{"id":"https://openalex.org/W4414405558","doi":"https://doi.org/10.1109/iccworkshops67674.2025.11162481","title":"Static and Dynamic Finite Constellation Decomposition for Wireless Physical Layer Security","display_name":"Static and Dynamic Finite Constellation Decomposition for Wireless Physical Layer Security","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414405558","doi":"https://doi.org/10.1109/iccworkshops67674.2025.11162481"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops67674.2025.11162481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops67674.2025.11162481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094155869","display_name":"Eyy\u00fcp Ta\u015f\u00e7\u0131","orcid":null},"institutions":[{"id":"https://openalex.org/I4405392","display_name":"Bo\u011fazi\u00e7i University","ror":"https://ror.org/03z9tma90","country_code":"TR","type":"education","lineage":["https://openalex.org/I4405392"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Eyy\u00fcp Ta\u015f\u00e7\u0131","raw_affiliation_strings":["Bogazici University,Department of Electrical and Electronics Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Bogazici University,Department of Electrical and Electronics Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I4405392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114110827","display_name":"Arman Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arman Tan","raw_affiliation_strings":["Boston University,Department of Electrical and Computer Engineering,Boston,MA,USA"],"affiliations":[{"raw_affiliation_string":"Boston University,Department of Electrical and Computer Engineering,Boston,MA,USA","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020730324","display_name":"Timur Zirtiloglu","orcid":"https://orcid.org/0000-0003-0991-9729"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timur Zirtiloglu","raw_affiliation_strings":["Boston University,Department of Electrical and Computer Engineering,Boston,MA,USA"],"affiliations":[{"raw_affiliation_string":"Boston University,Department of Electrical and Computer Engineering,Boston,MA,USA","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001398507","display_name":"Mutlu Koca","orcid":"https://orcid.org/0000-0001-7572-3009"},"institutions":[{"id":"https://openalex.org/I4405392","display_name":"Bo\u011fazi\u00e7i University","ror":"https://ror.org/03z9tma90","country_code":"TR","type":"education","lineage":["https://openalex.org/I4405392"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Mutlu Koca","raw_affiliation_strings":["Bogazici University,Department of Electrical and Electronics Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Bogazici University,Department of Electrical and Electronics Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I4405392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012405763","display_name":"Nir Shlezinger","orcid":"https://orcid.org/0000-0003-2234-929X"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Nir Shlezinger","raw_affiliation_strings":["Ben-Gurion University of the Negev,School of Electrical and Computer Engineering,Beer-Sheva,Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev,School of Electrical and Computer Engineering,Beer-Sheva,Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086055918","display_name":"Rabia Tugce Yazicigil","orcid":"https://orcid.org/0000-0002-1492-2941"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rabia Tugce Yazicigil","raw_affiliation_strings":["Boston University,Department of Electrical and Computer Engineering,Boston,MA,USA"],"affiliations":[{"raw_affiliation_string":"Boston University,Department of Electrical and Computer Engineering,Boston,MA,USA","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5094155869"],"corresponding_institution_ids":["https://openalex.org/I4405392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2707984,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2113","last_page":"2119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9653000235557556,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9616000056266785,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.8675000071525574},{"id":"https://openalex.org/keywords/basis","display_name":"Basis (linear algebra)","score":0.6412000060081482},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5335999727249146},{"id":"https://openalex.org/keywords/constellation","display_name":"Constellation","score":0.48159998655319214},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4530999958515167},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4025000035762787},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3395000100135803},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.3138999938964844}],"concepts":[{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.8675000071525574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7134000062942505},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.6412000060081482},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5335999727249146},{"id":"https://openalex.org/C70352696","wikidata":"https://www.wikidata.org/wiki/Q8928","display_name":"Constellation","level":2,"score":0.48159998655319214},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4530999958515167},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4025000035762787},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3395000100135803},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3280999958515167},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.3138999938964844},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3075000047683716},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2849999964237213},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.2768000066280365},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27140000462532043},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.26249998807907104},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops67674.2025.11162481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops67674.2025.11162481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1991614769","https://openalex.org/W1992670341","https://openalex.org/W2043769961","https://openalex.org/W2072563372","https://openalex.org/W2096236228","https://openalex.org/W2133406100","https://openalex.org/W2144007657","https://openalex.org/W2151807636","https://openalex.org/W2567863460","https://openalex.org/W2898104747","https://openalex.org/W2949672874","https://openalex.org/W2963490111","https://openalex.org/W2972894689","https://openalex.org/W3141610964","https://openalex.org/W3217728647","https://openalex.org/W4206599684"],"related_works":[],"abstract_inverted_index":{"Security":[0],"is":[1,27,89,108],"a":[2,97],"critical":[3],"element":[4],"in":[5,16,30,64,78,102,120],"the":[6,53,60,65,70,86,106,113,130,138,146],"design":[7,128],"of":[8,100,137],"communication":[9],"systems.":[10],"However,":[11],"despite":[12],"its":[13,159],"essential":[14],"role":[15],"enabling":[17],"low-cost":[18],"implementations":[19],"and":[20,154],"robust":[21],"theoretical":[22],"foundations,":[23],"physical":[24,163],"layer":[25,164],"security":[26,119],"often":[28],"overlooked":[29],"developing":[31],"countermeasures":[32,42],"against":[33],"eavesdropping.":[34],"In":[35],"this":[36],"work,":[37],"we":[38,91,110],"propose":[39],"practical":[40],"physical-layer":[41],"that":[43,103],"enhance":[44],"secrecy":[45,101,148,155],"with":[46],"low":[47],"computational":[48],"overhead.":[49,143],"Our":[50],"approach":[51],"decomposes":[52],"constellation":[54,76],"diagram":[55],"using":[56],"basis":[57,94,114,124,139],"vectors,":[58,95,140],"constructing":[59],"original":[61],"message":[62],"symbol":[63],"main":[66],"lobe":[67],"aimed":[68],"at":[69],"intended":[71,131],"receiver,":[72],"while":[73],"projecting":[74],"randomized":[75],"points":[77],"other":[79],"directions":[80,122],"to":[81,116,133,161],"mislead":[82],"potential":[83,160],"eavesdroppers.":[84],"When":[85,105],"eavesdropper\u2019s":[87],"location":[88,107],"known,":[90],"use":[92],"static":[93],"achieving":[96],"higher":[98],"level":[99],"direction.":[104],"unknown,":[109],"dynamically":[111],"change":[112],"vectors":[115],"provide":[117],"information-theoretic":[118],"all":[121],"through":[123,150],"vector":[125],"randomization.":[126],"This":[127],"enables":[129],"receiver":[132,142],"operate":[134],"without":[135],"knowledge":[136],"reducing":[141],"We":[144],"evaluate":[145],"scheme\u2019s":[147],"performance":[149],"bit":[151],"error":[152],"rate":[153,156],"analyses,":[157],"demonstrating":[158],"improve":[162],"security.":[165]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
