Recognition: unknown
Joint Secrecy and Covert Communication (JSACC): An Enhanced Physical Layer Security Approach
Pith reviewed 2026-05-07 07:50 UTC · model grok-4.3
The pith
JSACC dynamically switches between secrecy and covert modes with RIS to outperform conventional secrecy communication.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The JSACC system dynamically switches between secrecy and covert modes according to the channel difference between legitimate and illegitimate receivers, uses RIS to extend range, and derives closed-form outage probability and ergodic rate expressions for each scenario together with high-SNR approximations; these show that the diversity order depends on the Nakagami fading parameters and the number of RIS reflecting elements, with simulations confirming consistency with analysis and superiority over conventional secrecy communication.
What carries the argument
The dynamic mode-switching rule in JSACC that selects secrecy or covert operation based on the instantaneous channel difference between legitimate and illegitimate receivers, assisted by RIS reflection to extend range.
If this is right
- Diversity order grows with larger Nakagami-m parameters and with more RIS reflecting elements.
- JSACC achieves lower outage probability than conventional secrecy communication at the same SNR.
- Closed-form ergodic rate expressions allow direct computation of average throughput for each mode.
- High-SNR slope and diversity order formulas enable quick assessment of performance scaling with RIS size.
- The approach applies to Nakagami fading channels and provides asymptotic approximations usable for system design.
Where Pith is reading between the lines
- In networks with imperfect channel state information the switching threshold would need to be made robust, potentially reducing the observed gain over secrecy-only operation.
- The same mode-selection logic could be applied to multi-antenna or multi-user settings to protect several legitimate receivers simultaneously.
- Energy consumption of the RIS elements becomes a practical design variable once the diversity benefit is quantified.
- JSACC performance expressions could serve as benchmarks for comparing against other hybrid physical-layer security techniques such as artificial noise injection.
Load-bearing premise
The system can obtain accurate, real-time knowledge of the channel difference between legitimate and illegitimate receivers to decide the operating mode without estimation errors or delays.
What would settle it
An experiment or simulation with realistic channel estimation errors in which the outage probability of JSACC becomes worse than that of a conventional secrecy system would falsify the claimed superiority.
Figures
read the original abstract
In this paper, we propose an enhanced physical layer security approach, named joint secrecy and covert communication (JSACC), which aims to improve the performance of physical layer security (PLS). The JSACC system can dynamically switch between secrecy mode and covert mode according to the channel difference between legitimate and illegitimate receivers. We further leverage reconfigurable intelligent surface (RIS) to extend the communication range. For each scenario, we derive the closed-form expressions for the outage probability (OP) and ergodic rate (ER). To further understand system performance, we derive asymptotic approximations in the high signal-to-noise ratio (SNR) regime to obtain the diversity order and high-SNR slope. We demonstrate that the diversity order of the JSACC depends on Nakagami fading parameters and the RIS reflecting element number. Simulation results are consistent with our theoretical analysis and reveal the superiority of the JSACC system over the conventional secrecy communication (SC) system.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a Joint Secrecy and Covert Communication (JSACC) scheme that dynamically switches between secrecy and covert modes according to the relative channel strengths of the legitimate and illegitimate receivers, assisted by a reconfigurable intelligent surface (RIS). For each mode, closed-form expressions are derived for outage probability (OP) and ergodic rate (ER). High-SNR asymptotic approximations are obtained to extract diversity order and high-SNR slope. The authors claim that the JSACC diversity order depends on the Nakagami-m fading parameters and the number of RIS reflecting elements. Monte-Carlo simulations are presented to validate the analysis and to show that JSACC outperforms conventional secrecy communication.
