IEEE Global Communications Conference
4–8 December 2022 // Rio de Janeiro, Brazil // Hybrid: In-Person and Virtual Conference
Accelerating the Digital Transformation through Smart Communications

WS03: The Seventh IEEE Workshop on 5G and Beyond Wireless Security (7th IEEE Wireless-Sec) - VIRTUAL


*All times are BRT (GMT-3)

SUNDAY, DECEMBER 4 09:00-10:30

Physical Layer Security

Time: 09:00-10:30 BRT
Game-theoretic and Learning-aided Physical Layer Security for Multiple intelligent Eavesdroppers
Yingzhen Wu, Yan Huo and Qinghe Gao (Beijing Jiaotong University, China); Yue Wu (Beijing JiaoTong University, China); Xuehan Li (Beijing Jiaotong University, China)
Performance Analysis of the Wiretap Channel with a Friendly Jammer under Finite Blocklength
Uppalapati Somalatha (IIT Tirupati, India); Parthajit Mohapatra (Indian Institute of Technology Tirupati, India); Nikolaos Pappas (Linköping University, Sweden)
A General Security Approach for Soft-information Decoding against Smart Bursty Jammers
Furkan Ercan (Boston University, USA); Kevin Galligan (Maynooth University, Ireland); Ken R. Duffy (Hamilton Institute, Maynooth University, Ireland); Muriel Médard (MIT, USA); David Starobinski and Rabia T Yazicigil (Boston University, USA)
Cooperative Jamming for Secure Communications With Extra Power Penalty
Wenbo Guo (University of Electronic Science and Technology of China, China); Wen Yang (UESTC, China); Yimin He (University of Electronic Science and Technology of China, China); Yi Fang (UESTC, China); Hongzhi Zhao and Shihai Shao (University of Electronic Science and Technology of China, China)
Analytical Method of Physical Layer Authentication for Performance Evaluation
Lu Xinjin (National University of Defence Technology & College of Electronic Science and Technology, China); Jing Lei (National University of Denfense Technology, China); Shi Yuxin (NationalUniversityofDefence Technology, China); He Fang (Western University, Canada); Wei Li (National University of Defence Technology, Hong Kong)

SUNDAY, DECEMBER 4 10:30-12:00

Physical Layer Security II

Time: 10:30-12:00 BRT
Age of Information Minimization in Intelligent Reflecting Surface-Aided Covert Communications
Chao Wang, Zan Li and Yue Zhao (Xidian University, China); Derrick Wing Kwan Ng (University of New South Wales, Australia); Naofal Al-Dhahir (University of Texas at Dallas, USA)
Nonlinear Secret Sharing Schemes based on \{Z_4\} Linear Codes
Deepak Agrawal (Indian Institute of Technology, Guwahati, India)
SD-Based Low-Complexity Precoder Design for Gaussian MIMO Wiretap Channels
Hao Xu and Kai Kit Wong (University College London, United Kingdom (Great Britain)); Giuseppe Caire (Technische Universität Berlin, Germany)
IRS-Assisted Secure OFDMA With Untrusted Users
Ravikant Saini (Indian Institute of Technology Jammu, India); Deepak Mishra (University of New South Wales (UNSW) Sydney, Australia); Weisu Xiong (Hong Kong University of Science and Technology, HongKong, Hong Kong); Jinhong Yuan (University of New South Wales, Australia)
Achieving Positive Covert Rate in Distributed Antenna System
Jianquan Wang, Puxi Yu, Sa Xiao and Yuchen Zhang (University of Electronic Science and Technology of China, China); WanBin Tang (University of Electronic Science & Technology of China, China)

