{"id":"https://openalex.org/W2910070844","doi":"https://doi.org/10.1109/itw.2018.8613413","title":"Time-Division is Optimal for Covert Communication over Some Broadcast Channels","display_name":"Time-Division is Optimal for Covert Communication over Some Broadcast Channels","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2910070844","doi":"https://doi.org/10.1109/itw.2018.8613413","mag":"2910070844"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2018.8613413","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2018.8613413","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058345431","display_name":"Vincent Y. F. Tan","orcid":"https://orcid.org/0000-0002-5008-4527"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Vincent Y.F. Tan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091779193","display_name":"Si-Hyeon Lee","orcid":"https://orcid.org/0000-0002-4362-5970"},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Si-Hyeon Lee","raw_affiliation_strings":["Department of Electrical Engineering, Pohang University of Science and Technology (POSTECH)"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Pohang University of Science and Technology (POSTECH)","institution_ids":["https://openalex.org/I123900574"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058345431"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.2575,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59537282,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6511267423629761},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6288742423057556},{"id":"https://openalex.org/keywords/broadcast-communication-network","display_name":"Broadcast communication network","score":0.5124068856239319},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5061470866203308},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4676380157470703},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4395903944969177},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4150456190109253},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.388790488243103},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3236161470413208},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.314245343208313},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24079358577728271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1902655065059662},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.09488299489021301}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6511267423629761},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6288742423057556},{"id":"https://openalex.org/C83529365","wikidata":"https://www.wikidata.org/wiki/Q4972103","display_name":"Broadcast communication network","level":2,"score":0.5124068856239319},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5061470866203308},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4676380157470703},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4395903944969177},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4150456190109253},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.388790488243103},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3236161470413208},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.314245343208313},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24079358577728271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1902655065059662},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.09488299489021301}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2018.8613413","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2018.8613413","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W581334404","https://openalex.org/W636358068","https://openalex.org/W1549664537","https://openalex.org/W1897081267","https://openalex.org/W2052267390","https://openalex.org/W2060500262","https://openalex.org/W2084796966","https://openalex.org/W2093683948","https://openalex.org/W2098346479","https://openalex.org/W2122627558","https://openalex.org/W2802067688","https://openalex.org/W3102020296","https://openalex.org/W3104101844","https://openalex.org/W4300840296","https://openalex.org/W4302366875","https://openalex.org/W6750876372"],"related_works":["https://openalex.org/W2355663289","https://openalex.org/W2106913410","https://openalex.org/W4380372336","https://openalex.org/W4388150944","https://openalex.org/W2354248671","https://openalex.org/W2359134391","https://openalex.org/W2594116857","https://openalex.org/W2947628004","https://openalex.org/W2502435347","https://openalex.org/W4309910562"],"abstract_inverted_index":{"We":[0,51,112],"consider":[1],"a":[2,7,43,77,117,119,128,137,156],"covert":[3,91],"communication":[4,21,92],"scenario":[5],"where":[6,56],"transmitter":[8,41],"wishes":[9],"to":[10,13],"communicate":[11],"simultaneously":[12],"two":[14,141],"legitimate":[15,31],"receivers":[16,32],"while":[17],"ensuring":[18],"that":[19,89,114,136,139,166],"the":[20,28,34,37,40,54,57,64,68,72,80,90,96,124,149,159,164,169,173,176,185,195],"is":[22,60,75,93,161],"not":[23,61,76],"detected":[24],"by":[25,71,84,95],"an":[26],"adversary,":[27],"warden.":[29],"The":[30],"and":[33,152,201],"adversary":[35],"observe":[36],"transmission":[38],"from":[39],"via":[42],"three-user":[44],"discrete":[45],"or":[46],"Gaussian":[47],"memoryless":[48],"broadcast":[49,131,199,209],"channel.":[50],"focus":[52],"on":[53],"case":[55],"\u201cno-input\u201d":[58],"symbol":[59,74],"redundant,":[62],"i.e.,":[63,100],"output":[65,81],"distribution":[66],"at":[67,101],"warden":[69],"induced":[70,83],"no-input":[73],"mixture":[78],"of":[79,130,158,172,194,198],"distributions":[82],"other":[85],"input":[86],"symbols,":[87],"so":[88],"governed":[94],"square":[97],"root":[98],"law,":[99],"most":[102],"\u0398(\u221an)":[103],"bits":[104],"can":[105],"be":[106],"transmitted":[107],"over":[108],"n":[109],"channel":[110],"uses.":[111],"show":[113],"for":[115,127,148,155,175,206],"such":[116],"setting,":[118],"simple":[120],"time-division":[121],"strategy":[122,180],"achieves":[123,168],"optimal":[125,143,162],"throughputs":[126],"class":[129],"channels.":[132,210],"Our":[133,178],"result":[134],"implies":[135],"code":[138],"uses":[140],"separate":[142],"point-to-point":[144],"codes":[145],"each":[146,153],"designed":[147],"constituent":[150],"channels":[151,200],"used":[154],"fraction":[157],"time":[160],"in":[163,184],"sense":[165],"it":[167],"best":[170],"constants":[171],"\u221an-scaling":[174],"throughputs.":[177],"proof":[179],"combines":[181],"several":[182],"elements":[183],"network":[186],"information":[187],"theory":[188],"literature,":[189],"including":[190],"concave":[191],"envelope":[192],"representations":[193],"capacity":[196],"regions":[197],"El":[202],"Gamal's":[203],"outer":[204],"bound":[205],"more":[207],"capable":[208]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
