{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T02:30:31Z","timestamp":1769308231336,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11276-021-02828-3","type":"journal-article","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T11:03:16Z","timestamp":1637146996000},"page":"161-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Covert communication with noise and channel uncertainties"],"prefix":"10.1007","volume":"28","author":[{"given":"Hien Q.","family":"Ta","sequence":"first","affiliation":[]},{"given":"Quoc-Viet","family":"Pham","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7044-4131","authenticated-orcid":false,"given":"Khuong","family":"Ho-Van","sequence":"additional","affiliation":[]},{"given":"Sang W.","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,17]]},"reference":[{"key":"2828_CR1","doi-asserted-by":"crossref","unstructured":"Ta, H. Q., & Kim, S.\u00a0W. (2019). Covert communication under channel uncertainty and noise uncertainty. In IEEE international conference on communications (pp.\u00a01\u20136).","DOI":"10.1109\/ICC.2019.8761935"},{"key":"2828_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MWC.001.1900057","volume":"26","author":"S Yan","year":"2019","unstructured":"Yan, S., Zhou, X., Hu, J., & Hanly, S. V. (2019). Low probability of detection communication: Opportunities and challenges. IEEE Wireless Communications, 26, 19\u201325.","journal-title":"IEEE Wireless Communications"},{"key":"2828_CR3","doi-asserted-by":"crossref","unstructured":"Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners. Springer.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"2828_CR4","doi-asserted-by":"crossref","unstructured":"Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"2828_CR5","unstructured":"Simon, M. K., Omura, J. K., Scholtz, R. A., & Levitt, B. K. (1994). Spread spectrum communications handbook. McGraw-Hill Education."},{"key":"2828_CR6","doi-asserted-by":"crossref","unstructured":"Bash, B.\u00a0A., Goeckel, D., & Towsley, D. (2014). LPD communication when the warden does not know when. In: IEEE international symposium on information theory (pp. 606\u2013610).","DOI":"10.1109\/ISIT.2014.6874904"},{"key":"2828_CR7","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1109\/JSTSP.2015.2421477","volume":"9","author":"S Lee","year":"2015","unstructured":"Lee, S., Baxley, R. J., Weitnauer, M. A., & Walkenhorst, B. (2015). Achieving undetectable communication. IEEE Journal of Selected Topics in Signal Processing, 9, 1195\u20131205.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"2828_CR8","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1109\/TIFS.2020.3029902","volume":"16","author":"K Shahzad","year":"2020","unstructured":"Shahzad, K., & Zhou, X. (2020). Covert wireless communications under quasi-static fading with channel uncertainty. IEEE Transactions on Information Forensics and Security, 16, 1104\u20131116.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2828_CR9","doi-asserted-by":"crossref","unstructured":"Kim, S.\u00a0W., & Ta, H.\u00a0Q. (2020). Covert communication by exploiting node multiplicity and channel variations. In IEEE international conference on communications (pp.\u00a01\u20136).","DOI":"10.1109\/ICC40277.2020.9149011"},{"key":"2828_CR10","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/JSAC.2013.130923","volume":"31","author":"BA Bash","year":"2013","unstructured":"Bash, B. A., Goeckel, D., & Towsley, D. (2013). Limits of reliable communication with low probability of detection on AWGN channels. IEEE Journal on Selected Areas in Communications, 31, 1921\u20131930.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2828_CR11","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/TIT.2016.2530089","volume":"62","author":"MR Bloch","year":"2016","unstructured":"Bloch, M. R. (2016). Covert communication over noisy channels: A resolvability perspective. IEEE Transactions on Information Theory, 62, 2334\u20132354.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2828_CR12","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1109\/TIT.2016.2548471","volume":"62","author":"L Wang","year":"2016","unstructured":"Wang, L., Wornell, G. W., & Zheng, L. (2016). Fundamental limits of communication with low probability of detection. IEEE Transactions on Information Theory, 62, 3493\u20133503.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2828_CR13","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TIT.2018.2878526","volume":"65","author":"M Tahmasbi","year":"2018","unstructured":"Tahmasbi, M., & Bloch, M. R. (2018). First-and second-order asymptotics in covert communication. IEEE Transactions on Information Theory, 65, 2190\u20132212.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2828_CR14","doi-asserted-by":"publisher","first-page":"3542","DOI":"10.1109\/TWC.2019.2915305","volume":"18","author":"S Yan","year":"2019","unstructured":"Yan, S., Cong, Y., Hanly, S. V., & Zhou, X. (2019). Gaussian signalling for covert communications. IEEE Transactions on Wireless Communications, 18, 3542\u20133553.