{"id":"https://openalex.org/W2893451531","doi":"https://doi.org/10.1109/milcom.2018.8599849","title":"How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?","display_name":"How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2893451531","doi":"https://doi.org/10.1109/milcom.2018.8599849","mag":"2893451531"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2018.8599849","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2018.8599849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001332634","display_name":"Alireza Nooraiepour","orcid":"https://orcid.org/0000-0001-7810-1467"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alireza Nooraiepour","raw_affiliation_strings":["WINLAB, Rutgers University, NJ, USA"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084992908","display_name":"Kenza Hamidouche","orcid":"https://orcid.org/0000-0001-7049-7954"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kenza Hamidouche","raw_affiliation_strings":["WINLAB, Rutgers University, NJ, USA"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028718006","display_name":"Waheed U. Bajwa","orcid":"https://orcid.org/0000-0003-4406-5263"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Waheed U. Bajwa","raw_affiliation_strings":["WINLAB, Rutgers University, NJ, USA"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055303802","display_name":"Narayan B. Mandayam","orcid":"https://orcid.org/0000-0001-5744-0814"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Narayan Mandayam","raw_affiliation_strings":["WINLAB, Rutgers University, NJ, USA"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001332634"],"corresponding_institution_ids":["https://openalex.org/I102322142"],"apc_list":null,"apc_paid":null,"fwci":0.4887,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73263192,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/orthogonal-frequency-division-multiplexing","display_name":"Orthogonal frequency-division multiplexing","score":0.8759050369262695},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7415701746940613},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6851423382759094},{"id":"https://openalex.org/keywords/carrier-frequency-offset","display_name":"Carrier frequency offset","score":0.5591078400611877},{"id":"https://openalex.org/keywords/cyclostationary-process","display_name":"Cyclostationary process","score":0.5563889741897583},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.550082266330719},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5140467882156372},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.48725786805152893},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44402769207954407},{"id":"https://openalex.org/keywords/spurious-relationship","display_name":"Spurious relationship","score":0.4408378303050995},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.3834613561630249},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.339012086391449},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2645512819290161},{"id":"https://openalex.org/keywords/frequency-offset","display_name":"Frequency offset","score":0.230625718832016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16125673055648804},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.14266139268875122},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14003124833106995}],"concepts":[{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.8759050369262695},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7415701746940613},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6851423382759094},{"id":"https://openalex.org/C2776108382","wikidata":"https://www.wikidata.org/wiki/Q25111451","display_name":"Carrier frequency offset","level":5,"score":0.5591078400611877},{"id":"https://openalex.org/C178351263","wikidata":"https://www.wikidata.org/wiki/Q3922399","display_name":"Cyclostationary process","level":3,"score":0.5563889741897583},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.550082266330719},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5140467882156372},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.48725786805152893},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44402769207954407},{"id":"https://openalex.org/C97256817","wikidata":"https://www.wikidata.org/wiki/Q1462316","display_name":"Spurious relationship","level":2,"score":0.4408378303050995},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3834613561630249},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.339012086391449},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2645512819290161},{"id":"https://openalex.org/C49319798","wikidata":"https://www.wikidata.org/wiki/Q5502874","display_name":"Frequency offset","level":4,"score":0.230625718832016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16125673055648804},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.14266139268875122},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14003124833106995},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/milcom.2018.8599849","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2018.8599849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},{"id":"pmh:oai:alma.01RUT_INST:11664994320004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/conferenceProceeding/How-Secure-are-Multicarrier-Communication-Systems/991031665730604646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1584422250","https://openalex.org/W1963614665","https://openalex.org/W2040089718","https://openalex.org/W2048272888","https://openalex.org/W2069895896","https://openalex.org/W2135575309","https://openalex.org/W2144333904","https://openalex.org/W2148922257","https://openalex.org/W2561314843","https://openalex.org/W2734408173","https://openalex.org/W2736068844","https://openalex.org/W2785446263","https://openalex.org/W2962694065","https://openalex.org/W2964121744","https://openalex.org/W6631190155","https://openalex.org/W6730771499"],"related_works":["https://openalex.org/W2183273440","https://openalex.org/W2181352736","https://openalex.org/W2164367930","https://openalex.org/W4385774821","https://openalex.org/W2000044568","https://openalex.org/W1965281974","https://openalex.org/W2161400403","https://openalex.org/W24185419","https://openalex.org/W3126424621","https://openalex.org/W2509553561"],"abstract_inverted_index":{"In":[0,25],"this":[1,57],"paper,":[2],"robustness":[3],"of":[4,37,62,75,81,120,147,160,192],"non-contiguous":[5],"orthogonal":[6],"frequency":[7],"division":[8],"multiplexing":[9],"(NC-OFDM)":[10],"transmissions":[11,18,31,45],"is":[12,54,203],"investigated":[13],"and":[14,79,131,174,212],"contrasted":[15],"to":[16,27,41,68,110,127,170,179,207],"OFDM":[17,148],"for":[19,47,99,167,176,204],"fending":[20],"off":[21],"signal":[22],"exploitation":[23],"attacks.":[24],"contrast":[26],"ODFM":[28],"transmissions,":[29],"NC-OFDM":[30,115,155],"take":[32],"place":[33],"over":[34],"a":[35,85,217],"subset":[36,74],"active":[38,76,161,193],"sub":[39,77,162],"carriers":[40,78,163],"either":[42],"avoid":[43],"incumbent":[44],"or":[46],"strategic":[48],"considerations.":[49],"A":[50,117],"point-to-point":[51],"communication":[52],"system":[53],"considered":[55],"in":[56,59,114],"paper":[58],"the":[60,73,82,96,121,125,133,140,144,168,172,177,183,187,190,197,200,205,209,214],"presence":[61],"an":[63],"adversary":[64,126,169,206],"(exploiter)":[65],"that":[66,139],"aims":[67],"infer":[69,143,208],"transmission":[70,122,210],"parameters":[71,123,146,211],"(e.g.,":[72],"duration":[80],"signal)":[83],"using":[84,216],"deep":[86],"neural":[87],"network":[88],"(DNN).":[89],"This":[90],"method":[91],"has":[92],"been":[93,108],"proposed":[94],"since":[95],"existing":[97],"methods":[98],"exploitation,":[100],"which":[101],"are":[102],"based":[103],"on":[104],"cyclostationary":[105],"analysis,":[106],"have":[107,111],"shown":[109],"limited":[112],"success":[113],"systems.":[116],"good":[118,152],"estimation":[119],"allows":[124],"transmit":[128,145],"spurious":[129,184],"data":[130],"attack":[132,213],"legitimate":[134],"receiver.":[135],"Simulation":[136],"results":[137],"show":[138],"DNN":[141],"can":[142],"signals":[149],"with":[150,156],"very":[151],"accuracy.":[153],"However,":[154],"fully":[157],"random":[158],"selection":[159],"makes":[164],"it":[165,202],"difficult":[166],"exploit":[171],"waveform":[173],"thus":[175],"receiver":[178,215],"be":[180],"affected":[181],"by":[182,196],"data.":[185],"Moreover,":[186],"more":[188],"structured":[189],"set":[191],"subcarriers":[194],"selected":[195],"transmitter":[198],"is,":[199],"easier":[201],"DNN.":[218]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
