Hiding the wireless communication by transmitter Alice to intended recei...
User privacy can be compromised by matching user data traces to records ...
Deep Neural Networks (DNNs) have become prevalent in wireless communicat...
Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp ...
Recent works have considered the ability of transmitter Alice to communi...
Covert communication conceals the existence of the transmission from a
w...
Covert communication is necessary when revealing the mere existence of a...
Network flow fingerprinting can be used to de-anonymize communications o...
In covert communication, Alice tries to communicate with Bob without bei...
Network traffic analysis reveals important information even when message...