[1] F. Samsami Khodadad, P. Baee, M. Forouzesh, and S. M. J. Asgari Tabatabaie, “Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security needs based on Covert Communication and Secure Transmission of Information Theory in presence of Friendly Jammer,” Sci. J. Electron. Cyber Def., vol. 9, no. 4, pp. 67–76, 2022. [in Persian]
[2] J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels,” in IEEE International Conference on Communications, 2018, vol. 2018-May. doi: 10.1109/ICC.2018.8422941.
[3] X. Jiang et al., “Covert Communication in UAV-Assisted Air-Ground Networks,” IEEE Wirel. Commun., vol. 28, no. 4, 2021, doi: 10.1109/MWC.001.2000454.
[4] S. Yan, S. V. Hanly, I. B. Collings, and D. L. Goeckel, “Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications,” in IEEE International Conference on Communications, 2019, vol. 2019-May. doi: 10.1109/ICC.2019.8761271.
[5] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications,” IEEE Trans. Signal Process., vol. 67, no. 16, 2019, doi: 10.1109/TSP.2019.2928949.
[6] J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communication in wireless relay networks,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, vol. 2018-Janua. doi: 10.1109/GLOCOM.2017.8254008.
[7] J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wirel. Commun., vol. 17, no. 7, 2018, doi: 10.1109/TWC.2018.2831217.
[8] Q. Wang, Z. Chen, W. Mei, and J. Fang, “Improving Physical Layer Security Using UAV-Enabled Mobile Relaying,” IEEE Wirel. Commun. Lett., vol. 6, no. 3, 2017, doi: 10.1109/LWC.2017.2680449.
[9] C. Zhong, J. Yao, and J. Xu, “Secure UAV Communication With Cooperative Jamming and Trajectory Control,” IEEE Commun. Lett., vol. 23, no. 2, 2019, doi: 10.1109/LCOMM.2018.2889062.
[10] T. Nuradha, K. T. Hemachandra, T. Samarasinghe, and S. Atapattu, “Physical-layer security for untrusted UAV-Assisted full-duplex wireless networks,” 2019. doi: 10.1109/GCWkshps45667.2019.9024575.
[11] H. Wang, J. Wang, G. Ding, J. Chen, Y. Li, and Z. Han, “Spectrum sharing planning for full-duplex UAV relaying systems with underlaid D2D Communications,” IEEE J. Sel. Areas Commun., vol. 36, no. 9, 2018, doi: 10.1109/JSAC.2018.2864375.
[12] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” 2013. doi: 10.1109/ISIT.2013.6620765.
[13] Y. Cai, F. Cui, Q. Shi, M. Zhao, and G. Y. Li, “Dual-UAV-Enabled secure communications: Joint trajectory design and user scheduling,” IEEE J. Sel. Areas, Vol. 87, 73-82, 2019. doi:10.2528/PIERM19092802
[14] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., p. 1, 2022, doi: 10.1109/TVT.2022.3164051.
[15] W. Liang, J. Shi, Z. Tie, and F. Yang, “Performance Analysis for UAV-Jammer Aided Covert Communication,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3001069.
[16] X. Yu, S. Wei, and Y. Luo, “Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels under Covert Constraint,” IEEE Trans. Inf. Forensics Secur., vol. 16, 2021, doi: 10.1109/TIFS.2020.3032292.
[17] V. U. Prabhu and M. R. D. Rodrigues, “On wireless channels with m-antenna eavesdroppers: Characterization of the outage probability and ε-outage secrecy capacity,” IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3 PART 1, 2011, doi: 10.1109/TIFS.2011.2159491.
[18] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., 2022, doi: 10.1109/TVT.2022.3164051.
[19] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert Communication in the Presence of an Uninformed Jammer,” in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 9. doi: 10.1109/TWC.2017.2720736.
[20] X. Chen, M. Sheng, N. Zhao, W. Xu, and D. Niyato, “UAV-Relayed Covert Communication Towards a Flying Warden,” IEEE Trans. Commun., 2021, doi: 10.1109/TCOMM.2021.3106354.
[21] K. Shahzad, X. Zhou, and S. Yan, “Covert Communication in Fading Channels under Channel Uncertainty,” in IEEE Vehicular Technology Conference, 2017. doi: 10.1109/VTCSpring.2017.8108525.
[22] S. Talati, M.R, Hassani Ahangar; “Radar Data Processing Using a Combination of Principal Component Analysis Methods and Self-Organized and Digitizing Learning Vector Neural Networks”, Electronic and Cyber Defense, vol. 9, no. 2, pp. 1-7, 2021.
[23] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020.
[24] S. Hashemi, S. Barati, S. Talati, H. Noori; “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network”. Journal of Engineering and Applied Sciences. vol. 11, pp. 1395-1400, 2016.
[25] S. Hashemi, M. Abyari, S. Barati, T. Tahmasebi, S. Talati; “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI”. Journal of Engineering and Applied Sciences, vol. 11, pp. 2818-2829, 2016.
[26] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, 2019.
[27] S. Talati, S.M. Alavi; “Radar Systems Deception using Cross-eye Technique”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 3, pp. 19-21. 2020.
[28] S. Talati, M.R Hasani Ahangar; “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1, 2020.
[29] S. Talati, M.R. Hassani Ahangar; “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 65-69, 2020.
[30] M.R. Hassani Ahangar, S. Talati, A. Rahmati, H. Heidari; “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 93-97, 2020.
[31] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020.
[32] M. Aslinezhad, O. Mahmoudi, S. Talati; “Blind Detection of Channel Parameters Using Combination of the Gaussian Elimination and Interleaving”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 4, pp. 59-67, 2020.
[33] S. Talati, A. Amjadi; “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 2, pp. 23-28, 2020.
[34] S. Talati, S.M. Alavi, H. Akbarzade, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 2, 2021.
[35] P. Etezadifar, S. Talati, “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack”. Majlesi Journal of Telecommunication Devices, vol. 10, no. 2, pp. 55-59, 2021.
[36] S. Talati, B. Ebadi, H. Akbarzade; “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors”. QUID, pp. 1806-1812, Special Issue No.1-. April 2017. ISSN: 1692-343X, Medellín-Colombia.
[37] S. Talati, M. Akbari-Thani, M.R Hassani Ahangar; “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, vol. 8, no. 1, pp. 65-74, 2020.
[38] S. Talati, R. Abdollahi, V.R. Soltaninia, M. Ayat; “A New Emitter Localization Technique Using Airborne Direction Finder Sensor”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 4, pp. 5-16, 2021.
[39] V. Soltaninia, S. Talati, S.M. Khatmi, Ghaffari; Presenting a New Steganography Method Based on Wavelet Transform in Gray Image. Majlesi Journal of Telecommunication Devices, vol. 12, no. 2, pp. 105-111,2023.doi: 10.30486/mjtd.2023.1983555.1031.
[40] S. Talati, P. EtezadiFar, M.R. Hassani Ahangar, M. Molazade; Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP. Majlesi Journal of Telecommunication Devices, vol. 12, no. 1, pp. 7-15, 2023. doi: 10.30486/mjtd.2022.695928.
[41] S. Talati, S.M. Ghazali, V.R. SoltaniNia; “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz” Journal of Physics D: Applied Physics. Vol. 56, no. 17, 2023. DOI 10.1088/1361-6463/acb8c7.
[42] S.M. Ghazali. J. Mazloum, Y. Balaghi; “Modified binary salp swarm algorithm in EEG signal classification for epilepsy seizure detection” Biomedical Signal Processing and Control. vol. 78, 2022.