{"id":"https://openalex.org/W7131389100","doi":"https://doi.org/10.48550/arxiv.2602.20045","title":"Dual Security for MIMO-OFDM ISAC Systems: Artificial Ghosts or Artificial Noise","display_name":"Dual Security for MIMO-OFDM ISAC Systems: Artificial Ghosts or Artificial Noise","publication_year":2026,"publication_date":"2026-02-23","ids":{"openalex":"https://openalex.org/W7131389100","doi":"https://doi.org/10.48550/arxiv.2602.20045"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.20045","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.20045","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.20045","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020490718","display_name":"Yinchao Yang","orcid":"https://orcid.org/0009-0009-5194-7783"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yang, Yinchao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032413556","display_name":"Prabhat Raj Gautam","orcid":"https://orcid.org/0000-0001-9881-1394"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gautam, Prabhat Raj","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079897536","display_name":"Yathreb Bouazizi","orcid":"https://orcid.org/0000-0001-8732-6297"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bouazizi, Yathreb","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012171637","display_name":"Michael Breza","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Breza, Michael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126726328","display_name":"Julie McCann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"McCann, Julie","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020490718"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.7876999974250793,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.7876999974250793,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.062300000339746475,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.04360000044107437,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.8219000101089478},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7793999910354614},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5199999809265137},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5127000212669373},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.5051000118255615},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4966000020503998},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.4424000084400177},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.428600013256073}],"concepts":[{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.8219000101089478},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7793999910354614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7059999704360962},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5199999809265137},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5127000212669373},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.5051000118255615},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4966000020503998},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.4424000084400177},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.428600013256073},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.40380001068115234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3937999904155731},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3873000144958496},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.3458000123500824},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.33820000290870667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31630000472068787},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.3109999895095825},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3043000102043152},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2930999994277954},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2831000089645386},{"id":"https://openalex.org/C137270730","wikidata":"https://www.wikidata.org/wiki/Q120811","display_name":"Detection theory","level":3,"score":0.27549999952316284},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C184892835","wikidata":"https://www.wikidata.org/wiki/Q1474513","display_name":"Electromagnetic interference","level":2,"score":0.2630000114440918}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.20045","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.20045","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.20045","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.20045","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5953900218009949}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Integrated":[0],"sensing":[1,52,65,89,94,131,136,161,187,198],"and":[2,66,90,96,186,196],"communication":[3,28,67,91,97,121,185,194],"(ISAC)":[4],"enables":[5],"the":[6,61,126,139,172,179,191],"efficient":[7],"sharing":[8],"of":[9,64,169,193],"wireless":[10],"resources":[11],"to":[12,21,50,112,117,120,130,133],"support":[13],"emerging":[14],"applications,":[15],"but":[16,40],"it":[17],"also":[18,41],"gives":[19],"rise":[20],"new":[22],"sensing-based":[23],"security":[24,29,68],"vulnerabilities.":[25],"Here,":[26],"potential":[27],"threats":[30],"whereby":[31],"confidential":[32],"messages":[33],"intended":[34],"for":[35],"legitimate":[36,197],"users":[37,55,195],"are":[38,109],"intercepted,":[39],"unauthorized":[42],"receivers":[43,155],"(Eves)":[44],"can":[45,156],"passively":[46],"exploit":[47],"target":[48],"echoes":[49],"infer":[51],"parameters":[53],"without":[54,99],"being":[56],"aware.":[57],"Despite":[58],"these":[59,158],"risks,":[60],"joint":[62],"protection":[63],"in":[69],"ISAC":[70,84],"systems":[71],"remains":[72],"unexplored.":[73],"To":[74],"address":[75],"this":[76,78],"challenge,":[77],"paper":[79],"proposes":[80],"a":[81],"two-layer":[82],"dual-secure":[83],"framework":[85,181],"that":[86,178],"simultaneously":[87],"protects":[88],"against":[92],"passive":[93],"Eves":[95,132,162],"Eves,":[98,122],"requiring":[100],"their":[101,135,167],"channel":[102],"state":[103],"information":[104],"(CSI).":[105],"Specifically,":[106],"transmit":[107],"beamformers":[108],"jointly":[110],"designed":[111],"inject":[113],"artificial":[114,143],"noise":[115],"(AN)":[116],"introduce":[118],"interference":[119],"while":[123,189],"deliberately":[124],"distorting":[125],"reference":[127],"signal":[128],"available":[129],"impair":[134],"capability.":[137],"Furthermore,":[138],"proposed":[140,180],"design":[141],"generates":[142],"ghosts":[144],"(AGs)":[145],"with":[146],"fake":[147],"angle-range-velocity":[148],"profiles":[149],"observable":[150],"by":[151],"all":[152],"receivers.":[153,199],"Legitimate":[154],"suppress":[157],"AGs,":[159],"whereas":[160],"cannot,":[163],"thereby":[164],"significantly":[165],"reducing":[166],"probability":[168],"correctly":[170],"detecting":[171],"true":[173],"targets.":[174],"Numerical":[175],"results":[176],"demonstrate":[177],"effectively":[182],"enhances":[183],"both":[184],"security,":[188],"preserving":[190],"performance":[192]},"counts_by_year":[],"updated_date":"2026-02-26T06:34:08.959763","created_date":"2026-02-26T00:00:00"}
