Christoph Lipps

Orcid: 0000-0001-6382-9156

According to our database1, Christoph Lipps authored at least 28 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
7
8
9
10
4
1
1
1
2
5
7
3
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.
Network, 2024

Latency optimized Deep Neural Networks (DNNs): An Artificial Intelligence approach at the Edge using Multiprocessor System on Chip (MPSoC).
CoRR, 2024

Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape Through Systematic Review.
IEEE Access, 2024

Integrating Cybersecurity in V2X: A Review of Simulation Environments.
IEEE Access, 2024

Update Rate and Dimension Requirements for Reconfigurable Mirror Arrays in Vehicular Visible Light Communication.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

Multi-bit Secret Key Generation for LoRaWAN based 6G mMTC using Autoencoders.
Proceedings of the 35th IEEE International Symposium on Personal, 2024

Time-Series Forecasting Models for 5G Mobile Networks: A Comparative Study in a Cloud Implementation.
Proceedings of the 15th International Conference on Network of the Future, 2024

A Ring Topology Approach: Efficient Communication in Wireless Body Area Networks (WBANs).
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024

DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated Learning.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces.
Discov. Internet Things, December, 2023

URLLC Physical Layer Authentication based on non-linear Supervised Learning.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Piezoelectric Beam Path Modulation for Visible Light Communication.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Inception Based Deep Learning: Biometric Identification Using Electroencephalography (EEG).
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Multi-Feature Physical Layer Authentication for URLLC based on Linear Supervised Learning.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Fully Homomorphic Encryption: Precision Loss in Wireless Mobile Communication.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Open Source 5G Core Network Implementations: A Qualitative and Quantitative Analysis.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
No One Acts like You: AI based Behavioral Biometric Identification.
Proceedings of the 3rd International Conference on Next Generation Computing Applications, 2022

Reconfigurable Intelligent Surfaces: A Physical Layer Security Perspective.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

2021
Physical Layer Security based Key Management for LoRaWAN.
CoRR, 2021

2020
Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020

2019
Two Decades of SCADA Exploitation: A Brief History.
CoRR, 2019

Securing Industrial Wireless Networks: Enhancing SDN with PhySec.
Proceedings of the Conference on Next Generation Computing Applications, 2019

2018
Putting Things in Context: Securing Industrial Authentication with Context Information.
Int. J. Cyber Situational Aware., 2018

Demystifying Deception Technology: A Survey.
CoRR, 2018

Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Deception in Information Security: Legal Considerations in the Context of German and European Law.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017


  Loading...