IFS-P1: Communications/Network Security |
| Session Type: Poster |
| Time: Thursday, May 30, 15:20 - 17:20 |
| Location: Poster Area B |
| Session Chairs: Phillip Regalia, Catholic University of America, and U.S. National Science Foundation and Yan Lindsey Sun, University of Rhode Island
|
| |
| IFS-P1.1: INFORMATION ALIGNMENT FOR MITIGATING JAMMING IN WIRELESS RELAY NETWORKS |
| Sang Wu Kim; Iowa State University |
| |
| IFS-P1.2: PHASE WARPING AND DIFFERENTIAL SCRAMBLING ATTACKS AGAINST OFDM FREQUENCY SYNCHRONIZATION |
| Matthew J. La Pan; Virginia Polytechnic and State University |
| T. Charles Clancy; Virginia Polytechnic and State University |
| Robert W. McGwier; Virginia Polytechnic and State University |
| |
| IFS-P1.3: OPTIMAL TRANSCEIVER DESIGN FOR WIRETAP CHANNELS WITH SIDE INFORMATION |
| Holger Boche; Technische Universität München |
| Rafael F. Schaefer; Technische Universität München |
| |
| IFS-P1.4: SECRECY SUM-RATES WITH REGULARIZED CHANNEL INVERSION PRECODING UNDER IMPERFECT CSI AT THE TRANSMITTER |
| Giovanni Geraci; University of New South Wales |
| Romain Couillet; Supélec |
| Jinhong Yuan; University of New South Wales |
| Mérouane Debbah; Supélec |
| Iain Collings; CSIRO ICT Centre |
| |
| IFS-P1.5: MOBILE JAMMERS FOR SECRECY RATE MAXIMIZATION IN COOPERATIVE NETWORKS |
| Dionysios S. Kalogerias; Rutgers, The State University of New Jersey |
| Nikolaos Chatzipanagiotis; Duke University |
| Michael M. Zavlanos; Duke University |
| Athina P. Petropulu; Rutgers, The State University of New Jersey |
| |
| IFS-P1.6: AN INFORMATION THEORETIC FRAMEWORK FOR ENERGY EFFICIENT SECRECY |
| Cristina Comaniciu; Stevens Institute of Technology |
| H. Vincent Poor; Princeton University |
| Ruolin Zhang; Stevens Institute of Technology |
| |
| IFS-P1.7: JOINT NULL-SPACE BEAMFORMING AND JAMMING TO SECURE AF RELAY SYSTEMS WITH INDIVIDUAL POWER CONSTRAINT |
| Hui-Ming Wang; Xi'an Jiaotong University |
| Qinye Yin; Xi'an Jiaotong University |
| Wenjie Wang; Xi'an Jiaotong University |
| Xiang-Gen Xia; University of Delaware |
| |
| IFS-P1.8: RATING SYSTEMS FOR ENHANCED CYBER-SECURITY INVESTMENTS |
| Jie Xu; University of California, Los Angeles |
| Yu Zhang; University of California, Los Angeles |
| Mihaela van der Schaar; University of California, Los Angeles |
| |
| IFS-P1.9: ROBUST SCAREWARE IMAGE DETECTION |
| Christian Seifert; Microsoft Corporation |
| Jack W. Stokes; Microsoft Corporation |
| Christina Colcernian; Microsoft Corporation |
| John C. Platt; Microsoft Corporation |
| Long Lu; Georgia Institute of Technology |
| |
| IFS-P1.10: OPTIMAL DISTRIBUTED DETECTION IN THE PRESENCE OF BYZANTINES |
| Bhavya Kailkhura; Syracuse University |
| Swastik Brahma; Syracuse University |
| Yunghsiang Han; Syracuse University |
| Pramod K. Varshney; Syracuse University |
| |
| IFS-P1.11: FINDING AN INFECTION SOURCE UNDER THE SIS MODEL |
| Wuqiong Luo; Nanyang Technological University |
| Wee Peng Tay; Nanyang Technological University |
| |
| IFS-P1.12: A PHYSICAL LAYER AUTHENTICATION SCHEME FOR COUNTERING PRIMARY USER EMULATION ATTACK |
| Kapil M. Borle; Syracuse University |
| Biao Chen; Syracuse University |
| Wenliang Du; Syracuse University |
| |
| IFS-P1.13: PROBABILISTIC THREAT PROPAGATION FOR MALICIOUS ACTIVITY DETECTION |
| Kevin Carter; Massachusetts Institute of Technology, Lincoln Laboratory |
| Nwokedi Idika; Massachusetts Institute of Technology, Lincoln Laboratory |
| William Streilein; Massachusetts Institute of Technology, Lincoln Laboratory |
| |