Tuesday, December 7
Tuesday, December 7 10:00 - 11:00
Session 1: Wireless Security I
Chairs: Danda B. Rawat (Howard University, USA), Min Song (Stevens Institute of Technology, USA)
- 3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks
-
Helin Yang and Kwok-Yan Lam (Nanyang Technological University, Singapore); Jiangtian Nie (Nanyang Technological University (NTU), Singapore); Jun Zhao (Nanyang Technological University, Singapore); Sahil Garg (École de Technologie Supérieure, Canada); Liang Xiao (Xiamen University, China); Zehui Xiong (Singapore University of Technology and Design, Singapore); Mohsen Guizani (Qatar University, Qatar)
- Secrecy outage-constrained robust resource allocation design for MU-MISO RSMA systems
-
Hao Fu, Suili Feng and Weijun Tang (South China University of Technology, China); Zhiqiang Wei (Friedrich-Alexander University Erlangen-Nuremberg, Germany); Derrick Wing Kwan Ng (University of New South Wales, Australia)
- Secrecy Degradation for Inevitable Phase Noise in Artificial Noise Shielded FH Systems
-
Changqing Song, Lizhi Qin, Hongzhi Zhao, Shihai Shao and Youxi Tang (University of Electronic Science and Technology of China, China)
- Improved physical-layer security for OFDM using data-based subcarrier scrambling
-
Mohammad M. Banat (Jordan University of Science and Technology, Jordan); Joan Bas (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain); Alexis Alfredo Dowhuszko (Aalto University, Finland)
- Secrecy Rate Comparison of Key-based Encrypted Data Transmission and Keyless Secure Transmission
-
Ziyao Yu (University of Sydney, Australia); Zijie Ji (Beijing Institute of Technology, China); Phee Lep Yeoh (University of Sydney, Australia)
Tuesday, December 7 11:00 - 11:40
Session 2: Wireless Security II
Chairs: Danda B. Rawat (Howard University, USA), Min Song (Stevens Institute of Technology, USA)
- The Role of Feedback in Physical Layer Security of the IoT Systems: Revisit
-
Haoheng Yuan (Southwest Jiaotong University, China); Chuanchuan Yang (State Key Laboratory of Advanced Optical Communication Systems and Networks, Peking University, China); Bin Dai (Southwest Jiaotong University, China)
- SUDP: The Frontier Tools for Security in 5G and Beyond Wired or Wireless Communication
-
Bharat S Rawal and Jay Shah (Gannon University, USA)
- Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
-
Brian Kim (University of Maryland, USA); Yi Shi (Virginia Tech, USA); Yalin E Sagduyu (Intelligent Automation, Inc., USA); Tugba Erpek (Virginia Tech, USA); Sennur Ulukus (University of Maryland, USA)
Tuesday, December 7 12:10 - 1:10
Session 3: Wireless and Applications
Chairs: Danda B. Rawat (Howard University, USA), Min Song (Stevens Institute of Technology, USA)
- Attention Mechanism Based ResNeXt Network for Automatic Modulation Classification
-
Zhi Liang, Ling Wang, Mingliang Tao, Jian Xie and Xin Yang (Northwestern Polytechnical University, China)
- Reinforcement Learning for Multiagent-based Residential Energy Management System
-
Sudeep Tanwar (Institute of Technology Nirma University Ahmedabad Gujarat, India); Aparna Kumari (Institute of Technology, Nirma University, India)
- High-Speed Packetization for 5G Advanced
-
Donggun Kim (Samsung Research, Samsung Electronics Co., Ltd., Korea (South)); Sangkyu Baek and Jaehyuk Jang (Samsung Research, Korea (South)); Daegyun Kim (Samsung, Korea (South))
- PSO-Based K-means Algorithm for Clustering Routing in 5G WSN Networks
-
Aijing Sun and Kailei Zhu (Xi'an University of Posts and Telecommunications, China); Jianbo Du (Xi'an University of Posts & Telecommunications, China); Haotong Cao (The Hong Kong Polytechnic University, China)
- Tree Transformation and Neural Network Based Hand-written Formula Recognizer
-
Yuxiang Guo and Yuming Han (Northwestern University, USA); Haotong Cao (The Hong Kong Polytechnic University, China); Kailei Zhu (Xi'an University of Posts and Telecommunications, China); Jianbo Du (Xi'an University of Posts & Telecommunications, China)