researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
analysis
architecture
certification
data-flow
design
discovery
e-science
meta-model
mobile
modeling
open-source
protocol
routing
rule-based
security
systematic-approach
tagging
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
A. Selcuk Uluagac
Aanjhan Ranganathan
Ahmad-Reza Sadeghi
Christina Pöpper
Guevara Noubir
Ivan Martinovic
Jens B. Schmitt
Mathieu Cunche
Mathy Vanhoef
Matthias Hollick
Matthias Schulz
Mauro Conti
Nitesh Saxena
Panos Papadimitratos
Patrick Tague
Roberto Di Pietro
Sencun Zhu
Srdjan Capkun
Vincent Lenders
William Enck
Filter by Top terms
[+]
OR
AND
NOT
1
adversarial
analysis
android
attack
attacks
authentication
detection
devices
learning
mobile
network
networks
poster
privacy
secure
security
sensor
systems
using
wireless
WISEC (wisec)
Editions
Publications
Viewing Publication 1 - 100 from 690
2025
ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space
Yan Long 0002
,
Jiancong Cui
,
YuQing Yang
,
Tobias Alam
,
Zhiqiang Lin 0001
,
Kevin Fu
.
wisec 2025
:
100-111
[doi]
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, VA, USA, 30 June 2025- 3 July 2025
Massimiliano Albanese
,
Luiz da Silva
,
Aanjhan Ranganathan
,
Jean-Pierre Seifert
, editors,
ACM,
2025.
[doi]
Wireless-Tap: Automatic Transcription of Phone Calls Using Millimeter-Wave Radar Sensing
Suryoday Basak
,
Mahanth Gowda
.
wisec 2025
:
4-15
[doi]
Improving Wireless Security Research: Cost-Effective Detection of Wireless Charging Vulnerabilities
Shannon Beck
,
Steven Fulton
,
Jordan Scott
,
Manohar Raavi
.
wisec 2025
:
224-229
[doi]
Exploring Unanticipated Functionality in Cellular Devices and Networks
Kevin R. B. Butler
.
wisec 2025
:
1-2
[doi]
Run-time Attestation and Auditing: The Verifier's Perspective
Adam Ilyas Caulfield
,
Norrathep Rattanavipanon
,
Ivan De Oliveira Nunes
.
wisec 2025
:
16-27
[doi]
Distributed Multi-Antenna GPS Spoofing Attack using Off-the-Shelf Devices
Xiang Cheng
,
Hanchao Yang
,
Shinan Liu
,
Yaling Yang
.
wisec 2025
:
28-39
[doi]
Fragile Frames: Wi-Fi's Fraught Fight Against FragAttacks
Siebe Devroe
,
Héloïse Gollier
,
Mathy Vanhoef
.
wisec 2025
:
230-235
[doi]
Evaluating Time-Bounded Defense Against RRC Relay in 5G Broadcast Messages
Yilu Dong
,
Tao Wan
,
Tianwei Wu
,
Syed Rafiul Hussain
.
wisec 2025
:
236-241
[doi]
On the Performance and Consistency Trade-off of the eSIM M2M Remote Provisioning Protocol
Mitziu Echeverria
,
AliAkbar Sadeghi
,
G. M. Tasnim Alam
,
Omar Chowdhury
.
wisec 2025
:
40-52
[doi]
SoK: Evaluating 5G-Advanced Protocols Against Legacy and Emerging Privacy and Security Attacks
Stavros Eleftherakis
,
Domenico Giustiniano
,
Nicolas Kourtellis
.
wisec 2025
:
196-210
[doi]
POSTER: TRIDENT - A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy
Al Nahian Bin Emran
,
Dhiman Goswami
,
Md Hasan Ullah Sadi
,
Sanchari Das
.
wisec 2025
:
286-287
[doi]
AI5GTest: AI-Driven Specification-Aware Automated Testing and Validation of 5G O-RAN Components
Abiodun Ganiyu
,
Pranshav Gajjar
,
Vijay K. Shah
.
wisec 2025
:
53-64
[doi]
DEMO: AI5GTest: LLM based Automation for 5G O-RAN Testing
Abiodun Ganiyu
,
Pranshav Gajjar
,
Vijay K. Shah
.
wisec 2025
:
298-299
[doi]
Poster: SIMulator: SIM Tracing on a (Pico-)Budget
Gabriel K. Gegenhuber
,
Philipp É. Frenzel
,
Adrian Dabrowski
.
wisec 2025
:
288-289
[doi]
POSTER: VeilPIR: A Lightweight Private Information Retrieval Protocol for Enhancing Data Privacy in IoT Ecosystems
Saurav Ghosh
,
Sanchari Das
.
wisec 2025
:
290-291
[doi]
Unveiling Privacy Risks in WebGPU through Hardware-based Device Fingerprinting
Konrad Hohentanner
,
Nils Kemmerzell
,
Steffen Florschütz
.
wisec 2025
:
65-75
[doi]
POSTER: A Multi-Signal Model for Detecting Evasive Smishing
Shaghayegh Hosseinpour
,
Sanchari Das
.
wisec 2025
:
292-293
[doi]
SoK: Security in the Inaudible World
David Inyangson
,
Aditya Gaur
,
Atheer Almogbil
,
Tushar M. Jois
,
Aviel D. Rubin
.
wisec 2025
:
211-223
[doi]
Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems
Abdullah Al Ishtiaq
,
Raja Hasnain Anwar
,
Yasra Chandio
,
Fatima Muhammad Anwar
,
Syed Rafiul Hussain
,
Muhammad Taqi Raza
.
wisec 2025
:
76-87
[doi]
FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
Suhwan Jeong
,
Beomseok Oh
,
Kwangmin Kim
,
Insu Yun
,
Yongdae Kim
,
CheolJun Park
.
wisec 2025
:
242-247
[doi]
Guardian Positioning System (GPS) for Location Based Services
Wenjie Liu
,
Panos Papadimitratos
.
wisec 2025
:
88-99
[doi]
Low-Layer Attacks Against 4G/5G Networks
Norbert Ludant
,
Marinos Vomvas
,
Stavros Dimou
,
Guevara Noubir
.
wisec 2025
:
248-255
[doi]
Poster: BLE-Shield: A Hybrid Framework for Threat Identification in Bluetooth Low Energy (BLE) Networks
Adalynn Martinez
,
Usman Rauf
,
Fadi Mohsen
.
wisec 2025
:
294-295
[doi]
"Alexa, Is Dynamic Content Safe?" Understanding the Risks of Dynamic Content in the Alexa Skill Ecosystem
Nathan McClaran
,
Payton Walker
,
Zihao Zheng
,
Yangyong Zhang
,
Nitesh Saxena
,
Guofei Gu
.
wisec 2025
:
112-123
[doi]
BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN
Vincenz Mechler
,
Frank Hessel
,
Matthias Hollick
,
Bastian Bloessl
.
wisec 2025
:
256-261
[doi]
DEMO: Illuminating the BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN
Vincenz Mechler
,
Frank Hessel
,
Matthias Hollick
,
Bastian Bloessl
.
wisec 2025
:
300-301
[doi]
Assessing the Latency of Network Layer Security in 5G Networks
Sotiris Michaelides
,
Jonathan Mucke
,
Martin Henze
.
wisec 2025
:
262-267
[doi]
FlashCatch: Minimizing Disruption in IMSI Catcher Operations
Andrea Paci
,
Gabriele Bologna
,
Ivan Palamà
,
Giuseppe Bianchi 0001
.
wisec 2025
:
124-135
[doi]
Practical Inner Product Encryption for Privacy-Preserved Internet-of-Things Applications
Tran Viet Xuan Phuong
,
Dat H. Tran
,
Hongyi Wu
.
wisec 2025
:
136-146
[doi]
Rethinking Resilience in 6G Design: The Missing Link for Mission-Critical Applications
Venkatesh Ramaswamy
.
wisec 2025
:
3
[doi]
Ripple: Software-Only Detection of Signal Injection Attacks in Drone Temperature Sensors
Milad Rezaee
,
Sebastian Köhler 0005
,
Kasper Rasmussen
.
wisec 2025
:
147-159
[doi]
SpaceJam: Protocol-aware Jamming Attacks against Space Communications
Edd Salkield
,
Sebastian Köhler
,
Simon Birnbach
,
Martin Strohmeier
,
Ivan Martinovic
.
wisec 2025
:
160-171
[doi]
Universal Spoofing of Real-World Aircraft Multilateration
Oliver Senn
,
Giorgio Tresoldi
,
Daniel Moser
,
Vincent Lenders
,
Martin Strohmeier
.
