Picture for Stefano Tomasin

Stefano Tomasin

Department of Information Engineering, University of Padova, Italy

Authentication by Location Tracking in Underwater Acoustic Networks

Add code
Oct 04, 2024
Figure 1 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 2 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 3 for Authentication by Location Tracking in Underwater Acoustic Networks
Figure 4 for Authentication by Location Tracking in Underwater Acoustic Networks
Viaarxiv icon

Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach

Add code
Oct 01, 2024
Figure 1 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 2 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 3 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Figure 4 for Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach
Viaarxiv icon

Performance Limits for Signals of Opportunity-Based Navigation

Add code
Jul 23, 2024
Viaarxiv icon

Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines

Add code
May 07, 2024
Viaarxiv icon

One-Class Classification as GLRT for Jamming Detection in Private 5G Networks

Add code
May 07, 2024
Figure 1 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 2 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 3 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Figure 4 for One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Viaarxiv icon

Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning

Add code
May 07, 2024
Viaarxiv icon

Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones

Add code
May 06, 2024
Figure 1 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 2 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 3 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Figure 4 for Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones
Viaarxiv icon

User Localization with HRIS and Backscatter Modulation for Next-Generation Networks

Add code
Mar 01, 2024
Viaarxiv icon

Scheduling for Downlink OFDMA With IRS Reconfiguration Constraints

Add code
Jan 05, 2024
Viaarxiv icon

Minimum-Latency Scheduling For Partial-Information Multiple Access Schemes

Add code
Aug 04, 2023
Viaarxiv icon