IEEE INFOCOM 2022
MIMO
D\(^2\)BF—Data-Driven Beamforming in MU-MIMO with Channel Estimation Uncertainty
Shaoran Li, Nan Jiang, Yongce Chen, Thomas Hou, Wenjing Lou and Weijun Xie (Virginia Tech, USA)
M3: A Sub-Millisecond Scheduler for Multi-Cell MIMO Networks under C-RAN Architecture
Yongce Chen, Thomas Hou, Wenjing Lou and Jeffrey Reed (Virginia Tech, USA); Sastry Kompella (Naval Research Laboratory, USA)
MUSTER: Subverting User Selection in MU-MIMO Networks
Tao Hou (University of South Florida, USA); Shengping Bi and Tao Wang (New Mexico State University, USA); Zhuo Lu and Yao Liu (University of South Florida, USA); Satyajayant Misra (New Mexico State University, USA); Yalin E Sagduyu (Intelligent Automation, Inc., USA)
Semi-Online Precoding with Information Parsing for Cooperative MIMO Wireless Networks
Juncheng Wang and Ben Liang (University of Toronto, Canada); Min Dong (Ontario Tech University, Canada); Gary Boudreau (Ericsson, Canada); Hatem Abou-Zeid (University of Calgary, Canada)
Session Chair
Dimitrios Koutsonikolas (Northeastern University)
WiFi
Physical-World Attack towards WiFi-Based Behavior Recognition
Jianwei Liu and Yinghui He (Zhejiang University, China); Chaowei Xiao (University of Michigan, ann arbor, USA); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China); Le Cheng and Kui Ren (Zhejiang University, China)
In this paper, we reveal that WBR systems are vulnerable to manipulating physical signals. For instance, our observation shows that WiFi signals can be changed by jamming signals. By exploiting the vulnerability, we propose two approaches to generate physically online adversarial samples to perform untargeted attack and targeted attack, respectively. The effectiveness of these attacks are extensively evaluated over four real-world WBR systems. The experiment results show that our attack approaches can achieve 80% and 60% success rates for untargeted attack and targeted attack in physical world, respectively. We also show that our attack approaches can be generalized to other WiFi-based sensing applications, such as the user authentication.
Push the Limit of WiFi-based User Authentication towards Undefined Gestures
Hao Kong (Shanghai Jiao Tong University, China); Li Lu (Zhejiang University, China); Jiadi Yu, Yanmin Zhu, Feilong Tang, Yi-Chao Chen and Linghe Kong (Shanghai Jiao Tong University, China); Feng Lyu (Central South University, China)
Target-oriented Semi-supervised Domain Adaptation for WiFi-based HAR
Zhipeng Zhou (University of Science and Technology of China, China); Feng Wang (University of Mississippi, USA); Jihong Yu (Beijing Institute of Technology/ Simon Fraser University, China); Ju Ren (Tsinghua University, China); Zhi Wang (Xi'an Jiaotong University, China); Wei Gong (University of Science and Technology of China, China)
WiRa: Enabling Cross-Technology Communication from WiFi to LoRa with IEEE 802.11ax
Dan Xia, Xiaolong Zheng, Fu Yu, Liang Liu and Huadong Ma (Beijing University of Posts and Telecommunications, China)
Session Chair
Tamer Nadeem (Virginia Commonwealth University)
Made with in Toronto · Privacy Policy · INFOCOM 2020 · INFOCOM 2021 · © 2022 Duetone Corp.