Author of the publication

#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones.

, , , and . ACM Trans. Priv. Secur., 24 (4): 31:1-31:34 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of the Wireless Electric Vehicle Charging Communication., , , and . SmartGridComm, page 393-398. IEEE, (2022)They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors., , , , and . ACSAC, page 399-413. ACM, (2021)BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments., , , and . SECRYPT, page 135-146. SCITEPRESS, (2023)Peeves: Physical Event Verification in Smart Homes., , and . CCS, page 1455-1467. ACM, (2019)Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting., , , , and . CCS, page 608-621. ACM, (2023)RingAuth: Wearable Authentication using a Smart Ring., , , and . CoRR, (2023)Biometric Identification System based on Object Interactions in Internet of Things Environments., , , and . SP (Workshops), page 215-221. IEEE, (2022)KeySpace: Public Key Infrastructure Considerations in Interplanetary Networks., , , , and . CoRR, (2024)#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones., , , and . ACM Trans. Priv. Secur., 24 (4): 31:1-31:34 (2021)RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection., , and . EICC, page 159-166. ACM, (2023)