{"id":"https://openalex.org/W3198909688","doi":"https://doi.org/10.1109/isit45174.2021.9517916","title":"Detectability of Denial-of-Service Attacks on Arbitrarily Varying Classical-Quantum Channels","display_name":"Detectability of Denial-of-Service Attacks on Arbitrarily Varying Classical-Quantum Channels","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3198909688","doi":"https://doi.org/10.1109/isit45174.2021.9517916","mag":"3198909688"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9517916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517916","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000732219","display_name":"Holger Boche","orcid":"https://orcid.org/0000-0002-8375-8946"},"institutions":[{"id":"https://openalex.org/I4210125404","display_name":"Institute of Theoretical Physics","ror":"https://ror.org/02xtbq882","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210125404"]},{"id":"https://openalex.org/I4210142743","display_name":"Munich Center for Quantum Science and Technology","ror":"https://ror.org/04xrcta15","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210142743","https://openalex.org/I8204097"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]},{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["CN","DE"],"is_corresponding":true,"raw_author_name":"Holger Boche","raw_affiliation_strings":["Technical University of Munich,Institute of Theoretical Information Technology","Munich Center for Quantum Science and Technology (MCQST)","Institute of Theoretical Information Technology, Technical University of Munich","Excellence Cluster Cyber Security in the Age of Large-Scale Adversaries (CASA), Ruhr University Bochum"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Institute of Theoretical Information Technology","institution_ids":["https://openalex.org/I4210125404","https://openalex.org/I62916508"]},{"raw_affiliation_string":"Munich Center for Quantum Science and Technology (MCQST)","institution_ids":["https://openalex.org/I4210142743"]},{"raw_affiliation_string":"Institute of Theoretical Information Technology, Technical University of Munich","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Excellence Cluster Cyber Security in the Age of Large-Scale Adversaries (CASA), Ruhr University Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053727612","display_name":"Minglai Cai","orcid":"https://orcid.org/0000-0002-1327-2967"},"institutions":[{"id":"https://openalex.org/I4210125404","display_name":"Institute of Theoretical Physics","ror":"https://ror.org/02xtbq882","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210125404"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["CN","DE"],"is_corresponding":false,"raw_author_name":"Minglai Cai","raw_affiliation_strings":["Technical University of Munich,Institute of Theoretical Information Technology","Institute of Theoretical Information Technology, Technical University of Munich"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Institute of Theoretical Information Technology","institution_ids":["https://openalex.org/I4210125404","https://openalex.org/I62916508"]},{"raw_affiliation_string":"Institute of Theoretical Information Technology, Technical University of Munich","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042307561","display_name":"H. Vincent Poor","orcid":"https://orcid.org/0000-0002-2062-131X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Vincent Poor","raw_affiliation_strings":["Princeton University,Department of Electrical and Computer Engineering","Department of Electrical and Computer Engineering, Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038203207","display_name":"Rafael F. Schaefer","orcid":"https://orcid.org/0000-0002-1702-9075"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rafael F. Schaefer","raw_affiliation_strings":["University of Siegen,Chair of Communciations Engineering and Security","Chair of Communciations Engineering and Security, University of Siegen"],"affiliations":[{"raw_affiliation_string":"University of Siegen,Chair of Communciations Engineering and Security","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Chair of Communciations Engineering and Security, University of Siegen","institution_ids":["https://openalex.org/I206895457"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000732219"],"corresponding_institution_ids":["https://openalex.org/I4210125404","https://openalex.org/I4210142743","https://openalex.org/I62916508","https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":0.3875,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.61222901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"912","last_page":"917"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12946","display_name":"Fractal and DNA sequence analysis","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8267143964767456},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7990736961364746},{"id":"https://openalex.org/keywords/turing-machine","display_name":"Turing machine","score":0.6178396344184875},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.5907663106918335},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42870983481407166},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.42292192578315735},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.419511616230011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41626566648483276},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23516571521759033},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11219203472137451},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.09015867114067078},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.0752267837524414}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8267143964767456},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7990736961364746},{"id":"https://openalex.org/C29248071","wikidata":"https://www.wikidata.org/wiki/Q163310","display_name":"Turing