{"id":"https://openalex.org/W3033175307","doi":"https://doi.org/10.1109/mnet.011.1900579","title":"Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks","display_name":"Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks","publication_year":2020,"publication_date":"2020-06-05","ids":{"openalex":"https://openalex.org/W3033175307","doi":"https://doi.org/10.1109/mnet.011.1900579","mag":"3033175307"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.011.1900579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.011.1900579","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051708868","display_name":"Xiao Lu","orcid":"https://orcid.org/0000-0002-0602-2337"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Xiao Lu","raw_affiliation_strings":["University of Alberta, Edmonton, AB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Alberta, Edmonton, AB, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089270885","display_name":"Ekram Hossain","orcid":"https://orcid.org/0000-0002-5932-6887"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ekram Hossain","raw_affiliation_strings":["University of Manitoba, Winnipeg, MB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Manitoba, Winnipeg, MB, Canada","institution_ids":["https://openalex.org/I46247651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065559924","display_name":"Taniya Shafique","orcid":"https://orcid.org/0000-0003-1133-5466"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Taniya Shafique","raw_affiliation_strings":["University of Manitoba, Winnipeg, MB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Manitoba, Winnipeg, MB, Canada","institution_ids":["https://openalex.org/I46247651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080935585","display_name":"Shaohan Feng","orcid":"https://orcid.org/0000-0002-8193-466X"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shaohan Feng","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022850202","display_name":"Hai Jiang","orcid":"https://orcid.org/0000-0003-1042-4897"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hai Jiang","raw_affiliation_strings":["University of Alberta, Edmonton, AB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Alberta, Edmonton, AB, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091266202","display_name":"Dusit Niyato","orcid":"https://orcid.org/0000-0002-7442-7416"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5051708868"],"corresponding_institution_ids":["https://openalex.org/I154425047"],"apc_list":null,"apc_paid":null,"fwci":10.0631,"has_fulltext":false,"cited_by_count":148,"citation_normalized_percentile":{"value":0.98782948,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"34","issue":"5","first_page":"148","last_page":"155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10245","display_name":"Metamaterials and Metasurfaces Applications","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2504","display_name":"Electronic, Optical and Magnetic Materials"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.76276695728302},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6543360352516174},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5619084239006042},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5576928853988647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.557461142539978},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5238996744155884},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4981207847595215},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.46043696999549866},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44306594133377075},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4385956823825836},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4380275011062622},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4287841022014618},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.42004841566085815},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.4081823229789734},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.34765172004699707}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76276695728302},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6543360352516174},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5619084239006042},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5576928853988647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.557461142539978},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5238996744155884},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4981207847595215},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.46043696999549866},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44306594133377075},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4385956823825836},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4380275011062622},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4287841022014618},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.42004841566085815},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.4081823229789734},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.34765172004699707},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.011.1900579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.011.1900579","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1994232933","https://openalex.org/W2079364662","https://openalex.org/W2098346479","https://openalex.org/W2142238976","https://openalex.org/W2149164057","https://openalex.org/W2562742260","https://openalex.org/W2735938380","https://openalex.org/W2756790867","https://openalex.org/W2794344156","https://openalex.org/W2797972299","https://openalex.org/W2915414279","https://openalex.org/W2945534522","https://openalex.org/W2953226670","https://openalex.org/W2963121727","https://openalex.org/W3009902505","https://openalex.org/W3100399470","https://openalex.org/W3102020296","https://openalex.org/W3103461411","https://openalex.org/W4293702014","https://openalex.org/W6774773516"],"related_works":["https://openalex.org/W4210390481","https://openalex.org/W2473397309","https://openalex.org/W3193940080","https://openalex.org/W4288781965","https://openalex.org/W174282171","https://openalex.org/W2500394661","https://openalex.org/W2022835024","https://openalex.org/W1528698042","https://openalex.org/W14002155","https://openalex.org/W3120887218"],"abstract_inverted_index":{"With":[0],"growing":[1],"security":[2],"threats":[3],"to":[4,52,97,112,158],"the":[5,17,23,30,54,124,127,136,145,169,173,176],"evolving":[6],"wireless":[7],"systems,":[8],"protecting":[9],"user":[10],"privacy":[11],"becomes":[12],"progressively":[13],"challenging.":[14],"Even":[15],"if":[16],"transmitted":[18],"information":[19],"is":[20,27,104,180],"encrypted":[21],"and":[22,38,78,149,175],"potential":[24],"wiretap":[25],"channel":[26],"physically":[28],"limited,":[29],"raw":[31],"data":[32],"itself,":[33],"such":[34,75],"as":[35,63,76],"transmitter":[36],"position":[37],"transmission":[39,57],"pattern,":[40],"could":[41,118],"expose":[42],"confidential":[43],"information.":[44],"In":[45,84],"this":[46,87],"context,":[47],"covert":[48,139,188],"communication":[49,99,140,160,189],"that":[50],"intends":[51],"hide":[53],"existence":[55],"of":[56,86,107,126,135,147,168,172,181],"from":[58],"an":[59,91,133,153,186],"observant":[60],"adversary":[61],"emerges":[62],"a":[64,108,165],"practical":[65],"solution.":[66],"However,":[67],"existing":[68],"covertness":[69],"techniques":[70],"ineluctably":[71],"consume":[72],"additional":[73],"resources":[74],"bandwidth":[77],"energy,":[79],"which":[80,117,179],"burdens":[81],"system":[82],"deployment.":[83],"view":[85],"concern,":[88],"we":[89,130,143,192],"propose":[90],"intelligent":[92],"reflecting":[93],"surface":[94],"(IRS)-based":[95],"approach":[96],"enhance":[98],"covertness.":[100,161],"The":[101],"core":[102],"idea":[103],"making":[105],"use":[106],"smartly":[109],"controlled":[110],"metasurface":[111],"reshape":[113],"undesirable":[114],"propagation":[115],"conditions":[116],"divulge":[119],"secret":[120],"messages.":[121],"To":[122],"facilitate":[123],"understanding":[125],"proposed":[128],"idea,":[129],"first":[131],"provide":[132],"overview":[134],"state-ofthe-":[137],"art":[138],"techniques.":[141],"Then,":[142],"introduce":[144],"fundamentals":[146],"IRS":[148,154,174],"elaborate":[150],"on":[151,195],"how":[152],"can":[155],"be":[156],"integrated":[157],"benefit":[159],"We":[162],"also":[163],"demonstrate":[164],"case":[166],"study":[167],"joint":[170],"configuration":[171],"legitimate":[177],"transmitter,":[178],"pivotal":[182],"importance":[183],"in":[184],"designing":[185],"IRS-enhanced":[187],"system.":[190],"Finally,":[191],"shed":[193],"light":[194],"some":[196],"open":[197],"research":[198],"directions.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":23},{"year":2021,"cited_by_count":31},{"year":2020,"cited_by_count":9}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
