{"id":"https://openalex.org/W4360595875","doi":"https://doi.org/10.1109/lcomm.2023.3260194","title":"Detecting Intelligent Jamming on Physical Broadcast Channel in 5G NR","display_name":"Detecting Intelligent Jamming on Physical Broadcast Channel in 5G NR","publication_year":2023,"publication_date":"2023-03-22","ids":{"openalex":"https://openalex.org/W4360595875","doi":"https://doi.org/10.1109/lcomm.2023.3260194"},"language":"en","primary_location":{"id":"doi:10.1109/lcomm.2023.3260194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2023.3260194","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057650416","display_name":"Shaodi Wang","orcid":"https://orcid.org/0000-0002-1366-0775"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shao-Di Wang","raw_affiliation_strings":["School of Information and Communication Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Shaanxi, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Shaanxi, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["School of Information and Communication Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Shaanxi, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Shaanxi, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368548","display_name":"Wenjie Wang","orcid":"https://orcid.org/0009-0005-1249-5172"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjie Wang","raw_affiliation_strings":["School of Information and Communication Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Shaanxi, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Shaanxi, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Victor C. M. Leung","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057650416"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":1.8243,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.85018617,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"27","issue":"5","first_page":"1292","last_page":"1296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8234573602676392},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.6567257642745972},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5359770655632019},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4781138300895691},{"id":"https://openalex.org/keywords/demodulation","display_name":"Demodulation","score":0.4636954069137573},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.4255877435207367},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4188443124294281},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41421884298324585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4055846333503723},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24132263660430908}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8234573602676392},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.6567257642745972},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5359770655632019},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4781138300895691},{"id":"https://openalex.org/C195251586","wikidata":"https://www.wikidata.org/wiki/Q1185939","display_name":"Demodulation","level":3,"score":0.4636954069137573},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.4255877435207367},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4188443124294281},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41421884298324585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4055846333503723},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24132263660430908},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcomm.2023.3260194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcomm.2023.3260194","pdf_url":null,"source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5135885775","display_name":null,"funder_award_id":"61941118","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8039465085","display_name":null,"funder_award_id":"62171364","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1486683834","https://openalex.org/W2043053235","https://openalex.org/W2107831657","https://openalex.org/W2133589224","https://openalex.org/W2303624833","https://openalex.org/W2732830997","https://openalex.org/W2804590158","https://openalex.org/W2885760060","https://openalex.org/W2962759916","https://openalex.org/W3104095169","https://openalex.org/W4293733481","https://openalex.org/W4313555763"],"related_works":["https://openalex.org/W1996543123","https://openalex.org/W4388516297","https://openalex.org/W2010761432","https://openalex.org/W4389302182","https://openalex.org/W2089955640","https://openalex.org/W4229074657","https://openalex.org/W1978322239","https://openalex.org/W2146363836","https://openalex.org/W2070047532","https://openalex.org/W2385405232"],"abstract_inverted_index":{"In":[0,86],"fifth":[1],"generation":[2],"(5G)":[3],"new":[4],"radio":[5],"(NR),":[6],"since":[7],"the":[8,15,27,38,59,62,93,106,113,120,136],"synchronization":[9],"signal":[10,100],"blocks":[11],"are":[12],"unencrypted":[13],"during":[14],"initial":[16],"access,":[17],"an":[18],"intelligent":[19,54],"adversary":[20],"can":[21],"detect":[22,103],"these":[23],"signals":[24],"to":[25,40,81,91,102],"obtain":[26],"full":[28],"physical":[29,42],"cell":[30],"identity":[31],"(PCI)":[32],"by":[33,47,112],"sniffing,":[34],"and":[35,68,134],"then":[36],"use":[37],"PCI":[39,84],"attack":[41],"broadcast":[43],"channel":[44],"(PBCH)":[45],"extraction":[46],"targeted":[48],"jamming.":[49],"Such":[50],"kind":[51],"of":[52,61,74,96,138],"PBCH":[53,97],"jamming":[55],"(PBCH-IJ)":[56],"will":[57,124],"cause":[58],"failure":[60],"master":[63],"information":[64],"block":[65],"(MIB)":[66],"decoding,":[67],"further":[69],"result":[70],"in":[71],"severe":[72],"denial":[73],"services":[75],"for":[76],"those":[77],"users":[78],"who":[79],"want":[80],"access":[82],"this":[83,87],"cell.":[85],"letter,":[88],"we":[89],"propose":[90],"exploit":[92],"principal":[94,117],"direction":[95,118],"demodulation":[98],"reference":[99],"space":[101],"PBCH-IJ":[104,129],"at":[105],"user":[107],"side,":[108],"which":[109],"is":[110],"motivated":[111],"fact":[114],"that":[115],"such":[116],"under":[119],"low":[121],"mobility":[122],"scenarios":[123],"be":[125],"significantly":[126],"impacted":[127],"if":[128],"happens.":[130],"Numeric":[131],"results":[132],"evaluate":[133],"confirm":[135],"effectiveness":[137],"our":[139],"detection":[140],"method.":[141]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
