundamental limits of quantum-secure covert communication over bosonic channels. IEEE Journal on Selected Areas in Communications, 2020, 38 (3): 471 -482
6. Shi X, Wu D, Yue C, et al. Resource allocation for covert communication in D2D content sharing: a matching game
approach. IEEE Access, 2019, 7: 72835 -72849
7. Bash B A, Goeckel D, Towsley D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1921 -1930
8. Shahzad K, Zhou X Y, Yan S H. Covert communication in fading channels under channel uncertainty. Proceedings of the IEEE 85th Vehicular Technology Conference ( VTC Spring’17), 2017, Jun 4 -7, Sydney, Australia. Piscataway, NJ, USA: IEEE, 2017: 1 -5
9. Yan S H, He B, Zhou X Y, et al. Delay-intolerant covert communications with either fixed or random transmit power. IEEE
Transactions on Information Forensics and Security, 2019, 14(1): 129 -140
10.Sobers T V, Bash B A, Guha S, et al. Covert communication in the presence of an uninformed jammer. IEEE Transactions on
Wireless Communications, 2017, 16(9): 6193 -6206
11. Shu F, Xu T Z, Hu J S, et al. Delay-constrained covert communications with a full-duplex receiver. IEEE Communications
Letters, 2019, 8(3): 813 -816
12. Goldsmith A. Wireless communications. Cambridge, UK: Cambridge University Press, 2005: 64 -69
13. Everett E, Sahai A, Sabharwal A. Passive self-interference suppression for full-duplex infrastructure nodes. IEEE Transactions
on Wireless Communications, 2014, 13(2): 680 -694
14. David H A, Nagaraja H N. Order statistics. 3rd ed. Hoboken, NJ, USA: John Wiley, 2005: 9 -11
15.Gradshteyn I S, Ryzhik I M. Table of integrals, series and products. 7th ed. San Diego, CA, USA: Academic Press, 2007
|