Security I
Session Details:
Paper 1: Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks
Authors: Akash Raj Narayanadoss, National University of Singapore, Singapore;Tram Truong-Huu, National University of Singapore, Singapore;Purnima Murali Mohan, National University of Singapore, Singapore; and Mohan Gurusamy, National University of Singapore, Singapore
Paper 2: Experimental Evaluation of Jamming Threat inLoRaWAN
Authors: Chin-Ya Huang, National Taiwan University of Science and Technology, Taiwan; Ching-Wei Lin, National Taiwan University of Science and Technology, Taiwan; Ray-Guang Cheng, National Taiwan University of Science and Technology, Taiwan; Shanchieh Jay Yang, Rochester Institute of Technology, United States; and Shiann-Tsong Sheu, National Central University, Taiwan
Paper 3: Optimal Relay Selection with a Full-duplex Active Eavesdropper in Cooperative Wireless Networks
Authors: He Zhou, Beijing institute of technology, China;Dongxuan He, Beijing institute of technology, China;Hua Wang, Beijing institute of technology, China; and Dewei Yang, Beijing institute of technology, China
Paper 4: Secure Communication with Wireless Powered Friendly Jammers under Multiple Eavesdroppers
Authors: Dongxuan He, Beijing institute of technology, China;He Zhou, Beijing institute of technology, China;Hua Wang, Beijing institute of technology, China; and Dewei Yang, Beijing institute of technology, China
Paper 5: User Selection and Transceiver Design for Secure Transmission in MIMO Interference Networks
Authors: Qiuyi Cao, Dalian University of Technology, China;Nan Zhao, Dalian University of Technology, China;Guan Gui, Nanjing University of PostsTelecommunications, China;Yang Cao, Dalian University of Technology, China;Shun Zhang, Xidian University, China;Yunfei Chen, University of Warwick, United Kingdom; and Hikmet Sari, Nanjing University of Posts and Telecommunications, China
Session Category : Session