Picture for Francesco Ardizzon

Francesco Ardizzon

Authentication by Location Tracking in Underwater Acoustic Networks

Add code
Oct 04, 2024
Figure 1 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 2 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 3 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 4 for Authentication by Location Tracking in Underwater Acoustic Networks
Viaarxiv icon

Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach

Add code
Oct 01, 2024
Figure 1 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 2 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 3 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 4 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Viaarxiv icon

Performance Limits for Signals of Opportunity-Based Navigation

Add code
Jul 23, 2024
Viaarxiv icon

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

Add code
May 07, 2024
Figure 1 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 2 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 3 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 4 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Viaarxiv icon

Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones

Add code
May 06, 2024
Figure 1 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 2 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 3 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 4 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Viaarxiv icon

Secret-Key-Agreement Advantage Distillation With Quantization Correction

Add code
Apr 20, 2023
Viaarxiv icon

On the Limits of Cross-Authentication Checks for GNSS Signals

Add code
Apr 06, 2023
Viaarxiv icon

On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems

Add code
Feb 03, 2023
Figure 1 for On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems
Figure 2 for On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems
Figure 3 for On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems
Figure 4 for On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems
Viaarxiv icon

Generalized Likelihood Ratio Test With One-Class Classifiers

Add code
Oct 22, 2022
Viaarxiv icon

Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information

Add code
Aug 19, 2022
Figure 1 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Figure 2 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Figure 3 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Figure 4 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Viaarxiv icon