Significance. If the derivations are correct, the work supplies a concrete mechanism for combining secrecy and covert physical-layer security with RIS assistance and furnishes analytical performance metrics that could guide system design. The explicit dependence of diversity order on Nakagami parameters and RIS size, together with the closed-form OP/ER expressions, would constitute a useful addition to the PLS literature provided the asymptotic analysis is free of the weighting issue identified below.
major comments (3)
- [§IV-C] §IV-C (Asymptotic Analysis) and the diversity-order claim in the abstract: Mode selection is performed by comparing the instantaneous channel gains of the legitimate and illegitimate links; these gains are independent of SNR. Consequently the overall high-SNR outage probability is a convex combination P(mode_s)·OP_s^∞ + P(mode_c)·OP_c^∞ with SNR-independent weights. The diversity order of the mixture is therefore strictly the minimum of the two per-mode diversity orders. The manuscript states that “the diversity order of the JSACC depends on Nakagami fading parameters and the RIS reflecting element number” without demonstrating that the two modes possess identical diversity orders or explicitly writing the min{·,·} operation. An explicit high-SNR expansion of the composite OP (or a conditioning argument) is required to substantiate the claimed single diversity-order expression.
- [§II] §II (System Model) and §III (Performance Analysis): The derivations assume perfect instantaneous CSI of both the legitimate and the illegitimate receivers at the transmitter. For the covert mode this assumption is particularly strong, because the illegitimate receiver’s channel is precisely what the transmitter is trying to keep uncertain. No sensitivity analysis or robust formulation under imperfect CSI is provided, yet the closed-form OP/ER expressions and the diversity-order result rest directly on this assumption.
- [§IV-A] §IV-A and §IV-B (OP and ER derivations): The closed-form expressions are stated to be obtained after averaging over Nakagami-m fading and the discrete RIS phase shifts. However, the final expressions contain multiple nested sums and special functions whose numerical evaluation is not cross-checked against the Monte-Carlo curves in any table or figure. Without such verification, it is impossible to confirm that the analytic expressions are free of algebraic errors that would propagate into the asymptotic diversity-order formulas.
minor comments (3)
- Notation: The symbols for the mode-selection threshold and the RIS phase-shift vector are introduced without a dedicated nomenclature table; readers must hunt through the text to locate their definitions.
- Figure 3 (diversity-order plot): The legend does not indicate which curves correspond to the secrecy mode, covert mode, and JSACC composite; the caption should explicitly label the asymptotic slopes.
- Reference list: Several recent works on RIS-assisted covert communication (e.g., 2022–2023) are missing; the introduction would benefit from a brief comparison paragraph.
Simulated Author's Rebuttal
We are grateful to the referee for the detailed and insightful comments, which have helped us identify areas for improvement in our manuscript. Below, we provide point-by-point responses to the major comments. We will revise the manuscript to incorporate the suggested clarifications and verifications.
read point-by-point responses
-
Referee: [§IV-C] §IV-C (Asymptotic Analysis) and the diversity-order claim in the abstract: Mode selection is performed by comparing the instantaneous channel gains of the legitimate and illegitimate links; these gains are independent of SNR. Consequently the overall high-SNR outage probability is a convex combination P(mode_s)·OP_s^∞ + P(mode_c)·OP_c^∞ with SNR-independent weights. The diversity order of the mixture is therefore strictly the minimum of the two per-mode diversity orders. The manuscript states that “the diversity order of the JSACC depends on Nakagami fading parameters and the RIS reflecting element number” without demonstrating that the two modes possess identical diversity orders or explicitly writing the min{·,·} operation. An explicit high-SNR expansion of the composite OP (or a conditioning argument) is required to substantiate the claimed single diversity-order expression.
Authors: We thank the referee for this precise observation on the asymptotic behavior. We will revise §IV-C to include an explicit high-SNR expansion of the composite outage probability by conditioning on the mode. This will show that the diversity order is the minimum of the per-mode diversity orders. Both per-mode diversity orders depend on the Nakagami-m parameters and the number of RIS elements, thus the overall diversity order of JSACC depends on these factors as claimed. We will also explicitly state the min operation in the revised text. revision: yes
-
Referee: [§II] §II (System Model) and §III (Performance Analysis): The derivations assume perfect instantaneous CSI of both the legitimate and the illegitimate receivers at the transmitter. For the covert mode this assumption is particularly strong, because the illegitimate receiver’s channel is precisely what the transmitter is trying to keep uncertain. No sensitivity analysis or robust formulation under imperfect CSI is provided, yet the closed-form OP/ER expressions and the diversity-order result rest directly on this assumption.
