Learning adversary's actions for secret communication | IEEE Conference Publication | IEEE Xplore