2019 IEEE Information Theory Workshop (ITW) 2019
DOI: 10.1109/itw44776.2019.8989307
|View full text |Cite
|
Sign up to set email alerts
|

Channel Resolvability with a Full-Duplex Decode-and-Forward Relay

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The fundamental limits of covert communications have been actively studied mainly for pointto-point (p-to-p) channels such as additive white Gaussian noise (AWGN) channels [2], [3], discrete memoryless channels (DMCs) [3], [4], low-complexity coding scheme based on the pulse-position modulation [5], [6], channels using multiple antennas [7], and channels with some uncertainty of statistics [8], [9]. In most interesting cases, the covertness constraint restricts the number of no "off" input symbols (for discrete channel cases [4]) or the transmit power (for continuous channel cases [2], [3]) that leads the so-called square-root law, i.e., the maximum number of bits that can be communicated reliably and covertly over n channel uses scales proportionally to √ n. Recently, this line of research has been extended to various network scenarios such as multiple access channels (MACs) [10], broadcast channels (BCs) [11], relay channels (RCs) [12]- [14], and wireless adhoc networks [15]. It turns out that in some canonical models, the covertness constraint affects This paper was submitted to IEEE Transactions on Information Forensics and Security, and a shorter version of this paper was submitted to IEEE ISIT 2020 [1].…”
Section: Introductionmentioning
confidence: 99%
“…The fundamental limits of covert communications have been actively studied mainly for pointto-point (p-to-p) channels such as additive white Gaussian noise (AWGN) channels [2], [3], discrete memoryless channels (DMCs) [3], [4], low-complexity coding scheme based on the pulse-position modulation [5], [6], channels using multiple antennas [7], and channels with some uncertainty of statistics [8], [9]. In most interesting cases, the covertness constraint restricts the number of no "off" input symbols (for discrete channel cases [4]) or the transmit power (for continuous channel cases [2], [3]) that leads the so-called square-root law, i.e., the maximum number of bits that can be communicated reliably and covertly over n channel uses scales proportionally to √ n. Recently, this line of research has been extended to various network scenarios such as multiple access channels (MACs) [10], broadcast channels (BCs) [11], relay channels (RCs) [12]- [14], and wireless adhoc networks [15]. It turns out that in some canonical models, the covertness constraint affects This paper was submitted to IEEE Transactions on Information Forensics and Security, and a shorter version of this paper was submitted to IEEE ISIT 2020 [1].…”
Section: Introductionmentioning
confidence: 99%