Abstract
No abstract available.
Cited By
- Amihood B and Cohen A (2024). Covertly Controlling a Linear System, IEEE Transactions on Information Forensics and Security, 19, (2651-2663), Online publication date: 1-Jan-2024.
- Wang C, Li Z, Zheng T, Ng D and Al-Dhahir N (2023). Intelligent Reflecting Surface-Aided Full-Duplex Covert Communications: Information Freshness Optimization, IEEE Transactions on Wireless Communications, 22:5, (3246-3263), Online publication date: 1-May-2023.
- Arghavani A, Dey S and Ahlén A (2023). Covert Outage Minimization in the Presence of Multiple Wardens, IEEE Transactions on Signal Processing, 71, (686-700), Online publication date: 1-Jan-2023.
- Ma S, Zhang Y, Sheng H, Li H, Shi J, Yang L, Wu Y, Al-Dhahir N and Li S (2022). Optimal Probabilistic Constellation Shaping for Covert Communications, IEEE Transactions on Information Forensics and Security, 17, (3165-3178), Online publication date: 1-Jan-2022.
- Gómez A, Gómez-Pérez D and Tirkel A Generalised GMW Sequences 2021 IEEE International Symposium on Information Theory (ISIT), (1806-1811)
- Guo F, Liu L, Wang A and Wen Q (2019). Practical covert quantum key distribution with decoy-state method, Quantum Information Processing, 18:4, (1-18), Online publication date: 1-Apr-2019.
- Watson W, Couto D and Beaudeau J Low Probability of Exploitation Waveform Design Using Barankin Bound Formulation MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), (1-6)
- Soltani R, Goeckel D, Towsley D and Houmansadr A Fundamental Limits of Covert Bit Insertion in Packets 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1065-1072)
- Gao Y, Xiao Y, Wu M, Xiao M and Shao J (2018). Game Theory-Based Anti-Jamming Strategies for Frequency Hopping Wireless Communications, IEEE Transactions on Wireless Communications, 17:8, (5314-5326), Online publication date: 1-Aug-2018.
- Lakshminarayana S, Karachiwala J, Chang S, Revadigar G, Kumar S, Yau D and Hu Y Signal Jamming Attacks Against Communication-Based Train Control Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (160-171)
- Giustiniano D, Schalch M, Liechti M and Lenders V Interference Suppression in Bandwidth Hopping Spread Spectrum Communications Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (134-143)
- Boztaş S, Özbudak F and Tekin E (2018). Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods, Cryptography and Communications, 10:3, (509-517), Online publication date: 1-May-2018.
- Faix M, Mazer E, Laurent R, Abdallah M, Le Hy R and Lobo J (2017). Cognitive Computation, International Journal of Software Science and Computational Intelligence, 9:3, (37-58), Online publication date: 1-Jul-2017.
- Ben- Adar Bessos M, Birnbach S, Herzberg A and Martinovic I Exposing Transmitters in Mobile Multi-Agent Games Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, (125-136)
- Garlapati S, Kuruganti T, Buehrer M, Reed J, Garlapati S, Kuruganti T, Buehrer M and Reed J (2016). SMAC, IEEE/ACM Transactions on Networking, 24:5, (2648-2662), Online publication date: 1-Oct-2016.
- Chang S, Hu Y and Laurenti N (2016). SimpleMAC, IEEE/ACM Transactions on Networking, 24:2, (1095-1108), Online publication date: 1-Apr-2016.
- Liechti M, Lenders V and Giustiniano D Jamming mitigation by randomized bandwidth hopping Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, (1-13)
- Li L, An J, Wang Z and Li X (2015). Under-sampling spectrum-sparse signals based on active aliasing for low probability detection, Security and Communication Networks, 8:18, (4087-4097), Online publication date: 1-Dec-2015.
- Chang S, Hu Y, Chiang J and Chang S Redundancy offset narrow spectrum Proceedings of the 11th ACM international symposium on Mobility management and wireless access, (51-58)
- Das S, Mukherjee R, Kundu R and Vasilakos T Multi-user detection in multi-carrier CDMA wireless broadband system using a binary adaptive differential evolution algorithm Proceedings of the 15th annual conference on Genetic and evolutionary computation, (1245-1252)
- Richa A, Scheideler C, Schmid S and Zhang J (2013). Competitive throughput in multi-hop wireless networks despite adaptive jamming, Distributed Computing, 26:3, (159-171), Online publication date: 1-Jun-2013.
- Vo-Huu T, Blass E and Noubir G Counter-jamming using mixed mechanical and software interference cancellation Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, (31-42)
- Chang S, Hu Y and Laurenti N SimpleMAC Proceedings of the 18th annual international conference on Mobile computing and networking, (77-88)
- Chung J and Yang K Low-Hit-Zone frequency-hopping sequence sets with new parameters Proceedings of the 7th international conference on Sequences and Their Applications, (202-211)
- Zhou Z, Tang X, Yang Y and Parampalli U On the aperiodic hamming correlation of frequency-hopping sequences from norm functions Proceedings of the 7th international conference on Sequences and Their Applications, (148-158)
- Firouzbakht K, Noubir G and Salehi M On the capacity of rate-adaptive packetized wireless communication links under jamming Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, (3-14)
- Zhang Z and Zhang M Pulse amplitude modulation time-hopping spread-spectrum based on balance gold sequences Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II, (108-115)
- Liu S, Lazos L and Krunz M Thwarting inside jamming attacks on wireless broadcast communications Proceedings of the fourth ACM conference on Wireless network security, (29-40)
- Zheng L, Ge W and Qiu H (2010). Master synchronization in physical-layer communications of wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-9), Online publication date: 1-Apr-2010.
- Liu Y, Ning P, Dai H and Liu A Randomized differential DSSS Proceedings of the 29th conference on Information communications, (695-703)
- Chung J, Han Y and Yang K (2009). New classes of optimal frequency-hopping sequences by interleaving techniques, IEEE Transactions on Information Theory, 55:12, (5783-5791), Online publication date: 1-Dec-2009.
- Kim J, Wang C and Orra M Performance analysis of SDPSK and 1-bit differential GMSK modems for FFH-FDMA satellite communications under jamming Proceedings of the 28th IEEE conference on Global telecommunications, (2120-2125)
- Kim Y, Li X and Won S A new design of multi-path searcher in for W-CDMA mobile station with multi-antenna Proceedings of the 15th Asia-Pacific conference on Communications, (607-610)
- Todorovic B and Orlic V (2009). Direct sequence spread spectrum scheme for an unmanned aerial vehicle PPM control signal protection, IEEE Communications Letters, 13:10, (727-729), Online publication date: 1-Oct-2009.
- Ye Y, Wen-bo M and Yi-qian L Chirp-like jammer excision in DSSS communication systems using EMD based radon wigner distribution Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (2126-2129)
- Han Y and Yang K (2009). On the Sidel'nikov sequences as frequency-hopping sequences, IEEE Transactions on Information Theory, 55:9, (4279-4285), Online publication date: 1-Sep-2009.
- Cha B and Kuo C (2009). Robust MC-CDMA-based fingerprinting against time-varying collusion attacks, IEEE Transactions on Information Forensics and Security, 4:3, (302-317), Online publication date: 1-Sep-2009.
- Huang K, Lau V and Chen Y (2009). Spectrum sharing between cellular and mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, 27:7, (1256-1267), Online publication date: 1-Sep-2009.
- Benedetto F and Giunta G (2009). A self-synchronizing method for asynchronous code acquisition in band-limited spread spectrum communications, IEEE Transactions on Communications, 57:8, (2410-2419), Online publication date: 1-Aug-2009.
- Huang K, Lau V and Chen Y Spectrum sharing between cellular and mobile ad hoc networks Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (121-130)
- Hassan A, Hassan A and Hussian A Perfromance evaluation of two signatures' codes linear decorrelator detector for CDMA systems in Nakagami fading channel Proceedings of the Sixth international conference on Wireless and Optical Communications Networks, (199-206)
- Hassan A, Hassan A and Hussian A New approach for designing CDMA linear decorrelator detector Proceedings of the Sixth international conference on Wireless and Optical Communications Networks, (40-46)
- Hassan A, Hassan A and Hussian A Two signatures' codes linear decorrelator detector for CDMA systems Proceedings of the 2009 conference on Wireless Telecommunications Symposium, (32-38)
- Aloul F and El-Tarhuni M PN code acquisition using Boolean satisfiability techniques Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference, (632-637)
- Lazos L, Liu S and Krunz M Mitigating control-channel jamming attacks in multi-channel ad hoc networks Proceedings of the second ACM conference on Wireless network security, (169-180)
- Tsouri G and Wulich D (2009). Securing OFDM over wireless time-varying channels using subcarrier overloading with joint signal constellations, EURASIP Journal on Wireless Communications and Networking, 2009, (1-18), Online publication date: 1-Mar-2009.
