1st IEEE ICC Workshop on 5G Wireless Security (IEEE 5G-Security)
Thursday, May 24, 08:30 - 08:45
W18-S0 5G-Security: Opening Session
Room: Empire A
Chairs: Danda B. Rawat (Howard University, USA), Oliver Holland (King's College London, United Kingdom (Great Britain))
Thursday, May 24, 08:45 - 10:15
W18-S1 5G-Security: Session I
Room: Empire A
- Secrecy Outage Analysis for Massive MIMO-enabled Multi-Tier 5G Hybrid HetNets
-
Anum Umer (National University of Sciences and Technology (NUST) & School of Electrical Engineering and Computer Science (SEECS), Pakistan); Syed Ali Hassan (National University of Sciences and Technology, Pakistan); Haris Bin Pervaiz (University of Surrey & Institute for Communication Systems (ICS), Home of 5GIC, United Kingdom (Great Britain)); Qiang Ni (Lancaster University, United Kingdom (Great Britain)); Leila Musavian (University of Essex, United Kingdom (Great Britain)); Syed Hassan Ahmed (University of Central Florida, USA)
- Secrecy Performance Analysis in Downlink NOMA Systems with Cooperative Full-duplex Relaying
-
Chengpeng Liu (University of Electronic Science and Technology of China, P.R. China); Lin Zhang (University of Electronic Science and Technology of China & University of Sydney, P.R. China); Ming Xiao (Royal Institute of Technology, Sweden); Zhi Chen and Shaoqian Li (University of Electronic Science and Technology of China, P.R. China)
- On Secrecy Performance of Relay Assisted Millimeter Wave C-RAN
-
Peixi Liu (Peking University, P.R. China); Hui Gao (Beijing University of Posts and Telecommunications, P.R. China); Wu Luo and Wei Jiang (Peking University, P.R. China)
- Secure Beamformer Designs in MU-MIMO Systems: An Interference Exploitation Approach
-
Ming Li, Guangyu Ti, Xiaowen Tian, Zihuan Wang and Qian Liu (Dalian University of Technology, P.R. China)
- Networking Break
Thursday, May 24, 11:00 - 11:45
W18-K: W18-K 5G Security - Keynote
Room: Empire A
Keynote Speaker: Dr. Wenjing Lou, Virginia Tech, USA
Keynote Title: Internet of Things and its Security Challenges (Abstract and Bio)
Chair: Danda B. Rawat (Howard University, USA)
Thursday, May 24, 11:45 - 12:30
W18-S2 5G-Security: Session II
Room: Empire A
- On Secrecy Analysis for D2D Networks over \alpha-\mu Fading Channels with Randomly Distributed Eavesdroppers
-
Long Kong (ETS & University of Quebec, Canada); Georges Kaddoum (ETS Engineering School, University of Québec, Canada); Satyanarayana Vuppala (University of Luxembourgh, Luxembourg)
- Secure Communications with Secondary User Selection in Underlay Cognitive Radio Networks
-
Mian Qin, Shouyi Yang, Zhuo Han and Ruizhe Zhang (Zhengzhou University, P.R. China); Hao Deng (Henan University, P.R. China)
- Lunch Break
Thursday, May 24, 14:00 - 15:00
W18-S-I 5G-Security: Interactive Session
Room: Ballroom Prefunction
- Network Intrusion Detection Based on Stacked Sparse Autoencoder and Binary Tree Ensemble Method
-
Baoan Zhang, Yanhua Yu and Jie Li (Beijing University of Posts and Telecommunications, P.R. China)
- Secrecy Capacity of Indoor Visible Light Communication Channels
-
Jin-Yuan Wang (Nanjing University of Posts and Telecommunications, P.R. China); Sheng-Hong Lin (Nanjing Institute of Mechatronic Technology, P.R. China); Cheng Liu and Jun-Bo Wang (Southeast University, P.R. China); Bingcheng Zhu and Yuan Jiang (Nanjing University of Posts and Telecommunications, P.R. China)
- Secured Satellite Down-link Transmission Scheme based on OSTBC-WFRFT-precoding
-
Ruiyang Xu (Information and Navigation College, P.R. China); Da Xinyu (Telecommunication Engineering Institute of Air Force Engineering University, P.R. China); Yuan Liang (Airforce Engineering University, P.R. China); Hang Hu (Air Force Engineering University, P.R. China); Lei Ni (Information and Navigation College, P.R. China)
- Securing SC-FDE Uplink Transmissions Using Temporal Artificial Noise Under Three Detection Strategies
-
Mohamed Marzban (University of Texas at Dallas, USA); Ahmed El Shafie (Qualcomm Inc., USA); Rakan Chabaan (Hyundai, USA); Naofal Al-Dhahir (University of Texas at Dallas, USA)
Thursday, May 24, 15:00 - 15:45
W18-S3 5G-Security: Session III
Room: Empire A
- 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation
-
Marc Lichtman (Virginia Tech, USA); Raghunandan M Rao (Virgnina Tech & Wireless@Virginia Tech, USA); Vuk Marojevic and Jeffrey Reed (Virginia Tech, USA); Roger Piqueras Jover (Bloomberg Lp - Security Research Lab, USA)
- Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
-
Xiaoxue Wang and Yanzhao Hou (Beijing University of Posts and Telecommunications, P.R. China); Xueqing Huang (New York Institute of Technology, USA); Dongru Li, Xiaofeng Tao and Jin Xu (Beijing University of Posts and Telecommunications, P.R. China)
- Networking Break
Thursday, May 24, 16:15 - 18:00
W18-S4 5G-Security: Session IV
Room: Empire A
- Secrecy Analysis of a Cloud-Fog Radio Access Network with Binomial Point Process
-
Xian Liu (University of Arkansas at Little Rock, USA)
- Secrecy CPS Transmission Scheme for Slow Fading Independent Parallel Wiretap Channels with New SOP Constraint
-
Xia Wang (Xian Jiaotong University, P.R. China); Pengcheng Mu, Weile Zhang and Qinye Yin (Xi'an Jiaotong University, P.R. China)
- Secure Transmission against Pilot Spoofing Attack: A Random Matrix Theory Based Scheme
-
Xizhu Nie, Hong Jiang and Minghang Zhang (Jilin University, P.R. China)
- Exploring Challenge-Response Mechanism Designs for IoT Initial Trust Establishment
-
Tham T. Nguyen and Doan B Hoang (University of Technology Sydney, Australia); Aruna Seneviratne (University of New South Wales, Australia)
- Reputation Value Ranking Based Sequential Cooperative Spectrum Sensing Against Byzantine Attack
-
Jun Wu (Southeast University, P.R. China); Tiecheng Song (National Mobile Communications Research Laboratory, Southeast University, P.R. China); Cong Wang and Jing Hu (Southeast University, P.R. China)