T Zhang, B Li, Y Zhu, T Han, Q Wu - Computer Communications, 2023 - Elsevier
Traditional network covert channels have become insecure due to the continuous improvement of traffic analysis techniques. As an emerging technology combined with …
Semantic communication is an important component in the next generation of wireless networking. Enabled by this novel paradigm, the conventional Internet-of-Things (IoT) is …
Z Wang, L Zhang, R Guo, G Wang, J Qiu, S Su, Y Liu… - Computer Networks, 2023 - Elsevier
Blockchain, as a decentralized database, provides natural anonymity and tamper- resistance, safeguarding the identity of both parties in covert communication and preventing …
AA Pekerti, A Sasongko, A Indrayanto - IEEE Access, 2024 - ieeexplore.ieee.org
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in this field can benefit from a review paper with broader evaluation parameters than existing …
W Wen, H Huang, S Qi, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of internet applications, privacy protection of secret messages in covert communication has become increasingly important. To address the issue of attacks …
Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the …
I Shakeel, J Hilliard, W Zhang, M Rice - Sensors, 2023 - mdpi.com
Covert communication techniques play a crucial role in military and commercial applications to maintain the privacy and security of wireless transmissions from prying eyes. These …