Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Profiles
My profile
My library
Shihao Yan
Senior Lecturer, Edith Cowan University
Verified email at ecu.edu.au
Cited by 6846
Wireless Communication
Covert Communication
Communication Security
Key Generation
Wireless Authentication
Tanja Zseby
TU Wien
Verified email at tuwien.ac.at
Cited by 3630
Internet security
attack detection
anomaly detection
covert communication
smart grid
Wanming Hao
Zhengzhou University
Verified email at zzu.edu.cn
Cited by 3489
THz
ISAC
RIS
covert communication
PLS
Shaohan FENG
Institute for Infocomm Research (I2R), A*STAR
Verified email at i2r.a-star.edu.sg
Cited by 1811
Wireless Communications
Wireless Security
Covert Communication
Computer Networks
Internet of Things
Adel El-Atawy
Amazon (and ex-Google)
Verified email at acm.org
Cited by 1137
Network Security
Information Theory
Model Checking
Covert Communication
yuwen qian
Nanjing university of science and technology
Verified email at njust.edu.cn
Cited by 1007
Internet of things
covert communication
covert channel
network slices
Xinying Kilpi-Chen
Researcher, University of Jyvaskyla
Verified email at jyu.fi
Cited by 936
Covert communication
UAV
Wireless communications
Physical layer security
moslem forouzesh
Amol University of Special Modern Technologies
Verified email at ausmt.ac.ir
Cited by 321
Physical Layer Security
Covert Communication
Wireless Networks
Jongmin Ahn
ADD
Cited by 285
underwater communication
sonar
wireless communication
covert communication
YUAN, Jian
The 51st Research Institute of CETC
Verified email at yuanjian.me
Cited by 265
Signal Processing
Data Processing
Steganography
Steganalysis
Covert Communication
1 - 10
Privacy
Terms
Help
About Scholar
Search help