{"id":"https://openalex.org/W4410359316","doi":"https://doi.org/10.1109/lcomm.2025.3570104","title":"Opportunistic Jamming for Covert Communications: Ginibre Point Process Modeling and Analysis","display_name":"Opportunistic Jamming for Covert Communications: Ginibre Point Process Modeling and Analysis","publication_year":2025,"publication_date":"2025-05-14","ids":{"openalex":"https://openalex.org/W4410359316","doi":"https://doi.org/10.1109/lcomm.2025.3570104"},"language":"en","primary_location":{"id":"doi:10.1109/lcomm.2025.3570104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2025.3570104","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005926359","display_name":"Han-Bae Kong","orcid":"https://orcid.org/0000-0003-2856-7060"},"institutions":[{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Justin H. Kong","raw_affiliation_strings":["U.S. Army Combat Capabilities Development Command (DEVCOM) Army Research Laboratory, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"U.S. Army Combat Capabilities Development Command (DEVCOM) Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I2802705668"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060923648","display_name":"Fikadu T. Dagefu","orcid":"https://orcid.org/0000-0002-7532-5278"},"institutions":[{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fikadu T. Dagefu","raw_affiliation_strings":["U.S. Army Combat Capabilities Development Command (DEVCOM) Army Research Laboratory, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"U.S. Army Combat Capabilities Development Command (DEVCOM) Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I2802705668"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005926359"],"corresponding_institution_ids":["https://openalex.org/I2802705668"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12549363,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"7","first_page":"1654","last_page":"1658"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9531000256538391,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9531000256538391,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9085000157356262,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8249291777610779},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6967900991439819},{"id":"https://openalex.org/keywords/point-process","display_name":"Point process","score":0.6502059102058411},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.645593523979187},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45351144671440125},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4466104507446289},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4361698031425476},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3988872468471527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3980362117290497},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10275495052337646},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10260167717933655}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8249291777610779},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6967900991439819},{"id":"https://openalex.org/C88871306","wikidata":"https://www.wikidata.org/wiki/Q7208287","display_name":"Point process","level":2,"score":0.6502059102058411},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.645593523979187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45351144671440125},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4466104507446289},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4361698031425476},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3988872468471527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3980362117290497},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10275495052337646},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10260167717933655},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcomm.2025.3570104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2025.3570104","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W631335369","https://openalex.org/W1529380551","https://openalex.org/W1584905095","https://openalex.org/W1659111644","https://openalex.org/W2002015141","https://openalex.org/W2098346479","https://openalex.org/W2144007657","https://openalex.org/W2159687282","https://openalex.org/W2750003873","https://openalex.org/W2756790867","https://openalex.org/W2963121780","https://openalex.org/W3035904061","https://openalex.org/W3212250153","https://openalex.org/W4296437284","https://openalex.org/W4362500847","https://openalex.org/W4379117226","https://openalex.org/W4386322246","https://openalex.org/W4400277709"],"related_works":["https://openalex.org/W2523525694","https://openalex.org/W2998642566","https://openalex.org/W2392682561","https://openalex.org/W57793151","https://openalex.org/W2804882289","https://openalex.org/W2727423897","https://openalex.org/W1984793747","https://openalex.org/W4387389613","https://openalex.org/W1586180564","https://openalex.org/W3169444776"],"abstract_inverted_index":{"We":[0,58,109],"investigate":[1],"covert":[2],"communication":[3,26,86],"in":[4],"wireless":[5],"networks":[6],"with":[7],"spatially":[8],"distributed":[9],"friendly":[10],"jammers":[11,65],"that":[12,71,120],"radiate":[13],"jamming":[14,36,117],"signals":[15],"to":[16,43,51],"hinder":[17],"an":[18,96],"adversary":[19,106],"from":[20],"detecting":[21],"the":[22,25,39,44,53,56,60,64,73,76,79,85,91,99,105,112,115,122,129],"existence":[23],"of":[24,63,78,84,98,114],"between":[27],"a":[28,35,49,67,126],"transmitter/receiver":[29],"pair.":[30],"Each":[31],"jammer":[32],"opportunistically":[33],"broadcasts":[34],"signal":[37],"when":[38],"small-scale":[40],"fading":[41],"channel":[42],"receiver":[45,92],"is":[46,93,107],"less":[47],"than":[48],"threshold":[50,118],"mitigate":[52],"interference":[54],"at":[55,90,104],"receiver.":[57],"model":[59],"spatial":[61],"distribution":[62],"as":[66],"\u03b2-Ginibre":[68],"point":[69],"process":[70],"reflects":[72],"repulsion":[74],"among":[75],"locations":[77],"jammers.":[80],"The":[81],"exact":[82],"expression":[83],"outage":[87],"probability":[88,102],"(COP)":[89],"identified,":[94],"and":[95],"approximation":[97],"detection":[100],"error":[101],"(DEP)":[103],"derived.":[108],"also":[110],"examine":[111],"optimization":[113],"opportunistic":[116],"parameter":[119],"maximizes":[121],"DEP":[123],"while":[124],"satisfying":[125],"requirement":[127],"on":[128],"COP.":[130]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
