{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:08:40Z","timestamp":1741838920134,"version":"3.38.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,8]]},"DOI":"10.1109\/globecom52923.2024.10901523","type":"proceedings-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:30:35Z","timestamp":1741714235000},"page":"1341-1346","source":"Crossref","is-referenced-by-count":1,"title":["Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans"],"prefix":"10.1109","author":[{"given":"Serhat","family":"Bakirtas","sequence":"first","affiliation":[{"name":"New York University,Tandon School of Engineering,Brooklyn,NY"}]},{"given":"Matthieu R.","family":"Bloch","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,School of Electrical and Computer Engineering,Atlanta,GA"}]},{"given":"Elza","family":"Erkip","sequence":"additional","affiliation":[{"name":"New York University,Tandon School of Engineering,Brooklyn,NY"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130923"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2020.3037659"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900906"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2990792"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2530089"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2548471"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818650"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970786"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2720736"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2421477"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3135291"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921680"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1109\/GLOBECOM52923.2024.10901523","article-title":"Pilot-attacks can enable positive-rate covert communications of wireless hardware Trojans","author":"Bakirtas","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"volume-title":"Introduction to Algorithms","year":"2022","author":"Cormen","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809594"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.771147"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/18.737514"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761935"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2421477"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2720736"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1015957395"}],"event":{"name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","start":{"date-parts":[[2024,12,8]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2024,12,12]]}},"container-title":["GLOBECOM 2024 - 2024 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10900933\/10900934\/10901523.pdf?arnumber=10901523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T05:53:45Z","timestamp":1741758825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10901523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/globecom52923.2024.10901523","relation":{},"subject":[],"published":{"date-parts":[[2024,12,8]]}}}