Alert button
Picture for Arsenia Chorti

Arsenia Chorti

Alert button

Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers

Add code
Bookmark button
Alert button
Apr 25, 2024
Amitha Mayya, Arsenia Chorti, Rafael F. Schaefer, Gerhard P. Fettweis

Viaarxiv icon

Physical Layer Authentication Using Information Reconciliation

Add code
Bookmark button
Alert button
Apr 19, 2024
Atsu Kokuvi Angélo Passah, Rodrigo C. de Lamare, Arsenia Chorti

Viaarxiv icon

How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems

Add code
Bookmark button
Alert button
Nov 13, 2023
Stephanie Gil, Michal Yemini, Arsenia Chorti, Angelia Nedić, H. Vincent Poor, Andrea J. Goldsmith

Viaarxiv icon

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

Add code
Bookmark button
Alert button
Jun 01, 2022
Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti, Mahdi Shakiba Herfeh, Muhammad K. Shehzad, Philippe Sehier

Figure 1 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Figure 2 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Figure 3 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Figure 4 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Viaarxiv icon

Physical Layer Security for 6G Systems why it is needed and how to make it happen

Add code
Bookmark button
Alert button
May 03, 2022
Arsenia Chorti

Viaarxiv icon

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Add code
Bookmark button
Alert button
Oct 28, 2021
Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti

Figure 1 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Figure 2 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Figure 3 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Figure 4 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Viaarxiv icon

Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels

Add code
Bookmark button
Alert button
May 22, 2021
Mahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti

Figure 1 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Figure 2 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Figure 3 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Figure 4 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Viaarxiv icon

Distributed DoS Attack Detection in SDN: Trade offs in Resource Constrained Wireless Networks

Add code
Bookmark button
Alert button
Mar 25, 2021
Gustavo A. Nunez Segura, Arsenia Chorti, Cintia Borges Margi

Figure 1 for Distributed DoS Attack Detection in SDN: Trade offs in Resource Constrained Wireless Networks
Figure 2 for Distributed DoS Attack Detection in SDN: Trade offs in Resource Constrained Wireless Networks
Viaarxiv icon

Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation

Add code
Bookmark button
Alert button
Mar 21, 2021
Mahdi Shakiba-Herfeh, Arsenia Chorti

Figure 1 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Figure 2 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Figure 3 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Figure 4 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Viaarxiv icon

Deep Learning Based Detection for Spectrally Efficient FDM Systems

Add code
Bookmark button
Alert button
Mar 21, 2021
David Picard, Arsenia Chorti

Figure 1 for Deep Learning Based Detection for Spectrally Efficient FDM Systems
Figure 2 for Deep Learning Based Detection for Spectrally Efficient FDM Systems
Figure 3 for Deep Learning Based Detection for Spectrally Efficient FDM Systems
Figure 4 for Deep Learning Based Detection for Spectrally Efficient FDM Systems
Viaarxiv icon