共 50 条
- [42] Jamming strategies in covert communication Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11527 LNCS : 1 - 15
- [43] Covert Marketing Strategy and Techniques 11TH INTERNATIONAL STRATEGIC MANAGEMENT CONFERENCE, 2015, 207 : 135 - 148
- [44] Characterising and Detecting Sponsored Influencer Posts on Instagram 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2020, : 327 - 331
- [45] Detecting and characterising returns in a pulsed ladar system IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2006, 153 (02): : 160 - 172
- [48] Covert Wireless Communication on Beidou Short Message Communication CHINA SATELLITE NAVIGATION CONFERENCE PROCEEDINGS, CSNC 2022, VOL II, 2022, 909 : 310 - 320
- [49] Covert Wireless Communication on Beidou Short Message Communication Lecture Notes in Electrical Engineering, 2022, 909 LNEE : 310 - 320
- [50] Covert Multi-Access Communication with a Non-Covert User ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 1473 - 1478