{"id":"https://openalex.org/W2919684246","doi":"https://doi.org/10.1109/infocom.2019.8737581","title":"Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying","display_name":"Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2919684246","doi":"https://doi.org/10.1109/infocom.2019.8737581","mag":"2919684246"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2019.8737581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053788606","display_name":"Salvatore D\u2019Oro","orcid":"https://orcid.org/0000-0002-7690-0449"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Salvatore D'Oro","raw_affiliation_strings":["Dept. of Electr. & Comput. Eng., Northeastern University, Boston, MA, US"],"affiliations":[{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Northeastern University, Boston, MA, US","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058335425","display_name":"Francesco Restuccia","orcid":"https://orcid.org/0000-0002-9498-2302"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Francesco Restuccia","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Northeastern University, Boston, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Northeastern University, Boston, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054337759","display_name":"Tommaso Melodia","orcid":"https://orcid.org/0000-0002-2719-1789"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tommaso Melodia","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Northeastern University, Boston, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Northeastern University, Boston, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053788606"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":1.9076,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.8603314,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1585","last_page":"1593"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6825503706932068},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6394476294517517},{"id":"https://openalex.org/keywords/keying","display_name":"Keying","score":0.621670126914978},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6192594766616821},{"id":"https://openalex.org/keywords/phase-shift-keying","display_name":"Phase-shift keying","score":0.5705748200416565},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5465466976165771},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5442339777946472},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5113215446472168},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4587218761444092},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.4159672260284424},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4100003242492676},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3943239450454712},{"id":"https://openalex.org/keywords/bit-error-rate","display_name":"Bit error rate","score":0.35473471879959106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6825503706932068},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6394476294517517},{"id":"https://openalex.org/C2776542216","wikidata":"https://www.wikidata.org/wiki/Q6398306","display_name":"Keying","level":2,"score":0.621670126914978},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6192594766616821},{"id":"https://openalex.org/C186378180","wikidata":"https://www.wikidata.org/wiki/Q4874866","display_name":"Phase-shift keying","level":4,"score":0.5705748200416565},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5465466976165771},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5442339777946472},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5113215446472168},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4587218761444092},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.4159672260284424},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4100003242492676},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3943239450454712},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.35473471879959106},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2019.8737581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W581334404","https://openalex.org/W1508120902","https://openalex.org/W1527181506","https://openalex.org/W1550165678","https://openalex.org/W1588954910","https://openalex.org/W1635319022","https://openalex.org/W1738992959","https://openalex.org/W1967754176","https://openalex.org/W1971460123","https://openalex.org/W1973188796","https://openalex.org/W1