{"id":"https://openalex.org/W2918218932","doi":"https://doi.org/10.1109/infocom.2019.8737412","title":"On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure","display_name":"On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2918218932","doi":"https://doi.org/10.1109/infocom.2019.8737412","mag":"2918218932"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2019.8737412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082647883","display_name":"Sulei Wang","orcid":"https://orcid.org/0000-0002-0623-6378"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sulei Wang","raw_affiliation_strings":["School of Information Science and Technology, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100457678","display_name":"Zhe Chen","orcid":"https://orcid.org/0000-0002-2919-4481"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zhe Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063792608","display_name":"Yuedong Xu","orcid":"https://orcid.org/0000-0003-4168-3998"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuedong Xu","raw_affiliation_strings":["School of Information Science and Technology, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042277127","display_name":"Qiben Yan","orcid":"https://orcid.org/0000-0001-6272-7668"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiben Yan","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincole, NE, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincole, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057657686","display_name":"Chongbin Xu","orcid":"https://orcid.org/0000-0003-0808-8572"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chongbin Xu","raw_affiliation_strings":["School of Information Science and Technology, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061028507","display_name":"Xin Wang","orcid":"https://orcid.org/0000-0001-8969-1415"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Wang","raw_affiliation_strings":["School of Information Science and Technology, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5082647883"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.7154,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.70550006,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1963","last_page":"1971"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9093568325042725},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7875036597251892},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6902779936790466},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6612844467163086},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46552225947380066},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.4650859236717224},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33607012033462524},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15610462427139282},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.14140096306800842}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9093568325042725},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7875036597251892},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6902779936790466},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6612844467163086},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46552225947380066},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.4650859236717224},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33607012033462524},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15610462427139282},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.14140096306800842},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2019.8737412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1505285716","https://openalex.org/W1872735442","https://openalex.org/W1972743861","https://openalex.org/W2065655885","https://openalex.org/W2095179288","https://openalex.org/W2097736984","https://openalex.org/W2113638573","https://openalex.org/W2122653429","https://openalex.org/W2130369179","https://openalex.org/W2135890169","https://openalex.org/W2143927285","https://openalex.org/W2146102702","https://openalex.org/W2162812372","https://openalex.org/W2164497732","https://openalex.org/W2524499899","https://openalex.org/W2532081381","https://openalex.org/W2764210306","https://openalex.org/W2774799610","https://openalex.org/W2962986099","https://openalex.org/W6639125427","https://openalex.org/W6679843083","https://openalex.org/W6727625622"],"related_works":["https://openalex.org/W3127542629","https://openalex.org/W2519418716","https://openalex.org/W2013390885","https://openalex.org/W2396246529","https://openalex.org/W2603864964","https://openalex.org/W2406147923","https://openalex.org/W998576839","https://openalex.org/W4210710724","https://openalex.org/W2609754040","https://openalex.org/W2131867397"],"abstract_inverted_index":{"Multiuser":[0],"MIMO":[1],"(MU-MIMO)":[2],"empowers":[3],"access":[4],"points":[5],"(APs)":[6],"with":[7,91,192],"multiple":[8,12],"antennas":[9],"to":[10,16,26,35,41,47,82,112,144,199],"transmit":[11],"data":[13],"streams":[14],"concurrently":[15],"users":[17,24],"by":[18,129],"exploiting":[19],"spatial":[20],"multiplexing.":[21],"In":[22,53],"MU-MIMO,":[23],"need":[25],"estimate":[27],"channel":[28,136],"state":[29],"information":[30],"(CSI)":[31],"and":[32,64,94,103,118,157,166,170,195],"report":[33],"it":[34],"APs,":[36],"thus":[37],"opening":[38],"a":[39,62,76,153,173],"backdoor":[40],"attackers":[42,111,203],"who":[43],"may":[44],"forge":[45],"CSI":[46,69,125,146,150,201],"eavesdrop":[48],"the":[49,58,85,92,95,162,187],"content":[50],"of":[51,88,155],"victims.":[52],"this":[54],"paper,":[55],"we":[56],"explore":[57],"eavesdropping":[59,86,116],"attack":[60,102],"in":[61,67,75,148,172],"novel":[63],"practical":[65],"context":[66],"which":[68,149],"forgery":[70,151,202],"entangles":[71],"MU-MIMO":[72],"user":[73],"selection":[74],"many-users":[77],"regime.":[78],"The":[79],"attacker":[80,139],"hopes":[81],"optimize":[83],"both":[84],"opportunity":[87,117],"being":[89],"selected":[90],"victim":[93],"corresponding":[96],"decoding":[97,120],"quality.":[98],"We":[99,164],"propose":[100],"new":[101],"defense":[104],"mechanisms:":[105],"(1)":[106],"USE":[107,168,183],"Attack":[108,169,184],"that":[109,134,182],"enables":[110],"achieve":[113],"near":[114],"optimal":[115],"high":[119],"quality":[121,190],"through":[122],"constructing":[123],"orthogonal":[124],"against":[126],"victims":[127],"followed":[128],"stepwise":[130],"refinements;":[131],"(2)":[132],"AngleSec":[133,171,196],"exploits":[135],"reciprocity":[137],"for":[138,205],"detection":[140],"without":[141],"any":[142],"modification":[143],"legacy":[145],"feedback":[147],"induces":[152],"mismatching":[154],"downlink":[156],"uplink":[158],"angular":[159],"spectra":[160],"at":[161],"AP.":[163],"implement":[165],"evaluate":[167],"software":[174],"defined":[175],"radio":[176],"platform":[177],"WARPv3.":[178],"Extensive":[179],"experiments":[180],"manifest":[181],"significantly":[185],"improves":[186],"overall":[188],"eaves-dropping":[189],"compared":[191],"state-of-the-art":[193],"counterparts":[194],"is":[197],"able":[198],"detect":[200],"almost":[204],"sure.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-02-07T06:11:34.122080","created_date":"2025-10-10T00:00:00"}
