Picture for Francesco Ardizzon

Francesco Ardizzon

Authentication by Location Tracking in Underwater Acoustic Networks

Add code
Oct 04, 2024
Figure 1 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 2 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 3 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 4 for Authentication by Location Tracking in Underwater Acoustic Networks
Viaarxiv icon

Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach

Add code
Oct 01, 2024
Figure 1 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 2 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 3 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 4 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Viaarxiv icon

Performance Limits for Signals of Opportunity-Based Navigation

Add code
Jul 23, 2024
Viaarxiv icon

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

Add code
May 07, 2024
Figure 1 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 2 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 3 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 4 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Viaarxiv icon

Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones

Add code
May 06, 2024
Figure 1 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 2 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 3 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 4 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Viaarxiv icon

Secret-Key-Agreement Advantage Distillation With Quantization Correction

Add code
Apr 20, 2023
Viaarxiv icon

On the Limits of Cross-Authentication Checks for GNSS Signals

Add code
Apr 06, 2023
Viaarxiv icon

On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems

Add code
Feb 03, 2023
Viaarxiv icon

Generalized Likelihood Ratio Test With One-Class Classifiers

Add code
Oct 22, 2022
Viaarxiv icon

Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information

Add code
Aug 19, 2022
Figure 1 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Figure 2 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Figure 3 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Figure 4 for Machine Learning-Based Distributed Authentication of UWAN Nodes with Limited Shared Information
Viaarxiv icon