Learning an Adversary’s Actions for Secret Communication | IEEE Journals & Magazine | IEEE Xplore