Authors: We acknowledge that the perfect CSI assumption for the illegitimate receiver is particularly strong in the covert mode. This assumption enables the derivation of closed-form expressions. In the revised manuscript, we will add a discussion in §II on the implications of this assumption and its limitations for the covert communication scenario. We will also indicate that future work could explore robust designs under imperfect CSI. The current results provide performance benchmarks under ideal CSI conditions. revision: partial
-
Referee: [§IV-A] §IV-A and §IV-B (OP and ER derivations): The closed-form expressions are stated to be obtained after averaging over Nakagami-m fading and the discrete RIS phase shifts. However, the final expressions contain multiple nested sums and special functions whose numerical evaluation is not cross-checked against the Monte-Carlo curves in any table or figure. Without such verification, it is impossible to confirm that the analytic expressions are free of algebraic errors that would propagate into the asymptotic diversity-order formulas.
Authors: We thank the referee for highlighting the need for explicit verification. We will include a new table in the revised §IV that lists the analytical values from the closed-form OP and ER expressions alongside Monte-Carlo simulation results for selected parameter combinations. This cross-validation will confirm the correctness of the derivations and support the asymptotic analysis. revision: yes
Circularity Check
No significant circularity in derivation chain
full rationale
The paper's derivations of closed-form OP/ER expressions and high-SNR asymptotics rely on standard Nakagami-m channel PDFs, RIS phase-shift models, and integral evaluations for outage and ergodic rate, followed by series expansions to extract diversity order. Mode selection probabilities are SNR-independent (determined solely by relative fading coefficients), yielding a fixed-weight convex combination of per-mode asymptotics whose slope is the min of the component orders; this follows directly from the channel statistics and element count without any fitted parameters renamed as predictions, self-definitional loops, or load-bearing self-citations. No uniqueness theorems or ansatzes are imported via prior author work. The analysis is self-contained against external benchmarks of fading-channel performance analysis.
Axiom & Free-Parameter Ledger
axioms (3)
- domain assumption Wireless channels follow Nakagami-m fading
- ad hoc to paper Perfect channel state information is available for both legitimate and illegitimate receivers
- domain assumption RIS elements can be configured to perfectly enhance the legitimate link and degrade the illegitimate link
Reference graph
Works this paper leans on
-
[1]
NOMA-assisted secure short-packet communications in IoT,
Z. Xiang, W. Yang, Y. Cai, Z. Ding, Y. Song, and Y. Zou, “NOMA-assisted secure short-packet communications in IoT,” IEEE Wireless Commun., vol. 27, no. 4, pp. 8–15, Aug. 2020
2020
-
[2]
Physical layer security in cognitive radio inspired NOMA network,
Z. Xiang, W. Yang, G. Pan, Y. Cai, and Y. Song, “Physical layer security in cognitive radio inspired NOMA network,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 700–714, Jun. 2019
2019
-
[3]
On the secrecy capacity of fading channels,
P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698, 2008
2008
-
[4]
Secure communication over fading channels,
Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470–2492, 2008
2008
-
[5]
Y. Cheng, C. Ouyang, Y. Liu, and G. K. Karagiannidis, “On the performance of pinching-antenna systems (PASS) with orthogonal and non-orthogonal multiple access,” arXiv preprint arXiv:2506.02420, 2025
-
[6]
Hiding information in noise: Fundamental limits of covert wireless communication,
B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, pp. 26– 31, 2015
2015
-
[7]
