Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (8)

Search Parameters:
Keywords = average covert rate

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 763 KB  
Article
UAV-Assisted Covert Communication with Dual-Mode Stochastic Jamming
by Mingyang Gu, Yinjie Su, Zhangfeng Ma, Zhuxian Lian and Yajun Wang
Sensors 2026, 26(2), 624; https://doi.org/10.3390/s26020624 - 16 Jan 2026
Abstract
Covert communication assisted by unmanned aerial vehicles (UAVs) can achieve a low detection probability in complex environments through auxiliary strategies, including dynamic trajectory planning and power management, etc. This paper proposes a dual-UAV scheme, where one UAV transmits covert information while the other [...] Read more.
Covert communication assisted by unmanned aerial vehicles (UAVs) can achieve a low detection probability in complex environments through auxiliary strategies, including dynamic trajectory planning and power management, etc. This paper proposes a dual-UAV scheme, where one UAV transmits covert information while the other one generates stochastic jamming to disrupt the eavesdropper and reduce the probability of detection. We propose a dual-mode jamming scheme which can efficiently enhance the average covert rate (ACR). A joint optimization of the dual UAVs’ flight speeds, accelerations, transmit power, and trajectories is conducted to achieve the maximum ACR. Given the high complexity and non-convexity, we develop a dedicated algorithm to solve it. To be specific, the optimization is decomposed into three sub-problems, and we transform them into tractable convex forms using successive convex approximation (SCA). Numerical results verify the efficacy of dual-mode jamming in boosting ACR and confirm the effectiveness of this algorithm in enhancing CC performance. Full article
(This article belongs to the Section Communications)
26 pages, 6495 KB  
Article
Shaping Multi-Dimensional Traffic Features for Covert Communication in QUIC Streaming
by Dongfang Zhang, Dongxu Liu, Jianan Huang, Lei Guan and Xiaotian Yin
Mathematics 2025, 13(23), 3879; https://doi.org/10.3390/math13233879 - 3 Dec 2025
Viewed by 667
Abstract
Network covert channels embed secret data into legitimate traffic, but existing methods struggle to balance undetectability, robustness, and throughput. Application-independent channels at lower protocol layers are easily normalized or disrupted by network noise, while application-dependent streaming schemes rely on handcrafted traffic manipulations that [...] Read more.
Network covert channels embed secret data into legitimate traffic, but existing methods struggle to balance undetectability, robustness, and throughput. Application-independent channels at lower protocol layers are easily normalized or disrupted by network noise, while application-dependent streaming schemes rely on handcrafted traffic manipulations that fail to preserve the spatio-temporal dynamics of real encrypted flows and thus remain detectable by modern machine learning (ML)-based classifiers. Meanwhile, with the rapid adoption of HTTP/3, Quick UDP Internet Connections (QUIC) has become the dominant transport for streaming services, offering stable long-lived flows with rich spatio-temporal structure that create new opportunities for constructing resilient covert channels. In this paper, a QUIC streaming-based Covert Channel framework, QuicCC-SMD, is proposed that dynamically Shapes Multi-Dimensional traffic features to identify and exploit redundancy spaces for secret data embedding. QuicCC-SMD models the statistical and temporal dependencies of QUIC flows via Markov chain-based state representations and employs convex optimization to derive an optimal deformation matrix that maps source traffic to legitimate target distributions. Guided by this matrix, a packet-level modulation performs through packet padding, insertion, and delay operations under a periodic online optimization strategy. Evaluations on a real-world HTTP/3 over QUIC (HTTP/3-QUIC) dataset containing 18,000 samples across four video resolutions demonstrate that QuicCC-SMD achieves an average F1 score of 56% at a 1.5% embedding rate, improving detection resistance by at least 7% compared with three representative baselines. Full article
Show Figures

Figure 1

20 pages, 2026 KB  
Article
Synonym Substitution Steganalysis Based on Heterogeneous Feature Extraction and Hard Sample Mining Re-Perception
by Jingang Wang, Hui Du and Peng Liu
Big Data Cogn. Comput. 2025, 9(8), 192; https://doi.org/10.3390/bdcc9080192 - 22 Jul 2025
Viewed by 1078
Abstract
Linguistic steganography can be utilized to establish covert communication channels on social media platforms, thus facilitating the dissemination of illegal messages, seriously compromising cyberspace security. Synonym substitution-based linguistic steganography methods have garnered considerable attention due to their simplicity and strong imperceptibility. Existing linguistic [...] Read more.
Linguistic steganography can be utilized to establish covert communication channels on social media platforms, thus facilitating the dissemination of illegal messages, seriously compromising cyberspace security. Synonym substitution-based linguistic steganography methods have garnered considerable attention due to their simplicity and strong imperceptibility. Existing linguistic steganalysis methods have not achieved excellent detection performance for the aforementioned type of linguistic steganography. In this paper, based on the idea of focusing on accumulated differences, we propose a two-stage synonym substitution-based linguistic steganalysis method that does not require a synonym database and can effectively detect texts with very low embedding rates. Experimental results demonstrate that this method achieves an average detection accuracy 2.4% higher than the comparative method. Full article
Show Figures

