Denial-of-Service (DoS) threats pose a major challenge to the idea of
ph...
In wireless security, cognitive adversaries are known to inject jamming
...
This work addresses a reactive jamming attack on the low-latency message...
Inspired by several delay-bounded mission-critical applications, this pa...
Inspired by emerging applications in vehicular networks, we address the
...
With potential applications to short-packet communication, we address
co...
Provenance embedding algorithms are well known for tracking the footprin...
Inspired by several delay-bounded mission-critical applications, optimiz...
We address relay-assisted key generation wherein two wireless nodes, tha...
Low-latency provenance embedding methods have received traction in vehic...
We consider the problem of Private Information Retrieval with Private Si...
This work addresses a strategy to mitigate jamming attack on low-latency...
The problem of achieving ultra-reliable and low-latency communication (U...
It is well known that physical-layer key generation methods enable wirel...
In this work, we address reliable communication of low-latency packets i...
We propose a new adversarial attack on frequency-hopping based wireless
...
We consider an echo-assisted communication model wherein block-coded mes...
Physical-layer Group Secret-Key (GSK) generation is an effective way of
...
In this paper, we introduce a strong adversarial attack, referred to as ...