IFS-P1: Communications/Network Security |
Session Type: Poster |
Time: Thursday, May 30, 15:20 - 17:20 |
Location: Poster Area B |
Session Chairs: Phillip Regalia, Catholic University of America, and U.S. National Science Foundation and Yan Lindsey Sun, University of Rhode Island
|
|
IFS-P1.1: INFORMATION ALIGNMENT FOR MITIGATING JAMMING IN WIRELESS RELAY NETWORKS |
Sang Wu Kim; Iowa State University |
|
IFS-P1.2: PHASE WARPING AND DIFFERENTIAL SCRAMBLING ATTACKS AGAINST OFDM FREQUENCY SYNCHRONIZATION |
Matthew J. La Pan; Virginia Polytechnic and State University |
T. Charles Clancy; Virginia Polytechnic and State University |
Robert W. McGwier; Virginia Polytechnic and State University |
|
IFS-P1.3: OPTIMAL TRANSCEIVER DESIGN FOR WIRETAP CHANNELS WITH SIDE INFORMATION |
Holger Boche; Technische Universität München |
Rafael F. Schaefer; Technische Universität München |
|
IFS-P1.4: SECRECY SUM-RATES WITH REGULARIZED CHANNEL INVERSION PRECODING UNDER IMPERFECT CSI AT THE TRANSMITTER |
Giovanni Geraci; University of New South Wales |
Romain Couillet; Supélec |
Jinhong Yuan; University of New South Wales |
Mérouane Debbah; Supélec |
Iain Collings; CSIRO ICT Centre |
|
IFS-P1.5: MOBILE JAMMERS FOR SECRECY RATE MAXIMIZATION IN COOPERATIVE NETWORKS |
Dionysios S. Kalogerias; Rutgers, The State University of New Jersey |
Nikolaos Chatzipanagiotis; Duke University |
Michael M. Zavlanos; Duke University |
Athina P. Petropulu; Rutgers, The State University of New Jersey |
|
IFS-P1.6: AN INFORMATION THEORETIC FRAMEWORK FOR ENERGY EFFICIENT SECRECY |
Cristina Comaniciu; Stevens Institute of Technology |
H. Vincent Poor; Princeton University |
Ruolin Zhang; Stevens Institute of Technology |
|
IFS-P1.7: JOINT NULL-SPACE BEAMFORMING AND JAMMING TO SECURE AF RELAY SYSTEMS WITH INDIVIDUAL POWER CONSTRAINT |
Hui-Ming Wang; Xi'an Jiaotong University |
Qinye Yin; Xi'an Jiaotong University |
Wenjie Wang; Xi'an Jiaotong University |
Xiang-Gen Xia; University of Delaware |
|
IFS-P1.8: RATING SYSTEMS FOR ENHANCED CYBER-SECURITY INVESTMENTS |
Jie Xu; University of California, Los Angeles |
Yu Zhang; University of California, Los Angeles |
Mihaela van der Schaar; University of California, Los Angeles |
|
IFS-P1.9: ROBUST SCAREWARE IMAGE DETECTION |
Christian Seifert; Microsoft Corporation |
Jack W. Stokes; Microsoft Corporation |
Christina Colcernian; Microsoft Corporation |
John C. Platt; Microsoft Corporation |
Long Lu; Georgia Institute of Technology |
|
IFS-P1.10: OPTIMAL DISTRIBUTED DETECTION IN THE PRESENCE OF BYZANTINES |
Bhavya Kailkhura; Syracuse University |
Swastik Brahma; Syracuse University |
Yunghsiang Han; Syracuse University |
Pramod K. Varshney; Syracuse University |
|
IFS-P1.11: FINDING AN INFECTION SOURCE UNDER THE SIS MODEL |
Wuqiong Luo; Nanyang Technological University |
Wee Peng Tay; Nanyang Technological University |
|
IFS-P1.12: A PHYSICAL LAYER AUTHENTICATION SCHEME FOR COUNTERING PRIMARY USER EMULATION ATTACK |
Kapil M. Borle; Syracuse University |
Biao Chen; Syracuse University |
Wenliang Du; Syracuse University |
|
IFS-P1.13: PROBABILISTIC THREAT PROPAGATION FOR MALICIOUS ACTIVITY DETECTION |
Kevin Carter; Massachusetts Institute of Technology, Lincoln Laboratory |
Nwokedi Idika; Massachusetts Institute of Technology, Lincoln Laboratory |
William Streilein; Massachusetts Institute of Technology, Lincoln Laboratory |
|