Francesco Gringoli

Orcid: 0000-0003-2621-582X

According to our database1, Francesco Gringoli authored at least 124 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Can I Add a VR Flow? On the Maximum Capacity of 5G to Support 360° Video.
IEEE Commun. Mag., August, 2024

A First Look at 160 MHz WiFi 6/6E in Action: Performance and Interference Characterization.
Proceedings of the IFIP Networking Conference, 2024

Hey ChatGPT, Is This Message Phishing?
Proceedings of the 22nd Mediterranean Communication and Computer Networking Conference, 2024

An Experimental Analysis of the WPA3 Protocol in IoT Devices.
Proceedings of the 22nd Mediterranean Communication and Computer Networking Conference, 2024

Neuro-Symbolic Fusion of Wi-Fi Sensing Data for Passive Radar with Inter-Modal Knowledge Transfer.
Proceedings of the 27th International Conference on Information Fusion, 2024

Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments.
Comput. Commun., December, 2023

Enabling Time-Synchronized Hybrid Networks With Low-Cost IoT Modules.
IEEE Internet Things J., June, 2023

Wi-Fi Localization Obfuscation: An implementation in openwifi.
Comput. Commun., May, 2023

Exposing the CSI: A Systematic Investigation of CSI-based Wi-Fi Sensing Capabilities and Limitations.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2023

Scalable Multi-Modal Learning for Cross-Link Channel Prediction in Massive IoT Networks.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Rolling the D11: An Emulation Game for the Whole BCM43 Family.
Proceedings of the 17th ACM Workshop on Wireless Network Testbeds, 2023

Accurate Passive Radar via an Uncertainty-Aware Fusion of Wi-Fi Sensing Data.
Proceedings of the 26th International Conference on Information Fusion, 2023

2022
ERMII encoding lookup tables optimized with different goals.
Dataset, May, 2022

CSI-based Device-free Localization and Obfuscation.
Dataset, January, 2022

Enhanced Self-Synchronized Reduced Media-Independent Interface for Robotic and Automotive Applications.
IEEE Trans. Ind. Informatics, 2022

Integrating CSI Sensing in Wireless Networks: Challenges to Privacy and Countermeasures.
IEEE Netw., 2022

Cross-Link Channel Prediction for Massive IoT Networks.
CoRR, 2022

On the properties of device-free multi-point CSI localization and its obfuscation.
Comput. Commun., 2022

AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing.
Comput. Commun., 2022

"Careful with that Roam, Edu": experimental analysis of Eduroam credential stealing attacks.
Proceedings of the 17th Wireless On-Demand Network Systems and Services Conference, 2022

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Augmenting mmWave localization accuracy through sub-6 GHz on off-the-shelf devices.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

On the Implementation of Location Obfuscation in openwifi and Its Performance.
Proceedings of the 20th Mediterranean Communication and Computer Networking Conference, 2022

Looking for Criminal Intents in JavaScript Obfuscated Code.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

2021
A Precise Synchronization Method for Future Wireless TSN Networks.
IEEE Trans. Ind. Informatics, 2021

Modelling Downlink Packet Aggregation in Paced 802.11ac WLANs.
CoRR, 2021

IMSI Catchers in the wild: A real world 4G/5G assessment.
Comput. Networks, 2021

Quick & plenty: Achieving low delay & high rate in 802.11ac edge networks.
Comput. Networks, 2021

Low-delay high-rate operation of 802.11ac WLAN downlink: Nonlinear controller analysis & design.
Comput. Networks, 2021

IEEE 802.11 CSI randomization to preserve location privacy: An empirical evaluation in different scenarios.
Comput. Networks, 2021

Non Intrusive Wi-Pi CSI Obfuscation Against Active Localization Attacks.
Proceedings of the 16th Annual Conference on Wireless On-demand Network Systems and Services Conference, 2021

Modelling Downlink Aggregation in Paced WLANs.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

Accurate ubiquitous localization with off-the-shelf IEEE 802.11ac devices.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

AX-CSI: Enabling CSI Extraction on Commercial 802.11ax Wi-Fi Platforms.
Proceedings of the WiNTECH'21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, 2021

Reputation-Based Spectrum Data Fusion against Falsification Attacks in Cognitive Networks.
Proceedings of the 19th Mediterranean Communication and Computer Networking Conference, 2021

Passive Device-Free Multi-Point CSI Localization and Its Obfuscation with Randomized Filtering.
Proceedings of the 19th Mediterranean Communication and Computer Networking Conference, 2021

Low-Delay Proportional Fair Rate Allocation For 802.11ac WLAN Downlink.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Self-Aware Effective Identification and Response to Viral Cyber Threats.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

2020
6b8b RMII encoder/decoder verification data.
Dataset, April, 2020

Experimenting with open source tools to deploy a multi-service and multi-slice mobile network.
Comput. Commun., 2020

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets.
Proceedings of the 29th USENIX Security Symposium, 2020

Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

The diverse and variegated reactions of different cellular devices to IMSI catching attacks.
Proceedings of the WiNTECH@MobiCom 2020: Proceedings of the 14th International Workshop on Wireless Network Testbeds, 2020

An Experimental Study of CSI Management to Preserve Location Privacy.
Proceedings of the WiNTECH@MobiCom 2020: Proceedings of the 14th International Workshop on Wireless Network Testbeds, 2020

Regulating Aggregation Level For Low Latency in 802.11ac.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

One GPU to Snoop Them All: a Full-Band Bluetooth Low Energy Sniffer.
Proceedings of the Mediterranean Communication and Computer Networking Conference, 2020

2019
XTRA: Towards Portable Transport Layer Functions.
IEEE Trans. Netw. Serv. Manag., 2019

Experimental QoE Evaluation of Multicast Video Delivery over IEEE 802.11aa WLANs.
IEEE Trans. Mob. Comput., 2019

A Game of One/Two Strategic Friendly Jammers Versus a Malicious Strategic Node.
IEEE Netw. Lett., 2019

Regulating Queueing Delay in 802.11ac WLANs: Nonlinear Controller Analysis and Design.
CoRR, 2019

High Precision Synchronization between Commercial WiFi-ICs and External Device.
Proceedings of the 16th Workshop on Positioning, Navigation and Communications, 2019

Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets.
Proceedings of the 13th International Workshop on Wireless Network Testbeds, 2019

Dead on Arrival: An Empirical Study of The Bluetooth 5.1 Positioning System.
Proceedings of the 13th International Workshop on Wireless Network Testbeds, 2019

2018
Performance Assessment of Open Software Platforms for 5G Prototyping.
IEEE Wirel. Commun., 2018

Position and Velocity Estimation of a Non-Cooperative Source From Asynchronous Packet Arrival Time Measurements.
IEEE Trans. Mob. Comput., 2018

Low Delay Rate Allocation in WLANs Using Aggregation.
CoRR, 2018

Maximising the utility of enterprise millimetre-wave networks.
Comput. Commun., 2018

Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Design and Validation of a Multi-service 5G Network with QoE-aware Orchestration.
Proceedings of the 12th International Workshop on Wireless Network Testbeds, 2018

A Flexible Framework for Debugging IoT Wireless Applications.
Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, 2018

Making Wi-Fi Fit for the Tactile Internet: Low-Latency Wi-Fi Flooding Using Concurrent Transmissions.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
A High Efficiency MAC Protocol for WLANs: Providing Fairness in Dense Scenarios.
IEEE/ACM Trans. Netw., 2017

$μ$Nap: Practical Micro-Sleeps for 802.11 WLANs.
CoRR, 2017

Imola: A decentralised learning-driven protocol for multi-hop White-Fi.
Comput. Commun., 2017

μNap: Practical micro-sleeps for 802.11 WLANs.
Comput. Commun., 2017

A dynamic and autonomous channel selection strategy for interference avoidance in 802.11.
Proceedings of the 13th Annual Conference on Wireless On-demand Network Systems and Services, 2017

Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Demonstrating reactive smartphone-based jamming: demo.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Demo: Nexmon in Action: Advanced Applications Powered by the Nexmon Firmware Patching Framework.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

2016
Friendly Jamming on Access Points: Analysis and Real-World Measurements.
IEEE Trans. Wirel. Commun., 2016

Collision-free Operation in High Density WLAN Deployments.
CoRR, 2016

When is the right time to transmit in multi-hop White-Fi?
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

LTE/Wi-Fi co-existence under scrutiny: an empirical study.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016

An application of IEEE 802.11ac to Smart Grid automation based on IEC 61850.
Proceedings of the IECON 2016, 2016

2015
Emitter localisation from reception timestamps in asynchronous networks.
Comput. Networks, 2015

IEC 61850 for micro grid automation over heterogeneous network: Requirements and real case deployment.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Implementation and experimental evaluation of a Collision-Free MAC protocol for WLANs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Making a case for flexible 802.11 architectures.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Fault-Tolerant Streaming Computation with BlockMon.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
VoIPiggy: Analysis and Implementation of a Mechanism to Boost Capacity in IEEE 802.11 WLANs Carrying VoIP Traffic.
IEEE Trans. Mob. Comput., 2014

A first implementation and evaluation of the IEEE 802.11aa group addressed transmission service.
Comput. Commun. Rev., 2014

Gaining insight on friendly jamming in a real-world IEEE 802.11 network.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Flow Management at Multi-Gbps: Tradeoffs and Lessons Learned.
Proceedings of the Traffic Monitoring and Analysis - 6th International Workshop, 2014

Demo: a testbed to evaluate frequency-hopping anti-jamming techniques in ieee 802.11.
Proceedings of the 9th ACM international workshop on Wireless network testbeds, 2014

Reactive logic in software-defined networking: Measuring flow-table requirements.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

2013
Wireless MAC Processor Networking: A Control Architecture for Expressing and Implementing High-Level Adaptation Policies in WLANs.
IEEE Veh. Technol. Mag., 2013

Stream-monitoring with blockmon: convergence of network measurements and data analytics platforms.
Comput. Commun. Rev., 2013

An Innovative Rate Adaptation Algorithm for Multicast Transmissions in Wireless LANs.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Scaling Out the Performance of Service Monitoring Applications with BlockMon.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Enabling cognitive-radio paradigm on commercial off-the-shelf 802.11 hardware.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

Flexible and modular support for multicast rate adaptation in WLANs.
Proceedings of the 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013

2012
MTCLASS: Enabling statistical traffic classification of multi-gigabit aggregates on inexpensive hardware.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Wireless MAC processors: Programming MAC protocols on commodity Hardware.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

VoIPiggy: Implementation and evaluation of a mechanism to boost voice capacity in 802.11WLANs.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Wire-speed statistical classification of network traffic on commodity hardware.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

MTCLASS: Traffic classification on high-speed links with commodity hardware.
Proceedings of IEEE International Conference on Communications, 2012

MAClets: active MAC protocols over hard-coded devices.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

2011
Quantifying the accuracy of the ground truth associated with Internet traffic traces.
Comput. Networks, 2011

PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

MAC-Engine: a new architecture for executing MAC algorithms on commodity wifi hardware.
Proceedings of the 6th ACM International Workshop on Wireless Network Testbeds, 2011

On-line SVM traffic classification.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Taking a Peek at Bandwidth Usage on Encrypted Links.
Proceedings of IEEE International Conference on Communications, 2011

On the flexibility of the IEEE 802.11 technology: Challenges and directions.
Proceedings of the 2011 Future Network & Mobile Summit, Warsaw, Poland, June 15-17, 2011, 2011

2010
Maranello: Practical Partial Packet Recovery for 802.11.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Bologna: block-based 802.11 transmission recovery.
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010

Optimizing statistical classifiers of network traffic.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Coarse Classification of Internet Traffic Aggregates.
Proceedings of IEEE International Conference on Communications, 2010

Comparing P2PTV Traffic Classifiers.
Proceedings of IEEE International Conference on Communications, 2010

2009
Support Vector Machines for TCP traffic classification.
Comput. Networks, 2009

Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting.
Comput. Networks, 2009

GT: picking up the truth from the ground for internet traffic.
Comput. Commun. Rev., 2009

On the stability of the information carried by traffic flow features at the packet level.
Comput. Commun. Rev., 2009

Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic.
Proceedings of IEEE International Conference on Communications, 2009

Impact of Asymmetric Routing on Statistical Traffic Classification.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

An Experimental Evaluation of the Computational Cost of a DPI Traffic Classifier.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Pattern Recognition Approaches for Classifying IP Flows.
Proceedings of the Structural, 2008

IP Traffic Classification for QoS Guarantees: The Independence of Packets.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

A Preliminary Look at the Privacy of SSH Tunnels.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Detection of Encrypted Tunnels Across Network Boundaries.
Proceedings of IEEE International Conference on Communications, 2008

A Model for the Study of Privacy Issues in Secure Shell Connections.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Traffic classification through simple statistical fingerprinting.
Comput. Commun. Rev., 2007

Detecting HTTP Tunnels with Statistical Mechanisms.
Proceedings of IEEE International Conference on Communications, 2007

2006
A statistical approach to IP-level classification of network traffic.
Proceedings of IEEE International Conference on Communications, 2006


  Loading...