Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (6): 75-83.doi: 10.19665/j.issn1001-2400.20230603
• Special Issue on Elctromagnetic Space Security • Previous Articles Next Articles
LIAO Xiaomin1(),HAN Shuangli2(),ZHU Xuan1(),LIN Chushan1(),WANG Haipeng1()
Received:
2023-03-10
Online:
2023-12-20
Published:
2024-01-22
CLC Number:
LIAO Xiaomin, HAN Shuangli, ZHU Xuan, LIN Chushan, WANG Haipeng. Resource optimization algorithm for unmanned aerial vehicle jammer assisted cognitive covert communications[J].Journal of Xidian University, 2023, 50(6): 75-83.
[1] |
LI M, TAO X, WU H. Joint Trajectory and Resource Optimization for Covert Communication in UAV-Enabled Relaying Systems[J]. IEEE Transactions on Vehicular Technology, 2023, 72(4):5518-5523.
doi: 10.1109/TVT.2022.3225508 |
[2] |
BASH B A, GOECKEL D, TOWSLEY D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9):1921-1930.
doi: 10.1109/JSAC.2013.130923 |
[3] | CHE P H, BAKSHI M, JAGGI S. Reliable Deniable Communication:Hiding Messages in Noise[C]// Proceedings of the 2013 IEEE International Symposium on Information Theory.Piscataway:IEEE, 2013:2945-2949. |
[4] | WANG L, WORNELL G W, ZHENG L. Limits of Low Probability of Detection Communication over a Discrete Memoryless Channel[C]// Proceedings of the 2015 IEEE International Symposium on Information Theory(ISIT).Piscataway:IEEE, 2015:2525-2529. |
[5] |
LU X, YAN S, YANG W. Covert Communication with Time Uncertainty in Time-Critical Wireless Networks[J]. IEEE Transactions on Wireless Communications, 2023, 22(2):1116-1129.
doi: 10.1109/TWC.2022.3201872 |
[6] |
HE R, LI G, WANG H, et al. Adaptive Power Control for Cooperative Covert Communication with Partial Channel State Information[J]. IEEE Wireless Communications Letters, 2022, 11(7):1428-1432.
doi: 10.1109/LWC.2022.3172683 |
[7] |
LU X, HUANG Y, YAN S, et al. Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming[J]. IEEE Wireless Communications Letters, 2023, 12(5):932-936.
doi: 10.1109/LWC.2023.3253075 |
[8] | 胡锦松, 吴林梅, 束锋, 等. 无人机中继协助的有限码长隐蔽通信[J]. 电子与信息学报, 2022, 44(3):1006-1013. |
HU Jinsong, WU Linmei, SHU Feng, et al. UAV-Relay Assisted Covert Communication with Finite Block-Length[J]. Journal of Electronics & Information Technology, 2022, 44(3):1006-1013. | |
[9] |
LV L, WU Q, LI Z, et al. Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems:Design,Analysis,and Optimization[J]. IEEE Transactions on Wireless Communications, 2022, 21(3):1735-1750.
doi: 10.1109/TWC.2021.3106346 |
[10] |
ZHENG T X, YANG Z T, WANG C, et al. Wireless Covert Communications Aided by Distributed Cooperative Jammingover Slow Fading Channels[J]. IEEE Transactions on Wireless Communications, 2021, 20(11):7026-7039.
doi: 10.1109/TWC.2021.3080382 |
[11] | 杨欣, 毛雅淇, 王伶. 无人机辅助通信的密集无线网络MAC协议[J]. 西安电子科技大学学报, 2022, 49(3):10-20. |
YANG Xin, MAO Yaqi, WANG Ling. MAC Protocol for the Dense Wireless Network of UAV Assisted Communication[J]. Journal of Xidian University, 2022, 49(3):10-20. | |
[12] |
RAO H M, XIAO S, YAN S H, et al. Optimal Geometric Solutions to UAV-Enabled Covert Communications in Line-of-Sight Scenarios[J]. IEEE Transactions on Wireless Communications, 2022, 21(12):10633-10647.
doi: 10.1109/TWC.2022.3185492 |
[13] | 彭旭. 基于全双工无人机的隐蔽无线通信技术研究[D]. 阜阳: 阜阳师范大学, 2022. |
[14] |
MAMAGHANI M T, HONG Y. Aerial Intelligent Reflecting Surface-Enabled Terahertz Covert Communications in Beyond-5G Internet of Things[J]. IEEE Internet of Things Journal, 2022, 9(19):19012-19033.
doi: 10.1109/JIOT.2022.3163396 |
[15] |
WANG Y, YAN S, ZHOU X, et al. Covert Communication with Energy Replenishment Constraints in UAV Networks[J]. IEEE Transactions on Vehicular Technology, 2022, 71(9):10143-10148.
doi: 10.1109/TVT.2022.3178021 |
[16] |
DU H, NIYATO D, XIE Y, et al. Performance Analysis and Optimization for Jammer-Aided Multiantenna UAV Covert Communication[J]. IEEE Journal on Selected Areas in Communications, 2022, 40(10):2962-2979.
doi: 10.1109/JSAC.2022.3196131 |
[17] |
WANG C, CHEN X, AN J, et al. Covert Communication Assisted by UAV-IRS[J]. IEEE Transactions on Communications, 2023, 71(1):357-369.
doi: 10.1109/TCOMM.2022.3220903 |
[18] |
LI Z, LIAO X M, SHI J, et al. MD-GAN Based UAV Trajectory and Power Optimization for Cognitive Covert Communications[J]. IEEE Internet of Things Journal, 2022, 9(12):10187-10199.
