Next Article in Journal
A Dynamic Assessment of Digital Maturity in Industrial SMEs: An Adaptive AHP-Based Digital Maturity Model (DMM)with Customizable Weighting and Multidimensional Classification (DAMA-AHP)
Previous Article in Journal
Advanced HVOF-Sprayed Carbide Cermet Coatings as Environmentally Friendly Solutions for Tribological Applications: Research Progress and Current Limitations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions

1
College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
2
College of Electronic Science, National University of Defense Technology, Changsha 410073, China
*
Authors to whom correspondence should be addressed.
Technologies 2025, 13(7), 283; https://doi.org/10.3390/technologies13070283
Submission received: 25 May 2025 / Revised: 17 June 2025 / Accepted: 30 June 2025 / Published: 3 July 2025
(This article belongs to the Section Information and Communication Technologies)

Abstract

This paper addresses the optimization problem for mobile jamming assistance schemes in cognitive covert communication (CR-CC), where cognitive users adopt the underlying mode for spectrum access, while an unmanned aerial vehicle (UAV) transmits the same-frequency noise signals to interfere with eavesdroppers. Leveraging the inherent dynamic game-theoretic characteristics of covert communication (CC) systems, we propose a novel covert communication optimization algorithm based on generative adversarial networks (GAN-CCs) to achieve system-wide optimization under the constraint of maximum detection error probability. In GAN-CC, the generator simulates legitimate users to generate UAV interference assistance schemes, while the discriminator simulates the optimal signal detection of eavesdroppers. Through the alternating iterative optimization of these two components, the dynamic game process in CC is simulated, ultimately achieving the Nash equilibrium. The numerical results show that, compared with the commonly used multi-objective optimization algorithm or nonlinear programming algorithm at present, this algorithm exhibits faster and more stable convergence, enabling the derivation of optimal mobile interference assistance schemes for cognitive CC systems.

1. Introduction

The scarcity and underutilization of spectrum resources have driven the emergence of cognitive radio (CR) technology [1]. However, with the development of technology, its transmission security faces the same threats and challenges. Current encryption methods and physical layer security technologies have problems that make it difficult to meet current electromagnetic security needs [2,3,4,5,6]. Consequently, CC—a low-detection, low-interception secure communication paradigm—has garnered substantial attention [7].
The theoretical evolution of CC spans three key stages, as follows: Lee et al. propose that CC means the user’s communication is not perceived by any users other than the communication object [8]. Shahzad et al. believe that the eavesdropper’s detection probability of the user’s communication satisfies the given concealment constraints, namely CC [9]. Bash et al. define CC as low-detection/low-interception communications for information security, aiming both to protect data security and to ensure that the communication behavior is not detected [10]. Based on the above concepts, this paper further defines CR-CC as a secure communication method that achieves low detection and low interception by concealing communication elements such as transmission information, transmission mechanism, transmission channel, and transmission protocol.
Based on the theoretical basis, Bash et al. studied the CC over additive white Gaussian noise (AWGN) channels and defined the fundamental boundary of CC as the root mean square criterion [11]. He et al. further studied the fundamental bounds of CC networks with noise uncertainty (CNU) and verified that the maximum achievable rate of CC is positive [12]. Che et al. and Wang et al. studied CC over binary symmetric channels (BSC) and discrete memoryless channels (DMCs), respectively, and further verified the bounds of the root-mean-square criterion [13,14].
However, at the same time, for the complex CR system, approximate optimization and linear regression optimization methods are difficult to handle with such a problem. Intelligent CR-CC refers to the application of deep learning (DL) techniques to conventional CR networks to achieve CC, using its unique training mechanism and model construction method to overcome many difficulties and shortcomings of conventional CC.
Deep learning techniques have achieved certain application results in the field of radio communication (RC), such as physical layer authentication security [15,16,17], radio frequency (RF) fingerprinting of wireless devices [18,19], and detection of user simulation attacks [20,21]. In particular, deep learning technology integrated with game theory has developed and been applied rapidly in the field of CC, and has achieved certain research results in aspects such as dataset support [22], CC parameter analysis [23], and efficiency [24]. GAN can analyze sample features and extract label information based on limited data to train the optimal generator. Its “adversarial” method is similar to the dynamic game between users and eavesdroppers in CC systems. This method has broad development and application prospects in the field of CC.
The main contributions of this paper are as follows:
  • Modeling and analysis of a UAV-assisted CR-CC system with multi-objective optimization.
  • Formulation of CC dynamics as a GAN-based adversarial game.
  • Proposal of the GAN-CC algorithm, including network design and training procedures.
  • Comprehensive performance validation through simulations.
Essentially, this paper is organized as follows: Section 2 establishes the model of the UAV mobile interference-assisted CC system, analyzes the relevant parameters, and derives the multi-objective optimization system equation. Section 3 introduces the GAN-CC UAV interference-assistance optimization algorithm, presents the algorithm framework and network structure, and formulates the algorithm training process. Section 4 conducts the verification of the algorithm simulation results and the discussion of parameters. Section 5 summarizes and presents the future prospects of this research.