Figure 1

21 pages, 5691 KB  
Article
Task Offloading Strategy for UAV-Assisted Mobile Edge Computing with Covert Transmission
by Zhijuan Hu, Dongsheng Zhou, Chao Shen, Tingting Wang and Liqiang Liu
Electronics 2025, 14(3), 446; https://doi.org/10.3390/electronics14030446 - 23 Jan 2025
Cited by 4 | Viewed by 2806
Abstract
Task offloading strategies for unmanned aerial vehicle (UAV) -assisted mobile edge computing (MEC) systems have emerged as a promising solution for computationally intensive applications. However, the broadcast and open nature of radio transmissions makes such systems vulnerable to eavesdropping threats. Therefore, developing strategies [...] Read more.
Task offloading strategies for unmanned aerial vehicle (UAV) -assisted mobile edge computing (MEC) systems have emerged as a promising solution for computationally intensive applications. However, the broadcast and open nature of radio transmissions makes such systems vulnerable to eavesdropping threats. Therefore, developing strategies that can perform task offloading in a secure communication environment is critical for both ensuring the security and optimizing the performance of MEC systems. In this paper, we first design an architecture that utilizes covert communication techniques to guarantee that a UAV-assisted MEC system can securely offload highly confidential tasks from the relevant user equipment (UE) and calculations. Then, utilizing the Markov Decision Process (MDP) as a framework and incorporating the Prioritized Experience Replay (PER) mechanism into the Deep Deterministic Policy Gradient (DDPG) algorithm, a PER-DDPG algorithm is proposed, aiming to minimize the maximum processing delay of the system and the correct detection rate of the warden by jointly optimizing resource allocation, the movement of the UAV base station (UAV-BS), and the transmit power of the jammer. Simulation results demonstrate the convergence and effectiveness of the proposed approach. Compared to baseline algorithms such as Deep Q-Network (DQN) and DDPG, the PER-DDPG algorithm achieves significant performance improvements, with an average reward increase of over 16% compared to DDPG and over 53% compared to DQN. Furthermore, PER-DDPG exhibits the fastest convergence speed among the three algorithms, highlighting its efficiency in optimizing task offloading and communication security. Full article
(This article belongs to the Special Issue Research in Secure IoT-Edge-Cloud Computing Continuum)
Show Figures

Figure 1

18 pages, 5308 KB  
Article
Occurrence and Duration of Pauses in Relation to Speech Tempo and Structural Organization in Two Speech Genres
by Pavel Šturm and Jan Volín
Languages 2023, 8(1), 23; https://doi.org/10.3390/languages8010023 - 11 Jan 2023
Cited by 7 | Viewed by 6387
Abstract
Pauses act as important acoustic cues to prosodic phrase boundaries. However, the distribution and phonetic characteristics of pauses have not yet been fully described either cross-linguistically or in different genres and speech styles within languages. The current study examines the pausal performance of [...] Read more.
Pauses act as important acoustic cues to prosodic phrase boundaries. However, the distribution and phonetic characteristics of pauses have not yet been fully described either cross-linguistically or in different genres and speech styles within languages. The current study examines the pausal performance of 24 Czech speakers in two genres of read speech: news reading and poetry reciting. The pause rate and pause duration are related to genre differences, overt and covert text organization, and speech tempo. We found a significant effect of several levels of text organization, including a strong effect of punctuation. This was reflected in both measures of pausal performance. A grammatically informed analysis of a subset of pauses within the smallest units revealed a significant contribution for pause rate only. An effect of tempo was found in poetry reciting at a macro level (speaker averages) but not when pauses were observed individually. Genre differences did not manifest consistently and analogically for the two measures. The findings provide evidence that pausing is used systematically by speakers in read speech to convey not only prosodic phrasing but also text structure, among other things. Full article
(This article belongs to the Special Issue Pauses in Speech)
Show Figures