Covert wireless communications under quasi-static fading with channel uncertainty,
K. Shahzad and X. Zhou, “Covert wireless communications under quasi-static fading with channel uncertainty,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 1104–1116, 2020
2020
-
[8]
Federated transfer learning with client selection for intrusion detection in mobile edge computing,
Y. Cheng, J. Lu, D. Niyato, B. Lyu, J. Kang, and S. Zhu, “Federated transfer learning with client selection for intrusion detection in mobile edge computing,” IEEE Commun. Lett., vol. 26, no. 3, pp. 552–556, Mar. 2022
2022
-
[9]
Enhancing the secrecy rate with direction-range focusing with FDA and RIS,
C. Li, S. Roth, and A. Sezgin, “Enhancing the secrecy rate with direction-range focusing with FDA and RIS,” IEEE Trans. Veh. Technol., pp. 1–14, Jan. 2025
2025
-
[10]
Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,
X. Li, M. Liu, S. Dang, N. C. Luong, C. Yuen, A. Nallanathan, and D. Niyato, “Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,” IEEE Trans. Wireless Commun., pp. 1–1, Mar. 2025
2025
-
[11]
Performance analysis and optimization for jammer-aided multiantenna UA V covert communication,
H. Du, D. Niyato, Y.-A. Xie, Y. Cheng, J. Kang, and D. I. Kim, “Performance analysis and optimization for jammer-aided multiantenna UA V covert communication,” IEEE J. Sel. Areas Commun., vol. 40, no. 10, pp. 2962–2979, 2022
2022
-
[12]
Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?
X. Guan, Q. Wu, and R. Zhang, “Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?” IEEE Wireless Commun. Lett., vol. 9, no. 6, pp. 778– 782, 2020
2020
-
[13]
Intelligent reflecting surface and UA V assisted secrecy communication in millimeter-wave networks,
G. Sun, X. Tao, N. Li, and J. Xu, “Intelligent reflecting surface and UA V assisted secrecy communication in millimeter-wave networks,” IEEE Trans. Veh. Technol., vol. 70, no. 11, pp. 11 949–11 961, 2021
2021
-
[14]
Secrecy performance analysis of RIS-aided wireless communication systems,
L. Yang, J. Yang, W. Xie, M. O. Hasna, T. Tsiftsis, and M. Di Renzo, “Secrecy performance analysis of RIS-aided wireless communication systems,” IEEE Trans. Veh. Technol., vol. 69, no. 10, pp. 12 296–12 300, 2020
2020
-
[15]
RIS-assisted green secure communications: Active RIS or passive RIS?
W. Lv, J. Bai, Q. Yan, and H. M. Wang, “RIS-assisted green secure communications: Active RIS or passive RIS?” IEEE Wireless Commun. Lett., vol. 12, no. 2, pp. 237–241, 2022
2022
-
[16]
Secrecy transmission in large-scale UA V- enabled wireless networks,
J. Yao and J. Xu, “Secrecy transmission in large-scale UA V- enabled wireless networks,” IEEE Trans. Commun., vol. 67, no. 11, pp. 7656–7671, 2019
2019
-
[17]
Physical layer security over fluid antenna systems: Secrecy performance analysis,
F. R. Ghadi, K.-K. Wong, F. J. López-Martínez, W. K. New, H. Xu, and C.-B. Chae, “Physical layer security over fluid antenna systems: Secrecy performance analysis,” IEEE Trans. Wireless Commun., 2024
2024
-
[18]
Secure transmission with mul- tiple antennas—part II: The mimome wiretap channel,
A. Khisti and G. W. Wornell, “Secure transmission with mul- tiple antennas—part II: The mimome wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, 2010
2010
-
[19]
Improving physical layer security via cooperative diversity in energy-constrained cognitive radio networks with multiple eavesdroppers,
H. A. Shah and I. Koo, “Improving physical layer security via cooperative diversity in energy-constrained cognitive radio networks with multiple eavesdroppers,” Int. J. Commun. Syst., vol. 32, no. 14, p. e4008, 2019
2019
-
[20]
Deep reinforcement learning-based intelligent reflecting surface for secure wireless communications,
H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, “Deep reinforcement learning-based intelligent reflecting surface for secure wireless communications,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 375–388, 2020