wisec 2025
:
268-273
[doi]
Demo: Fooling Eavesdroppers via On-Phone Metasurface and Spoofed Audio Information
Zhambyl Shaikhanov
,
Mahmoud Al-Madi
,
Jy-Chin Liao
,
Hou-Tong Chen
,
Chun-Chieh Chang
,
Sadhvikas Addamane
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2025
:
302-303
[doi]
RFinger: Environmental Fingerprint Embedding for Harmless mmWave Dataset Ownership Verification
Zixin Shang
,
Zhi Wu
,
Jiamu Li
,
Yang Hu
,
Yan Chen
.
wisec 2025
:
172-183
[doi]
DEMO: Radio Unit Activity Fingerprinting through Electromagnetic Side-Channel Analysis in O-RAN Networks
Sreenithya Somavarapu
,
Harshita Chaudhari
,
Nour El Houda Aidlaid
,
Nongnapat Adchariyavivit
,
Qais Dib
,
Moinul Hossain
,
Vijay K. Shah
,
Md Tanvir Arafin
.
wisec 2025
:
304-305
[doi]
Augmenting BLE Fingerprinting Using Instantaneous Frequency
George-Alexandru Stoian
,
Thiemo Voigt
,
Christian Rohner
.
wisec 2025
:
274-279
[doi]
Anti-Tamper Radio Meets Reconfigurable Intelligent Surface for System-Level Tamper Detection
Maryam Shaygan Tabar
,
Johannes Kortz
,
Paul Staat
,
Harald Elders-Boll
,
Christof Paar
,
Christian T. Zenger
.
wisec 2025
:
184-195
[doi]
Poster: When Diameter Firewall Meets User Devices
Maurice Zhang
,
Stephen Dowhy
,
John Doyle
,
David Dunn
,
Joel Cornett
,
Sangwook Bae
.
wisec 2025
:
296-297
[doi]
Standing Firm in 5G: A Single-Round, Dropout-Resilient Secure Aggregation for Federated Learning
YiWei Zhang
,
Rouzbeh Behnia
,
Imtiaz Karim
,
Attila A. Yavuz
,
Elisa Bertino
.
wisec 2025
:
280-285
[doi]
2024
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
Hongyu Jin 0001
,
Panos Papadimitratos
.
wisec 2024
:
8-13
[doi]
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events
Chenglong Fu 0002
,
Xiaojiang Du
,
Qiang Zeng 0001
,
Zhenyu Zhao
,
Fei Zuo
,
Jia Di
.
wisec 2024
:
101-112
[doi]
Covert Communications with Simultaneous Multi-Modal Transmission
Rahul Aggarwal
,
Justin Kong 0001
,
Terrence J. Moore
,
Jihun Choi
,
Predrag Spasojevic
,
Fikadu T. Dagefu
.
wisec 2024
:
1-7
[doi]
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection
Ildi Alla
,
Hervé B. Olou
,
Valeria Loscrì
,
Marco Levorato
.
wisec 2024
:
123-133
[doi]
Detecting Battery Cells with Harmonic Radar
Cesar Arguello
,
Beatrice Perez
,
Timothy J. Pierson
,
David Kotz
.
wisec 2024
:
231-236
[doi]
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks
Supriya Bajpai
,
Pagadala Krishna Murthy
,
Niraj Kumar
.
wisec 2024
:
113-122
[doi]
A Privacy Preserving Context Sensitive Kernel
Anshul Bhaware
,
Gaurav Varshney
,
Jaswinder Kour
,
Tejaswi Bishnoi
,
Mudit Jain
,
Dalchandra Sharma
.
wisec 2024
:
20-25
[doi]
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles
Tommaso Bianchi
,
Alessandro Brighente
,
Mauro Conti
.
wisec 2024
:
174-184
[doi]
UWB-Auth: A UWB-based Two Factor Authentication Platform
Yifeng Cao
,
Ashutosh Dhekne
,
Mostafa H. Ammar
.
wisec 2024
:
185-195
[doi]
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram
Maurantonio Caprolu
,
Savio Sciancalepore
,
Aleksandar Grigorov
,
Velyan Kolev
,
Gabriele Oligeri
.
wisec 2024
:
20-30
[doi]
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks
Azuka J. Chiejina
,
Brian Kim
,
Kaushik Chowhdury
,
Vijay K. Shah
.
wisec 2024
:
237-247
[doi]
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning
Abdurrahman Elmaghbub
,
Bechir Hamdaoui
.
wisec 2024
:
134-144
[doi]
Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Aya Fukami
,
Richard Buurke
.
