Covert Communication by Exploiting Node Multiplicity and Channel Variations | IEEE Conference Publication | IEEE Xplore