machine","level":3,"score":0.6178396344184875},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.5907663106918335},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42870983481407166},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.42292192578315735},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.419511616230011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41626566648483276},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23516571521759033},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11219203472137451},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.09015867114067078},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0752267837524414},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit45174.2021.9517916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517916","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1611215","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1611215","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"ConferencePaper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1876139014","display_name":null,"funder_award_id":"SCHA 1944/6-1","funder_id":"https://openalex.org/F4320308022","funder_display_name":"California Department of Fish and Game"},{"id":"https://openalex.org/G3099549975","display_name":null,"funder_award_id":"CCF-0939370,CCF-1908308","funder_id":"https://openalex.org/F4320308960","funder_display_name":"United States - Israel Binational Science Foundation"},{"id":"https://openalex.org/G5354664402","display_name":null,"funder_award_id":"16KlS0858,16KIS0948","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320308022","display_name":"California Department of Fish and Game","ror":"https://ror.org/02v6w2r95"},{"id":"https://openalex.org/F4320308960","display_name":"United States - Israel Binational Science Foundation","ror":"https://ror.org/00j8z2m73"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W273047393","https://openalex.org/W1509579779","https://openalex.org/W1550331971","https://openalex.org/W1551587481","https://openalex.org/W1553142094","https://openalex.org/W1905361484","https://openalex.org/W1965684244","https://openalex.org/W1985989979","https://openalex.org/W1989102762","https://openalex.org/W1994481523","https://openalex.org/W2001619599","https://openalex.org/W2022731279","https://openalex.org/W2030815627","https://openalex.org/W2039957003","https://openalex.org/W2071846104","https://openalex.org/W2104944531","https://openalex.org/W2126160338","https://openalex.org/W2138129780","https://openalex.org/W2154564336","https://openalex.org/W2164684058","https://openalex.org/W2170607873","https://openalex.org/W2259819917","https://openalex.org/W2416714877","https://openalex.org/W2763095792","https://openalex.org/W2764080034","https://openalex.org/W2783742675","https://openalex.org/W2917230695","https://openalex.org/W2953578651","https://openalex.org/W2963474987","https://openalex.org/W2964259320","https://openalex.org/W2976374803","https://openalex.org/W2981670379","https://openalex.org/W3011819404","https://openalex.org/W3021198511","https://openalex.org/W3023053516","https://openalex.org/W3023832694","https://openalex.org/W3098560821","https://openalex.org/W3100205402","https://openalex.org/W3101442630","https://openalex.org/W3101531626","https://openalex.org/W3103003625","https://openalex.org/W3104754307","https://openalex.org/W3128610733","https://openalex.org/W3160283212","https://openalex.org/W3188072287","https://openalex.org/W4243563333","https://openalex.org/W4298290503","https://openalex.org/W4301168154","https://openalex.org/W6609912839","https://openalex.org/W6633084826","https://openalex.org/W6656063086","https://openalex.org/W6794596882","https://openalex.org/W6799967987","https://openalex.org/W6983042241"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4200319726","https://openalex.org/W2765763546","https://openalex.org/W2294870584","https://openalex.org/W2315104758","https://openalex.org/W2116825378","https://openalex.org/W4381854137","https://openalex.org/W2101265578","https://openalex.org/W1551708390","https://openalex.org/W2072174184"],"abstract_inverted_index":{"Communication":[0],"systems":[1],"are":[2,23,51,56,83,93],"subject":[3],"to":[4,44],"adversarial":[5],"attacks":[6,27,48],"since":[7],"malevolent":[8],"adversaries":[9],"might":[10],"harm":[11],"and":[12,62,72],"disrupt":[13],"legitimate":[14],"transmissions":[15],"intentionally.":[16],"Of":[17],"particular":[18],"interest":[19],"in":[20,28],"this":[21],"paper":[22],"so-called":[24],"denial-of-service":[25],"(DoS)":[26],"which":[29],"the":[30,46,68,103],"jammer":[31],"completely":[32],"prevents":[33],"any":[34],"transmission.":[35],"Arbitrarily":[36],"varying":[37],"classical-quantum":[38],"channels,":[39],"providing":[40],"a":[41],"suitable":[42],"model":[43],"capture":[45],"jamming":[47],"of":[49,86,106],"interest,":[50],"studied.":[52],"Algorithmic":[53],"detection":[54,105],"frameworks":[55],"developed":[57],"based":[58],"on":[59],"Turing":[60,81],"machines":[61,82,92],"also":[63],"Blum-Shub-Smale":[64],"(BSS)":[65],"machines,":[66],"where":[67],"latter":[69],"can":[70],"process":[71],"store":[73],"arbitrary":[74],"real":[75,98],"numbers.":[76],"It":[77],"is":[78],"shown":[79],"that":[80,97],"not":[84],"capable":[85,94],"detecting":[87],"DoS":[88,107],"attacks.":[89,108],"However,":[90],"BSS":[91],"thereof":[95],"implying":[96],"number":[99],"signal":[100],"processing":[101],"enables":[102],"algorithmic":[104]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