wisec 2024
:
145-155
[doi]
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network
Héloïse Gollier
,
Mathy Vanhoef
.
wisec 2024
:
156-161
[doi]
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing
Yaqi He
,
Kai Zeng 0001
,
Long Jiao
,
Brian L. Mark
,
Khaled N. Khasawneh
.
wisec 2024
:
196-206
[doi]
Practical Integrity Validation in the Smart Home with HomeEndorser
Kaushal Kafle
,
Kirti Jagtap
,
Mansoor Ahmed-Rengers
,
Trent Jaeger
,
Adwait Nadkarni
.
wisec 2024
:
207-218
[doi]
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
Syed Khandker
,
Michele Guerra
,
Evangelos Bitsikas
,
Roger Piqueras Jover
,
Aanjhan Ranganathan
,
Christina Pöpper
.
wisec 2024
:
89-100
[doi]
Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning, WiseML 2024, Seoul, Republic of Korea, 30 May 2024
Minhoe Kim
,
Gihyuk Ko
,
Yalin E. Sagduyu
,
Yi Shi
, editors,
ACM,
2024.
[doi]
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024
Yongdae Kim
,
Jong Kim 0001
,
Farinaz Koushanfar
,
Kasper Rasmussen
, editors,
ACM,
2024.
[doi]
Backdoors on Manifold Learning
Christina Kreza
,
Stefanos Koffas
,
Behrad Tajalli
,
Mauro Conti
,
Stjepan Picek
.
wisec 2024
:
1-7
[doi]
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment
Edward Kwao
,
Jaehun Lee
,
Jinmo Park
,
Byeongdo Hong
,
Taehoon Kim
,
Inkyu Bang
.
wisec 2024
:
248-253
[doi]
Cost Minimization for Joint Server and Service Deployment in Edge Computing
Feng Liu
,
Lei Shi
,
Juan Xu 0002
,
Xu Ding
,
Yuqi Fan
,
Zhehao Li
.
wisec 2024
:
32-37
[doi]
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems
Francesco Marchiori
,
Mauro Conti
.
wisec 2024
:
8-13
[doi]
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs
Harsh Sanjay Pacherkar
,
Guanhua Yan
.
wisec 2024
:
254-264
[doi]
Privacy-Preserving Pseudonyms for LoRaWAN
Samuel Pélissier
,
Jan Aalmoes
,
Abhishek Kumar Mishra
,
Mathieu Cunche
,
Vincent Roca
,
Didier Donsez
.
wisec 2024
:
14-19
[doi]
Wireless-Powered Multi-Channel Backscatter Communications Under Jamming: A Cooperative Reinforcement Learning Approach
Dara Ron
,
Kai Zeng
.
wisec 2024
:
26-31
[doi]
DetecSHUN: Detection of Signals Hidden Under the Noise
Nathaniel Rowe
,
Dola Saha
.
wisec 2024
:
38-43
[doi]
De-anonymizing VR Avatars using Non-VR Motion Side-channels
Mohd Sabra
,
Nisha Vinayaga-Sureshkanth
,
Ari Sharma
,
Anindya Maiti
,
Murtuza Jadliwala
.
wisec 2024
:
54-65
[doi]
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models
Coen Schoof
,
Stefanos Koffas
,
Mauro Conti
,
Stjepan Picek
.
wisec 2024
:
14-19
[doi]
Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping
Amit Singha
,
Ziqian Bi
,
Tao Li 0042
,
Yimin Chen 0004
,
Yanchao Zhang
.
wisec 2024
:
31-41
[doi]
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices
Shiva Sunar
,
Paria Shirani
,
Suryadipta Majumdar
,
J. David Brown
.
wisec 2024
:
219-230
[doi]
Security Testing The O-RAN Near-Real Time RIC & A1 Interface
Kashyap Thimmaraju
,
Altaf Shaik
,
Sunniva Flück
,
Pere Joan Fullana Mora
,
Christian Werling
,
Jean-Pierre Seifert
.
wisec 2024
:
277-287
[doi]
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions
Seaver Thorn
,
K. Virgil English
,
Kevin R. B. Butler
,
William Enck
.
wisec 2024
:
66-77
[doi]
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric
Ruxin Wang
,
Long Huang
,
Kaitlyn Madden
,
Chen Wang 0009
.
