{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:06:31Z","timestamp":1767773191231,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["18H03235","19K14983"],"award-info":[{"award-number":["18H03235","19K14983"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China NSFC","award":["61972308","61571352","U1736216","U1536202"],"award-info":[{"award-number":["61972308","61571352","U1736216","U1536202"]}]},{"name":"China the Project of Hainan Province Key Research and Development Program","award":["ZDYF2019202"],"award-info":[{"award-number":["ZDYF2019202"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["GK201903087"],"award-info":[{"award-number":["GK201903087"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11276-020-02256-9","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T13:02:52Z","timestamp":1579698172000},"page":"3275-3289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["On covert throughput performance of two-way relay covert wireless communications"],"prefix":"10.1007","volume":"26","author":[{"given":"Huihui","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yuanyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xuening","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"2256_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of wireless communication","author":"D Tse","year":"2005","unstructured":"Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge: Cambridge University Press."},{"key":"2256_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-layer security: From information theory to security engineering","author":"M Bloch","year":"2011","unstructured":"Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press."},{"issue":"12","key":"2256_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2015.7355562","volume":"53","author":"BA Bash","year":"2015","unstructured":"Bash, B. A., Goeckel, D., Towsley, D., & Guha, S. (2015). Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Communications Magazine, 53(12), 26\u201331.","journal-title":"IEEE Communications Magazine"},{"key":"2256_CR4","doi-asserted-by":"crossref","unstructured":"Che, P. H., Bakshi, M., & Jaggi, S. (2013). Reliable deniable communication: Hiding messages in noise. In 2013 IEEE international symposium on information theory proceedings (ISIT) (pp. 2945\u20132949). IEEE.","DOI":"10.1109\/ISIT.2013.6620765"},{"issue":"5","key":"2256_CR5","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/TIT.2016.2530089","volume":"62","author":"MR Bloch","year":"2016","unstructured":"Bloch, M. R. (2016). Covert communication over noisy channels: A resolvability perspective. IEEE Transactions on Information Theory, 62(5), 2334\u20132354.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2256_CR6","doi-asserted-by":"publisher","DOI":"10.1201\/9781420015317","volume-title":"Wireless ad hoc and sensor networks: Protocols, performance, and control","author":"J Sarangapani","year":"2017","unstructured":"Sarangapani, J. (2017). Wireless ad hoc and sensor networks: Protocols, performance, and control. Boca Raton: CRC Press."},{"key":"2256_CR7","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.jnca.2015.09.008","volume":"60","author":"B Rashid","year":"2016","unstructured":"Rashid, B., & Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: A survey. Journal of Network and Computer Applications, 60, 192\u2013219.","journal-title":"Journal of Network and Computer Applications"},{"key":"2256_CR8","unstructured":"Narayanan, S. (2006). Two-hop forwarding in wireless networks. Ph.D. dissertation, Polytechnic University."},{"issue":"2","key":"2256_CR9","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1109\/TWC.2010.02.090314","volume":"9","author":"RH Louie","year":"2010","unstructured":"Louie, R. H., Li, Y., & Vucetic, B. (2010). Practical physical layer network coding for two-way relay channels: Performance analysis and comparison. IEEE Transactions on Wireless Communications, 9(2), 764\u2013777.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2256_CR10","doi-asserted-by":"crossref","unstructured":"Bash, B. A., Goeckel, D., & Towsley, D. (2012). Square root law for communication with low probability of detection on AWGN channels. In 2012 IEEE international symposium on information theory proceedings (ISIT) (pp. 448\u2013452). IEEE.","DOI":"10.1109\/ISIT.2012.6284228"},{"issue":"8","key":"2256_CR11","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","volume":"61","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61(8), 3693\u20133704.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2256_CR12","volume-title":"Spread spectrum communications handbook","author":"MK Simon","year":"1994","unstructured":"Simon, M. K., Omura, J. K., Scholtz, R. A., & Levitt, B. K. (1994). Spread spectrum communications handbook. New York: McGraw-Hill."},{"issue":"9","key":"2256_CR13","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/JSAC.2013.130923","volume":"31","author":"BA Bash","year":"2013","unstructured":"Bash, B. A., Goeckel, D., & Towsley, D. (2013). Limits of reliable communication with low probability of detection on AWGN channels. IEEE Journal on Selected Areas in Communications, 31(9), 1921\u20131930.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2256_CR14","unstructured":"Haeupler, B., Kamath, P., & Velingker, A. (2015). Communication with partial noiseless feedback. In Approximation, randomization, and combinatorial optimization. Algorithms and techniques (APPROX\/RANDOM 2015). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"2256_CR15","doi-asserted-by":"crossref","unstructured":"Wang, G., Qin, Y., & Chang, C. (2017). Communication with partial noisy feedback. In 2017 IEEE symposium on computers and communications (ISCC) (pp. 602\u2013607). IEEE.","DOI":"10.1109\/ISCC.2017.8024594"},{"issue":"8","key":"2256_CR16","doi-asserted-by":"publisher","first-page":"4575","DOI":"10.1109\/TIT.2016.2582176","volume":"62","author":"K Efremenko","year":"2016","unstructured":"Efremenko, K., Gelles, R., & Haeupler, B. (2016). Maximal noise in interactive communication over erasure channels and channels with feedback. IEEE Transactions on Information Theory, 62(8), 4575\u20134588.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2256_CR17","doi-asserted-by":"crossref","unstructured":"Che, P. H., Bakshi, M., Chan, C., & Jaggi, S. ( 2014). Reliable, deniable and hidable communication. In Information theory and applications workshop (ITA), 2014 (pp. 1\u201310). IEEE.","DOI":"10.1109\/ITA.2014.6804271"},{"key":"2256_CR18","doi-asserted-by":"crossref","unstructured":"Che, P. H., Bakshi, M., Chan, C., & Jaggi, S. (2014). Reliable deniable communication with channel uncertainty. In 2014 IEEE information theory workshop (ITW 2014) (pp. 30\u201334). IEEE.","DOI":"10.1109\/ITW.2014.6970786"},{"key":"2256_CR19","doi-asserted-by":"crossref","unstructured":"Bloch, M. (2015). A channel resolvability perspective on stealth communications. In 2015 IEEE international symposium on information theory (ISIT) (pp. 2535\u20132539). IEEE.","DOI":"10.1109\/ISIT.2015.7282913"},{"issue":"6","key":"2256_CR20","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1109\/TIT.2016.2548471","volume":"62","author":"L Wang","year":"2016","unstructured":"Wang, L., Wornell, G. W., & Zheng, L. (2016). Fundamental limits of communication with low probability of detection. IEEE Transactions on Information Theory, 62(6), 3493\u20133503.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2256_CR21","doi-asserted-by":"crossref","unstructured":"Bash, B. A., Goeckel, D., & Towsley, D. (2014). LPD communication when the warden does not know when. In 2014 IEEE international symposium on information theory (ISIT) (pp. 606\u2013610). IEEE.","DOI":"10.1109\/ISIT.2014.6874904"},{"issue":"2","key":"2256_CR22","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/LCOMM.2015.2507594","volume":"20","author":"D Goeckel","year":"2016","unstructured":"Goeckel, D., Bash, B., Guha, S., & Towsley, D. (2016). Covert communications when the warden does not know the background noise power. IEEE Communications Letters, 20(2), 236\u2013239.","journal-title":"IEEE Communications Letters"},{"issue":"9","key":"2256_CR23","doi-asserted-by":"publisher","first-page":"6193","DOI":"10.1109\/TWC.2017.2720736","volume":"16","author":"TV Sobers","year":"2017","unstructured":"Sobers, T. V., Bash, B. A., Guha, S., Towsley, D., & Goeckel, D. (2017). Covert communication in the presence of an uninformed jammer. IEEE Transactions on Wireless Communications, 16(9), 6193\u20136206.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2256_CR24","unstructured":"Soltani, R., Goeckel, D., Towsley, D., Bash, B., & Guha, S. (2017). Covert wireless communication with artificial noise generation. arXiv preprint arXiv:1709.07096."},{"issue":"1","key":"2256_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIFS.2018.2846257","volume":"14","author":"S Yan","year":"2019","unstructured":"Yan, S., He, B., Zhou, X., Cong, Y., & Swindlehurst, A. L. (2019). Delay-intolerant covert communications with either fixed or random transmit power. IEEE Transactions on Information Forensics and Security, 14(1), 129\u2013140.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"2256_CR26","doi-asserted-by":"publisher","first-page":"8394","DOI":"10.1109\/TWC.2016.2614502","volume":"15","author":"BA Bash","year":"2016","unstructured":"Bash, B. A., Goeckel, D., & Towsley, D. (2016). Covert communication gains from adversary\u2019s ignorance of transmission time. IEEE Transactions on Wireless Communications, 15(12), 8394\u20138405.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2256_CR27","unstructured":"Shahzad, K., Zhou, X., & Yan, S. (2017). Covert communication in fading channels under channel uncertainty. arXiv preprint arXiv:1703.02169."},{"issue":"9","key":"2256_CR28","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1109\/TIFS.2018.2818650","volume":"13","author":"S-H Lee","year":"2018","unstructured":"Lee, S.-H., Wang, L., Khisti, A., & Wornell, G. W. (2018). Covert communication with channel-state information at the transmitter. IEEE Transactions on Information Forensics and Security, 13(9), 2310\u20132319.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2256_CR29","unstructured":"Forouzesh, M., Azmi, P., Mokari, N., & Goeckel, D. (2019). Robust power allocation in covert communication: Imperfect CDI. arXiv preprint arXiv:1901.04914."},{"issue":"4","key":"2256_CR30","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/LCOMM.2016.2647716","volume":"21","author":"B He","year":"2017","unstructured":"He, B., Yan, S., Zhou, X., & Lau, V. K. (2017). On covert communication with noise uncertainty. IEEE Communications Letters, 21(4), 941\u2013944.","journal-title":"IEEE Communications Letters"},{"issue":"7","key":"2256_CR31","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1109\/JSTSP.2015.2421477","volume":"9","author":"S Lee","year":"2015","unstructured":"Lee, S., Baxley, R. J., Weitnauer, M. A., & Walkenhorst, B. (2015). Achieving undetectable communication. IEEE Journal of Selected Topics in Signal Processing, 9(7), 1195\u20131205.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"2256_CR32","unstructured":"Hu, J. Yan, S. Zhou, X. Shu, F. & Li, J. (2018). Covert wireless communications with channel inversion power control in Rayleigh fading. arXiv preprint arXiv:1803.07812."},{"issue":"7","key":"2256_CR33","doi-asserted-by":"publisher","first-page":"4077","DOI":"10.1007\/s11276-018-1732-1","volume":"25","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Shen, Y., & Jiang, X. (2019). Friendship-based cooperative jamming for secure communication in Poisson networks. Wireless Networks, 25(7), 4077\u20134095.","journal-title":"Wireless Networks"},{"issue":"12","key":"2256_CR34","doi-asserted-by":"publisher","first-page":"8517","DOI":"10.1109\/TWC.2018.2878014","volume":"17","author":"K Shahzad","year":"2018","unstructured":"Shahzad, K., Zhou, X., Yan, S., Hu, J., Shu, F., & Li, J. (2018). Achieving covert wireless communications using a full-duplex receiver. IEEE Transactions on Wireless Communications, 17(12), 8517\u20138530.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2256_CR35","doi-asserted-by":"crossref","unstructured":"Wu, H., Liao, X., Dang, Y., Shen, Y., & Jiang, X. (2017). Limits of covert communication on two-hop AWGN channels. In 2017 international conference on networking and network applications (NaNA) (pp. 42\u201347). IEEE.","DOI":"10.1109\/NaNA.2017.55"},{"key":"2256_CR36","doi-asserted-by":"publisher","first-page":"3656","DOI":"10.1109\/TWC.2018.2812881","volume":"17","author":"A Sheikholeslami","year":"2018","unstructured":"Sheikholeslami, A., Ghaderi, M., Towsley, D., Bash, B. A., Guha, S., & Goeckel, D. (2018). Multi-hop routing in covert wireless networks. IEEE Transactions on Wireless Communications, 17, 3656\u20133669.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2256_CR37","unstructured":"Liu, Z., Liu, J., Zeng, Y., Ma, Z., Ma, J., & Huang, Q. (2019). Challenges in covert wireless communications with active warden on AWGN channels. arXiv preprint arXiv:1901.03185."},{"key":"2256_CR38","volume-title":"Testing statistical hypotheses","author":"EL Lehmann","year":"2006","unstructured":"Lehmann, E. L., & Romano, J. P. (2006). Testing statistical hypotheses. Berlin: Springer."},{"key":"2256_CR39","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover, T. M., & Thomas, J. A. (2012). Elements of information theory. Hoboken: Wiley."},{"key":"2256_CR40","volume-title":"Undergraduate analysis","author":"S Lang","year":"2013","unstructured":"Lang, S. (2013). Undergraduate analysis. Berlin: Springer."},{"key":"2256_CR41","volume-title":"Information theory and statistics","author":"S Kullback","year":"1997","unstructured":"Kullback, S. (1997). Information theory and statistics. North Chelmsford: Courier Corporation."},{"key":"2256_CR42","unstructured":"Filler, T., Ker, A. D., & Fridrich, J. (2009). The square root law of steganographic capacity for Markov covers. In Media forensics and security (Vol. 7254, p. 725408). International Society for Optics and Photonics."},{"key":"2256_CR43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807046","volume-title":"Fundamentals of digital communication","author":"U Madhow","year":"2008","unstructured":"Madhow, U. (2008). Fundamentals of digital communication. Cambridge: Cambridge University Press."},{"key":"2256_CR44","doi-asserted-by":"crossref","unstructured":"Rankov, B., & Wittneben, A. (2006). Achievable rate regions for the two-way relay channel. In 2006 IEEE international symposium on information theory (pp. 1668\u20131672). IEEE.","DOI":"10.1109\/ISIT.2006.261638"},{"key":"2256_CR45","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T. H. (2009). Introduction to algorithms. Cambridge: MIT Press."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02256-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-020-02256-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02256-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:16:05Z","timestamp":1611188165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-020-02256-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,22]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2256"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02256-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2020,1,22]]},"assertion":[{"value":"22 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}