- Cheng H, Ma M and Jiao B (2009). On the design of comb spectrum code for multiple access scheme, IEEE Transactions on Communications, 57:3, (754-763), Online publication date: 1-Mar-2009.
- Nagaraj S, Khan S, Schlegel C and Burnashev M (2009). Differential preamble detection in packet-based wireless networks, IEEE Transactions on Wireless Communications, 8:2, (599-607), Online publication date: 1-Feb-2009.
- Zhu D and Natarajan B (2009). Residue number system arithmetic assisted coded frequency-hopped OFDMA, EURASIP Journal on Wireless Communications and Networking, 2009, (1-11), Online publication date: 1-Jan-2009.
- Won S and Hanzo L (2009). Initial acquisition performance of the multiple receive antenna assisted DS-UWB downlink using search space reduction and iterative code phase estimation, IEEE Transactions on Wireless Communications, 8:1, (386-395), Online publication date: 1-Jan-2009.
- Javadi S and Pourang P Improving low voltage distribution line carrier communication systems for transferring data by applying efficient modulation techniques Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing, (289-296)
- Landolsi M and Hussain G (2008). Pulse shaping in non-coherent DLL tracking of CDMA signals, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:12, (1246-1252), Online publication date: 1-Dec-2008.
- Udaya P and Boztaş S On Partial Correlations of Various Z4 Sequence Families Proceedings of the 5th international conference on Sequences and Their Applications, (332-344)
- Awerbuch B, Richa A and Scheideler C A jamming-resistant MAC protocol for single-hop wireless networks Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (45-54)
- Bhuiyan M, Lohan E and Renfors M (2008). Code tracking algorithms for mitigating multipath effects in fading channels for satellite-based positioning, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
- Wang Q, Liu X, Chen W, Sha L and Caccamo M (2007). Building Robust Wireless LAN for Industrial Control with the DSSS-CDMA Cell Phone Network Paradigm, IEEE Transactions on Mobile Computing, 6:6, (706-719), Online publication date: 1-Jun-2007.
- Yoon S and Song H Existence of modular sonar sequences of twin-prime product length Proceedings of the 2007 international conference on Sequences, subsequences, and consequences, (184-191)
- Xin Liu , Noubir G, Sundaram R and San Tan SPREAD Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (2536-2540)
- Moungnoul P, Nonthaputha T and Junnapiya S Performance improvement of MC-FH-CDMA system using multi linear chirp technique Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks, (44-48)
- Xiaodai Dong , Li Jin , Orlik P and Rongrong Zhang Performance of A New Transmitted Reference Pulse Cluster System for UWB Communications Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (1609-1614)
- Chen Z, Li S and Dong B Asynchronous multiuser performance analysis of differential frequency hopping system over Rayleigh-fading channel Proceedings of the 2006 IEEE conference on Military communications, (1178-1183)
- Zhang T, Tian Z, Chen Q, Lin X and Zhou Z Use APEX neural networks to extract the PN sequence in lower SNR DS-SS signals Proceedings of the 2006 international conference on Intelligent computing: Part II, (1252-1257)
- Tsaur L and Lee D (2006). Closed-loop architecture and protocols for rapid dynamic spreading gain adaptation in CDMA networks, IEEE/ACM Transactions on Networking, 14:4, (821-834), Online publication date: 1-Aug-2006.
- Yeung O and Chugg K (2006). An Iterative Algorithm and Low Complexity Hardware Architecture for Fast Acquisition of Long PN Codes in UWB Systems, Journal of VLSI Signal Processing Systems, 43:1, (25-42), Online publication date: 1-Apr-2006.
- Lohan E, Lakhzouri A and Renfors M (2006). Feedforward delay estimators in adverse multipath propagation for Galileo and modernized GPS signals, EURASIP Journal on Advances in Signal Processing, 2006, (157-157), Online publication date: 1-Jan-2006.
- Lee Y, Kang H, Lee M and Kim T A study on the effect of interference on time hopping binary PPM impulse radio system Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II, (665-674)
- Inácio J, Gerald J and Ortigueira M (2005). New PN even balanced sequences for spread-spectrum systems, EURASIP Journal on Wireless Communications and Networking, 2005:3, (447-458), Online publication date: 1-Aug-2005.
- Hong Y and Song H Frequency/Time hopping sequences with large linear complexities Proceedings of the 2005 international conference on Coding and Cryptography, (386-396)
- Scholtz R, Pozar D and Namgoong W (2005). Ultra-wideband radio, EURASIP Journal on Advances in Signal Processing, 2005, (252-272), Online publication date: 1-Jan-2005.
- Chen J, Lv T and Zheng H (2005). Joint cross-layer design for wireless QoS content delivery, EURASIP Journal on Advances in Signal Processing, 2005, (167-182), Online publication date: 1-Jan-2005.
- Jang J, Kim S, No J and Chung H New constructions of quaternary hadamard matrices Proceedings of the Third international conference on Sequences and Their Applications, (361-372)
- Klapper A (2004). Distributional properties of d-FCSR sequences, Journal of Complexity, 20:2-3, (305-317), Online publication date: 1-Apr-2004.
- McGuffin B Jammed FH-FSK performance in Rayleigh and Nakagami-m fading Proceedings of the 2003 IEEE conference on Military communications - Volume II, (1077-1082)
- Wyckoff P, Young R and McGregor D Scale time offset robust modulation Proceedings of the 2003 IEEE conference on Military communications - Volume I, (330-335)
- Cetintemel U, Flinders A and Sun Y Power-efficient data dissemination in wireless sensor networks Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access, (1-8)
- Subramanian S, Shpak D and Antoniou A (2000). Performance of a Multiple-Antenna Multiple-Equalizer System for a CDMA Indoor Wireless System, Wireless Personal Communications: An International Journal, 15:2, (97-123), Online publication date: 1-Nov-2000.
- Bender W, Butera W, Gruhl D, Hwang R, Paiz F and Pogreb S (2000). Applications for data hiding, IBM Systems Journal, 39:3-4, (547-568), Online publication date: 1-Jul-2000.
- Spangenberg S, Scott I, Mclaughlin S, Povey G, Cruickshank D and Grant P (2000). An FFT-Based Approach for Fast Acquisition in Spread Spectrum Communication Systems, Wireless Personal Communications: An International Journal, 13:1-2, (27-55), Online publication date: 1-May-2000.
- Deng C and Chien C A low energy architecture for fast PN acquisition Proceedings of the 1999 international symposium on Low power electronics and design, (42-47)
- Povey G (1998). Spread Spectrum PN Code Acquisition Using Hybrid Correlator Architectures, Wireless Personal Communications: An International Journal, 8:2, (151-164), Online publication date: 1-Sep-1998.
- Firmanto W and Gulliver T (1998). Code Combining of Reed–Muller Codes in an Indoor Wireless Environment, Wireless Personal Communications: An International Journal, 6:3, (359-373), Online publication date: 1-Mar-1998.
- Cheah K and Li K (1998). On the Capacity Enhancement of a Cellular CDMA Channel with Asymmetrical Bandwidth Allocation, Wireless Personal Communications: An International Journal, 6:1-2, (197-209), Online publication date: 1-Jan-1998.
- Shepard T (1996). A channel access scheme for large dense packet radio networks, ACM SIGCOMM Computer Communication Review, 26:4, (219-230), Online publication date: 1-Oct-1996.
- Shepard T A channel access scheme for large dense packet radio networks Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (219-230)
Index Terms
- Spread spectrum communications handbook (revised ed.)
Recommendations
Spread spectrum for commercial communications
The authors describe how spread spectrum operates and explain why the FCC has allocated several spectral bands for spread spectrum. They examine what is wrong with the spectrum allocations the way they are now. They show who is using and will use spread ...
Spread spectrum image steganography
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means “covered writing” in Greek, is the science of communicating in a hidden manner. Following a discussion of ...