Figure 1

24 pages, 1837 KB  
Article
Multi-UAV Clustered NOMA for Covert Communications: Joint Resource Allocation and Trajectory Optimization
by Xiaofei Qin, Xu Wu, Mudi Xiong, Ye Liu and Yue Zhang
Electronics 2022, 11(23), 4056; https://doi.org/10.3390/electronics11234056 - 6 Dec 2022
Cited by 4 | Viewed by 2536
Abstract
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted communication networks have been widely used in civil and military fields. However, the open accessibility of wireless channels brings a huge risk of privacy disclosure to UAV-based networks. This paper considers a [...] Read more.
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted communication networks have been widely used in civil and military fields. However, the open accessibility of wireless channels brings a huge risk of privacy disclosure to UAV-based networks. This paper considers a multi-UAV-assisted covert communication system based on Wireless Powered Communication (WPC) and Clustered-Non-Orthogonal-Multiple-Access (C-NOMA), aiming to hide the transmission behavior between UAVs and legitimate ground users (LGUs). Specifically, the UAVs serve as aerial base stations to provide services to LGUs, while avoiding detection by the ground warden. In order to improve the considered covert communication performance, the average uplink covert rate of all clusters in each slot is maximized by jointly optimizing the cluster scheduling variable, subslot allocation, LGU transmit power and multi-UAV trajectory subject to covertness constraints. The original problem is a mixed integer non-convex problem, which are typically difficult to solve directly. To solve this challenge, this paper decouples it into four sub-problems and solves the sub-problems by alternating iterations until the objective function converges. The simulation results show that the proposed multi-UAV-assisted covert communication scheme can effectively improve the average uplink covert rate of all clusters compared with the benchmark schemes. Full article
(This article belongs to the Special Issue Satellite-Terrestrial Integrated Internet of Things)
Show Figures

Figure 1

16 pages, 563 KB  
Article
Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection
by Zeke Wu, Rui Liu, Haifeng Shuai, Shibing Zhu and Changqing Li
Sensors 2022, 22(15), 5524; https://doi.org/10.3390/s22155524 - 25 Jul 2022
Cited by 11 | Viewed by 2509
Abstract
Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication. It both utilizes the advantages of the two systems and overcomes their shortcomings. However, security issues inevitably arise in the ISMTRN resulting from the [...] Read more.
Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication. It both utilizes the advantages of the two systems and overcomes their shortcomings. However, security issues inevitably arise in the ISMTRN resulting from the broad coverage of the satellite beams and the openness of wireless communication. One of the promising methods to achieve secure transmission is covert communication technology, which has been a hot discussion topic in recent years. In this paper, we investigate the performance of covert communication in the ISMTRN with partial relay selection. Particularly, when the satellite transmits its signal to the user, we consider the scenario that the selected relay opportunistically sends covert information to the destination. Furthermore, the closed-form error detection probability and average covert communication rate are derived. Finally, numerical simulation results are provided to reveal the impact of critical parameters on system covert performance. Full article
(This article belongs to the Special Issue Integration of Satellite-Aerial-Terrestrial Networks)
Show Figures

Figure 1

22 pages, 961 KB  
Article
Quiescence Generates Moving Average in a Stochastic Epidemiological Model with One Host and Two Parasites
by Usman Sanusi, Sona John, Johannes Mueller and Aurélien Tellier
Mathematics 2022, 10(13), 2289; https://doi.org/10.3390/math10132289 - 30 Jun 2022
Cited by 3 | Viewed by 2173
Abstract
Mathematical modelling of epidemiological and coevolutionary dynamics is widely being used to improve disease management strategies of infectious diseases. Many diseases present some form of intra-host quiescent stage, also known as covert infection, while others exhibit dormant stages in the environment. As quiescent/dormant [...] Read more.
Mathematical modelling of epidemiological and coevolutionary dynamics is widely being used to improve disease management strategies of infectious diseases. Many diseases present some form of intra-host quiescent stage, also known as covert infection, while others exhibit dormant stages in the environment. As quiescent/dormant stages can be resistant to drug, antibiotics, fungicide treatments, it is of practical relevance to study the influence of these two life-history traits on the coevolutionary dynamics. We develop first a deterministic coevolutionary model with two parasite types infecting one host type and study analytically the stability of the dynamical system. We specifically derive a stability condition for a five-by-five system of equations with quiescence. Second, we develop a stochastic version of the model to study the influence of quiescence on stochasticity of the system dynamics. We compute the steady state distribution of the parasite types which follows a multivariate normal distribution. Furthermore, we obtain numerical solutions for the covariance matrix of the system under symmetric and asymmetric quiescence rates between parasite types. When parasite strains are identical, quiescence increases the variance of the number of infected individuals at high transmission rate and vice versa when the transmission rate is low. However, when there is competition between parasite strains with different quiescent rates, quiescence generates a moving average behaviour which dampen off stochasticity and decreases the variance of the number of infected hosts. The strain with the highest rate of entering quiescence determines the strength of the moving average and the magnitude of reduction of stochasticity. Thus, it is worth investigating simple models of multi-strain parasite under quiescence/dormancy to improve disease management strategies. Full article
Show Figures

Figure 1

Back to TopTop