Covert Multi-Access Communication with a Non-Covert User.
Abdelaziz BounharMireille SarkissMichèle A. WiggerPublished in: CoRR (2024)
Keyphrases
- information flow
- communication systems
- user interface
- multiple users
- user requests
- user access
- user interaction
- user feedback
- terrorist networks
- relevance feedback
- network analysis
- key players
- neural network
- end users
- information sharing
- user preferences
- user requirements
- communication technologies
- user centric
- user input
- access control
- internet access
- communication protocol
- personalized services
- web interface
- single user
- social media
- metadata
- information systems