2. Materials and Methods

This section first establishes the UAV mobile interference-assisted CC system model, quantifies the behaviors of each user within the CC system, analyzes the relevant parameters, and finally derives the multi-objective optimization system equation for subsequent research.

2.1. System Model

Figure 1 illustrates a CR network CC system consisting of the following communication nodes: the primary user transmitter and receiver (PT, PR), the authorized cognitive user transmitter and receiver (AT, AR), and the auxiliary jammer UAV and eavesdropper, Eve. Among them, the cognitive user’s communication uses an underlay approach for co-channel access, while the UAV assists the CR user’s CC by emitting noise to interfere with the eavesdropper.
According to the problem setting, UAV is able to obtain the location information of PT, PR, AT, and AR, but considering Eve’s passive reception mode and secret eavesdropping characteristics, its accurate location information cannot be obtained, so it is assumed that Eve is located in the reference plane and the UAV’s position error parameter for Eve is expressed as a Gaussian distribution with variance of ε E ve 2 .
Each communication node in the system is assumed to transmit with a single antenna, and the effects of antenna polarization are not considered. In the underlay mode CC, each legal user communication and UAV noise are transmitting on the same frequency, that is, there will be mutual interference of signals. In addition to the antenna propagation gain, it is also necessary to consider the path propagation loss problem in communication. The wireless electromagnetic wave enters the receiver after propagating through multiple non-visible paths, and its signal strength obeys the Rayleigh distribution [25]. Thus, the transmission gain of each communication link channel is expressed based on Rayleigh fading, and the channel gain corresponding to the   n 1,2 , , N time slot is expressed as follows:
h a , b ( n ) = A d ( c 4 π f c d a , b n ) d e α e a , b , a , b { PT , PR , AT , AR , UAV , Eve }
Among them, A d represents antenna gain, f c represents carrier frequency, d a , b ( n ) = ( x a n x b n ) 2 + ( y a n y b n ) 2 + ( z a n z b n ) 2 represents the space distance of the node a , b in the system with the n time slot, d e represents the path decay index, c = 3 × 1 0 8   m / s , and α e a , b represents the fading parameter and obeys the Rayleigh distribution [26].
It is worth noting that in the CC system, the parameters α e P T , P R , α e P T , A R , α e A T , P R , α e A T , A R , α e U A V , P R , and α e U A V , A R obey the frequency-free-selectivity standard Rayleigh fading with mean 0 and variance 1, while the parameter distribution patterns of α e U A V , E v e and α e A T , E v e are related to the actual sample data. Similarly, the UAV can obtain P R , A R noise variance, while the parameters of noise variance at Eve are also related to the sample data.
Therefore, the respective co-channel signals received by the i ( i { 1,2 , , M } ) channel of the AR node at the n ( n { 1,2 , , N } ) time slot can be expressed as follows:
r i A R n = P A T h A T , A R s i A T n + P P T h P T , A R s i P T n + P U A V ( n ) h U A V , A R ( n ) s i U A V ( n ) + n i A R ( n )
Among them, P A T and P P T represent the signal transmit power of AT and PT nodes, and their values remain constant in the system duration T. P U A V ( n ) represent the signal transmit power of the UAV with artificial noise in the n th s lot, s i A T ( n ) , s i P T ( n ) and s i U A V ( n ) correspond to the signals of AT, PT, and UAV in the n th slot, respectively. In order to be close to the actual non-ideal situation, we introduce n i A R ( n ) as the additive white Gaussian noise (AWGN) parameter of AR nodes [27].

2.2. Communication Parameter Analysis

In the underlay CC, the cognitive user follows the principle that it cannot affect the normal communication of the primary user; the transmission rate of the i th channel at the n th slot of the PR needs to satisfy the following conditions:
R P R n = 1 P i = 1 P R i P R n = log 2 ( 1 + P P T | h P T ,   P R | 2 P A T | h A T ,   P R | 2 + P U A V n h U A V ,   P R n 2 + σ P R 2 ) R m i n P R
where R m i n P R is the minimum transmission rate constraint of the primary user, and σ P R 2 is the variance of the AWGN at the PR node. Based on this, the CC rate of the AR in the n th time slot can be expressed as follows:
R A R ,     C n = 1 M i = 1 M R i A R ,   C n = log 2 ( 1 + P A T | h A T ,   A R | 2 P P T | h P T ,   A R | 2 + P U A V n h U A V ,   A R n 2 + σ A R 2 )
And Eve determines the communication behavior by detecting whether information is transmitted between AT and AR, corresponding to the existence of CC. The received signal of Eve’s first channel at the n th time slot is as follows:
r i E v e n = P U A V ( n ) h UAV , E v e ( n ) s i UAV ( n ) + P A T h A T , E v e ( n ) s i A T ( n ) + n i E v e ( n ) ,   H 1 P U A V ( n ) h UAV , E v e ( n ) s i UAV ( n ) + n i E v e ( n ) ,                                                                                       H 0
where H 1 and H 0 correspond to whether the cognitive user performs CC or not, and n i E v e ( n ) denotes Eve’s AWGN with a variance of σ E v e 2 .
Eve determines the received signal by setting the detection threshold value τ . The detection error probability in the n th slot is as follows:
ρ n = p H 0 p D 1 H 0 n + p ( H 1 ) p ( D 0 | H 1 ) ( n )
where p ( D 1 | H 0 ) ( n ) and p ( D 0 | H 1 ) ( n ) denote the probabilities of error-triggering and missed detection of Eve at the n th slot, and p ( H 1 ) and p ( H 0 ) denote the probability of whether the AT actually performs CC, p ( H 1 ) + p ( H 0 ) = 1 .

2.3. System Equation Derivation

According to the system model, the problem under study is essentially a comprehensive optimization of the UAV flight trajectory and transmission power to maximize the user CC rate and Eve’s detection error probability, aiming to achieve optimal system efficiency while preserving information security.
Based on the above derivation, we describe such a multi-objective non-convex optimization problem for a UAV interference-assisted CR-CC system as follows:
p 1 m a x x UAV n , y UAV n , z UAV n , P UAV n R A R , C n p 2 m a x x UAV n , y UAV n , z UAV n , P UAV n ρ ( n )                
Subject to
0 P U A V n P U A V m a x , n ( 1,2 , , N )
R p r R p r m i n
V U A V V m a x · δ , n ( 1,2 , , N 1 )
To solve this problem, the current research adopts the approximate convex optimization (ACO) method and the block coordinate descent (BCD) method. However, these methods often need to reduce the dimension of system problems by simplifying the system problems through idealized hypotheses or by fixing one of the problems, which has many problems. Therefore, this paper proposes a GAN-based optimization algorithm for UAV interference-assisted schemes, i.e., the GAN-CC algorithm, using a deep learning approach.

3. Algorithm Design

In this section, the optimization process is transformed into a dynamic game problem between the UAV and Eve based on the system model, and the GAN-CC UAV interference-assistance optimization algorithm is proposed. In particular, we first introduce the algorithm framework and the network structure, and then develop the training process of the network model.

3.1. Principles of Counter CC

According to the analysis of the system model and optimization process in Part 2, the objectives of the optimization problem correspond to the metrics of the UAV jamming-assistance CR-CC system model, respectively.
Figure 2 shows the framework of the GAN-CC algorithm, which mainly consists of two subnetworks, namely, the generator and discriminator. The generator w g simulates the CC of legitimate users, and the discriminator w d simulates Eve’s eavesdropping behavior. Environment parameters include electromagnetic environment, communication state, and parameters of each node in the communication system. According to the system model, the environmental state parameters obtained by the generator include h P T , P R ( n ) , h A T , P R ( n ) , h U A V , P R ( n ) , h P T , A R ( n ) , h A T , A R ( n ) , h U A V , A R ( n ) , σ P R 2 , σ P R 2 , and σ E v e 2 . Meanwhile, the constraints in w g include the minimum communication rate constraint of the main user, R m i n P R , the maximum flight speed constraint of the UAV, V m a x , and the maximum noise emission power constraint, P U A V m a x , while the condition in the discriminator is the initial detection threshold value, τ 0 .
According to the dynamic game process of CC, the training expectation of the w g is to generate the best interference assistance scheme G T , G P based on the existing environment state parameters and the Eve threshold τ , while the training expectation of w d is to optimize the detection threshold based on the communication parameters and UAV results to achieve the best signal detection scheme. Therefore, the GAN-CC algorithm is essentially designed to design an optimal generator to achieve the maximum CC rate, while the discriminator cannot detect it correctly. The antagonistic process of the network is described as follows:
p 3.1 V ( G , D ) m a x D = E H 0 ~ P d a t a lg D H 0 + E z ~ P z lg 1 D G z p 3.2 V ( G , D ) m i n G = E H 0 ~ P d a t a l g ( D ( H 0 ) ) + E z ~ P z l g ( 1 D ( G ( z ) ) )
where H 0 represents the UAV scheme without CC, subject to the sample data distribution p d a t a ; z is the environmental state parameter, subject to a prior probability distribution p z ; D ( G ( z ) ) and D ( H 0 ) represent the output of w d at inputs G ( z ) and H 0 , respectively, corresponding to the discriminator’s analog signal detection under the condition that w g generates the scheme, whether CC is taking place or not.
Thus, the goal of w d is to make D ( H 0 ) as close to 1 as possible and D ( G ( z ) ) close to 0, that is, to maximize lg ( D ( H 0 ) ) and lg ( 1 D ( G ( z ) ) ) , thus allowing Eve to avoid error detection. The goal of w g is to generate the best solution, even if the value of D ( G ( z ) ) is as close to 1 as possible, and to minimize lg ( 1 D ( G ( z ) ) ) , so that Eve detects errors. The above dynamic game objectives correspond to Equation (11), respectively.

3.2. Introduction of Full-Label Sample Condition

Due to the complex parameters of the CR-CC system, this paper focuses on solving the adversarial CC problem while preventing the GAN from generating “fake data” or the optimization process from being affected by other non-critical factors. This paper introduces some reasonable assumptions, mainly analyzing the CC problem under the full-label sample condition. The full-label sample condition assumes that the transmitting power and channel state information (CSI) of the legitimate user are known, the channel distribution information (CDI) of Eve is known, and the detection threshold is unknown.

3.3. Design of Discriminator and Generator Network Structure

Figure 3a shows the network structure of D, which is composed of three layers of the neural network. The neurons in the input layer are P A T 0 , P A T 1 , P U A V , which, respectively, represent the transmitted power of cognitive users in the absence of CC, the CC-transmitted power of cognitive users, and the transmitted power of the UAV received by Eve. According to the Kolmogorov theorem, the number of neurons d in the hidden layer of the discriminator is set as 7 [28]. According to the system equations ( p 1 ,   p 2 ) and the game process ( p 3.1 ) , the discriminator training process is essential to optimize τ and achieve the optimal signal detection probability, that is, the output layer neuron is Eve’s signal detection parameter.
To facilitate the quantification of the results, the output neurons are approximated as multivariate classifiers, so the SoftMax function is chosen for the activation function [29], while the weight optimization process of the implicit layer needs to fit the data, so the ReLU function is chosen [30].
Figure 3b shows the network structure of G, which is composed of three layers of neural networks. The input layer neuron parameters are h P T , P R ( n ) , h A T , P R ( n ) , h U A V , P R ( n ) , h P T , A R ( n ) , h A T , A R ( n ) , h U A V , A R ( n ) , σ A R 2 , σ P R 2 , and σ E v e 2 . The number of neurons in the hidden layer g is set to 19. According to the system equations ( p 1 ,   p 2 ) and the game process ( p 3.2 ) , the goal of the generator is to maximize the CC rate, that is, to generate the optimal UAV flight path and transmission power scheme. The output layer neurons of the generator correspond to G 1 and G 2 .
The ReLU function is selected for the implicit layer in line with D to enhance the accuracy of the weight update and improve the fit to the data, while the activation function of each neuron in the output layer is selected as the ReLU for the convenience of outputting a non-approximate UAV scheme.

3.4. GAN-CC Network Model Training

Algorithm 1 describes the algorithm training process. The overall idea of the GAN-CC algorithm training is based on pre-training, alternating iterative training of G and D. The iterative optimization process is controlled by the changes in the corresponding loss functions of G and D to achieve the Nash Equilibrium of the system. The final result of G is the best CC scheme that can cope with all possible eavesdropping behaviors. The weights are updated using gradient descent training, and according to the game equations ( p 3.1 , p 3.2 ), the loss functions for constructing the discriminator and generator, respectively, are constructed as follows:
L D = ω d ( lg ( D ( x ) ) + lg ( 1 D ( G ( z ) ) ) )
L G = ω g ( lg ( 1 D ( G ( z ) ) ) )
Specifically, taking D as an example, the output of the implied layer is H d , the output of the output layer is C d , and the value of the loss function is L d . The update of the weights from the implied layer to the output layer ω d 2 and the update of the weights from the input layer to the implied layer ω d 1 are:
ω d 2 = ω d 2 + λ d L d C d C d ω d 2
ω d 1 = ω d 1 + λ d L d C d C d H d H d ω d 1
where λ d denotes the training learning rate of D; λ d and λ g can be updated according to the loss functions L d and L g during the adversarial training, serving as adaptive learning rates [31].
Algorithm 1 Training Procedure of GAN-CC
Initialization
1:
Establish a frequency-free, selective, small-scale Rayleigh fading parameter distribution with mean 0 and variance 1, where the path-fading index α e is chosen as 2.8 ( α e a , b = 1.0848,0.9039 , 0.8941 , 1.2015 , 1.4296 , 1.9746 , 1.2852,0.0611,0.0076,0.1774 ) [32,33]; establish a Gaussian AWGN parameter distribution with mean 0 and variance 3 to simulate a real communication scenario ( A W G N = { 0.6354 , 2.1392,1.2825 , 1.2110,3.1169 , 3.2806,0.8905,2.8324,0.5696,4.4047 } ) [34]; initialize the weights ω d and ω g of each layer of the discriminator and generator using Gaussian-distributed random data with mean 0 and a variance of 2 S l , where S l denotes the number of neurons in the layer l of the neural network [35].
Pre-processing
2:
Use sample data to pre-train D and G (numpy.random.normal (loc = 0.0, scale = 1.0, size = 10)).
3:
While the loss function has not converged or the training number is less than the maximum iterations, do
4: 
When the system reaches Nash equilibrium, end the model training, and obtain the best output solution based on the sample data.
5: 
For k steps, do
6:  
According to Equation (12), calculate the loss function of D and iteratively train it, updating the neural network weights along the direction of the rising gradient of the loss function.
7: 
End for
8: 
According to Equation (13), calculate the loss function of G and iteratively train it, updating the neural network weights along the direction of the gradient decrease of the loss function.
9:
End while
Output
10:
Obtain the optimal CC jamming-assistance scheme.

4. Results and Discussion

In this section, the GAN-CC algorithm’s performance and parameter sensitivity are further evaluated by comparing different learning rate settings, validating numerical simulation results, and discussing parameters.

4.1. Convergence Performance Analysis

Figure 4 shows the effects of fixed and adaptive learning rates on the convergence of the algorithm. It can be seen that during the process of network training, the value of the loss function of D monotonically increases, while the loss function of G monotonically decreases. Finally, they reach a Nash equilibrium, where the value of the loss function tends to be stable, the overall convergence rate is faster, and the results are stable. At the same time, we can see that the convergence rate of the network is faster in the case of the adaptive learning rate, which makes the algorithm perform better in practice.

4.2. Covert Communication Performance Analysis

The CC performance of the GAN-CC algorithm is analyzed through comparative studies with the iterative optimization process of the BCD method. The BCD approach operates by fixing UAV positioning parameters under current configurations and transforming the system problem into a single-objective optimization task for transmission power iteration, aiming to maximize the CC rate. Consequently, its simulation results exhibit discrete distributions with high similarity between consecutive iterations. Comparative simulations reveal that the GAN-CC algorithm demonstrates superior capability in handling complex sample data and non-ideal multi-objective optimization scenarios, effectively mitigating excessive idealization assumptions inherent in conventional methods. Moreover, it maintains robust convergence and stability while achieving comparable or enhanced CC performance relative to traditional approaches, thereby demonstrating superior optimization characteristics.

4.3. Parameter Discussion

According to the changes in the minimum detection error probability, ρ min , and the maximum CC rate, R max , of the system under different parameter conditions in Table 1, it can be seen that ρ min always decreases monotonically with the increase in P AT , which is consistent with the actual situation—the greater the CC transmission power of the cognitive user, the greater the risk of being detected by an eavesdropper. Meanwhile, as shown in Figure (a) in Table 1, λ does not change the value of ρ min , but only changes the convergence speed of the model; thus, the larger the learning rate is within the preset range, the faster the model converges. And R m i n P R and h U A V P R affect the value of ρ min . As shown in Figure (c) in Table 1, with the increase in R m i n P R , the system imposes greater constraints on the UAV transmission power in the case of constant CC power, so the concealment performance of communication is affected, and ρ min decreases monotonically. As shown in Figure (g) in Table 1, with the increase in h U A V P R , the signal interference of UAV to the primary user is stronger under the condition of constant noise power, so the constraint is stronger, which affects the CC performance, and ρ min decreases monotonically.
In terms of the maximum CC rate, R max , of the system, it can be seen that R max always increases monotonically with the increasing P AT . At the same time, it can be seen from Figure (b) in Table 1 that λ still only affects the model convergence rate and does not change the value of R max . And R m i n P R and h U A V P R have an effect on the value of R max . As shown in Figure (d) in Table 1, with the increase in R m i n P R , the system will generate greater constraints on both P A T and P U A V ( n ) , resulting in the restriction of the CC rate, and R max monotonically decreases. As shown in Figure (h) in Table 1, with the increase in h U A V P R , the UAV transmit power will decrease under the condition that R m i n P R is constant, and more cognitive user power can be released to a certain extent, so R max monotonically increases. The above two influencing factors have little influence when P AT is small, and the data gap increases with the increase in P AT ; subject to the constraint of the eavesdropping risk, R max cannot keep increasing, and will tend to a stable value.

5. Conclusions

This study addresses the significant challenge of optimizing mobile jamming-assisted schemes for cognitive CC systems through the novel integration of GANs and game-theoretic principles. By formulating the CC process as a dynamic adversarial game between legitimate users and eavesdroppers, the GAN-CC algorithm can dynamically analyze the process of CC based on the generated datasets of legitimate users and eavesdroppers, jointly optimize the trajectory and transmission power of UAV to maximize the CC rate while minimizing the detection probability of eavesdroppers, thereby improving the efficiency of CC by approximately 60%. The main contributions include the following:
  • System modeling: A comprehensive framework for UAV-assisted CR-CC that integrates underlay spectrum access, Rayleigh fading channels, and multi-objective optimization constraints.
  • Algorithm design: A GAN-based adversarial training mechanism where the generator synthesizes optimal interference schemes and the discriminator emulates adaptive eavesdropper detection, achieving Nash equilibrium through iterative optimization.
  • Performance validation: Numerical simulations demonstrate that GAN-CC outperforms conventional methods (e.g., block coordinate descent) in terms of convergence speed, stability, and CC rate maximization, particularly under non-ideal channel conditions.
The algorithm’s robustness stems from its ability to bypass idealized assumptions inherent in traditional optimization approaches and directly addresses the dynamics of non-convex and high-dimensional systems. Simulation results further reveal that the adaptive learning rate mechanism significantly accelerates convergence, while parameter sensitivity analyses highlight the trade-off between detection error probability ( ρ min ) and CC rate ( R max ) under varying constraints.
These findings underscore the practical applicability of GAN-CC in CC networks, where dynamic interference management and eavesdropper evasion are critical. However, this study is mainly based on the full-label sample condition, introduces some assumptions, and does not consider the energy consumption, endurance of the UAV, or the dynamic and real-time performance of the CC system. Therefore, the parameter update model should be further added to support promotion and application. Future work will explore extensions to multi-UAV cooperative systems and heterogeneous channel environments to further enhance the scalability and adaptability of the framework.

Author Contributions

Conceptualization, W.F. and H.W.; methodology, W.F., B.L. and H.W.; software, H.W. and H.G.; validation, B.L.; writing—original draft preparation, W.F. and H.W.; writing—review and editing, B.L. and X.L.; visualization, W.F. and H.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CR-CCCognitive Covert Communication
CCCovert Communication
CRCognitive Radio
GANsGenerative Adversarial Networks
AWGNAdditive White Gaussian Noise
CNUCC with Noise Uncertainty
BSCBinary Symmetric Channels
DMCDiscrete Memoryless Channel
DLDeep Learning
RCRadio Communication
RFRadio Frequency
UAVUnmanned Aerial Vehicle
ACOApproximate Convex Optimization
BCDBlock Coordinate Descent
CSIChannel State Information
CDIChannel Distribution Information

References

  1. Mitola, J.; Maguire, G.Q. Cognitive Radio: Making Software Radios More Personal. IEEE Pers. Commun. 1999, 6, 13–18. [Google Scholar] [CrossRef]
  2. Jagatheesaperumal, S.K.; Ahmad, I.; Höyhtyä, M.; Khan, S.; Gurtov, A. Deep Learning Frameworks for Cognitive Radio Networks: Review and Open Research Challenges. J. Netw. Comput. Appl. 2025, 233, 104051. [Google Scholar] [CrossRef]
  3. Li, J.; Li, B.; You, G.; Zhang, J.; Zhao, W. ISAC-Assisted Defense Mechanisms for PUE Attacks in Cognitive Radio Networks. Int. J. Intell. Syst. 2025, 2025, 6618969. [Google Scholar] [CrossRef]
  4. Alahmadi, A.; Abdelhakim, M.; Ren, J.; Li, T. Defense against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE Trans. Inf. Forensics Secur. 2014, 9, 772–781. [Google Scholar] [CrossRef]
  5. Goeckel, D.; Vasudevan, S.; Towsley, D.; Adams, S.; Ding, Z.; Leung, K. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks. IEEE J. Sel. Areas Commun. 2011, 29, 2067–2076. [Google Scholar] [CrossRef]
  6. Wang, X.; Du, H.; Gao, Y.; Zhang, J.; Niyato, D.; Letaief, K.B. Secure Body-Centric Internet of Things Networks: Physical Layer Security versus Covert Communication. IEEE Trans. Wirel. Commun. 2024, 23, 12731–12748. [Google Scholar] [CrossRef]
  7. Shen, W.; Chen, J.; Zheng, S.; Zhang, L.; Pei, Z.; Lu, W.; Yang, X. Deep Learning for Covert Communication. China Commun. 2024, 21, 40–59. [Google Scholar] [CrossRef]
  8. Lee, S.; Baxley, R.J.; McMahon, J.B.; Frazier, R.S. Achieving Positive Rate with Undetectable Communication over MIMO Rayleigh Channels. In Proceedings of the 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM), A Coruna, Spain, 22–25 June 2014. [Google Scholar] [CrossRef]
  9. Shahzad, K.; Zhou, X.; Yan, S. Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints. IEEE Trans. Veh. Technol. 2019, 68, 12432–12436. [Google Scholar] [CrossRef]
  10. Bash, B.A.; Goeckel, D.; Towsley, D.; Guha, S. Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication. IEEE Commun. Mag. 2015, 53, 26–31. [Google Scholar] [CrossRef]
  11. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  12. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication with Noise Uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef]
  13. Che, P.H.; Bakshi, M.; Jaggi, S. Reliable Deniable Communication: Hiding Messages in Noise. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013. [Google Scholar] [CrossRef]
  14. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental Limits of Communication with Low Probability of Detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef]
  15. Wei, Q.; Wang, B.; Cao, K. Physical Layer Security Technology Based on Nonorthogonal Multiple Access Communication. Mob. Inf. Syst. 2022, 2022, 6303210. [Google Scholar] [CrossRef]
  16. Meng, R.; Xu, B.; Xu, X.; Sun, M.; Wang, B.; Han, S.; Lv, S.; Zhang, P. A Survey of Machine Learning-Based Physical-Layer Authentication in Wireless Communications. J. Netw. Comput. Appl. 2024, 235, 104085. [Google Scholar] [CrossRef]
  17. Saravanan, K.; Gurumoorthy, K.B.; Stalin, A.D.; Kumar, O.P. Secure Channel Estimation Model for Cognitive Radio Network Physical Layer Security Using Two-Level Shared Key Authentication. Sci. Rep. 2025, 15, 2445. [Google Scholar] [CrossRef]
  18. Sun, L.; Ke, D.; Wang, X.; Huang, Z.; Huang, K. Robustness of Deep Learning-Based Specific Emitter Identification under Adversarial Attacks. Remote Sens. 2022, 14, 4996. [Google Scholar] [CrossRef]
  19. Lu, Q.; Yang, Z.; Zhang, H.; Chen, F.; Xian, H. MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification. IEEE Internet Things J. 2024, 11, 30442–30454. [Google Scholar] [CrossRef]
  20. Toma, A.; Krayani, A.; Farrukh, M.; Qi, H.; Marcenaro, L.; Gao, Y.; Regazzoni, C.S. AI-Based Abnormality Detection at the PHY-Layer of Cognitive Radio by Learning Generative Models. IEEE Trans. Cogn. Commun. Netw./IEEE Trans. Cogn. Commun. Netw. 2020, 6, 21–34. [Google Scholar] [CrossRef]
  21. Krishnan, M.; Lim, Y.; Perumal, S.; Palanisamy, G. Detection and Defending the XSS Attack Using Novel Hybrid Stacking Ensemble Learning-Based DNN Approach. Digit. Commun. Netw. 2022, 10, 716–727. [Google Scholar] [CrossRef]
  22. Li, Z.; Shi, J.; Si, J.; Lv, L.; Guan, L.; Hao, B.; Tie, Z.; Wang, D.; Xing, C.; Quek, T.Q.S. Intelligent Covert Communication: Recent Advances and Future Research Trends. Engineering 2024, 44, 101–111. [Google Scholar] [CrossRef]
  23. Wen, Y.; Huo, Y.; Li, J.; Qian, J.; Wang, K. Generative Adversarial Network-Aided Covert Communication for Cooperative Jammers in CCRNs. IEEE Trans. Inf. Forensics Secur. 2025, 20, 1278–1289. [Google Scholar] [CrossRef]
  24. Qin, J.; Wang, J.; Tan, Y.; Huang, H.; Xiang, X.; He, Z. Coverless Image Steganography Based on Generative Adversarial Network. Mathematics 2020, 8, 1394. [Google Scholar] [CrossRef]
  25. Ashok, P.; Latha, B. Develop an Improved Mel-Frequency Cepstral Coefficients Signal Processing Algorithms for Enhancing Underwater Acoustic Signal through Wireless Network. Measurement 2024, 243, 116414. [Google Scholar] [CrossRef]
  26. Liao, L.; Lai, Y.; Yang, F.; Zeng, W. Online Computation Offloading with Double Reinforcement Learning Algorithm in Mobile Edge Computing. J. Parallel Distrib. Comput. 2023, 171, 28–39. [Google Scholar] [CrossRef]
  27. Jiang, Y.; Wang, L.; Chen, H.-H.; Shen, X. Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges. Proc. IEEE 2024, 112, 47–82. [Google Scholar] [CrossRef]
  28. Frisiani, G.; Parisini, T.; Siccardi, L.; Zoppoli, R. Team Theory and Backpropagation for Dynamic Routing in Communication Networks. In Proceedings of the IJCNN-91-Seattle International Joint Conference on Neural Networks, Seattle, WA, USA, 8–12 July 2002. [Google Scholar] [CrossRef]
  29. Rosa, G.H.; Papa, J.P. A Survey on Text Generation Using Generative Adversarial Networks. Pattern Recognit. 2021, 119, 108098. [Google Scholar] [CrossRef]
  30. Allouche, M.; Girard, S.; Gobet, E. EV-GAN: Simulation of Extreme Events with ReLU Neural Networks. J. Mach. Learn. Res. 2021, 23, 1–39. [Google Scholar]
  31. Yang, W.; Zhang, H.; Lim, J.B.; Zhang, Y.; Meng, H. A New Chiller Fault Diagnosis Method under the Imbalanced Data Environment via Combining an Improved Generative Adversarial Network with an Enhanced Deep Extreme Learning Machine. Eng. Appl. Artif. Intell. 2024, 137, 109218. [Google Scholar] [CrossRef]
  32. Huang, L.; Bi, S.; Zhang, Y.J. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks. IEEE Trans. Mob. Comput. 2019, 19, 2581–2593. [Google Scholar] [CrossRef]
  33. Tang, Q.; Fei, Z.; Li, B.; Yu, H.; Cui, Q.; Zhang, J.; Han, Z. Stochastic Computation Offloading for LEO Satellite Edge Computing Networks: A Learning-Based Approach. IEEE Internet Things J. 2023, 11, 5638–5652. [Google Scholar] [CrossRef]
  34. Memduh, K. Signal-To-Noise Ratio Estimation of Noisy Transient Signals. Commun. Fac. Sci. Univ. Ank. 2015, 57, 11–19. [Google Scholar] [CrossRef]
  35. He, K.; Zhang, X.; Ren, S.; Sun, J. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification. In Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV), Santiago, Chile, 7–13 December 2015. [Google Scholar] [CrossRef]
Figure 1. UAV mobile jamming-assisted CC system model.
Figure 1. UAV mobile jamming-assisted CC system model.
Technologies 13 00283 g001
Figure 2. Framework of the GAN-CC algorithm.
Figure 2. Framework of the GAN-CC algorithm.
Technologies 13 00283 g002
Figure 3. Network structure (a) discriminator; (b) generator.
Figure 3. Network structure (a) discriminator; (b) generator.
Technologies 13 00283 g003
Figure 4. Effect of training the learning rate on convergence.
Figure 4. Effect of training the learning rate on convergence.
Technologies 13 00283 g004
Table 1. ρ min , R max changes.
Table 1. ρ min , R max changes.
Parameter SettingMinimum Detection Error
Probability ρ min
Maximum CC Rate R max
Training learning rate λ Technologies 13 00283 i001
(a)
Technologies 13 00283 i002
(b)
Primary
users’
minimum transmission rate R min PR
Technologies 13 00283 i003
(c)
Technologies 13 00283 i004
(d)
Cognitive users’
transmission power P AT
Technologies 13 00283 i005
(e)
Technologies 13 00283 i006
(f)
UAV
channel
parameter h UAV PR
Technologies 13 00283 i007
(g)
Technologies 13 00283 i008
(h)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fu, W.; Li, B.; Wang, H.; Gong, H.; Lin, X. A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions. Technologies 2025, 13, 283. https://doi.org/10.3390/technologies13070283

AMA Style

Fu W, Li B, Wang H, Gong H, Lin X. A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions. Technologies. 2025; 13(7):283. https://doi.org/10.3390/technologies13070283

Chicago/Turabian Style

Fu, Wenxuan, Bo Li, Haipeng Wang, Haochen Gong, and Xiang Lin. 2025. "A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions" Technologies 13, no. 7: 283. https://doi.org/10.3390/technologies13070283

APA Style

Fu, W., Li, B., Wang, H., Gong, H., & Lin, X. (2025). A GAN-Based Method for Cognitive Covert Communication UAV Jamming-Assistance Under Fully Labeled Sample Conditions. Technologies, 13(7), 283. https://doi.org/10.3390/technologies13070283

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop