A Cooperative Deception Strategy for Covert Communication in Presence of a Multi-antenna Adversary Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2209.11171
Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer (Jammer) tries to attract a multi-antenna adversary (Willie) and degrade the adversary's reception ability for the signal from a transmitter (Alice). For this strategy, we formulate an optimization problem to maximize the covert rate when three different types of channel state information (CSI) are available. The total power is optimally allocated between Alice and Jammer subject to Kullback-Leibler (KL) divergence constraint. Different from the existing literature, in our proposed strategy, we also determine the optimal transmission power at the jammer when Alice is silent, while existing works always assume that the jammer's power is fixed. Specifically, we apply the S-procedure to convert infinite constraints into linear-matrix-inequalities (LMI) constraints. When statistical CSI at Willie is available, we convert double integration to single integration using asymptotic approximation and substitution method. In addition, the transmission strategy without jammer deception is studied as a benchmark. Finally, our simulation results show that for the proposed strategy, the covert rate is increased with the number of antennas at Willie. Moreover, compared to the benchmark, our proposed strategy is more robust in face of imperfect CSI.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2209.11171
- https://arxiv.org/pdf/2209.11171
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4296957731
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4296957731Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2209.11171Digital Object Identifier
- Title
-
A Cooperative Deception Strategy for Covert Communication in Presence of a Multi-antenna AdversaryWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-09-08Full publication date if available
- Authors
-
Jiangbo Si, Zizhen Liu, Zan Li, Hang Hu, Lei Guan, Chao Wang, Naofal Al–DhahirList of authors in order
- Landing page
-
https://arxiv.org/abs/2209.11171Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2209.11171Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2209.11171Direct OA link when available
- Concepts
-
Computer science, Covert, Mathematical optimization, Channel state information, Benchmark (surveying), Transmission (telecommunications), Power (physics), Adversary, Throughput, Wireless, Telecommunications, Mathematics, Computer security, Linguistics, Geography, Physics, Philosophy, Quantum mechanics, GeodesyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4296957731 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2209.11171 |
| ids.doi | https://doi.org/10.48550/arxiv.2209.11171 |
| ids.openalex | https://openalex.org/W4296957731 |
| fwci | 0.0 |
| type | preprint |
| title | A Cooperative Deception Strategy for Covert Communication in Presence of a Multi-antenna Adversary |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10964 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9993000030517578 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | Wireless Communication Security Techniques |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9779999852180481 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T10796 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9775000214576721 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Cooperative Communication and Network Coding |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6979477405548096 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2779338814 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5691241025924683 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q5179285 |
| concepts[1].display_name | Covert |
| concepts[2].id | https://openalex.org/C126255220 |
| concepts[2].level | 1 |
| concepts[2].score | 0.561335027217865 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q141495 |
| concepts[2].display_name | Mathematical optimization |
| concepts[3].id | https://openalex.org/C148063708 |
| concepts[3].level | 3 |
| concepts[3].score | 0.54013991355896 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5072511 |
| concepts[3].display_name | Channel state information |
| concepts[4].id | https://openalex.org/C185798385 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5282584428787231 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1161707 |
| concepts[4].display_name | Benchmark (surveying) |
| concepts[5].id | https://openalex.org/C761482 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4916253685951233 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q118093 |
| concepts[5].display_name | Transmission (telecommunications) |
| concepts[6].id | https://openalex.org/C163258240 |
| concepts[6].level | 2 |
| concepts[6].score | 0.41537654399871826 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q25342 |
| concepts[6].display_name | Power (physics) |
| concepts[7].id | https://openalex.org/C41065033 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4139013886451721 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2825412 |
| concepts[7].display_name | Adversary |
| concepts[8].id | https://openalex.org/C157764524 |
| concepts[8].level | 3 |
| concepts[8].score | 0.4125001132488251 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1383412 |
| concepts[8].display_name | Throughput |
| concepts[9].id | https://openalex.org/C555944384 |
| concepts[9].level | 2 |
| concepts[9].score | 0.32896190881729126 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[9].display_name | Wireless |
| concepts[10].id | https://openalex.org/C76155785 |
| concepts[10].level | 1 |
| concepts[10].score | 0.2177170217037201 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[10].display_name | Telecommunications |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.2170889675617218 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C38652104 |
| concepts[12].level | 1 |
| concepts[12].score | 0.1384325623512268 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[12].display_name | Computer security |
| concepts[13].id | https://openalex.org/C41895202 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q8162 |
| concepts[13].display_name | Linguistics |
| concepts[14].id | https://openalex.org/C205649164 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1071 |
| concepts[14].display_name | Geography |
| concepts[15].id | https://openalex.org/C121332964 |
| concepts[15].level | 0 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[15].display_name | Physics |
| concepts[16].id | https://openalex.org/C138885662 |
| concepts[16].level | 0 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q5891 |
| concepts[16].display_name | Philosophy |
| concepts[17].id | https://openalex.org/C62520636 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[17].display_name | Quantum mechanics |
| concepts[18].id | https://openalex.org/C13280743 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q131089 |
| concepts[18].display_name | Geodesy |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6979477405548096 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/covert |
| keywords[1].score | 0.5691241025924683 |
| keywords[1].display_name | Covert |
| keywords[2].id | https://openalex.org/keywords/mathematical-optimization |
| keywords[2].score | 0.561335027217865 |
| keywords[2].display_name | Mathematical optimization |
| keywords[3].id | https://openalex.org/keywords/channel-state-information |
| keywords[3].score | 0.54013991355896 |
| keywords[3].display_name | Channel state information |
| keywords[4].id | https://openalex.org/keywords/benchmark |
| keywords[4].score | 0.5282584428787231 |
| keywords[4].display_name | Benchmark (surveying) |
| keywords[5].id | https://openalex.org/keywords/transmission |
| keywords[5].score | 0.4916253685951233 |
| keywords[5].display_name | Transmission (telecommunications) |
| keywords[6].id | https://openalex.org/keywords/power |
| keywords[6].score | 0.41537654399871826 |
| keywords[6].display_name | Power (physics) |
| keywords[7].id | https://openalex.org/keywords/adversary |
| keywords[7].score | 0.4139013886451721 |
| keywords[7].display_name | Adversary |
| keywords[8].id | https://openalex.org/keywords/throughput |
| keywords[8].score | 0.4125001132488251 |
| keywords[8].display_name | Throughput |
| keywords[9].id | https://openalex.org/keywords/wireless |
| keywords[9].score | 0.32896190881729126 |
| keywords[9].display_name | Wireless |
| keywords[10].id | https://openalex.org/keywords/telecommunications |
| keywords[10].score | 0.2177170217037201 |
| keywords[10].display_name | Telecommunications |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.2170889675617218 |
| keywords[11].display_name | Mathematics |
| keywords[12].id | https://openalex.org/keywords/computer-security |
| keywords[12].score | 0.1384325623512268 |
| keywords[12].display_name | Computer security |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2209.11171 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | public-domain |
| locations[0].pdf_url | https://arxiv.org/pdf/2209.11171 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | https://openalex.org/licenses/public-domain |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2209.11171 |
| locations[1].id | doi:10.48550/arxiv.2209.11171 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | public-domain |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/public-domain |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2209.11171 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5009796023 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7419-4042 |
| authorships[0].author.display_name | Jiangbo Si |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Si, Jiangbo |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5103202637 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-1674-9361 |
| authorships[1].author.display_name | Zizhen Liu |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Liu, Zizhen |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5100697315 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5207-6504 |
| authorships[2].author.display_name | Zan Li |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Li, Zan |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5102010565 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-7010-6471 |
| authorships[3].author.display_name | Hang Hu |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Hu, Hang |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5100948114 |
| authorships[4].author.orcid | https://orcid.org/0009-0006-6293-1232 |
| authorships[4].author.display_name | Lei Guan |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Guan, Lei |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5100407081 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-0187-6453 |
| authorships[5].author.display_name | Chao Wang |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Wang, Chao |
| authorships[5].is_corresponding | False |
| authorships[6].author.id | https://openalex.org/A5081018704 |
| authorships[6].author.orcid | https://orcid.org/0000-0001-9894-8382 |
| authorships[6].author.display_name | Naofal Al–Dhahir |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Al-Dhahir, Naofal |
| authorships[6].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2209.11171 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Cooperative Deception Strategy for Covert Communication in Presence of a Multi-antenna Adversary |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10964 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9993000030517578 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | Wireless Communication Security Techniques |
| related_works | https://openalex.org/W2523525694, https://openalex.org/W2378211422, https://openalex.org/W2998642566, https://openalex.org/W2392682561, https://openalex.org/W57793151, https://openalex.org/W2804882289, https://openalex.org/W2727423897, https://openalex.org/W2497612952, https://openalex.org/W4247948804, https://openalex.org/W2392053643 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2209.11171 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | public-domain |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2209.11171 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | https://openalex.org/licenses/public-domain |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2209.11171 |
| primary_location.id | pmh:oai:arXiv.org:2209.11171 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | public-domain |
| primary_location.pdf_url | https://arxiv.org/pdf/2209.11171 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | https://openalex.org/licenses/public-domain |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2209.11171 |
| publication_date | 2022-09-08 |
| publication_year | 2022 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 5, 10, 17, 31, 152 |
| abstract_inverted_index.In | 141 |
| abstract_inverted_index.an | 39 |
| abstract_inverted_index.as | 151 |
| abstract_inverted_index.at | 90, 124, 174 |
| abstract_inverted_index.in | 79, 187 |
| abstract_inverted_index.is | 2, 61, 95, 106, 126, 149, 167, 184 |
| abstract_inverted_index.of | 51, 172, 189 |
| abstract_inverted_index.to | 15, 42, 69, 113, 132, 178 |
| abstract_inverted_index.we | 37, 83, 109, 128 |
| abstract_inverted_index.CSI | 123 |
| abstract_inverted_index.For | 34 |
| abstract_inverted_index.The | 58 |
| abstract_inverted_index.and | 21, 66, 138 |
| abstract_inverted_index.are | 56 |
| abstract_inverted_index.for | 4, 27, 160 |
| abstract_inverted_index.our | 80, 155, 181 |
| abstract_inverted_index.the | 23, 28, 44, 76, 86, 91, 103, 111, 143, 161, 164, 170, 179 |
| abstract_inverted_index.(KL) | 71 |
| abstract_inverted_index.CSI. | 191 |
| abstract_inverted_index.When | 121 |
| abstract_inverted_index.also | 84 |
| abstract_inverted_index.face | 188 |
| abstract_inverted_index.from | 30, 75 |
| abstract_inverted_index.into | 117 |
| abstract_inverted_index.more | 185 |
| abstract_inverted_index.rate | 46, 166 |
| abstract_inverted_index.show | 158 |
| abstract_inverted_index.that | 102, 159 |
| abstract_inverted_index.this | 35 |
| abstract_inverted_index.when | 47, 93 |
| abstract_inverted_index.with | 169 |
| abstract_inverted_index.(CSI) | 55 |
| abstract_inverted_index.(LMI) | 119 |
| abstract_inverted_index.Alice | 65, 94 |
| abstract_inverted_index.apply | 110 |
| abstract_inverted_index.power | 60, 89, 105 |
| abstract_inverted_index.state | 53 |
| abstract_inverted_index.three | 48 |
| abstract_inverted_index.total | 59 |
| abstract_inverted_index.tries | 14 |
| abstract_inverted_index.types | 50 |
| abstract_inverted_index.using | 135 |
| abstract_inverted_index.where | 9 |
| abstract_inverted_index.while | 97 |
| abstract_inverted_index.works | 99 |
| abstract_inverted_index.Covert | 0 |
| abstract_inverted_index.Jammer | 67 |
| abstract_inverted_index.Willie | 125 |
| abstract_inverted_index.always | 100 |
| abstract_inverted_index.assume | 101 |
| abstract_inverted_index.covert | 45, 165 |
| abstract_inverted_index.double | 130 |
| abstract_inverted_index.fixed. | 107 |
| abstract_inverted_index.jammer | 12, 92, 147 |
| abstract_inverted_index.number | 171 |
| abstract_inverted_index.robust | 186 |
| abstract_inverted_index.signal | 29 |
| abstract_inverted_index.single | 133 |
| abstract_inverted_index.Willie. | 175 |
| abstract_inverted_index.ability | 26 |
| abstract_inverted_index.attract | 16 |
| abstract_inverted_index.between | 64 |
| abstract_inverted_index.channel | 52 |
| abstract_inverted_index.convert | 114, 129 |
| abstract_inverted_index.degrade | 22 |
| abstract_inverted_index.method. | 140 |
| abstract_inverted_index.optimal | 87 |
| abstract_inverted_index.problem | 41 |
| abstract_inverted_index.results | 157 |
| abstract_inverted_index.silent, | 96 |
| abstract_inverted_index.studied | 150 |
| abstract_inverted_index.subject | 68 |
| abstract_inverted_index.without | 146 |
| abstract_inverted_index.(Alice). | 33 |
| abstract_inverted_index.(Jammer) | 13 |
| abstract_inverted_index.(Willie) | 20 |
| abstract_inverted_index.Finally, | 154 |
| abstract_inverted_index.antennas | 173 |
| abstract_inverted_index.compared | 177 |
| abstract_inverted_index.existing | 77, 98 |
| abstract_inverted_index.infinite | 115 |
| abstract_inverted_index.jammer's | 104 |
| abstract_inverted_index.maximize | 43 |
| abstract_inverted_index.proposed | 81, 162, 182 |
| abstract_inverted_index.strategy | 145, 183 |
| abstract_inverted_index.Different | 74 |
| abstract_inverted_index.Moreover, | 176 |
| abstract_inverted_index.addition, | 142 |
| abstract_inverted_index.adversary | 19 |
| abstract_inverted_index.allocated | 63 |
| abstract_inverted_index.deception | 7, 148 |
| abstract_inverted_index.determine | 85 |
| abstract_inverted_index.different | 49 |
| abstract_inverted_index.formulate | 38 |
| abstract_inverted_index.imperfect | 190 |
| abstract_inverted_index.increased | 168 |
| abstract_inverted_index.optimally | 62 |
| abstract_inverted_index.reception | 25 |
| abstract_inverted_index.strategy, | 8, 36, 82, 163 |
| abstract_inverted_index.asymptotic | 136 |
| abstract_inverted_index.available, | 127 |
| abstract_inverted_index.available. | 57 |
| abstract_inverted_index.benchmark, | 180 |
| abstract_inverted_index.benchmark. | 153 |
| abstract_inverted_index.divergence | 72 |
| abstract_inverted_index.simulation | 156 |
| abstract_inverted_index.S-procedure | 112 |
| abstract_inverted_index.adversary's | 24 |
| abstract_inverted_index.constraint. | 73 |
| abstract_inverted_index.constraints | 116 |
| abstract_inverted_index.cooperative | 6, 11 |
| abstract_inverted_index.information | 54 |
| abstract_inverted_index.integration | 131, 134 |
| abstract_inverted_index.literature, | 78 |
| abstract_inverted_index.statistical | 122 |
| abstract_inverted_index.transmitter | 32 |
| abstract_inverted_index.constraints. | 120 |
| abstract_inverted_index.investigated | 3 |
| abstract_inverted_index.optimization | 40 |
| abstract_inverted_index.substitution | 139 |
| abstract_inverted_index.transmission | 1, 88, 144 |
| abstract_inverted_index.Specifically, | 108 |
| abstract_inverted_index.approximation | 137 |
| abstract_inverted_index.multi-antenna | 18 |
| abstract_inverted_index.Kullback-Leibler | 70 |
| abstract_inverted_index.linear-matrix-inequalities | 118 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 7 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6499999761581421 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile |