Sign in

Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications.

Guojie HuJiangbo SiYunlong CaiNaofal Al-Dhahir
Published in: IEEE Trans. Veh. Technol. (2023)
Keyphrases
  • anomaly detection
  • communication networks
  • communication systems
  • email
  • network traffic
  • communication channels
  • databases
  • information systems
  • anti money laundering
  • database
  • real time
  • decision trees
  • deep learning