Abstract: In this paper, we consider a scenario of covert communication assisted by multiple friendly interference nodes, aimed at concealing the legitimate communication link under the surveillance ...