Gerhard P. Hancke
Orcid: 0000-0002-2388-3542Affiliations:
- City University of Hong Kong, Department of Computer Science, Hong Kong
- Royal Holloway University of London, Egham Hill, Information Security Group, UK
- University of Cambridge, Computer Laboratory, UK
- University of Pretoria, Department of Electrical, Electronic and Computer Engineering, South Africa
According to our database1,
Gerhard P. Hancke
authored at least 210 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
NLOS Identification and Mitigation for Time-based Indoor Localization Systems: Survey and Future Research Directions.
ACM Comput. Surv., December, 2024
IEEE Trans. Ind. Informatics, March, 2024
Adaptive Interference Avoidance and Mode Selection Scheme for D2D-Enabled Small Cells in 5G-IIoT Networks.
IEEE Trans. Ind. Informatics, February, 2024
Boosting Weakly-Supervised Referring Image Segmentation via Progressive Comprehension.
CoRR, 2024
A Scheme for Distributed Vehicle Authentication and Revocation in Decentralized VANETs.
IEEE Access, 2024
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024
A Survey on NB-IoT Random Access: Approaches for Uplink Radio Access Network Congestion Management.
IEEE Access, 2024
Efficient Microservice Deployment in the Edge-Cloud Networks With Policy-Gradient Reinforcement Learning.
IEEE Access, 2024
Proceedings of the ACM SIGGRAPH 2024 Conference Papers, 2024
NLOS Identification and Mitigation with WiFi: A Performance Evaluation in Dynamic Environments.
Proceedings of the IEEE International Conference on Industrial Technology, 2024
Proceedings of the IEEE International Conference on Industrial Technology, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
ACM Trans. Graph., August, 2023
Sensors, March, 2023
J. Sens. Actuator Networks, February, 2023
IEEE Internet Things J., 2023
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023
UWB-Based NLOS Identification and Mitigation: A Performance Evaluation in Dynamic Settings.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
Proceedings of the IEEE International Conference on Industrial Technology, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 34th British Machine Vision Conference 2023, 2023
2022
IEEE Trans. Ind. Informatics, 2022
Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities.
IEEE Trans. Ind. Informatics, 2022
Guest Editorial: Reliability and Security for Intelligent Wireless Sensing and Control Systems.
IEEE Trans. Ind. Informatics, 2022
A Fuzzy-Logic Based Adaptive Data Rate Scheme for Energy-Efficient LoRaWAN Communication.
J. Sens. Actuator Networks, 2022
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022
Int. J. Netw. Manag., 2022
Comput. Secur., 2022
Investigating Distance Bounding for Delegated Proof-of-Proximity Consensus within IIoT.
Proceedings of the 31st IEEE International Symposium on Industrial Electronics, 2022
Proceedings of the 20th IEEE International Conference on Industrial Informatics, 2022
Proceedings of the 20th IEEE International Conference on Industrial Informatics, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
From Industry 4.0 to Agriculture 4.0: Current Status, Enabling Technologies, and Research Challenges.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Dependable Secur. Comput., 2021
Amplitude quantization method for autonomous threshold estimation in self-reconfigurable cognitive radio systems.
Phys. Commun., 2021
IEEE Internet Things J., 2021
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021
Generalized self-tuning system for adaptive threshold estimators in cognitive radio systems using swarm and evolutionary-based approaches.
Trans. Emerg. Telecommun. Technol., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021
Performance Analysis of Machine Learning Classifiers for Pothole Road Anomaly Segmentation.
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021
Proceedings of the IECON 2021, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
IEEE Trans. Ind. Informatics, 2020
Cognitive Radio in Low Power Wide Area Network for IoT Applications: Recent Approaches, Benefits and Challenges.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Emerg. Top. Comput., 2020
A cuckoo search optimization-based forward consecutive mean excision model for threshold adaptation in cognitive radio.
Soft Comput., 2020
IEEE Syst. J., 2020
Behavioral Acoustic Emanations: Attack and Verification of PIN Entry Using Keypress Sounds.
Sensors, 2020
Low Power Wide Area Network, Cognitive Radio and the Internet of Things: Potentials for Integration.
Sensors, 2020
Trans. Emerg. Telecommun. Technol., 2020
CACC: Context-aware congestion control approach for lightweight CoAP/UDP-based Internet of Things traffic.
Trans. Emerg. Telecommun. Technol., 2020
CoRR, 2020
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020
IEEE Access, 2020
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Around-the-Corner or Through-the-Wall? Classification of Non-Line-of-Sight Conditions.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020
Enhanced security in industrial internet of things networks using latency based fingerprinting.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
2019
Fragmentation-Based Distributed Control System for Software-Defined Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019
Evaluating the Implications of Varying Bluetooth Low Energy (BLE) Transmission Power Levels on Wireless Indoor Localization Accuracy and Precision.
Sensors, 2019
An Effective Spectrum Handoff Based on Reinforcement Learning for Target Channel Selection in the Industrial Internet of Things.
Sensors, 2019
Sensors, 2019
Hum. centric Comput. Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
Histogram partitioning algorithms for adaptive and autonomous threshold estimation in cognitive radio-based industrial wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2019
Efficient controller placement and reelection mechanism in distributed control system for software defined wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2019
A delay-aware spectrum handoff scheme for prioritized time-critical industrial applications with channel selection strategy.
Comput. Commun., 2019
Sleep Scheduling for Unbalanced Energy Harvesting in Industrial Wireless Sensor Networks.