2020
-
[21]
Covert communications: A comprehensive survey,
X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, F. R. Yu, and A. Nallanathan, “Covert communications: A comprehensive survey,” IEEE Commun. Surveys Tuts., vol. 25, no. 2, pp. 1173– 1198, 2023
2023
-
[22]
Covert communication in the presence of an uninformed jam- mer,
T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert communication in the presence of an uninformed jam- mer,” IEEE Trans. Wireless Commun., vol. 16, no. 9, pp. 6193– 6206, 2017
2017
-
[23]
Covert communication assisted by UA V-IRS,
C. Wang, X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, and D. Niyato, “Covert communication assisted by UA V-IRS,” IEEE Trans. Commun., vol. 71, no. 1, pp. 357–369, 2022
2022
-
[24]
Performance analysis and power allocation for covert mobile edge computing with RIS-aided NOMA,
Y. Cheng, J. Lu, D. Niyato, B. Lyu, M. Xu, and S. Zhu, “Performance analysis and power allocation for covert mobile edge computing with RIS-aided NOMA,” IEEE Trans. Mobile Comput., vol. 23, no. 5, pp. 4212–4227, May 2023
2023
-
[25]
Covert communication achieved by a greedy relay in wireless networks,
J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4766–4779, 2018
2018
-
[26]
Physical layer covert communication in B5G wireless networks—its research, applications, and challenges,
Y. Jiang, L. Wang, H.-H. Chen, and X. Shen, “Physical layer covert communication in B5G wireless networks—its research, applications, and challenges,” Proc. IEEE, vol. 112, no. 1, pp. 47–82, 2024
2024
-
[27]
Covert communication via blockchain: Hiding patterns and communication patterns,
T. Zhang, Q. Wu, Q. Wang, T. Han, B. Li, and Y. Zhu, “Covert communication via blockchain: Hiding patterns and communication patterns,” Comput. Stand. Interfaces, vol. 90, p. 103851, 2024
2024
-
[28]
Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,
X. Li, M. Liu, S. Dang, N. C. Luong, C. Yuen, A. Nallanathan, and D. Niyato, “Covert communications with enhanced physical layer security in RIS-assisted cooperative networks,” IEEE Trans. Wireless Commun., 2025
2025
-
[29]
Covert communication with finite blocklength in A WGN channels,
S. Yan, B. He, Y. Cong, and X. Zhou, “Covert communication with finite blocklength in A WGN channels,” in Proc. IEEE Int. Conf. Commun. (ICC). IEEE, 2017, pp. 1–6. 13
2017
-
[30]
Covert communication using null space and 3D beamforming,
M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert communication using null space and 3D beamforming,” arXiv preprint arXiv:1907.01350, 2019
-
[31]
Covert ambient backscatter communication under surveillance of UA V relaying,
X. Wu, L. Xu, N. Zhao, X. Jiang, B. Li, W. Lu, and A. Nal- lanathan, “Covert ambient backscatter communication under surveillance of UA V relaying,” IEEE Trans. Commun., 2025
2025
-
[32]
Covert channel detection: machine learning approaches,
M. A. Elsadig and A. Gafar, “Covert channel detection: machine learning approaches,” IEEE Access, vol. 10, pp. 38 391–38 405, 2022
2022
-
[33]
Achieving covertness and secrecy: a new paradigm for secure wireless communica- tion,
H. Wu, Y. Zhang, Y. Shen, and X. Jiang, “Achieving covertness and secrecy: a new paradigm for secure wireless communica- tion,” arXiv preprint arXiv:2008.00147, 2020
-
[34]
Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden,
M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, “Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden,” IEEE Internet Things J., vol. 8, no. 9, pp. 7170–7181, 2020
2020
-
[35]
Secrecy and covert communications against UA V surveillance via multi-hop networks,
H.-M. Wang, Y. Zhang, X. Zhang, and Z. Li, “Secrecy and covert communications against UA V surveillance via multi-hop networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 389–401, 2019
2019
-
[36]
Distributed secure transmission for covert communication under multi-user network,
