{"id":"https://openalex.org/W4290715054","doi":"https://doi.org/10.1109/tifs.2022.3197327","title":"On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems","display_name":"On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4290715054","doi":"https://doi.org/10.1109/tifs.2022.3197327"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3197327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3197327","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086000923","display_name":"Jiaqing Bai","orcid":"https://orcid.org/0000-0002-0524-7032"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Jiaqing Bai","raw_affiliation_strings":["School of System Information Science, Future University Hakodate, Hakodate, Japan"],"raw_orcid":"https://orcid.org/0000-0002-0524-7032","affiliations":[{"raw_affiliation_string":"School of System Information Science, Future University Hakodate, Hakodate, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100608622","display_name":"Ji He","orcid":"https://orcid.org/0000-0003-3640-3488"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji He","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","an, China","Shaanxi Key Laboratory of Network and System Security, China","Guangzhou institute of technology, Xidian University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-3640-3488","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"an, China","institution_ids":[]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Network and System Security, China","institution_ids":[]},{"raw_affiliation_string":"Guangzhou institute of technology, Xidian University, Guangzhou, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419627","display_name":"Yanping Chen","orcid":"https://orcid.org/0000-0001-6548-6070"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanping Chen","raw_affiliation_strings":["Department of Computer Science and Technology, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China","an University of Posts and Telecommunications, Xi&#x2019","an, China"],"raw_orcid":"https://orcid.org/0000-0001-6548-6070","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Xi&#x2019;an University of Posts and Telecommunications, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"an University of Posts and Telecommunications, Xi&#x2019","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","an, China","Shaanxi Key Laboratory of Network and System Security, China","Guangzhou institute of technology, Xidian University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-8448-705X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"an, China","institution_ids":[]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Network and System Security, China","institution_ids":[]},{"raw_affiliation_string":"Guangzhou institute of technology, Xidian University, Guangzhou, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014884811","display_name":"Xiaohong Jiang","orcid":"https://orcid.org/0000-0001-9739-1930"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Xiaohong Jiang","raw_affiliation_strings":["School of System Information Science, Future University Hakodate, Hakodate, Japan"],"raw_orcid":"https://orcid.org/0000-0001-9739-1930","affiliations":[{"raw_affiliation_string":"School of System Information Science, Future University Hakodate, Hakodate, Japan","institution_ids":["https://openalex.org/I84400586"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086000923"],"corresponding_institution_ids":["https://openalex.org/I84400586"],"apc_list":null,"apc_paid":null,"fwci":2.1245,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.87282649,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"2920","last_page":"2935"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.8286715745925903},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.820996880531311},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.6967883110046387},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6765720844268799},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5990777015686035},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5482840538024902},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.48388800024986267},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.4831673502922058},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.4593944549560547},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4384040832519531},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.3454347252845764},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20914724469184875},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18488964438438416},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09274378418922424}],"concepts":[{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.8286715745925903},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.820996880531311},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.6967883110046387},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6765720844268799},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5990777015686035},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5482840538024902},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.48388800024986267},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