[1] Y. Liang, H. V. Poor, and L. Ying, “Wireless broadcast networks: reliability, security, and stability,” Inf. Theory and App. Work. , USA, pp. 249-255, Feb. 2008.
[2] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surveys Tuts. , Vol. 16, no. 3, pp. 1550-1573, Feb. 2014.
[3] A. Kuhestani, A. Mohammadi and M. Mohammadi “ Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers,” IEEE Trans. Inf. Foren. Sec., vol. 13, no. 2, pp. 341-355, Feb. 2018.
[4] M. Tatar Mamaghani, A. Kuhestani and K.-K. Won “Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer,” IEEE Trans. Veh. Tech., pp. 1-1, Jul. 2018.
[5] A. Kuhestani, A. Mohammadi and P. L. Yeoh, “Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer,” IEEE Trans. Commun. ,Vol. 66, no.6, pp. 2671-2684, Jun. 2018 .
[6] A. Yener and S. Ulukus, “Wireless physical-layer security: Lessons learned from information theory,” Proc. IEEE, Vol. 103, no. 10, pp. 1814-1825, Oct. 2015.
[7] E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory ,Vol. 54, no. 6, pp. 2735-2751, Jun. 2008 .
[8] R. Diamant and L. Lampe, “Low Probability of Detection for Underwater Acoustic Communication: A Review,” IEEE Access, Vol. 6, pp. 19099-19112, Mar. 2018.
[9] K. Shahzad, X. Zhou, and S. Yan, “Covert Communication in Fading Channels under Channel Uncertainty,” IEEE 85th Veh. Tech.Conf. (VTC Spring), Sydney, NSW, Australia, pp. 1-5, Nov. 2017.
[10] A. Abdelaziz and C. Emre Koksal, “Fundamental Limits of Covert Communication over MIMO AWGN Channel,” IEEE Conf. on Commun. and Net. Security (CNS), Las Vegas, NV, USA, pp. 1-9, Dec. 2017.
[11] M. Forouzesh, P. Azmi, N. Mokari, and K.-K. Wong,” Covert Communications Versus Physical Layer Security,” arXiv: 1803.06608.
[12] J. Zhang and M. C. Gursoy, “Collaborative relay beamforming for secure broadcasting,” IEEE Wireless Commun. and Net. Conf. (WCNC), Sydney, NSW, Australia, pp. 1-6, Apr. 2010.
[13] J. Hu, S. Yan, X. Zhou, F. and J. Wang, “Covert Communication in Wireless Relay Networks,” IEEE GLOBECOM 2017, Singapore, pp. 1-6, Jan. 2018.
[14] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication,” IEEE Commun. Magazine, Vol. 53, no. 12, pp. 26-31, Dec. 2015.
[15] P. E. Oguntunde, O.A. Odetunmibi and A.O. Adejumo, “On the Sum of Exponentially Distributed Random Variables: A Convolution Approac”,’ European Journal of Statistics and Probability, Vol. 1, no. 2, pp. 1-8, Dec 2013.
[16] M. Forouzesh, P. Azmi, and A. Kuhestani, “Secure transmission with covert requirement in untrusted relaying networks”, arXiv: 1809.00312 [cs.CR], 2018.
[17] S. Boyd and L. Vandenberghe, “Convex Optimization”, Cambridge University Press, 2004.
[18] M. Moltafet, P. Azmi, M.R. Javan, and A.Mokdad, “Optimal and fair energy efficient resource allocation for energy harvesting-enabled-PD-NOMA-based HetNets”, IEEE Transactions on Wireless Communications, Vol. 17, no. 3, pp. 2054-2067, Mar. 2018.
[19] D. T. Ngo, S. Khakurel, T. Le-Ngoc, “Joint subchannel assignment and power allocation for OFDMA femtocell networks”, IEEE Transactions on Wireless Communications, Vol. 13 no. 1, pp. 342-355, Jan. 2014.