Skip to main content

Publications

Journal Papers

  • A. J. Smiley, W. K. Harrison, G. L. Plett, “Postprocessing the outputs of an interacting multiple-model Kalman filter using a Markovian trellis to estimate parameter values of aged Li-ion cells,” Journal of Energy Storage, vol. 27, no. 2, pp. 1–14, Feb. 2020.
  • W. K. Harrison, E. Beard, S. Dye, E. Holmes, K. Nelson, M. A. C. Gomes, and J. P. Vilela, “Implications of coding layers on physical-layer security: A secrecy benefit approach,” Entropy, vol. 21, no. 8, pp. 1–15, Aug. 2019.
  • W. K. Harrison, T. Fernandes, M. A. C. Gomes, and J. P. Vilela, “Generating a binary symmetric channel for wiretap codes,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2128–2138, Aug. 2019.
  • W. K. Harrison, D. Sarmento, J. P. Vilela, and M. A. C. Gomes, “Analysis of short blocklength codes for secrecy,” EURASIP Journal on Wireless Communications and Networking, vol. 2018, no.1, p. 255, Oct 2018. [Online]. Available: https://doi.org/10.1186/s13638-018-1276-1
  • J. L. Salmon and W. K. Harrison, “A data analytics approach to evaluation of competition in the 2012 Summer Olympics,” Journal of Data Science, vol. 15, no. 3, pp. 373–390, July 2017.
  • J. P. Vilela, M. Gomes, W. K. Harrison, D. Sarmento, and F. Dias, “Interleaved concatenated coding for secrecy in the finite blocklength regime,” IEEE Signal Processing Letters, vol. 23, no. 3, pp. 356–360, Mar. 2016.
  • W. K. Harrison, “The role of graph theory in system of systems engineering,” IEEE Access, vol. 4, pp. 1716–1742, 2016.
  • W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, “Coding for secrecy: An overview of error-control coding techniques for physical-layer security,” IEEE Signal Processing 2 Magazine, vol. 30, no. 5, pp. 41–50, Sept. 2013.
  • W. K. Harrison, J. Almeida, S. W. McLaughlin, and J. Barros, “Coding for cryptographic security enhancement using stopping sets,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 575–584, Sept. 2011.
  • D. J. Baker, B. K. Thurgood, W. K. Harrison, M. G. Mlynczak, and J. M. Russell, “Equatorial enhancement of the nighttime OH mesospheric infrared airglow,” Physica Scripta, vol. 75, no. 5, pp. 615–619, 2007. [Online]. Available: http://stacks.iop.org/1402-4896/75/i=5/a=004

Conference Papers

  • M. Johnson and W. K. Harrison, “Comparison of latency with selective repeat and rateless coding in delayed feedback systems,” in Proc. IEEE Workshop on Computing, Networking and Communications (CNC), Kailua-Kona, HI, Feb. 2020, pp. 1–5.
  • H. Searle, M. A. C. Gomes, J. P. Vilela, and W. K. Harrison, “Irregular quadrature amplitude modulation for adaptive physical-layer security,” in Proc. IEEE Global Telecommunications Conf. (GLOBECOM), Waikoloa, HI, Dec. 2019, pp. 1–6.
  • M. Rice, W. K. Harrison, B. Jensen, K. Norman, B. Wood, and C. A. Gutirrez, “V2V propagation in mountainous terrain: Part I—Experimental configuration and measurement results,” in Proc. IEEE Latin-American Conference on Communications (LATINCOM), Nov. 2019, pp. 1–6.
  • C. A. Gutierrez, W. K. Harrison, and M. Rice, “V2V propagation in mountainous terrain: Part II— Modeling results,” in Proc. IEEE Latin-American Conference on Communications (LATINCOM), Nov. 2019, pp. 1–6.
  • K. Norman, B. Jensen, M. Rice, and W. K. Harrison, “Doppler power spectra from vehicle-to-everything propagation experiments,” in Proc. Int. Telemetering Conf. (ITC), Las Vegas, NV, Oct. 2019, pp. 1–7.
  • W. K. Harrison and M. R. Bloch, “Attributes of generator matrices for best finite blocklength wiretap codes,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Paris, FR, July 2019, pp. 1–5.
  • D. Flanary, B. Jensen, B. Clark, K. Norman, N. Nelson, M. Rice, and W. K. Harrison, “Manufacturing an erasure wiretap channel from channel sounding measurements,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Paris, FR, July 2019, pp. 1–5.
  • B. Jensen, B. Clark, D. Flanary, K. Norman, M. Rice, and W. K. Harrison, “Physical-layer security: Does it work in a real environment?” in Proc. IEEE Int. Conf. Communications (ICC), Shanghai, CN, May 2019, pp. 1–7.
  • M. Carreira, T. M. Sa Pinto, M. Gomes, J. P. Vilela, and W. K. Harrison, “Adaptive physical-layer security through punctured coding for secrecy,” in Proc. IEEE Int. Conf. Communications (ICC), Shanghai, CN, May 2019, pp. 1–6.
  • Z. Dryer, A. Nickerl, M. A. C. Gomes, J. P. Vilela, and W. K. Harrison, “Full-duplex jamming for enhanced hidden-key secrecy,” in Proc. IEEE Int. Conf. Communications (ICC), Shanghai, CN, May 2019, pp. 1–7.
  • T. M. Sa Pinto, M. Gomes, J. P. Vilela, and W. K. Harrison, “Polar coding for physical-layer security without knowledge of the eavesdropper’s channel,” in Proc. IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, MY, Apr. 2019, pp. 1–5.
  • W. K. Harrison and J. L. Salmon, “Leveraging pitcher-batter matchups for optimal game strategy,” in Proc. MIT Sloan Sports Analytics Conference, Boston, MA, Mar. 2019, pp. 1–22. [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2017/02/1684.pdf 3
  • W. K. Harrison, K. Nelson, and S. Dye, “Physical-layer security for aeronautical telemetry,” in Proc. Int. Telemetering Conf. (ITC), Glendale, AZ, Nov. 2018, pp. 1–12.
  • W. K. Harrison and M. R. Bloch, “On dual relationships of secrecy codes,” in Proc. 56th Allerton Conference on Communication, Control, and Computing, Urbana-Champaign, IL, Oct. 2018, pp. 1–7.
  • P. Boyce and W. K. Harrison, “Cryptanalysis of Lempel-Ziv compressed and encrypted text: The statistics of compression,” in Proc. IEEE Int. Symp. Wireless Communication Systems (ISWCS), Lisbon, PO, Aug. 2018, pp. 1–6.
  • F. Arabian, W. Harrison, C. Josephson, E. Perrins, and M. D. Rice, “On peak-to-average power ratio optimization for coded APSK,” in Proc. IEEE Int. Symp. Wireless Communication Systems (ISWCS), Lisbon, PO, Aug. 2018, pp. 1–6.
  • G. Larmore and W. K. Harrison, “Active topology inference in store, code, and forward networks,” in Proc. IEEE Int. Symp. Wireless Communication Systems (ISWCS), Lisbon, PO, Aug. 2018, pp. 1–6.
