Login / Signup
Covert Authentication at the Physical Layer.
Xufei Li
Shuiguang Zeng
Yangyang Liu
Published in:
NaNA (2021)
Keyphrases
</>
physical layer
wireless communication
application layer
resource utilization
network layer
multipath
smart grid
communication protocol
communication systems
mac protocol
wireless networks
network management
channel coding
power system
neural network
end to end
load balancing
cognitive radio