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2828_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/JSTSP.2007.914879","volume":"2","author":"R Tandra","year":"2008","unstructured":"Tandra, R., & Sahai, A. (2008). SNR walls for signal detection. IEEE Journal of selected topics in Signal Processing, 2, 4\u201317.","journal-title":"IEEE Journal of selected topics in Signal Processing"},{"key":"2828_CR16","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/LCOMM.2016.2647716","volume":"21","author":"B He","year":"2017","unstructured":"He, B., Yan, S., Zhou, X., & Lau, V. K. N. (2017). On covert communication with noise uncertainty. IEEE Communications Letters, 21, 941\u2013944.","journal-title":"IEEE Communications Letters"},{"key":"2828_CR17","doi-asserted-by":"publisher","first-page":"7252","DOI":"10.1109\/TWC.2018.2865946","volume":"17","author":"R Soltani","year":"2018","unstructured":"Soltani, R., Goeckel, D., Towsley, D., Bash, B., & Guha, S. (2018). Covert wireless communication with artificial noise generation. IEEE Transactions on Wireless Communications, 17, 7252\u20137267.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2828_CR18","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/LWC.2019.2894617","volume":"8","author":"F Shu","year":"2019","unstructured":"Shu, F., Xu, T., Hu, J., & Yan, S. (2019). Delay-constrained covert communications with a full-duplex receiver. IEEE Wireless Communications Letters, 8, 813\u2013816.","journal-title":"IEEE Wireless Communications Letters"},{"key":"2828_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z. Liu, J., Zeng, Y., Ma, J., & Huang, Q. (2018). On covert communication with interference uncertainty. In IEEE international conference on communications (pp.\u00a01\u20136).","DOI":"10.1109\/ICC.2018.8422940"},{"key":"2828_CR20","doi-asserted-by":"publisher","first-page":"6193","DOI":"10.1109\/TWC.2017.2720736","volume":"16","author":"TV Sobers","year":"2017","unstructured":"Sobers, T. V., Bash, B. A., Guha, S., Towsley, D., & Goeckel, D. (2017). Covert communication in the presence of an uninformed jammer. IEEE Transactions on Wireless Communications, 16, 6193\u20136206.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2828_CR21","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/TWC.2019.2900915","volume":"18","author":"T-X Zheng","year":"2019","unstructured":"Zheng, T.-X., Wang, H.-M., Ng, D. W. K., & Yuan, J. (2019). Multi-antenna covert communications in random wireless networks. IEEE Transactions on Wireless Communications, 18, 1974\u20131987.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2828_CR22","doi-asserted-by":"publisher","first-page":"1266","DOI":"10.1109\/TCOMM.2003.815062","volume":"51","author":"C Cozzo","year":"2003","unstructured":"Cozzo, C., & Hughes, B. L. (2003). Joint channel estimation and data detection in space-time communications. IEEE Transactions on Communications, 51, 1266\u20131270.","journal-title":"IEEE Transactions on Communications"},{"key":"2828_CR23","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.comcom.2021.05.020","volume":"176","author":"H Wang","year":"2021","unstructured":"Wang, H., Li, X., Jhaveri, R. H., Gadekallu, T. R., Zhu, M., Ahanger, T. A., & Khowaja, S. A. (2021). Sparse Bayesian learning based channel estimation in FBMC\/OQAM industrial IoT networks. Computer Communications, 176, 40\u201345.","journal-title":"Computer Communications"},{"key":"2828_CR24","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1561\/0100000088","volume":"11","author":"A Zappone","year":"2015","unstructured":"Zappone, A., & Jorswieck, E. (2015). Energy efficiency in wireless networks via fractional programming theory. Foundations and Trends in Communications and Information Theory, 11, 185\u2013396.","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"2828_CR25","doi-asserted-by":"crossref","unstructured":"Abramowitz, M., & Stegun, I. A. (1965). Handbook of mathematical functions: With formulas, graphs, and mathematical tables (Vol. 55). Courier Corporation.","DOI":"10.1115\/1.3625776"},{"key":"2828_CR26","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/BF02124750","volume":"5","author":"RM Corless","year":"1996","unstructured":"Corless, R. M., Gonnet, G. H., Hare, D. E., Jeffrey, D. J., & Knuth, D. E. (1996). On the LambertW function. Advances in Computational mathematics, 5, 329\u2013359.","journal-title":"Advances in Computational mathematics"},{"key":"2828_CR27","doi-asserted-by":"crossref","unstructured":"Jhaveri, R. H., Tan, R., Easwaran, A., & Ramani, S.\u00a0V. (2019). Managing industrial communication delays with software-defined networking. In IEEE international conference on embedded and real-time computing systems and applications (pp.\u00a01\u201311).","DOI":"10.1109\/RTCSA.2019.8864557"},{"key":"2828_CR28","unstructured":"Cambini, A., & Martein, L. (2009). Generalized convexity and optimization: Theory and applications. Springer."},{"key":"2828_CR29","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.jmaa.2008.05.074","volume":"346","author":"S Andr\u00e1s","year":"2008","unstructured":"Andr\u00e1s, S., & Baricz, \u00c1. (2008). Properties of the probability density function of the non-central chi-squared distribution. Journal of Mathematical Analysis and Applications, 346, 395\u2013402.","journal-title":"Journal of Mathematical Analysis and Applications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02828-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02828-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02828-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T08:49:52Z","timestamp":1642582192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02828-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,17]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2828"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02828-3","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,17]]},"assertion":[{"value":"25 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}