[1] S. Blackburn and S. D. Galbraith, "Certification of secure RSA keys," Electronics Letters, vol. 36, no. 1, pp. 29-30, 2000, doi: 10.1049/el:20000035.
[2] J. Han, X. Zeng, X. Xue, and J. Ma, "Physical Layer Secret Key Generation Based on Autoencoder for Weakly Correlated Channels," in 2020 IEEE/CIC International Conference on Communications in China (ICCC), 2020: IEEE, pp. 1220-1225, doi: 10.1109/ICCC49849.2020.9238931.
[3] M. Adil, S. Wyne, and S. J. Nawaz, "On quantization for secret key generation from wireless channel samples," IEEE Access, vol. 9, pp. 21653-21668, 2021, doi: 10.1109/ACCESS.2021.3055561.
[4] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, "Hiding information in noise: Fundamental limits of covert wireless communication," IEEE Communications Magazine, vol. 53, no. 12, pp. 26-31, 2015, doi: 10.1109/MCOM.2015.7355562.
[5] L. Mucchi et al., "Physical-layer security in 6G networks," IEEE Open Journal of the Communications Society, vol. 2, pp. 1901-1914, 2021, doi: 10.1109/OJCOMS.2021.3103735.
[6] K. S. K. Arumugam, M. R. Bloch, and L. Wang, "Covert communication over a physically degraded relay channel with non-colluding wardens," in 2018 IEEE International Symposium on Information Theory (ISIT), 2018: IEEE, pp. 766-770, doi: 10.1109/ISIT.2018.8437505.
[7] M. Forouzesh, P. Azmi, A. Kuhestani, and P. L. Yeoh, "Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens," IEEE Transactions on Communications, 2020, doi: 10.1109/TCOMM.2020.2978206.
[8] M. Forouzesh, P. Azmi, N. Mokari, and D. Goeckel, "Covert Communication Using Null Space and 3D Beamforming," arXiv preprint arXiv:1907.01350, 2019, doi: 10.1109/TVT.2020.2997074.
[9] J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, "Covert communication achieved by a greedy relay in wireless networks," IEEE Transactions on Wireless Communications, vol. 17, no. 7, pp. 4766-4779, 2018, doi: 10.1109/TWC.2018.2831217.
[10] K. Shahzad, "Relaying via cooperative jamming in covert wireless communications," in 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS), 2018: IEEE, pp. 1-6, doi: 10.1109/ICSPCS.2018.8631772.
[11] K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, and J. Li, "Achieving covert wireless communications using a full-duplex receiver," IEEE Transactions on Wireless Communications, vol. 17, no. 12, pp. 8517-8530, 2018, doi: 10.1109/TWC.2018.2878014.
[12] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, "Covert communication in the presence of an uninformed jammer," IEEE Transactions on Wireless Communications, vol. 16, no. 9, pp. 6193-6206, 2017, doi: 10.1109/TWC.2017.2720736.
[13] J. Wang, W. Tang, Q. Zhu, X. Li, H. Rao, and S. Li, "Covert communication with the help of relay and channel uncertainty," IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 317-320, 2018, doi: 10.1109/LWC.2018.2872058.
[14] A. Nosratinia, T. E. Hunter, and A. Hedayat, "Cooperative communication in wireless networks," IEEE communications Magazine, vol. 42, no. 10, pp. 74-80, 2004, doi: 10.1109/MCOM.2004.1341264.
[15] A. S. Shah and M. S. Islam, "A survey on cooperative communication in wireless networks," International Journal of Intelligent Systems and Applications, vol. 6, no. 7, p. 66, 2014, doi: 10.5815/ijisa.2014.07.09.
[16] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, "A survey on multiple-antenna techniques for physical layer security," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1027-1053, 2016, doi: 10.1109/COMST.2016.2633387.
[17] A. D. Wyner, "The wire‐tap channel," Bell system technical journal, vol. 54, no. 8, pp. 1355-1387, 1975, doi: 10.1002/j.1538-7305.1975.tb02040.x.
[18] J. M. Hamamreh, H. M. Furqan, and H. Arslan, "Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1773-1828, 2018, doi: 10.1109/COMST.2018.2878035.
[19] D. Fang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Cooperative jamming protocols in two hop amplify-and-forward wiretap channels," in 2013 IEEE International Conference on Communications (ICC), 2013: IEEE, pp. 2188-2192, doi: 10.1109/ICC.2013.6654852.
[20] H.-M. Wang, C. Wang, and D. W. K. Ng, "Artificial noise assisted secure transmission under training and feedback," IEEE Transactions on Signal Processing, vol. 63, no. 23, pp. 6285-6298, 2015, doi: 10.1109/TSP.2015.2465301.
[21] Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: interaction between source, eavesdropper, and friendly jammer," EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 1-10, 2010, doi: 10.1155/2009/452907.
[22] I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5003-5011, 2009, doi: 10.1109/TWC.2009.090323.
[23] F. Samsami, P. Baei, M. Forouzesh, S. M. J. Asgari Tabatabaee, "The analysis and design of secure wireless networks in the presence of users with different security needs based on covert communication and secure transmission of information theory in the presence of a friendly jammer", Jornal of Electronical & Cyber Defence, vol. 9 no. 4, 2022, doi: 20.1001.1.23224347.1400.9.4.6.9. (In Persian)
[24] Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp. 682-694, 2013, doi: 10.1109/TIFS.2013.2248730.
[25] A. Kuhestani, A. Mohammadi, and M. Mohammadi, "Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers," IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 341-355, 2017, doi: 10.1109/TIFS.2017.2750102.
[26] M. Mitchell, An Introduction to Genetic Algorithms. 1996.
[27] C. A. C. Coello and E. M. Montes, "Constraint-handling in genetic algorithms through the use of dominance-based tournament selection," Advanced Engineering Informatics, vol. 16, no. 3, pp. 193-203, 2002, doi: 10.1016/S1474-0346(02)00011-3.
[28] C. A. C. Coello, "A comprehensive survey of evolutionary-based multiobjective optimization techniques," Knowledge and Information systems, vol. 1, no. 3, pp. 269-308, 1999, doi: 10.1007/BF03325101.
[29] M. Yari, P. Azmi, “Covert communication with untrusted relay,” Thesis, Tarbiat modares Univ, Se, 2020. (In Persian)
[30] R. Hinterding, "Gaussian mutation and self-adaption for numeric genetic algorithms," in Proceedings of 1995 IEEE International Conference on Evolutionary Computation, 1995, vol. 1: IEEE, p. 384, doi: 10.1109/ICEC.1995.489178.
[31] M. Furqan, H. Hartono, E. Ongko, and M. Ikhsan, "Performance of Arithmetic Crossover and Heuristic Crossover in Genetic Algorithm Based on Alpha Parameter," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 19, no. 1, pp. 31-36, 2017, doi: 10.9790/0661-1905013136.
[32] K. Deb, S. Agrawal, A. Pratap, and T. Meyarivan, "A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II," in International conference on parallel problem solving from nature, 2000: Springer, pp. 849-858, doi: 10.1007/3-540-45356-3_83.
[33] M. A. Albadr, S. Tiun, M. Ayob, and F. Al-Dhief, "Genetic algorithm based on natural selection theory for optimization problems," Symmetry, vol. 12, no. 11, p. 1758, 2020, doi: 10.3390/sym12111758.
[34] A. E. Eiben and S. K. Smit, "Parameter tuning for configuring and analyzing evolutionary algorithms," Swarm and Evolutionary Computation, vol. 1, no. 1, pp. 19-31, 2011, doi: 10.1016/j.swevo.2011.02.001.