Arsenia Chorti

Orcid: 0000-0002-4458-3696

According to our database1, Arsenia Chorti authored at least 89 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Pilot Randomization to Protect MIMO Secret Key Generation Systems Against Injection Attacks.
IEEE Wirel. Commun. Lett., July, 2023

Analysis of the Mutual Information of Channel Phase Observations in Line-of-Sight Scenarios.
Entropy, July, 2023

Dataset for the paper: A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack.
Dataset, May, 2023

How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems.
CoRR, 2023

Joint secure communication and sensing in 6G networks.
CoRR, 2023

Novel Slice Admission Control Scheme with Overbooking and Dynamic Buyback Process.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023

On the Optimal Power Allocation at the MAC Layer in the Asymptotic and in the Finite Blocklength.
Proceedings of the IEEE International Conference on Communications, 2023

Machine Learning-Based Robust Physical Layer Authentication Using Angle of Arrival Estimation.
Proceedings of the IEEE Global Communications Conference, 2023

Physical Layer Secret Key Generation with Kalman Filter Detrending.
Proceedings of the IEEE Global Communications Conference, 2023

Physical-Layer Challenge-Response Authentication for Drone Networks.
Proceedings of the IEEE Global Communications Conference, 2023

A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack.
Proceedings of the IEEE Global Communications Conference, 2023

Deep Reinforcement Learning-Based Network Slicing Algorithm for 5G Heterogenous Services.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping.
IEEE Wirel. Commun. Lett., 2022

Centralized and Distributed Intrusion Detection for Resource-Constrained Wireless SDN Networks.
IEEE Internet Things J., 2022

Smart Link Adaptation and Scheduling for IIoT.
IEEE Netw. Lett., 2022

Context-Aware Security for 6G Wireless: The Role of Physical Layer Security.
IEEE Commun. Stand. Mag., 2022

What Physical Layer Security Can Do for 6G Security.
CoRR, 2022

Physical Layer Security - from Theory to Practice.
CoRR, 2022

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation.
CoRR, 2022

Physical Layer Security for 6G Systems why it is needed and how to make it happen.
CoRR, 2022

Challenge-Response Physical Layer Authentication over Partially Controllable Channels.
IEEE Commun. Mag., 2022

Scheduling of Heterogeneous Services by Resolving Conflicts.
IEEE Access, 2022

A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol.
IEEE Access, 2022

Joint Localization-based Node Authentication and Secret Key Generation.
Proceedings of the IEEE International Conference on Communications, 2022

Task Offloading with 5G Network Slicing for V2X Communications.
Proceedings of the IEEE Global Communications Conference, 2022


2021
Protecting Physical Layer Secret Key Generation from Active Attacks.
Entropy, 2021

Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

Rate Analysis and Deep Neural Network Detectors for SEFDM FTN Systems.
CoRR, 2021

Indoor Localization Using Data Augmentation via Selective Generative Adversarial Networks.
IEEE Access, 2021

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys.
Proceedings of the 25th International ITG Workshop on Smart Antennas, 2021

Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2021

Distributed DoS Attack Detection in SDN: Tradeoffs in Resource Constrained Wireless Networks.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2021

Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels.
Proceedings of the IEEE Information Theory Workshop, 2021

Conflict-Aware Multi-Numerology Radio Resource Allocation for Heterogeneous Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Performance Analysis of Uplink NOMA-Relevant Strategy Under Statistical Delay QoS Constraints.
IEEE Wirel. Commun. Lett., 2020

Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints.
IEEE Open J. Commun. Soc., 2020

Authenticated secret key generation in delay-constrained wireless systems.
EURASIP J. Wirel. Commun. Netw., 2020

Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless.
CoRR, 2020

5G New Radio Resource Allocation Optimization for Heterogeneous Services.
CoRR, 2020

Multi-factor Physical Layer Security Authentication in Short Blocklength Communication.
CoRR, 2020

Flexible Multiple Access Enabling Low-Latency Communications: Introducing NOMA-R.
CoRR, 2020

Physical Layer Security: Authentication, Integrity and Confidentiality.
CoRR, 2020

Real-Time Algorithms for the Detection of Changes in the Variance of Video Content Popularity.
IEEE Access, 2020

Multimetric Online Intrusion Detection in Software-Defined Wireless Sensor Networks.
Proceedings of the IEEE Latin-American Conference on Communications, 2020

Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Performance Analysis of NOMA Uplink Networks under Statistical QoS Delay Constraints.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Security Protocols and Resource Allocation for Fifth Generation Networks.
, 2020

2019
Mitigating Jamming Attacks Using Energy Harvesting.
IEEE Wirel. Commun. Lett., 2019

Effective Secrecy Rate for a Downlink NOMA Network.
IEEE Trans. Wirel. Commun., 2019

Understanding the Performance of Software Defined Wireless Sensor Networks under Denial of Service Attack.
Open J. Internet Things, 2019

Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis.
IEEE Access, 2019

Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Performance Analysis of the Uplink of a Two User NOMA Network under QoS Delay Constraints.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Early Video Content Popularity Detection with Change Point Analysis.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches.
IEEE Trans. Inf. Forensics Secur., 2017

Secret key generation in Rayleigh block fading AWGN channels under jamming attacks.
Proceedings of the IEEE International Conference on Communications, 2017

Optimal signalling strategies and power allocation for wireless secret key generation systems in the presence of a jammer.
Proceedings of the IEEE International Conference on Communications, 2017

Energy harvesting in secret key generation systems under jamming attacks.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference.
IEEE Trans. Inf. Forensics Secur., 2016

Overcoming limitations of secret key generation in block fading channels under active attacks.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

2015
Optimal Power Allocation in Block Fading Channels With Confidential Messages.
IEEE Trans. Wirel. Commun., 2015

Strong Secrecy in Wireless Network Coding Systems from Structured Interference.
CoRR, 2015

Degrees of Freedom and Secrecy in Wireless Relay Networks.
CoRR, 2015

A novel physical layer authenticated encryption protocol exploiting shared randomness.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Strong secrecy in wireless network coding systems with M-QAM modulators.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Optimal power allocation in block fading Gaussian channels with causal CSI and secrecy constraints.
Proceedings of the IEEE Global Communications Conference, 2014

2013
On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers.
IEEE J. Sel. Areas Commun., 2013

On the tradeoffs between network state knowledge and secrecy.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

On the impact of network-state knowledge on the Feasibility of secrecy.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Achievable secrecy rates in physical layer secure systems with a helping interferer.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Physical layer security in wireless networks with passive and active eavesdroppers.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Helping interferer physical layer security strategies for M-QAM and M-PSK systems.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Performance analysis of OFDM and DAB receivers in the presence of spurious tones.
Telecommun. Syst., 2011

On the Effect of Voigt Profile Oscillators on OFDM Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2011

A multigrid method for the estimation of geometric anisotropy in environmental data from sensor networks.
Comput. Geosci., 2011

Faster than Nyquist interference assisted secret communication for OFDM systems.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
How to Model the Near-to-the-Carrier Regime and the Lower Knee Frequency of Real RF Oscillators.
J. Electr. Comput. Eng., 2010

A Fast Constrained Sphere Decoder for Ill Conditioned Communication Systems.
IEEE Commun. Lett., 2010

Joint channel equalization and detection of Spectrally Efficient FDM signals.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

2009
Investigation of a Semidefinite Programming detection for a spectrally efficient FDM system.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Masked M-QAM OFDM: A simple approach for enhancing the security of OFDM systems.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Spectrally Efficient FDM Signals: Bandwidth Gain at the Expense of Receiver Complexity.
Proceedings of IEEE International Conference on Communications, 2009

2008
Nonparametric Identification of Anisotropic (Elliptic) Correlations in Spatially Distributed Data Sets.
IEEE Trans. Signal Process., 2008

A combined MMSE-ML detection for a spectrally efficient non orthogonal FDM signal.
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008

2007
Resolving Near-Carrier Spectral Infinities Due to 1/f Phase Noise in Oscillators.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
A Spectral Model for RF Oscillators With Power-Law Phase Noise.
IEEE Trans. Circuits Syst. I Regul. Pap., 2006


  Loading...