{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:36:00Z","timestamp":1764174960392,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/ieeecopyrightform.pdf"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/ieeecopyrightform.pdf"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1910859"],"award-info":[{"award-number":["1910859"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/jsait.2021.3056640","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T06:30:36Z","timestamp":1612333836000},"page":"352-365","source":"Crossref","is-referenced-by-count":13,"title":["On Covert Quantum Sensing and the Benefits of Entanglement"],"prefix":"10.1109","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2985-497X","authenticated-orcid":false,"given":"Mehrdad","family":"Tahmasbi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-9050","authenticated-orcid":false,"given":"Matthieu R.","family":"Bloch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/9781316809976"},{"journal-title":"On Differentiability of Symmetric Matrix Valued Functions","year":"2002","author":"shapiro","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/18.761271"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007122"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062321"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335648"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2459652"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2261279"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOS1144"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2261188"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1054959"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706205"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2023726"},{"key":"ref28","first-page":"840","article-title":"Active covert sensing","author":"tahmasbi","year":"2020","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2530089"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.87.177901"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130923"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2878526"},{"journal-title":"A framework for covert and secret key expansion over quantum channels","year":"2018","author":"tahmasbi","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2548471"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2016.7606857"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541662"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874903"},{"journal-title":"Covert channel capacity","year":"2020","author":"gagatsos","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174381"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283840"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933967"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2616323"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-019-0162-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/9781316848142"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1214\/16-AOS1436"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1214\/08-AOS593"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8700143\/9380089\/9344627-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8700143\/9380089\/09344627.pdf?arnumber=9344627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T20:15:38Z","timestamp":1623701738000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9344627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsait.2021.3056640","relation":{},"ISSN":["2641-8770"],"issn-type":[{"type":"electronic","value":"2641-8770"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}