Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging | 0 | 0.34 | 2022 |
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones | 0 | 0.34 | 2022 |
Next2You: Robust Copresence Detection Based on Channel State Information | 0 | 0.34 | 2022 |
Best Practices for Notification Studies for Security and Privacy Issues on the Internet | 0 | 0.34 | 2021 |
Leveraging Cross-Technology Broadcast Communication to build Gateway-Free Smart Homes | 0 | 0.34 | 2021 |
BEAMWAVE: Cross-layer Beamforming and Scheduling for Superimposed Transmissions in Industrial IoT mmWave Networks | 0 | 0.34 | 2021 |
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System | 0 | 0.34 | 2021 |
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop | 0 | 0.34 | 2021 |
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network | 1 | 0.40 | 2021 |
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support | 0 | 0.34 | 2021 |
Improving the Reliability of Bluetooth Low Energy Connections. | 0 | 0.34 | 2020 |
Concurrent Wireless Cut-Through Forwarding: Ultra-Low Latency Multi-Hop Communication for the Internet of Things | 0 | 0.34 | 2020 |
Neat-Tcp: Generation Of Tcp Congestion Control Through Neuroevolution Of Augmenting Topologies | 0 | 0.34 | 2020 |
Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio | 0 | 0.34 | 2020 |
Demo - Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices. | 0 | 0.34 | 2020 |
HydraWave: Multi-group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communications | 0 | 0.34 | 2020 |
Towards Secure Urban Infrastructures - Cyber Security Challenges for Information and Communication Technology in Smart Cities. | 0 | 0.34 | 2020 |
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks | 1 | 0.38 | 2020 |
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints | 1 | 0.35 | 2020 |
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices | 2 | 0.42 | 2019 |
Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets | 10 | 0.54 | 2019 |
ZERO-INTERACTION SECURITY-TOWARDS SOUND EXPERIMENTAL VALIDATION | 0 | 0.34 | 2019 |
Practical VLC to WiFi Handover Mechanisms. | 0 | 0.34 | 2019 |
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments | 0 | 0.34 | 2019 |
JamLab-NG - Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi Interference. | 0 | 0.34 | 2019 |
Transitions: A Protocol-Independent View of the Future Internet | 3 | 0.43 | 2019 |
Hybrid Precoding for Multi-Group Multicasting in mmWave Systems | 0 | 0.34 | 2019 |
CBMoS: Combinatorial Bandit Learning for Mode Selection and Resource Allocation in D2D Systems | 2 | 0.36 | 2019 |
InternalBlue - Bluetooth Binary Patching and Experimentation Framework | 2 | 0.40 | 2019 |
Perils of Zero-Interaction Security in the Internet of Things. | 1 | 0.35 | 2019 |
A Billion Open Interfaces For Eve And Mallory: Mitm, Dos, And Tracking Attacks On Ios And Macos Through Apple Wireless Direct Link | 0 | 0.34 | 2019 |
Fast and Infuriating: Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware | 6 | 0.48 | 2018 |
Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi. | 9 | 0.56 | 2018 |
Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response. | 4 | 0.47 | 2018 |
The Nexmon firmware analysis and modification framework: Empowering researchers to enhance Wi-Fi devices. | 1 | 0.45 | 2018 |
FML: Fast Machine Learning for 5G mmWave Vehicular Communications. | 1 | 0.37 | 2018 |
Demo: Channel Estimation and Custom Beamforming on the 60 GHz TP-Link Talon AD7200 Router. | 0 | 0.34 | 2018 |
Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. | 3 | 0.38 | 2018 |
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks. | 6 | 0.52 | 2018 |
Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices. | 0 | 0.34 | 2018 |
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market. | 0 | 0.34 | 2018 |
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. | 0 | 0.34 | 2018 |
An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications. | 8 | 0.49 | 2018 |
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control | 0 | 0.34 | 2018 |
A systematic approach to constructing families of incremental topology control algorithms using graph transformation. | 2 | 0.36 | 2018 |
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control. | 12 | 0.77 | 2017 |
A practical and secure social media facility for internet-deprived populations. | 1 | 0.37 | 2017 |
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.1 lad Devices. | 10 | 0.80 | 2017 |
Unsupervised Traffic Flow Classification Using a Neural Autoencoder | 1 | 0.48 | 2017 |
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices. | 6 | 0.56 | 2017 |