Showing 1–20 of 25 results
/ Date/ Name
Nov 10, 2024HidePrint: Protecting Device Anonymity by Obscuring Radio FingerprintsMay 9, 2023The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over TimeJan 7, 2025Cyber Spectrum Intelligence: Security Applications, Challenges and Road AheadJul 22, 2013Silence is Golden: exploiting jamming and radio silence to communicateAug 27, 2023MITRE ATT&CK: State of the Art and Way ForwardDec 20, 2024Detection of Aerial Spoofing Attacks to LEO Satellite Systems via Deep LearningFeb 27, 2025LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic AnalysisOct 9, 2019BrokenStrokes: On the (in)Security of Wireless KeyboardsOct 19, 2020KaFHCa: Key-establishment via Frequency Hopping CollisionsJul 31, 2020Long-Term Noise Characterization of Narrowband Power Line CommunicationsFeb 12, 2020Road Traffic Poisoning of Navigation Apps: Threats and CountermeasuresJul 11, 2024Preventing Radio Fingerprinting through Low-Power JammingMay 26, 2025Weak-Jamming Detection in IEEE 802.11 Networks: Techniques, Scenarios and MobilityJun 19, 2023Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep LearningOct 21, 2019Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking DetectionOct 25, 2023Radio Frequency Fingerprinting via Deep Learning: Challenges and OpportunitiesJan 11, 2019PiNcH: an Effective, Efficient, and Robust Solution to Drone Detection via Network Traffic AnalysisSep 16, 2020The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and ServicesAug 20, 2023False Data Injection Attacks in Smart Grids: State of the Art and Way ForwardOct 12, 2020PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning