{"id":"https://openalex.org/W3048360002","doi":"https://doi.org/10.1109/cns48642.2020.9162192","title":"Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels","display_name":"Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3048360002","doi":"https://doi.org/10.1109/cns48642.2020.9162192","mag":"3048360002"},"language":"en","primary_location":{"id":"doi:10.1109/cns48642.2020.9162192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162192","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012426658","display_name":"Ahmed Bendary","orcid":"https://orcid.org/0000-0002-6413-3692"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed Bendary","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030047891","display_name":"C. Emre Koksal","orcid":"https://orcid.org/0000-0001-8463-4446"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"C. Emre Koksal","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012426658"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":0.1027,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42162329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/additive-white-gaussian-noise","display_name":"Additive white Gaussian noise","score":0.8109670877456665},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.6395942568778992},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5558314919471741},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5463746190071106},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42270851135253906},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4138070046901703},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3085899353027344},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.20455968379974365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11853915452957153}],"concepts":[{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.8109670877456665},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.6395942568778992},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5558314919471741},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5463746190071106},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42270851135253906},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4138070046901703},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3085899353027344},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.20455968379974365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11853915452957153},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns48642.2020.9162192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns48642.2020.9162192","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W581334404","https://openalex.org/W636358068","https://openalex.org/W1897081267","https://openalex.org/W1975181717","https://openalex.org/W1997834106","https://openalex.org/W2039836978","https://openalex.org/W2052267390","https://openalex.org/W2057415673","https://openalex.org/W2072563372","https://openalex.org/W2079364662","https://openalex.org/W2098346479","https://openalex.org/W2145577744","https://openalex.org/W2747389502","https://openalex.org/W2810713150","https://openalex.org/W2963113656","https://openalex.org/W2963513299","https://openalex.org/W2963645489","https://openalex.org/W2963991642","https://openalex.org/W2982533134","https://openalex.org/W3102020296","https://openalex.org/W3103270291","https://openalex.org/W3104101844","https://openalex.org/W3196620053","https://openalex.org/W4293702014","https://openalex.org/W6769779934"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2523525694","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4389151493","https://openalex.org/W2946164306"],"abstract_inverted_index":{"Covert":[0],"communication,":[1],"i.e.,":[2],"communication":[3,78],"with":[4,43,109],"a":[5,13,115],"low":[6],"probability":[7],"of":[8,16,28,65,69,91,94,103],"detection":[9],"(LPD),":[10],"has":[11],"attracted":[12],"huge":[14],"body":[15],"work.":[17],"Recent":[18],"studies":[19],"have":[20],"concluded":[21],"that":[22,50],"the":[23,29,34,44,46,63,66,70,87,92,98,110,119],"maximal":[24,99],"covert":[25,77,95,100],"coding":[26,101],"rate":[27,102],"discrete":[30],"memoryless":[31],"channels":[32,40,59,106],"and":[33,55,124],"additive":[35],"white":[36],"Gaussian":[37],"noise":[38],"(AWGN)":[39],"is":[41,60,107],"diminishing":[42,108],"blocklength:":[45],"maximum":[47],"information":[48],"nats":[49,96],"can":[51],"be":[52],"transmitted":[53],"covertly":[54],"reliably":[56],"over":[57,79],"such":[58],"only":[61],"on":[62],"order":[64],"square":[67],"root":[68],"blocklength.":[71,111],"In":[72],"this":[73],"paper,":[74],"we":[75,113],"study":[76],"multiple-input":[80],"multiple-output":[81],"(MIMO)":[82],"AWGN":[83,105],"channels.":[84],"We":[85],"derive":[86],"order-optimal":[88],"scaling":[89],"law":[90],"number":[93],"when":[97],"MIMO":[104],"Furthermore,":[112],"provide":[114],"comparative":[116],"discussion":[117],"for":[118],"case":[120],"in":[121],"which":[122],"secrecy":[123],"energy":[125],"undetectability":[126],"constraints":[127],"are":[128],"combined.":[129]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
