{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:34:33Z","timestamp":1772908473030,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11432-019-2919-5","type":"journal-article","created":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T05:02:22Z","timestamp":1629435742000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Covert communication with beamforming over MISO channels in the finite blocklength regime"],"prefix":"10.1007","volume":"64","author":[{"given":"Xinchun","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"2919_CR1","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1109\/TIT.2009.2025549","volume":"55","author":"S Shafiee","year":"2009","unstructured":"Shafiee S, Liu N, Ulukus S. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Trans Inform Theor, 2009, 55: 4033\u20134039","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR2","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theor, 2010, 56: 3088\u20133104","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR3","doi-asserted-by":"publisher","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell G W. Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans Inform Theor, 2010, 56: 5515\u20135532","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR4","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1007\/s11432-010-4003-z","volume":"53","author":"L Zhang","year":"2010","unstructured":"Zhang L, Wu G, Li S Q. Capacity bounds of transmit beamforming over MISO time-varying channels with imperfect feedback. Sci China Inf Sci, 2010, 53: 1417\u20131430","journal-title":"Sci China Inf Sci"},{"key":"2919_CR5","doi-asserted-by":"publisher","first-page":"2547","DOI":"10.1109\/TIT.2008.2011448","volume":"55","author":"T Liu","year":"2009","unstructured":"Liu T, Shamai S. A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans Inform Theor, 2009, 55: 2547\u20132553","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR6","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TIFS.2011.2181946","volume":"7","author":"S Gerbracht","year":"2012","unstructured":"Gerbracht S, Scheunert C, Jorswieck E A. Secrecy outage in MISO systems with partial channel information. IEEE Trans Inform Forensic Secur, 2012, 7: 704\u2013716","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2919_CR7","doi-asserted-by":"crossref","unstructured":"Rezki Z, Khisti A, Alouini M S. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation. In: Proceedings of IEEE Global Communications Conference (GLOBECOM\u20192014), Austin, 2014. 1602\u20131607","DOI":"10.1109\/GLOCOM.2014.7037037"},{"key":"2919_CR8","doi-asserted-by":"publisher","first-page":"4470","DOI":"10.1109\/TWC.2016.2542128","volume":"15","author":"X Zhou","year":"2016","unstructured":"Zhou X, Rezki Z, Alomair B, et al. Achievable rates of secure transmission in Gaussian MISO channel with imperfect main channel estimation. IEEE Trans Wirel Commun, 2016, 15: 4470\u20134485","journal-title":"IEEE Trans Wirel Commun"},{"key":"2919_CR9","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/JSAC.2013.130923","volume":"31","author":"B A Bash","year":"2013","unstructured":"Bash B A, Goeckel D, Towsley D. Limits of reliable communication with low probability of detection on AWGN channels. IEEE J Sel Areas Commun, 2013, 31: 1921\u20131930","journal-title":"IEEE J Sel Areas Commun"},{"key":"2919_CR10","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1109\/TIT.2016.2548471","volume":"62","author":"L Wang","year":"2016","unstructured":"Wang L, Wornell G W, Zheng L. Fundamental limits of communication with low probability of detection. IEEE Trans Inform Theor, 2016, 62: 3493\u20133503","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR11","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/TIT.2016.2530089","volume":"62","author":"M R Bloch","year":"2016","unstructured":"Bloch M R. Covert communication over noisy channels: a resolvability perspective. IEEE Trans Inform Theor, 2016, 62: 2334\u20132354","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR12","doi-asserted-by":"crossref","unstructured":"Abdelaziz A, Koksal C E. Fundamental limits of covert communication over MIMO AWGN channel. In: Proceedings of 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, 2017. 1\u20139","DOI":"10.1109\/CNS.2017.8228657"},{"key":"2919_CR13","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.ins.2016.12.024","volume":"47","author":"K Wang","year":"2017","unstructured":"Wang K, Gong Y, Zhou G M, et al. A novel covert communication system based on symmetric \u03b1-stable distribution (in Chinese). Sci Sin Inform, 2017, 47: 374\u2013384","journal-title":"Sci Sin Inform"},{"key":"2919_CR14","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1360\/112010-1345","volume":"43","author":"Y Zhu","year":"2013","unstructured":"Zhu Y, Yu M Y, Hu H X, et al. Efficient construction of provably secure steganography under ordinary covert channels (in Chinese). Sci Sin Inform, 2013, 43: 657\u2013669","journal-title":"Sci Sin Inform"},{"key":"2919_CR15","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1109\/JSTSP.2015.2421477","volume":"9","author":"S Lee","year":"2015","unstructured":"Lee S, Baxley R J, Weitnauer M A, et al. Achieving undetectable communication. IEEE J Sel Top Signal Process, 2015, 9: 1195\u20131205","journal-title":"IEEE J Sel Top Signal Process"},{"key":"2919_CR16","doi-asserted-by":"crossref","unstructured":"Che P H, Bakshi M, Jaggi S. Reliable deniable communication: hiding messages in noise. In: Proceedings of IEEE International Symposium on Information Theory (ISIT2013), Istanbul, 2013. 2945\u20132949","DOI":"10.1109\/ISIT.2013.6620765"},{"key":"2919_CR17","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/LCOMM.2016.2647716","volume":"21","author":"B He","year":"2017","unstructured":"He B, Yan S H, Zhou X Y, et al. On covert communication with noise uncertainty. IEEE Commun Lett, 2017, 21: 941\u2013944","journal-title":"IEEE Commun Lett"},{"key":"2919_CR18","doi-asserted-by":"crossref","unstructured":"Shahzad K, Zhou X, Yan S. Covert communication in fading channels under channel uncertainty. In: Proceedings of IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, 2017. 1\u20135","DOI":"10.1109\/VTCSpring.2017.8108525"},{"key":"2919_CR19","doi-asserted-by":"crossref","unstructured":"Sobers T V, Bash B A, Goeckel D, et al. Covert communication with the help of an uninformed jammer achieves positive rat. In: Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, 2015. 625\u2013629","DOI":"10.1109\/ACSSC.2015.7421206"},{"key":"2919_CR20","doi-asserted-by":"publisher","first-page":"7252","DOI":"10.1109\/TWC.2018.2865946","volume":"17","author":"R Soltani","year":"2018","unstructured":"Soltani R, Goeckel D, Towsley D, et al. Covert wireless communication with artificial noise generation. IEEE Trans Wirel Commun, 2018, 17: 7252\u20137267","journal-title":"IEEE Trans Wirel Commun"},{"key":"2919_CR21","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1109\/TWC.2011.011811.100356","volume":"10","author":"J Li","year":"2011","unstructured":"Li J, Petropulu A P. On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans Wirel Commun, 2011, 10: 1176\u20131187","journal-title":"IEEE Trans Wirel Commun"},{"key":"2919_CR22","doi-asserted-by":"crossref","unstructured":"Tahmasbi M, Bloch M R. Second-order asymptotics of covert communications over noisy channels. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), Barcelona, 2016. 2224\u20132228","DOI":"10.1109\/ISIT.2016.7541694"},{"key":"2919_CR23","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TIT.2018.2878526","volume":"65","author":"M Tahmasbi","year":"2019","unstructured":"Tahmasbi M, Bloch M R. First- and second-order asymptotics in covert communication. IEEE Trans Inform Theor, 2019, 65: 2190\u20132212","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR24","doi-asserted-by":"crossref","unstructured":"Tang H, Wang J, Zheng Y R. Covert communication with extremely low power under finite block length over slow fading. In: Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, 2018. 657\u2013661","DOI":"10.1109\/INFCOMW.2018.8406961"},{"key":"2919_CR25","doi-asserted-by":"crossref","unstructured":"Yu X, Wei S, Luo Y. One-shot achievability and converse bounds of Gaussian random coding in AWGN channels under covert constraint. In: Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, 2019","DOI":"10.1109\/ALLERTON.2019.8919845"},{"key":"2919_CR26","doi-asserted-by":"publisher","unstructured":"Yu X, Wei S, Luo Y. Finite blocklength analysis of Gaussian random coding in AWGN channels under covert constraints. IEEE Transactions on Information Forensics & Security, 2019. doi: https:\/\/doi.org\/10.1109\/TIFS.2020.3032292","DOI":"10.1109\/TIFS.2020.3032292"},{"key":"2919_CR27","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1109\/TIT.2010.2043769","volume":"56","author":"Y Polyanskiy","year":"2010","unstructured":"Polyanskiy Y, Poor H V, Verdu S. Channel coding rate in the finite blocklength regime. IEEE Trans Inform Theor, 2010, 56: 2307\u20132359","journal-title":"IEEE Trans Inform Theor"},{"key":"2919_CR28","doi-asserted-by":"publisher","first-page":"3542","DOI":"10.1109\/TWC.2019.2915305","volume":"18","author":"S H Yan","year":"2019","unstructured":"Yan S H, Cong Y R, Hanly S V, et al. Gaussian signalling for covert communications. IEEE Trans Wirel Commun, 2019, 18: 3542\u20133553","journal-title":"IEEE Trans Wirel Commun"},{"key":"2919_CR29","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1002\/ett.4460100604","volume":"10","author":"I E Telatar","year":"1999","unstructured":"Telatar I E. Capacity of multi-antenna Gaussian channels. Eur Trans Telecommun, 1999, 10: 585\u2013595","journal-title":"Eur Trans Telecommun"},{"key":"2919_CR30","doi-asserted-by":"crossref","unstructured":"Yu X, Wei S, Luo Y. Finite blocklength analysis of Gaussian random coding in AWGN channels under covert constraints. 2019. ArXiv: 1909.11324","DOI":"10.1109\/ALLERTON.2019.8919845"},{"key":"2919_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of Wireless Communication","author":"D Tse","year":"2005","unstructured":"Tse D, Viswanath P. Fundamentals of Wireless Communication. Cambridge: Cambridge University Press, 2005"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-2919-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-019-2919-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-2919-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T20:18:56Z","timestamp":1666297136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-019-2919-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["2919"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-2919-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"3 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"192303"}}