.4831673502922058},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.4593944549560547},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4384040832519531},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3454347252845764},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20914724469184875},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18488964438438416},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09274378418922424},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3197327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3197327","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1355528185","display_name":null,"funder_award_id":"61972308","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3879237744","display_name":null,"funder_award_id":"2018YFE0207600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6251768370","display_name":null,"funder_award_id":"2019JC-17","funder_id":"https://openalex.org/F4320336567","funder_display_name":"Natural Science Basic Research Program of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320336567","display_name":"Natural Science Basic Research Program of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W581334404","https://openalex.org/W1518208850","https://openalex.org/W1530662203","https://openalex.org/W1897081267","https://openalex.org/W1972485395","https://openalex.org/W1992463666","https://openalex.org/W2003192648","https://openalex.org/W2011793867","https://openalex.org/W2022381648","https://openalex.org/W2032896960","https://openalex.org/W2044331621","https://openalex.org/W2050285621","https://openalex.org/W2055558096","https://openalex.org/W2084796966","https://openalex.org/W2141610237","https://openalex.org/W2143010285","https://openalex.org/W2149040914","https://openalex.org/W2161925986","https://openalex.org/W2163968165","https://openalex.org/W2170561782","https://openalex.org/W2506174538","https://openalex.org/W2511419557","https://openalex.org/W2515541240","https://openalex.org/W2562742260","https://openalex.org/W2594393372","https://openalex.org/W2605923879","https://openalex.org/W2886464990","https://openalex.org/W2893082680","https://openalex.org/W2896420513","https://openalex.org/W2903188535","https://openalex.org/W2911314746","https://openalex.org/W2950582173","https://openalex.org/W2962960827","https://openalex.org/W2963108679","https://openalex.org/W2963163777","https://openalex.org/W2963262186","https://openalex.org/W2964286662","https://openalex.org/W2987093331","https://openalex.org/W3002985653","https://openalex.org/W3004834585","https://openalex.org/W3009494512","https://openalex.org/W3028777793","https://openalex.org/W3044223429","https://openalex.org/W3080678239","https://openalex.org/W3095693198","https://openalex.org/W3104101844","https://openalex.org/W3105644655","https://openalex.org/W3107775080","https://openalex.org/W3111996209","https://openalex.org/W3119936166","https://openalex.org/W3122007543","https://openalex.org/W3122180002","https://openalex.org/W3125553008","https://openalex.org/W3132579400","https://openalex.org/W3132976614","https://openalex.org/W3150881411","https://openalex.org/W3157007851","https://openalex.org/W3168495756","https://openalex.org/W3173416460","https://openalex.org/W3185268715","https://openalex.org/W3198447824","https://openalex.org/W3206417983","https://openalex.org/W4200390056"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W2787091472","https://openalex.org/W2463175948","https://openalex.org/W2561242965","https://openalex.org/W2006290459"],"abstract_inverted_index":{"Communication":[0],"performance":[1,25,83,131,136],"relies":[2],"largely":[3],"on":[4,20,64,154],"the":[5,15,21,49,57,73,80,97,105,111,117,123,128,133,138,149,155],"availability":[6],"of":[7,17,38,60,87,99,107,119,151],"channel":[8,51],"state":[9],"information":[10],"(CSI).":[11],"This":[12],"paper":[13],"investigates":[14],"impact":[16,150],"outdated":[18,61,77,139,152],"CSI":[19,78,153],"achievable":[22],"covert":[23,35,82,93,156],"communication":[24,157],"in":[26,85],"a":[27],"two-hop":[28],"wireless":[29],"relay":[30],"system":[31],"under":[32],"two":[33],"typical":[34,50],"transmission":[36,40,44],"schemes":[37],"rate-control":[39],"(RCT)":[41],"and":[42,79,92,132],"power-control":[43],"(PCT).":[45],"We":[46],"first":[47],"apply":[48],"feedback":[52],"delay":[53],"model":[54],"to":[55,71,110,122,126,147],"determine":[56],"statistical":[58],"distribution":[59],"CSI,":[62],"based":[63],"which":[65],"we":[66,102],"then":[67],"develop":[68],"theoretical":[69],"models":[70],"depict":[72],"inherent":[74],"relationship":[75],"between":[76],"fundamental":[81],"metrics":[84],"terms":[86],"detection":[88],"error":[89],"probability":[90],"(DEP)":[91],"rate":[94],"(CR).":[95],"With":[96],"help":[98],"these":[100],"models,":[101],"further":[103],"explore":[104],"optimization":[106,118],"DEP":[108,124,130],"subject":[109,121],"CR":[112,120,135],"constraint":[113,125],"as":[114,116],"well":[115],"reveal":[127],"max-min":[129],"maximal":[134],"with":[137],"CSI.":[140],"Finally,":[141],"extensive":[142],"numerical":[143],"results":[144],"are":[145],"provided":[146],"illustrate":[148],"performance.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