978627933","https://openalex.org/W2001371125","https://openalex.org/W2010334926","https://openalex.org/W2022971840","https://openalex.org/W2031029123","https://openalex.org/W2127907890","https://openalex.org/W2167999072","https://openalex.org/W2339410153","https://openalex.org/W2798333393","https://openalex.org/W2963199173","https://openalex.org/W2963418062","https://openalex.org/W4233130698","https://openalex.org/W4239066252","https://openalex.org/W6637693764","https://openalex.org/W6656231170"],"related_works":["https://openalex.org/W2995199289","https://openalex.org/W803703519","https://openalex.org/W2154754758","https://openalex.org/W1995305527","https://openalex.org/W2733866746","https://openalex.org/W14002155","https://openalex.org/W2124840623","https://openalex.org/W2288828649","https://openalex.org/W2136896203","https://openalex.org/W3092473865"],"abstract_inverted_index":{"Undetectable":[0],"wireless":[1,17,68,134,167],"transmissions":[2],"are":[3,111,181,309],"fundamental":[4],"to":[5,71,97,153,164,286,298],"avoid":[6],"eavesdroppers":[7],"or":[8],"censorship":[9],"by":[10,25,47,107,183,280,312],"authoritarian":[11],"governments.":[12],"To":[13,125],"address":[14,126],"this":[15,127],"issue,":[16],"steganography":[18,69],"\u201chides\u201d":[19],"covert":[20,40,54,80,102,179,192,244,300],"information":[21,24,34,41,55,193],"inside":[22],"primary":[23,33,62,84,188,242],"slightly":[26],"modifying":[27],"the":[28,51,58,61,76,79,83,101,150,158,185,223,231,236,252,278],"transmitted":[29],"waveform":[30],"such":[31],"that":[32,100,132,143,240,275,294],"will":[35,42,194,203],"still":[36],"be":[37,43,118,162,195],"decodable,":[38],"while":[39],"seen":[44],"as":[45,86,209,227],"noise":[46],"agnostic":[48],"receivers.":[49],"Since":[50],"addition":[52],"of":[53,60,78,89,187,212,225,230,257,304],"inevitably":[56],"decreases":[57],"SNR":[59],"transmission,":[63],"a":[64,87,166,171,198,228],"key":[65],"challenge":[66],"in":[67,122,144,207],"is":[70,96,104,296],"mathematically":[72],"analyze":[73],"and":[74,113,120,243,255,262],"optimize":[75,241],"impact":[77],"channel":[81,85,91,103,151,248],"on":[82,137,170,263,268,302],"function":[88,229],"different":[90,247],"conditions.":[92],"Another":[93],"core":[94],"issue":[95],"make":[98],"sure":[99],"almost":[105],"undetectable":[106],"eavesdroppers.":[108],"Existing":[109],"approaches":[110],"protocol-specific":[112],"thus":[114],"their":[115,205],"performance":[116,254],"cannot":[117],"assessed":[119],"optimized":[121],"general":[123],"scenarios.":[124],"research":[128],"gap,":[129],"we":[130,220,234,290],"notice":[131],"existing":[133],"technologies":[135],"rely":[136],"phase-keying":[138],"modulations":[139],"(e.g.,":[140],"BPSK,":[141],"QPSK)":[142],"most":[145],"cases":[146],"do":[147],"not":[148],"use":[149],"up":[152],"its":[154],"Shannon":[155],"capacity.":[156],"Therefore,":[157],"residual":[159],"capacity":[160],"can":[161],"leveraged":[163],"implement":[165],"system":[168],"based":[169,267],"pseudo-noise":[172],"asymmetric":[173],"shift":[174,206],"keying":[175],"(PN-ASK)":[176],"modulation,":[177],"where":[178],"symbols":[180,202],"mapped":[182],"shifting":[184],"amplitude":[186,208],"symbols.":[189],"This":[190],"way,":[191],"undetectable,":[196],"since":[197],"receiver":[199],"expecting":[200],"phase-modulated":[201],"see":[204],"an":[210,264,313],"effect":[211],"channel/path":[213],"loss":[214],"degradation.":[215],"Through":[216],"rigorous":[217],"mathematical":[218],"analysis,":[219],"first":[221],"investigate":[222],"SER":[224],"PN-ASK":[226,238,258,276,295],"channel;":[232],"then,":[233],"find":[235],"optimal":[237],"parameters":[239],"throughput":[245,253,279],"under":[246],"condition.":[249],"We":[250],"evaluate":[251],"undetectability":[256],"through":[259,292],"extensive":[260],"simulations":[261],"experimental":[265],"testbed":[266],"USRP":[269],"N210":[270],"software-defined":[271],"radios.":[272],"Results":[273],"indicate":[274],"improves":[277],"more":[281],"than":[282],"8x":[283],"with":[284],"respect":[285],"prior":[287],"art.":[288],"Finally,":[289],"demonstrate":[291],"experiments":[293],"able":[297],"transmit":[299],"data":[301],"top":[303],"IEEE":[305],"802.11g":[306],"frames,":[307],"which":[308],"correctly":[310],"decoded":[311],"off-the-shelf":[314],"laptop":[315],"WiFi":[316],"card":[317],"without":[318],"any":[319],"hardware":[320],"modifications.":[321]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
