[1] C. S. R. Murthy and B. S. Manoj, Ad hoc wireless networks: architectures and protocols. 2004.
[2] F. Samsami Khodadad and G. A. Hodtani, “Detection of Spread Spectrum multi-user direct Sequence Signals with the help of Information Theory criteria,” J. Electron. Cyber Def., vol. 2, no. 1, 2014 (in Persian).
[3] Y. S. Shiu, S. Y. Chang, H. C. Wu, S. C. H. Huang, and H. H. Chen, “Physical layer security in wireless networks: A tutorial,” IEEE Wirel. Commun., vol. 18, no. 2, pp. 66–74, 2011,
doi: 10.1109/MWC.2011.5751298.
[4] N. Yang, S. Yan, J. Yuan, R. Malaney, R. Subramanian, and I. Land, “Artificial noise: Transmission optimization in multi-input single-output wiretap channels,” IEEE Trans.
Commun., vol. 63, no. 5, 2015,
doi: 10.1109/TCOMM.2015.2419634.
[5] M. Bloch and J. Barros, Physical–layer security: From information theory to security engineering, vol. 9780521516. 2011.
[6] J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels,” in IEEE International Conference on Communications, 2018, vol. 2018-May,
doi: 10.1109/ICC.2018.8422941.
[7] A. D. Wyner, “The Wire‐Tap Channel,” Bell Syst. Tech. J., vol. 54, no. 8, 1975,
doi: 10.1002/j.1538-7305.1975.tb02040.x.
[8] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert Communication in the Presence of an Uninformed Jammer,” in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 9, doi: 10.1109/TWC.2017.2720736.
[9] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” in IEEE Communications Magazine, 2015, vol. 53, no. 12, pp. 26–31, doi: 10.1109/MCOM.2015.7355562.
[10] M. R. Bloch, “Covert Communication over Noisy Channels: A Resolvability Perspective,” in IEEE Transactions on Information Theory, 2016, vol. 62, no. 5, doi: 10.1109/TIT.2016.2530089.
[11] S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walkenhorst, “Achieving undetectable communication,” IEEE J. Sel. Top. Signal Process., vol. 9, no. 7, 2015,
doi: 10.1109/JSTSP.2015.2421477.
[12] B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communication with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, 2017,
doi: 10.1109/LCOMM.2016.2647716.
[13] G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Trans. Signal Process., vol. 61, no. 20, 2013,
doi: 10.1109/TSP.2013.2269049.
[14] M. Abedi, N. Mokari, H. Saeedi, and H. Yanikomeroglu, “Secure robust resource allocation using full-duplex receivers,” 2015,
doi: 10.1109/ICCW.2015.7247229.
[15] M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characterization of full-duplex wireless systems,” IEEE Trans. Wirel. Commun., vol. 11, no. 12, 2012,
doi: 10.1109/TWC.2012.102612.111278.
[16] D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” 2013,
doi: 10.1145/2486001.2486033.
[17] L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, “Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays,” IEEE Trans. Veh. Technol., vol. 65, no. 8, 2016,
doi: 10.1109/TVT.2015.2478029.
[18] M. Forouzesh, P. Azmi, and N. Mokari, “Reduce impact of false detection of adversary states on the secure cooperative network,” 2017,
doi: 10.1109/ISTEL.2016.7881822.
[19] M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, “Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie’s Location Information,” IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8568–8576, 2020, doi: 10.1109/TVT.2020.2997074.
[20] Y. Wen, Y. Huo, L. Ma, T. Jing, and Q. Gao, “A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks,” IEEE Trans. Veh. Technol., vol. 68, no. 4, 2019, doi: 10.1109/TVT.2019.2895639.
[21] S. Sharifian, F. Lin, and R. Safavi-Naini, “Secret key agreement using a virtual wiretap channel,” 2017, doi: 10.1109/INFOCOM.2017.8057119.
[22] K. Cumanan et al., “Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks,” IEEE
Access, vol. 5, 2017,
doi: 10.1109/ACCESS.2016.2636239.
[23] K. Cumanan, Z. Ding, M. Xu, and H. V. Poor, “Secure multicast communications with private jammers,” in IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2016, vol. 2016-August, doi: 10.1109/SPAWC.2016.7536824.
[24] L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, “Secure transmission with optimal power allocation in untrusted relay networks,” IEEE Wirel. Commun. Lett., vol. 3, no. 3, 2014, doi: 10.1109/WCL.2014.031114.140018.