![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2024
- Hongyu Jin
, Panos Papadimitratos
:
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization. WISEC 2024: 8-13 - Chenglong Fu
, Xiaojiang Du
, Qiang Zeng
, Zhenyu Zhao
, Fei Zuo
, Jia Di
:
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events. WISEC 2024: 101-112 - Rahul Aggarwal
, Justin Kong, Terrence J. Moore
, Jihun Choi
, Predrag Spasojevic
, Fikadu T. Dagefu
:
Covert Communications with Simultaneous Multi-Modal Transmission. WISEC 2024: 1-7 - Ildi Alla
, Hervé B. Olou
, Valeria Loscrì
, Marco Levorato
:
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection. WISEC 2024: 123-133 - Cesar Arguello
, Beatrice Perez
, Timothy J. Pierson
, David Kotz
:
Detecting Battery Cells with Harmonic Radar. WISEC 2024: 231-236 - Supriya Bajpai
, Pagadala Krishna Murthy
, Niraj Kumar
:
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks. WISEC 2024: 113-122 - Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. WISEC 2024: 174-184 - Yifeng Cao
, Ashutosh Dhekne
, Mostafa H. Ammar
:
UWB-Auth: A UWB-based Two Factor Authentication Platform. WISEC 2024: 185-195 - Maurantonio Caprolu
, Savio Sciancalepore
, Aleksandar Grigorov
, Velyan Kolev
, Gabriele Oligeri
:
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram. WISEC 2024: 20-30 - Azuka J. Chiejina
, Brian Kim
, Kaushik Chowhdury
, Vijay K. Shah
:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. WISEC 2024: 237-247 - Abdurrahman Elmaghbub
, Bechir Hamdaoui
:
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning. WISEC 2024: 134-144 - Aya Fukami
, Richard Buurke
:
Keyless Entry: Breaking and Entering eMMC RPMB with EMFI. WISEC 2024: 145-155 - Héloïse Gollier
, Mathy Vanhoef
:
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network. WISEC 2024: 156-161 - Yaqi He
, Kai Zeng
, Long Jiao
, Brian L. Mark
, Khaled N. Khasawneh
:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. WISEC 2024: 196-206 - Kaushal Kafle
, Kirti Jagtap
, Mansoor Ahmed-Rengers
, Trent Jaeger
, Adwait Nadkarni
:
Practical Integrity Validation in the Smart Home with HomeEndorser. WISEC 2024: 207-218 - Syed Khandker
, Michele Guerra
, Evangelos Bitsikas
, Roger Piqueras Jover
, Aanjhan Ranganathan
, Christina Pöpper
:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. WISEC 2024: 89-100 - Edward Kwao
, Jaehun Lee
, Jinmo Park
, Byeongdo Hong
, Taehoon Kim
, Inkyu Bang
:
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment. WISEC 2024: 248-253 - Harsh Sanjay Pacherkar
, Guanhua Yan
:
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs. WISEC 2024: 254-264 - Samuel Pélissier
, Jan Aalmoes
, Abhishek Kumar Mishra
, Mathieu Cunche
, Vincent Roca
, Didier Donsez
:
Privacy-Preserving Pseudonyms for LoRaWAN. WISEC 2024: 14-19 - Mohd Sabra
, Nisha Vinayaga-Sureshkanth
, Ari Sharma
, Anindya Maiti
, Murtuza Jadliwala
:
De-anonymizing VR Avatars using Non-VR Motion Side-channels. WISEC 2024: 54-65 - Amit Singha
, Ziqian Bi
, Tao Li
, Yimin Chen
, Yanchao Zhang
:
Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping. WISEC 2024: 31-41 - Shiva Sunar
, Paria Shirani
, Suryadipta Majumdar
, J. David Brown
:
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices. WISEC 2024: 219-230 - Kashyap Thimmaraju
, Altaf Shaik
, Sunniva Flück
, Pere Joan Fullana Mora
, Christian Werling
, Jean-Pierre Seifert
:
Security Testing The O-RAN Near-Real Time RIC & A1 Interface. WISEC 2024: 277-287 - Seaver Thorn
, K. Virgil English
, Kevin R. B. Butler
, William Enck
:
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions. WISEC 2024: 66-77 - Ruxin Wang
, Long Huang
, Kaitlyn Madden
, Chen Wang
:
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric. WISEC 2024: 42-53 - Johannes Willbold
, Moritz Schloegel
, Robin Bisping
, Martin Strohmeier
, Thorsten Holz
, Vincent Lenders
:
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices. WISEC 2024: 288-299 - Yaru Yang
, Yiming Zhang
, Tao Wan
, Chuhan Wang
, Haixin Duan
, Jianjun Chen
, Yishen Li
:
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services. WISEC 2024: 265-276 - Oliver Zeidler
, Julian Sturm
, Daniel Fraunholz
, Wolfgang Kellerer
:
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane. WISEC 2024: 78-88 - Xingya Zhao
, Anwesha Roy
, Avishek Banerjee
, Kannan Srinivasan
:
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems. WISEC 2024: 162-173 - Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-30 23:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint