Skip to content
Home » Blogposts

Blogposts

Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum

This paper presents a security framework designed for the emerging Cloud Continuum, where cloud, edge, and extreme-edge environments operate together to support next-generation 6G services. As networks become more distributed and dynamic, traditional static security mechanisms struggle to keep pace.… Read More »Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum

Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation

This paper presents an improved framework for physical-layer authentication (PLA) in multiuser wireless environments, where channel variations, measurement noise, and interference can make it difficult to reliably distinguish legitimate users from attackers. Traditional CSI-based authentication methods often suffer in such… Read More »Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation

A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions

This survey examines how Explainable AI (XAI) can strengthen security in 5G and future 6G networks, where AI models increasingly drive tasks such as intrusion detection, traffic classification, PHY-layer authentication, and anomaly detection. While these models offer strong performance, their… Read More »A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions

High-accuracy AoA-based Localization using Hierarchical ML Classifiers in Outdoor Environments

This paper presents a machine learning–driven localization framework that leverages Angle of Arrival (AoA) as a robust feature extracted from massive MIMO OFDM channel state information (CSI). The goal is to enable accurate user or device localization in complex outdoor… Read More »High-accuracy AoA-based Localization using Hierarchical ML Classifiers in Outdoor Environments

Leveraging Angle of Arrival Estimation against Impersonation Attacks in Physical Layer Authentication

This paper investigates whether Angle of Arrival (AoA) can serve as a reliable feature for physical-layer authentication (PLA), particularly when an adversary attempts to impersonate a legitimate transmitter. While previous PLA methods often rely on features such as channel frequency… Read More »Leveraging Angle of Arrival Estimation against Impersonation Attacks in Physical Layer Authentication

DRACO: Decentralized Asynchronous Federated Learning over Row-Stochastic Wireless Networks

This paper introduces DRACO, a decentralized and asynchronous federated learning framework tailored for wireless networks where communication delays, node heterogeneity, and topology variations make traditional synchronous FL inefficient. Unlike centralized approaches, DRACO removes the need for a server and allows… Read More »DRACO: Decentralized Asynchronous Federated Learning over Row-Stochastic Wireless Networks

S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning

This paper introduces S-VOTE, a similarity-based voting mechanism designed to improve both efficiency and model performance in Decentralized Federated Learning (DFL). Unlike traditional federated learning, DFL operates without a central server, relying on peer-to-peer communication. While this avoids bottlenecks and… Read More »S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning

HyperDtct: Hypervisor-Based Ransomware Detection using System Calls

This paper presents HyperDtct, a hypervisor-based framework for detecting ransomware by monitoring system call behavior from outside the guest operating system. Rather than relying on in-guest agents or signature-based methods, both of which can be evaded by modern ransomware, HyperDtct… Read More »HyperDtct: Hypervisor-Based Ransomware Detection using System Calls