Y. Huang and J. Lei, “Distributed secure transmission for covert communication under multi-user network,” IET Commun., vol. 16, no. 16, pp. 1901–1911, 2022
1901
-
[37]
Enhancing covert secrecy rate in a zero-forcing UA V jammer-assisted covert communication,
X. Chen, Z. Chang, and T. Hämäläinen, “Enhancing covert secrecy rate in a zero-forcing UA V jammer-assisted covert communication,” IEEE Wireless Commun. Lett., 2024
2024
-
[38]
The influence of secrecy on the communication structure of covert networks,
R. Lindelauf, P. Borm, and H. Hamers, “The influence of secrecy on the communication structure of covert networks,” Social Networks, vol. 31, no. 2, pp. 126–137, 2009
2009
-
[39]
Down- link and uplink intelligent reflecting surface aided networks: NOMA and OMA,
Y. Cheng, K. H. Li, Y. Liu, K. C. Teh, and H. V. Poor, “Down- link and uplink intelligent reflecting surface aided networks: NOMA and OMA,” IEEE Trans. Wireless Commun., vol. 20, no. 6, pp. 3988–4000, Jun. 2021
2021
-
[41]
Towards smart and reconfigurable envi- ronment: Intelligent reflecting surface aided wireless network,
Q. Wu and R. Zhang, “Towards smart and reconfigurable envi- ronment: Intelligent reflecting surface aided wireless network,” IEEE Commun. Mag., vol. 58, no. 1, pp. 106–112, Jan. 2020
2020
-
[42]
Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,
L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735–1750, Mar. 2022
2022
-
[43]
Covert transmission assisted by intelligent reflecting surface,
J. Si, Z. Li, Y. Zhao, J. Cheng, L. Guan, J. Shi, and N. Al- Dhahir, “Covert transmission assisted by intelligent reflecting surface,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5394–5408, Aug. 2021
2021
-
[44]
Cascaded channel estimation for large intelligent metasurface assisted massive mimo,
Z.-Q. He and X. Yuan, “Cascaded channel estimation for large intelligent metasurface assisted massive mimo,” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 210–214, 2019
2019
-
[45]
Channel estimation and low- complexity beamforming design for passive intelligent surface assisted MISO wireless energy transfer,
D. Mishra and H. Johansson, “Channel estimation and low- complexity beamforming design for passive intelligent surface assisted MISO wireless energy transfer,” in Proc. IEEE Int. Conf. Acoustics, Speech Signal Process. (ICASSP). IEEE, 2019, pp. 4659–4663
2019
-
[46]
Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,
X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532–547, 2021
2021
-
[47]
Intelligent reflecting surface assisted covert communication with transmis- sion probability optimization,
J. Kong, F. T. Dagefus, J. Choi, and P. Spasojevic, “Intelligent reflecting surface assisted covert communication with transmis- sion probability optimization,” IEEE Wireless Commun. Lett., vol. 10, no. 8, pp. 1825–1829, 2021
2021
-
[48]
Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,
L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735–1750, 2021
2021
-
[49]
On covert communi- cation with noise uncertainty,
B. He, S. Yan, X. Zhou, and V. K. Lau, “On covert communi- cation with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941–944, 2017
2017
-
[50]
A simple design of IRS-NOMA transmission,
Z. Ding and H. V. Poor, “A simple design of IRS-NOMA transmission,” IEEE Commun. Lett., vol. 24, no. 5, pp. 1119– 1123, 2020
2020
-
[51]
On the impact of phase shifting designs on IRS-NOMA,
Z. Ding, R. Schober, and H. V. Poor, “On the impact of phase shifting designs on IRS-NOMA,” IEEE Wireless Commun. Lett., vol. 9, no. 10, pp. 1596–1600, Oct. 2020
2020
-
[52]
Non-orthogonal multiple access in large-scale het- erogeneous networks,
Y. Liu, Z. Qin, M. Elkashlan, A. Nallanathan, and J. A. McCann, “Non-orthogonal multiple access in large-scale het- erogeneous networks,” IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2667–2680, 2017
2017
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.