IEEE Commun. Mag., 2019
Indoor Localization using Wireless Fidelity (WiFi) and Bluetooth Low Energy (BLE) signals.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019
A Comparison of Data Aggregation Techniques in Software-Defined Wireless Sensor Network.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019
An Approach to Improve Location Accuracy in Non-Line-of-Sight Scenarios using Floor Plans.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Towards Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Approaches for Best-Effort Relay-Resistant Channels on Standard Contactless Channels.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Proceedings of the IEEE International Conference on Industrial Technology, 2019
A Review of Wireless Sensor Network Localisation Based on Software Defined Networking.
Proceedings of the IEEE International Conference on Industrial Technology, 2019
Proceedings of the 9th International Conference on Information Communication and Management, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
2018
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Ind. Informatics, 2018
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018
A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study.
Sensors, 2018
Overlay Virtualized Wireless Sensor Networks for Application in Industrial Internet of Things: A Review.
Sensors, 2018
A comparative analysis of local and global adaptive threshold estimation techniques for energy detection in cognitive radio.
Phys. Commun., 2018
Localised information fusion techniques for location discovery in wireless sensor networks.
Int. J. Sens. Networks, 2018
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.
Comput. Secur., 2018
Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices.
IEEE Access, 2018
A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges.
IEEE Access, 2018
Problem of Wireless Fingerprint Duplication in Fingerprinting Based Indoor Localization.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018
Analysis of Bluetooth Low Energy (BLE) Based Indoor Localization System with Multiple Transmission Power Levels.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018
Survey of Proximity Based Authentication Mechanisms for the Industrial Internet of Things.
Proceedings of the IECON 2018, 2018
Proceedings of the IECON 2018, 2018
Proceedings of the IECON 2018, 2018
2017
Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2017
Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.
Sensors, 2017
Pose Estimation of a Mobile Robot Based on Fusion of IMU Data and Vision Data Using an Extended Kalman Filter.
Sensors, 2017
A survey of cognitive radio handoff schemes, challenges and issues for industrial wireless sensor networks (CR-IWSN).
J. Netw. Comput. Appl., 2017
User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks.
Entropy, 2017
A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements.
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the IEEE International Conference on Industrial Technology, 2017
Energy efficient irrigation scheduling system based on the ISO/IEC/IEEE 21451 standards.
Proceedings of the IEEE International Conference on Industrial Technology, 2017
Proceedings of the IEEE International Conference on Industrial Technology, 2017
Sleep scheduling for critical nodes in group-based industrial wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
2016
IR-UWB-Based Non-Line-of-Sight Identification in Harsh Environments: Principles and Challenges.
IEEE Trans. Ind. Informatics, 2016
Multiple Region of Interest Coverage in Camera Sensor Networks for Tele-Intensive Care Units.
IEEE Trans. Ind. Informatics, 2016
IEEE Trans. Ind. Informatics, 2016
Sensors, 2016
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Comput. Networks, 2016
Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Wearable security: Key derivation for Body Area sensor Networks based on host movement.
Proceedings of the 25th IEEE International Symposium on Industrial Electronics, 2016
Proceedings of the 25th IEEE International Symposium on Industrial Electronics, 2016
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016
Towards non-line-of-sight ranging error mitigation in industrial wireless sensor networks.
Proceedings of the IECON 2016, 2016
Proceedings of the IECON 2016, 2016
Proceedings of the IECON 2016, 2016
When Innovation Meets Evolution: An Extensive Study of Emerging e-Learning Technologies for Higher Education in Hong Kong.
Proceedings of the Emerging Technologies for Education - First International Symposium, 2016
Public key cryptography: Feasible for security in modern personal area sensor networks?
Proceedings of the IEEE International Conference on Industrial Technology, 2016
Cognitiva - A cognitive industrial wireless network protocol: Protocol design and testbed implementation.
Proceedings of the IEEE International Conference on Industrial Technology, 2016
Efficient video multicast in wireless surveillance networks for intelligent building.
Proceedings of the IEEE International Conference on Industrial Technology, 2016
2015
Experimental Link Quality Characterization of Wireless Sensor Networks for Underground Monitoring.
IEEE Trans. Ind. Informatics, 2015
Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview.
IEEE Trans. Ind. Informatics, 2015
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.
IEEE Commun. Lett., 2015
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality.
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Classifying tachycardias via high dimensional linear discriminant function and perceptron with mult-piece domain activation function.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015
A service-oriented architecture for wireless video sensor networks: Opportunities and challenges.
Proceedings of the IECON 2015, 2015
Enhanced centroid localization of wireless sensor nodes using linear and neighbor weighting mechanisms.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Rapid prototyping of a wireless sensor network gateway for the internet of things using off-the-shelf components.
Proceedings of the IEEE International Conference on Industrial Technology, 2015
2014
IEEE Trans. Ind. Informatics, 2014
IEEE Trans. Ind. Informatics, 2014
Dynamic spectrum allocation for smart meter networks and WSNs in the presence of household consumer networks.
Proceedings of the 23rd IEEE International Symposium on Industrial Electronics, 2014
Proceedings of the 12th IEEE International Conference on Industrial Informatics, 2014
Proceedings of the 12th IEEE International Conference on Industrial Informatics, 2014
Positioning infrastructure for industrial automation systems based on UWB wireless communication.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
IEEE Trans. Ind. Informatics, 2013
An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method.
Int. J. Sens. Networks, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
A remote moniotring patient Homecare Gateway supporting streaming vital sign monitoring.
Proceedings of the IECON 2013, 2013
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013
2012
Distance-bounding for RFID: Effectiveness of 'terrorist fraud' in the presence of bit errors.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
2011
J. Comput. Secur., 2011
Actor coordination using info-gap decision theory in wireless sensor and actor networks.
Int. J. Sens. Networks, 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the AFRICON 2011, 2011
Proceedings of the AFRICON 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010
A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
2007
Elektrotech. Informationstechnik, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005