  • M. H. Johnson and W. K. Harrison, “A rateless approach to physical-layer security,” in Proc. IEEE Int. Conf. Communications (ICC), Kansas City, MO, May 2018, pp. 1–6.
  • G. T. Rendon, W. K. Harrison, M. A. C. Gomes, and J. P. Vilela, “Nested QPSK encoding for information theoretic security,” in Proc. IEEE Int. Conf. Communications (ICC), Kansas City, MO, May 2018, pp. 1–6.
  • J. Pfister, M. A. C. Gomes, J. P. Vilela, and W. K. Harrison, “Quantifying equivocation for finite blocklength wiretap codes,” in Proc. IEEE Int. Conf. Communications (ICC), Paris, France, May 2017, pp. 1–6.
  • W. K. Harrison and J. L. Salmon, “Bullpen strategies for Major League Baseball,” in Proc. MIT Sloan Sports Analytics Conference, Boston, MA, Mar. 2017, pp. 1–16, 4th place paper award of approximately 200 submissions. [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2017/02/1684.pdf
  • J. L. Salmon and W. K. Harrison, “Tracking pitcher performance with instantaneous component ERA and moving averages,” in Proc. MIT Sloan Sports Analytics Conference, Boston, MA, Mar. 2016, pp. 1–8. [Online]. Available: http://www.sloansportsconference.com/wp-content/uploads/2016/02/1564-Tracking-Pitcher-Performance-with-Instantaneous-Component-ERA-and-Moving-Averages.pdf
  • D. Sarmento, J. P. Vilela, W. K. Harrison, and M. Gomes, “Interleaved coding for secrecy with a hidden key,” in Proc. IEEE Global Telecommunications Conf. (GLOBECOM) Workshops, San Diego, CA, Dec. 2015, pp. 1–6.
  • S. Schmidt and W. K. Harrison, “Real-time rate-adaptable coding for fading channels,” in Proc. IEEE Signal Processing & SP Education Workshop (SP/SPE), Salt Lake City, UT, Aug. 2015, pp. 151–156.
  • W. K. Harrison and P. Boyce, “Parity modifications and stopping sets in high-rate codes for physical-
  • layer security,” in Proc. IEEE Conf. Communications and Network Security (CNS), San Francisco, CA, Oct. 2014, pp. 115–120.
  • N. L. Gross and W. K. Harrison, “An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext,” in Proc. IEEE Int. Conf. Communications (ICC), Sydney, AU, June 2014, pp. 749–754.
  • W. K. Harrison, “Coset codes in a multi-hop network,” in Proc. IEEE Global Telecommunications Conf. (GLOBECOM) Workshops, Atlanta, GA, Dec. 2013, pp. 1270–1274. 4
  • W. K. Harrison and S. W. McLaughlin, “Equivocations for the simple substitution cipher with erasure-prone ciphertext,” in Proc. IEEE Information Theory Workshop (ITW), Lausanne, CH, Sept. 2012, pp. 622–626.
  • W. Harrison, J. Almeida, S. McLaughlin, and J. Barros, “Physical-layer security over correlated erasure channels,” in Proc. IEEE Int. Conf. Communications (ICC), Ottawa, ON, June 2012, pp. 888–892.
  • W. K. Harrison, J. Almeida, D. Klinc, S. W. McLaughlin, and J. Barros, “Stopping sets for physical-layer security,” in Proc. IEEE Information Theory Workshop (ITW), Dublin, IE, Aug. 2010, pp. 1–5.
  • W. K. Harrison and S. W. McLaughlin, “EXIT charts applied to tandem coding and cryptography in a wiretap scenario,” in Proc. IEEE Information Theory Workshop (ITW), Taormina, Sicily, Oct. 2009, pp. 173–177.
  • ——, “Tandem coding and cryptography on wiretap channels: EXIT chart analysis,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, June-July 2009, pp. 1939–1943.
  • ——, “Physical-layer security: Combining error control coding and cryptography,” in Proc. IEEE Int. Conf. Communications (ICC), Dresden, Germany, June 2009, pp. 1–5.

Theses

  • W. K. Harrison, “Physical-layer security: Practical aspects of coding and cryptography,” Ph.D. dissertation, Georgia Institute of Technology, Atlanta, GA, June 2012. [Online]. Available: https://smartech.gatech.edu/handle/1853/44818
  • W. K. Harrison, “Mesospheric infrared airglow measurements of molecular twilight transitions by means of satellite-based radiometry,” Master’s thesis, Utah State University, Logan, UT, May 2007.