Abstract: In this paper, we consider a scenario of covert communication assisted by multiple friendly interference nodes, aimed at concealing the legitimate communication link under the surveillance ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results