wisec 2024
:
42-53
[doi]
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices
Johannes Willbold
,
Moritz Schloegel
,
Robin Bisping
,
Martin Strohmeier
,
Thorsten Holz
,
Vincent Lenders
.
wisec 2024
:
288-299
[doi]
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services
Yaru Yang
,
Yiming Zhang 0009
,
Tao Wan 0004
,
Chuhan Wang
,
Haixin Duan
,
Jianjun Chen
,
Yishen Li
.
wisec 2024
:
265-276
[doi]
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane
Oliver Zeidler
,
Julian Sturm
,
Daniel Fraunholz
,
Wolfgang Kellerer
.
wisec 2024
:
78-88
[doi]
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems
Xingya Zhao
,
Anwesha Roy
,
Avishek Banerjee
,
Kannan Srinivasan 0001
.
wisec 2024
:
162-173
[doi]
2023
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
Mashari Alatawi
,
Nitesh Saxena
.
wisec 2023
:
187-201
[doi]
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
Evangelos Bitsikas
,
Syed Khandker
,
Ahmad Salous
,
Aanjhan Ranganathan
,
Roger Piqueras Jover
,
Christina Pöpper
.
wisec 2023
:
121-132
[doi]
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Chongqi Guan
,
Heting Liu
,
Guohong Cao
,
Sencun Zhu
,
Thomas La Porta
.
wisec 2023
:
49-59
[doi]
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks
Thijs Heijligenberg
,
Guido Knips
,
Christian Böhm
,
David Rupprecht
,
Katharina Kohls
.
wisec 2023
:
145-150
[doi]
Circumventing the Defense against Modulation Classification Attacks
Naureen Hoque
,
Hanif Rahbari
.
wisec 2023
:
377-382
[doi]
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems
Naureen Hoque
,
Hanif Rahbari
.
wisec 2023
:
275-285
[doi]
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
Bedran Karakoc
,
Nils Fürste
,
David Rupprecht
,
Katharina Kohls
.
wisec 2023
:
97-108
[doi]
Verifying List Swarm Attestation Protocols
Jay Le-Papin
,
Brijesh Dongol
,
Helen Treharne
,
Stephan Wesemeyer
.
wisec 2023
:
163-174
[doi]
Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems
Wenjing Lou
.
wisec 2023
:
1
[doi]
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal
Ahmed Tanvir Mahdad
,
Nitesh Saxena
.
wisec 2023
:
175-186
[doi]
Exploring Adversarial Attacks on Learning-based Localization
Frost Mitchell
,
Phillip Smith
,
Aditya Bhaskara
,
Sneha Kumar Kasera
.
wisec 2023
:
15-20
[doi]
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication
Maryam Motallebighomi
,
Harshad Sathaye
,
Mridula Singh
,
Aanjhan Ranganathan
.
wisec 2023
:
365-376
[doi]
JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network
Hai N. Nguyen
,
Guevara Noubir
.
wisec 2023
:
293-304
[doi]
Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial Training
József Sándor
,
Roland Nagy
,
Levente Buttyán
.
wisec 2023
:
3-8
[doi]
Machine Learning-Based Jamming Detection and Classification in Wireless Networks
Enrico Testi
,
Luca Arcangeloni
,
Andrea Giorgetti
.
wisec 2023
:
39-44
[doi]
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats
Daniel Timko
,
Muhammad Lutfor Rahman
.
wisec 2023
:
1-12
[doi]
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Payton Walker
,
Tianfang Zhang
,
Cong Shi 0004
,
Nitesh Saxena
,
Yingying Chen 0001
.
wisec 2023
:
203-214
[doi]
Hierarchical Over-the-Air Federated Learning with Differential Privacy
Zixi Wang
,
Arick Grootveld
,
Mustafa Cenk Gursoy
.
wisec 2023
:
51-56
[doi]
Analysis of Lossy Generative Data Compression for Robust Remote Deep Inference
Mathew Williams
,
Silvija Kokalj-Filipovic
,
Armani Rodriguez
.
wisec 2023
:
33-38
[doi]
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators
Ka Lok Wu
,
Man Hong Hue
,
Ka Fun Tang
,
Sze Yiu Chau
.
wisec 2023
:
251-261
[doi]
Malicious Relay Detection and Legitimate Channel Recovery
Xingya Zhao
,
Wei-Han Chen
,
Kannan Srinivasan
.
wisec 2023
:
353-363
[doi]
Sign in
or
sign up
to see more results.