ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2019
DOI: 10.1109/icassp.2019.8682745
|View full text |Cite
|
Sign up to set email alerts
|

On Radar Privacy in Shared Spectrum Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Accordingly, a number of performance trade-offs involving the radar detection and estimation performance, the communication rate and the secrecy rate remain to be studied. Some initial works on this topic can be found in [113]- [115].…”
Section: ) Learning Based Crssmentioning
confidence: 99%
“…Accordingly, a number of performance trade-offs involving the radar detection and estimation performance, the communication rate and the secrecy rate remain to be studied. Some initial works on this topic can be found in [113]- [115].…”
Section: ) Learning Based Crssmentioning
confidence: 99%
“…The inclusion of data into the probing signal, used to illuminate targets, makes it prone to eavesdropping by potentially malicious radar targets [196]. Even if the data itself is protected with higher layer encryption, the existence of a communication link can still be detected by a malicious target that can jeopardize the communication privacy, reveal the AP's location and ID and make it prone to cyberattacks [197]- [199]. Classical communication-only PHY security solutions often involve reducing the signal power in the direction of the eavesdropper (target), which would severely deteriorate the sensing performance of ISAC.…”
Section: Sensing-assisted Phy Securitymentioning
confidence: 99%
“…The authors in [141] investigated whether or not a malicious opponent could infer the radar's location through veiled radar information contained in the system's precoder. An MLbased location inference attack was simulated for two specific precoder schemes.…”
Section: ) Privacy Protection For Pus In Ss Networkmentioning
confidence: 99%