{"id":"https://openalex.org/W4415368460","doi":"https://doi.org/10.1109/isit63088.2025.11195556","title":"Joint Covert Communication and Covert Secret Key Generation via Causal CSI","display_name":"Joint Covert Communication and Covert Secret Key Generation via Causal CSI","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415368460","doi":"https://doi.org/10.1109/isit63088.2025.11195556"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195556","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055549636","display_name":"Hassan ZivariFard","orcid":"https://orcid.org/0000-0002-4218-0121"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hassan ZivariFard","raw_affiliation_strings":["Columbia University,Department of Electrical Engineering,New York,NY,USA,10027"],"affiliations":[{"raw_affiliation_string":"Columbia University,Department of Electrical Engineering,New York,NY,USA,10027","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047776960","display_name":"R\u00e9mi A. Chou","orcid":"https://orcid.org/0000-0003-4431-3175"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R\u00e9mi A. Chou","raw_affiliation_strings":["The University of Texas at Arlington,Department of Computer Science and Engineering,Arlington,TX,USA,76019"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Arlington,Department of Computer Science and Engineering,Arlington,TX,USA,76019","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100382658","display_name":"Xiaodong Wang","orcid":"https://orcid.org/0000-0002-2945-9240"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaodong Wang","raw_affiliation_strings":["Columbia University,Department of Electrical Engineering,New York,NY,USA,10027"],"affiliations":[{"raw_affiliation_string":"Columbia University,Department of Electrical Engineering,New York,NY,USA,10027","institution_ids":["https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055549636"],"corresponding_institution_ids":["https://openalex.org/I78577930"],"apc_list":null,"apc_paid":null,"fwci":1.6611,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87702724,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9445000290870667,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9424999952316284,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.8410999774932861},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6729000210762024},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6502000093460083},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6087999939918518},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5026000142097473},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.4564000070095062}],"concepts":[{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.8410999774932861},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6729000210762024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.660099983215332},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6502000093460083},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6087999939918518},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5026000142097473},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.4564000070095062},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.4537000060081482},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.44339999556541443},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3630000054836273},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2930999994277954},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2786000072956085},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195556","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1897081267","https://openalex.org/W1978070031","https://openalex.org/W1998812578","https://openalex.org/W2052267390","https://openalex.org/W2052787375","https://openalex.org/W2060500262","https://openalex.org/W2084796966","https://openalex.org/W2098346479","https://openalex.org/W2125999125","https://openalex.org/W2129137934","https://openalex.org/W2139352051","https://openalex.org/W2506174538","https://openalex.org/W2911183838","https://openalex.org/W2950463707","https://openalex.org/W2963113656","https://openalex.org/W2963194416","https://openalex.org/W2985659114","https://openalex.org/W3009469272","https://openalex.org/W3104101844","https://openalex.org/W3195623054","https://openalex.org/W3196620053","https://openalex.org/W3198691598","https://openalex.org/W4289655257","https://openalex.org/W4300840296","https://openalex.org/W4386075110","https://openalex.org/W4406794231","https://openalex.org/W4415368460"],"related_works":[],"abstract_inverted_index":{"We":[0,60],"study":[1],"covert":[2,5,53,79,103],"communication":[3,80],"and":[4,41],"secret":[6,54,104],"key":[7,55,105],"generation":[8],"with":[9,14,46,57,83],"positive":[10,100],"rates":[11],"over":[12,81],"channels":[13,82],"causal":[15,36],"Channel":[16,30],"State":[17],"Information":[18],"(CSI)":[19],"at":[20],"the":[21,33,39,47,58,75,86,94],"transmitter.":[22],"Specifically,":[23],"we":[24],"consider":[25],"a":[26,52,72,99],"state-dependent":[27],"Discrete":[28],"Memoryless":[29],"(DMC)":[31],"where":[32],"transmitter":[34],"has":[35],"access":[37],"to":[38,43],"CSI,":[40],"aims":[42],"communicate":[44],"covertly":[45],"receiver":[48],"while":[49],"simultaneously":[50],"generating":[51],"shared":[56],"receiver.":[59],"derive":[61],"an":[62],"achievable":[63],"rate":[64,101],"region":[65],"for":[66,78,102],"this":[67],"problem,":[68],"which":[69],"recovers":[70],"as":[71],"special":[73],"case":[74],"best-known":[76],"results":[77,92],"CSI.":[84],"To":[85],"best":[87],"of":[88,97],"our":[89,91],"knowledge,":[90],"are":[93],"first":[95],"instance":[96],"achieving":[98],"generation.":[106]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-21T00:00:00"}
