My ICASSP 2013 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Clicking on the Add button next to a paper title will add that paper to your custom schedule.
Clicking on the Remove button next to a paper will remove that paper from your custom schedule.

IFS-P1: Communications/Network Security

Session Type: Poster
Time: Thursday, May 30, 15:20 - 17:20
Location: Poster Area B
Session Chairs: Phillip Regalia, Catholic University of America, and U.S. National Science Foundation and Yan Lindsey Sun, University of Rhode Island
 
  IFS-P1.1: INFORMATION ALIGNMENT FOR MITIGATING JAMMING IN WIRELESS RELAY NETWORKS
         Sang Wu Kim; Iowa State University
 
  IFS-P1.2: PHASE WARPING AND DIFFERENTIAL SCRAMBLING ATTACKS AGAINST OFDM FREQUENCY SYNCHRONIZATION
         Matthew J. La Pan; Virginia Polytechnic and State University
         T. Charles Clancy; Virginia Polytechnic and State University
         Robert W. McGwier; Virginia Polytechnic and State University
 
  IFS-P1.3: OPTIMAL TRANSCEIVER DESIGN FOR WIRETAP CHANNELS WITH SIDE INFORMATION
         Holger Boche; Technische Universität München
         Rafael F. Schaefer; Technische Universität München
 
  IFS-P1.4: SECRECY SUM-RATES WITH REGULARIZED CHANNEL INVERSION PRECODING UNDER IMPERFECT CSI AT THE TRANSMITTER
         Giovanni Geraci; University of New South Wales
         Romain Couillet; Supélec
         Jinhong Yuan; University of New South Wales
         Mérouane Debbah; Supélec
         Iain Collings; CSIRO ICT Centre
 
  IFS-P1.5: MOBILE JAMMERS FOR SECRECY RATE MAXIMIZATION IN COOPERATIVE NETWORKS
         Dionysios S. Kalogerias; Rutgers, The State University of New Jersey
         Nikolaos Chatzipanagiotis; Duke University
         Michael M. Zavlanos; Duke University
         Athina P. Petropulu; Rutgers, The State University of New Jersey
 
  IFS-P1.6: AN INFORMATION THEORETIC FRAMEWORK FOR ENERGY EFFICIENT SECRECY
         Cristina Comaniciu; Stevens Institute of Technology
         H. Vincent Poor; Princeton University
         Ruolin Zhang; Stevens Institute of Technology
 
  IFS-P1.7: JOINT NULL-SPACE BEAMFORMING AND JAMMING TO SECURE AF RELAY SYSTEMS WITH INDIVIDUAL POWER CONSTRAINT
         Hui-Ming Wang; Xi'an Jiaotong University
         Qinye Yin; Xi'an Jiaotong University
         Wenjie Wang; Xi'an Jiaotong University
         Xiang-Gen Xia; University of Delaware
 
  IFS-P1.8: RATING SYSTEMS FOR ENHANCED CYBER-SECURITY INVESTMENTS
         Jie Xu; University of California, Los Angeles
         Yu Zhang; University of California, Los Angeles
         Mihaela van der Schaar; University of California, Los Angeles
 
  IFS-P1.9: ROBUST SCAREWARE IMAGE DETECTION
         Christian Seifert; Microsoft Corporation
         Jack W. Stokes; Microsoft Corporation
         Christina Colcernian; Microsoft Corporation
         John C. Platt; Microsoft Corporation
         Long Lu; Georgia Institute of Technology
 
  IFS-P1.10: OPTIMAL DISTRIBUTED DETECTION IN THE PRESENCE OF BYZANTINES
         Bhavya Kailkhura; Syracuse University
         Swastik Brahma; Syracuse University
         Yunghsiang Han; Syracuse University
         Pramod K. Varshney; Syracuse University
 
  IFS-P1.11: FINDING AN INFECTION SOURCE UNDER THE SIS MODEL
         Wuqiong Luo; Nanyang Technological University
         Wee Peng Tay; Nanyang Technological University
 
  IFS-P1.12: A PHYSICAL LAYER AUTHENTICATION SCHEME FOR COUNTERING PRIMARY USER EMULATION ATTACK
         Kapil M. Borle; Syracuse University
         Biao Chen; Syracuse University
         Wenliang Du; Syracuse University
 
  IFS-P1.13: PROBABILISTIC THREAT PROPAGATION FOR MALICIOUS ACTIVITY DETECTION
         Kevin Carter; Massachusetts Institute of Technology, Lincoln Laboratory
         Nwokedi Idika; Massachusetts Institute of Technology, Lincoln Laboratory
         William Streilein; Massachusetts Institute of Technology, Lincoln Laboratory