Publication | Authors |
---|---|
Secret Key Generation Rates for Line of Sight Multipath Channels in the Prescence of Eavesdroppers | Amitha Mayya, Arsenia Chorti, Rafael F. Schaefer, Gerhard P. Fettweis |
Physical Layer Authentication Using Information Reconciliation | Atsu Kokuvi Angélo Passah, Rodrigo C. de Lamare, and Arsenia Chorti |
Divergence-minimizing attack against challenge- response authentication with IRSs | L. Crosara, A. V. Guglielmi, N. Laurenti, and S. Tomasin |
Physical-layer challenge-response authentication with IRS and single-antenna devices | A. V. Guglielmi, L. Crosara, S. Tomasin, and N. Laurenti |
Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones | Francesco Ardizzon, Damiano Salvaterra, Mattia Piana, and Stefano Tomasin |
Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning | Matteo Varotto, Stefan Valentin, and Stefano Tomasin |
A Latent Space Metric for Enhancing Prediction Confidence in Earth Observation Data | I. Pitsiorlas, A. Tsantalidou, G. Arvanitakis, M. Kountouris, Ch. Kontoes |
Decentralized LLM Inference over Edge Networks with Energy Harvesting | Aria Khoshsirat, Giovanni Perin, Michele Rossi |
Semantics-Aware Active Fault Detection in Status Updating Systems | G. Stamatakis, N. Pappas, A. Fragkiadakis, N. Petroulakis and A. Traganitis |
Version Age-based Client Scheduling Policy for Federating Learning | X. Hu, N. Pappas, H. Yang |
Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics | Q. Wang, H. Chen, P. Mohapatra, N. Pappas |
ROBUST-6G: Smart, Automated, and Reliable Security Service Platform for 6G | Bartlomiej Siniarski, Chamara Sandeepa, Shen Wang, Madhusanka Liyanage, Cem Ayyildiz, Veli Can Yildirim, Hakan Alakoca, Fatma Gunes Kesik, Betul Guvenc Paltun, Giovanni Perin, Michele Rossi, Stefano Tomasin, Arsenia Chorti, Pietro G. Giardina, Alberto Garcıa Perez, Jose Marıa Jorquera Valero, Tommy Svensson, Nikolaos Pappas, Marios Kountouris |
Advancing Security for 6G Smart Networks and Services | Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, Thulitha Senevirathna, Yushan Siriwardhana, Awaneesh Kumar Yadav, Bartlomiej Siniarski |
Explainable AI for 6G Use Cases: Technical Aspects and Research Challenges | Shen Wang, M. Atif Qureshi, Luis Miralles-Pechuan, Thien Huynh-The, Thippa Reddy Gadekallu, Madhusanka Liyanage |
SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks | Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage |
A Novel Method to Mitigate Adversarial Attacks Against AI-as-a-Service Functionality | Ömer Faruk Tuna, Leyli Karaçay, Utku Gülen |
One-Class Classification as GLRT for Jamming Detection in Private 5G Networks | Matteo Varotto, Stefan Valentin, Francesco Ardizzon, Samuele Marzotto, Stefano Tomasin |
Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces | Stefano Tomasin, Tarek N. M. Mohamed Elwakeel, Anna Valeria Guglielmi, Robin Maes, Nele Noels, Marc Moeneclaey |
Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum | José María Jorquera Valero, Alberto García Pérez, Gunes Kesik, Ömer Faruk Tuna, Pietro Giardina, Enrico Alberti, Lucía Cabanillas Rodríguez, Ignacio Dominguez, Diego Lopez, Dhouha Ayed, Manuel Gil Pérez, Gregorio Martinez Perez |
Minimizing the Age of Missed and False Alarms in Remote Estimation of Markov Sources | Jiping Luo and Nikolaos Pappas |
A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions | Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang |
A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions | Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang |
A Generalized Multi-Layer IDS for Smart Buildings | Marco Ruta; Pietro Giardina; Giada Landi; Rosario G. Garroppo |
Impact of Residual Hardware Impairments on RIS-aided Authentication | Bilal Çiçek, Hakan Alakoca |
A Framework for Global Trust and Reputation Management in 6G Networks | Bac Trinh-Nguyen, Sara Berri, Sin G. Teo, Tram Truong-Huu, Arsenia Chorti |
Enhanced Multiuser CSI-based Physical Layer Authentication Based on Information Reconciliation | Passah, Atsu Kokuvi Angélo; Chorti, Arsenia; de Lamare, Rodrigo |
ProFe: Communication-Efficient Decentralized Federated Learning via Distillation and Prototypes | Pedro Miguel Sanchez Sanchez, Enrique Tomas Martinez Beltran, Miguel Fernandez Llamas, Gerome Bovet, Gregorio Martinez Perez, Alberto Huertas Celdran |
HyperDtct: Hypervisor-based Ransomware Detection using System Calls | Jan von der Assen, Alberto Huertas Celdran, Jan Marc Luthi, Jose Maria Jorquera Valero, Francisco Enguix, Gerome Bovet, Burkhard Stiller |
S-VOTE: Similarity-based Voting for Client Selection in Decentralized Federated Learning | Enrique Tomás, Alberto Huertas Celdrán, Gregorio Martínez Pérez |