no code implementations • 7 May 2024 • Matteo Varotto, Stefan Valentin, Francesco Ardizzon, Samuele Marzotto, Stefano Tomasin
5G mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation.
no code implementations • 6 May 2024 • Francesco Ardizzon, Damiano Salvaterra, Mattia Piana, Stefano Tomasin
Drones are expected to be used for many tasks in the future and require secure communication protocols.
no code implementations • 3 Feb 2023 • Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti
We first derive the optimal attack strategy against a Gaussian transmission from Alice, by minimizing an outer bound on the achievable error probability region of the spoofing detection test.
no code implementations • 22 Oct 2022 • Francesco Ardizzon, Stefano Tomasin
The artificial dataset is used only for training, while the OCC is used on negative-class samples generated from a different pdf.
no code implementations • 19 Aug 2022 • Francesco Ardizzon, Roee Diamant, Paolo Casari, Stefano Tomasin
We propose a technique to authenticate received packets in underwater acoustic networks based on the physical layer features of the underwater acoustic channel (UWAC).