doi: 10.1109/JIOT.2021.3122014 |
[19] |
CHEN X, ZHANG N, TANG J, et al. UAV-Aided Covert Communication with a Multi-Antenna Jammer[J]. IEEE Transactions on Vehicular Technology, 2021, 70(11):11619-11631.
doi: 10.1109/TVT.2021.3112121 |
[20] |
JIANG X, YANG Z, ZHAO N, et al. Resource Allocation and Trajectory Optimization for UAV-Enabled Multi-User Covert Communications[J]. IEEE Transactions on Vehicular Technology, 2021, 70(2):1989-1994.
doi: 10.1109/TVT.2021.3053936 |
[21] | 段正祥, 杨欣, 张兆林, 等. 加权分数傅里叶辅助的上行NOMA隐蔽通信[J]. 西安电子科技大学学报, 2023, 50(2):54-63. |
DUAN Zhengxiang, YANG Xin, ZHANG Zhaolin, et al. Covert Communication in Uplink NOMA Systems with Weighted Fractional Fourier Transform[J]. Journal of Xidian University, 2023, 50(2):54-63. | |
[22] |
LIAO X M, SI J B, SHI J. Generative Adversarial Network Assisted Power Allocation for Cooperative Cognitive Covert Communication System[J]. IEEE Communications Letters, 2020, 24(7):1463-1467.
doi: 10.1109/COML.4234 |
[23] | HAGAN M T, DEMUTH H B, BEALE M H, et al. Neural Network Design, 2nd Edition[M]. Oklahoma: Martin Hagan, 2014:1-802. |
[24] | YOSINSKI J, CLUNE J, BENGIO Y, et al. How Transferable Are Features in Deep Neural Networks?[C]// Proceedings of the 27th International Conference on Neural Information Processing Systems. New York: ACM, 2014:3320-3328. |
[25] |
GOODFELLOW I, POUGET-ABADIE J, MIRZA M, et al. Generative Adversarial Networks[J]. Communications of the ACM, 2020, 63(11):139-144.
doi: 10.1145/3422622 |
[26] |
ZHOU Y, YEOH P L, CHEN H, et al. Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location[J]. IEEE Transactions on Vehicular Technology, 2018, 67(11):11280-11284.
doi: 10.1109/TVT.2018.2868944 |
[1] | DU Mingyang, DU Meng, PAN Jifei, BI Daping. Generative adversarial model for radar intra-pulse signal denoising and recognition [J]. Journal of Xidian University, 2023, 50(6): 133-147. |
[2] | XU Mengfan,LI Xinghua. Privacy-preserving federated learning with non-transfer learning [J]. Journal of Xidian University, 2023, 50(4): 89-99. |
[3] | WU Yihao,QI Yanli,ZHOU Yiqing,CAI Qing,LIU Ling,SHI Jinglin. UAVs trajectory planning and power allocation based on the convergence of communication,sensing and computing [J]. Journal of Xidian University, 2023, 50(3): 61-74. |
[4] | CAO Xincheng, YAO Bin, HE Wangpeng, CHEN Binqiang, QING Tao. Edge-cloud collaborative transfer of process knowledge for digital manufacturing monitoring [J]. Journal of Xidian University, 2022, 49(6): 152-163. |
[5] | XU Zimeng,WANG Bowen,YUN Xiao,WANG Xiaolin. Stable relay selection method under an uncertain preference ordinal for UAV in post-disaster [J]. Journal of Xidian University, 2022, 49(6): 32-41. |
[6] | CHANG Jiantao,LIU Yao,KONG Xianguang,LI Xinwei,CHEN Qiang,SU Xin. Cutting force prediction under the variable machining condition incorporating workpiece geometric features [J]. Journal of Xidian University, 2022, 49(5): 154-165. |
[7] | TAO Yang,YANG Na,GUO Tan. Discrimination and structure preserved cross-domain subspace learning for unsupervised domain adaption [J]. Journal of Xidian University, 2022, 49(4): 90-99. |
[8] | YANG Xin,MAO Yaqi,WANG Ling. MAC protocol for the dense wireless network of UAV assisted communication [J]. Journal of Xidian University, 2022, 49(3): 10-20. |
[9] | BIAN Zhi’ang,LU Hu,SHI Haodong. Research on the drones single station opportunistic signal positioning method aided by motion parameters [J]. Journal of Xidian University, 2022, 49(3): 101-110. |
[10] | DU Lixuhong,CHEN Jie,YANG Xiaoxue. Targeted password guessing scheme combined with GAN [J]. Journal of Xidian University, 2022, 49(3): 129-136. |
[11] | GU Zhaojun,LIU Tingting,SUI He. Latent feature reconstruction generative GAN model for ICS anomaly detection [J]. Journal of Xidian University, 2022, 49(2): 173-181. |
[12] | GAO Jie,HUO Zhiyong. Algorithmfor image inpainting in generative adversarial networks based on gated convolution [J]. Journal of Xidian University, 2022, 49(1): 216-224. |
[13] | TIAN Lin,SU Zhijie,FENG Wanmei,CHEN Zhen,TANG Jie,ZHOU Encheng. Trajectory and resource allocation for multi-UAV enabled swipt systems [J]. Journal of Xidian University, 2021, 48(6): 115-122. |
[14] | YU Haoyang,YIN Liang,LI Shufang,LV Shun. Recognition algorithm for the little sample radar modulation signal based on the generative adversarial network [J]. Journal of Xidian University, 2021, 48(6): 96-104. |
[15] | SUN Yanjing,WEI Li,ZHANG Nianlong,YUN Xiao,DONG Kaiwen,GE Min,CHENG Xiaozhou,HOU Xiaofeng. Person re-identification method combining the DD-GAN and Global feature in a coal mine [J]. Journal of Xidian University, 2021, 48(5): 201-211. |
|