SUNDAY, DECEMBER 4 13:00-14:30

Wireless Network Security

Time: 13:00-14:30 BRT
Reciprocity and Secret Key Generation for FDD Systems using Non-Linear Quantization
Ehsan Olyaei Torshizi and Werner Henkel (Jacobs University Bremen, Germany)
Secrecy Communication for Wireless-Powered Cooperative NOMA Systems With a Friendly Jammer
Yuan Ren and Xuewei Zhang (Xi'an University of Posts and Telecommunications, China); Pinyi Long (ZTE, China); Junxuan Wang (Xi'an University of Posts and Telecommunications, China); Guangyue Lu (Xi'an University of Posts & Telecommunications, China)
Data Trustworthiness for UWB Ranging in IoT
Bernhard Etzlinger, Philipp Peterseil, Roya Khanzadeh, David Märzinger and Andreas Springer (Johannes Kepler University Linz, Austria)
How to Launch Jamming Attacks on Federated Learning in NextG Wireless Networks
Yi Shi and Yalin E Sagduyu (Virginia Tech, USA)
Multidimensional secret key agreement with tensor-decomposition-based mmWave-MIMO channel estimation
Dandan Mao, Bowen Xue, Lingfeng Shen, Ning Wang and Xiaomin Mu (Zhengzhou University, China); Wei Xu (Southeast University, China)

SUNDAY, DECEMBER 4 14:30-16:00

Wireless Network Security II

Time: 14:30-16:00 BRT
Secure Transmission Based on Access Point Classification in Cell-Free Networks
Jintao Xing and Tiejun Lv (Beijing University of Posts and Telecommunications, China); Yashuai Cao (North China Electric Power University, China)
The NetApps Certification Environment for 5G and beyond Vertical Ecosystems: The EVOLVED-5G Approach
Fotini Setaki (COSMOTE Mobile Telecommunications S.A. Greece, Greece); Ioanna Mesogiti, Elina Theodoropoulou and George Lyberopoulos (COSMOTE Mobile Telecommunications S.A., Greece); David Artuñedo Guillen (Telefónica, Spain); Javier Garcia Rodrigo (Telefónica I+D, Spain); Yannis Karadimas (National and Kapodistrian University of Athens & Maggioli Spa, Greece); Harilaos Koumaras (NCSR Demokritos, Greece); George Avdikos (Eight Bells Ltd, Greece); Ioannis Margaritis (Eight Bells Ltd, Cyprus); Dimitris Tsolkas (National and Kapodistrian University of Athens, Greece); Emmanouil Kafetzakis (Eight Bells Ltd., Cyprus)
CASCADE and CREAM: Covert Communications Enhancement Based on Frequency Diverse Array
Yuchen Zhang, Yichi Zhang, Jianquan Wang and Sa Xiao (University of Electronic Science and Technology of China, China); WanBin Tang (University of Electronic Science & Technology of China, China)
Selective User Plane (UP) Security for Throughput Enhancement in Mobile Communication
Donghyun Je (Samsung Electronics, Korea (South)); Aneesh Deshmukh (Samsung R&D Institute, India - Bangalore, India); Sunwoo Cho (Samsung Electronics, Korea (South)); Dongmyoung Kim (Samsung Research & Samsung Electronics, Korea (South)); Neha Sharma (Samsung Research Institute Bangalore, India); Jungsoo Jung (Samsung Electronics, Korea (South)); Juho Lee (Samsung Electronics. Co., Ltd, Korea (South)); Sunghyun Choi (Samsung Electronics, Korea (South))
Secrecy Performance Analysis of MIMO-V2V Communications With Keyhole Effect
Xujie Zang, Chongjun Ouyang and Hongwen Yang (Beijing University of Posts and Telecommunications, China)

SUNDAY, DECEMBER 4 16:00-17:00

Wireless Security III

Time: 16:00-17:00 BRT
Secure and Energy-Efficient Proximity-Based Pairing for IoT Devices
Yaqi He, Kai Zeng, Brian L Mark and Khaled N Khasawneh (George Mason University, USA)
Machine Learning 5G Attack Detection in Programmable Logic
Cooper Coldwell, Denver Conger, Edward Goodell, Brendan Jacobson, Bryton Petersen, Damon Spencer, Matthew Anderson and Matthew Sgambati (Idaho National Laboratory, USA)
Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Ferhat Ozgur Catak (University of Stavanger, Norway); Murat Kuzlu (Old Dominion University, USA); Salih Sarp (Virginia Commonwealth University & Old Dominion University, USA); Evren Catak (Independent, Norway); Umit Cali (Norwegian University of Science and Technology, Norway)

Platinum Patrons

Gold Patrons

Bronze Patrons

Supporting Sponsors