Gianmarco Baldini
Orcid: 0000-0003-4830-1227
According to our database1,
Gianmarco Baldini
authored at least 128 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Misbehavior detection in intelligent transportation systems based on federated learning.
Internet Things, April, 2024
Intrusion Detection System for MIL-STD-1553 Based on Convolutional Neural Networks With Binary Images and Adaptive Quantization.
IEEE Netw. Lett., March, 2024
Wireless Interference Identification With Convolutional Neural Networks Based on the FPGA Implementation of the LTE Cell-Specific Reference Signal (CRS).
IEEE Trans. Cogn. Commun. Netw., February, 2024
Enhancement of Transient-Based Radio Frequency Fingerprinting with Smoothing and Gradient Functions.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024
2023
Convolutional neural networks combined with feature selection for radio-frequency fingerprinting.
Comput. Intell., October, 2023
Nakagami-m Fading Channel Identification Using Adaptive Continuous Wavelet Transform and Convolutional Neural Networks.
Algorithms, June, 2023
In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms.
Inf., 2023
Fading Channel Classification with Walsh-Hadamard Transform and Convolutional Neural Network.
Proceedings of the International Conference on Smart Applications, 2023
Specific Emitter Identification with Principal Component Analysis (PCA) Dimensionality Reduction and Convolutional Neural Network.
Proceedings of the International Conference on Smart Applications, 2023
Classification of Optical Transmission Anomalies with Convolutional Neural Networks and 2D Histograms.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023
Multi scale histogram-based intrusion detection system for the MIL-STD-1553 protocol.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023
2022
Phys. Commun., 2022
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525.
Int. J. Crit. Infrastructure Prot., 2022
Int. J. Crit. Infrastructure Prot., 2022
Computer, 2022
Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis.
Comput. Commun., 2022
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges.
Comput. Networks, 2022
Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension.
Comput. Networks, 2022
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022
Microphone Identification based on Spectral Entropy with Convolutional Neural Network.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
2021
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions.
IEEE Secur. Priv., 2021
Spectrum Sensing Implemented with Improved Fluctuation-Based Dispersion Entropy and Machine Learning.
Entropy, 2021
ACM Comput. Surv., 2021
On the application of sensor authentication with intrinsic physical features to vehicle security.
Comput. Electr. Eng., 2021
Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions.
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the 15th International Conference on Signal Processing and Communication Systems, 2021
Proceedings of the 5th Cyber Security in Networking Conference, 2021
Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles.
Symmetry, 2020
Sensors, 2020
On the Application of Time Frequency Convolutional Neural Networks to Road Anomalies' Identification with Accelerometers and Gyroscopes.
Sensors, 2020
An Interledger Blockchain Platform for Cross-Border Management of Cybersecurity Information.
IEEE Internet Comput., 2020
A Review on the Application of Distributed Ledgers in the Evolution of Road Transport.
IEEE Internet Comput., 2020
Not Quite Yourself Today: Behaviour-Based Continuous Authentication in IoT Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
Transient-Based Internet of Things Emitter Identification Using Convolutional Neural Networks and Optimized General Linear Chirplet Transform.
IEEE Commun. Lett., 2020
On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks.
Entropy, 2020
Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Proceedings of the 2020 Global Internet of Things Summit, 2020
Proceedings of the 2020 Global Internet of Things Summit, 2020
Proceedings of the 2020 Global Internet of Things Summit, 2020
2019
Sensors, 2019
Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots.
Internet Technol. Lett., 2019
Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices.
Comput. Stand. Interfaces, 2019
Comput. Electr. Eng., 2019
Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network.
IEEE Access, 2019
Proceedings of the 2019 Global IoT Summit, 2019
Proceedings of the 2019 Global IoT Summit, 2019
An assessment of the impact of IQ imbalances on the physical layer authentication of IoT wireless devices.
Proceedings of the 2019 Global IoT Summit, 2019
An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN.
Proceedings of the 2019 Global IoT Summit, 2019
Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019
Proceedings of the 6th International Conference on Control, 2019
2018
Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union.
Int. J. Crit. Infrastructure Prot., 2018
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018
Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the Security in Computer and Information Sciences, 2018
2017
Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns.
Sensors, 2017
An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting.
Mob. Inf. Syst., 2017
Trans. Emerg. Telecommun. Technol., 2017
A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components.
IEEE Commun. Surv. Tutorials, 2017
Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017
A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017
Proceedings of the 40th International Convention on Information and Communication Technology, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the Global Internet of Things Summit, 2017
Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy.
Proceedings of the Global Internet of Things Summit, 2017
2016
Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS).
Sensors, 2016
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
Proceedings of the 23rd International Conference on Telecommunications, 2016
Informed consent in Internet of Things: The case study of cooperative intelligent transport systems.
Proceedings of the 23rd International Conference on Telecommunications, 2016
LTE D2D communication for collaborative wearable sensor networks: A connectivity analysis.
Proceedings of the European Conference on Networks and Communications, 2016
2015
Apodization Method for Standard Load Modulation Amplitude Measurement on Proximity Integrated Circuit Cards.
IEEE Trans. Instrum. Meas., 2015
Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios.
Secur. Commun. Networks, 2015
Experimental detection of mobile satellite transmissions with cyclostationary features.
Int. J. Satell. Commun. Netw., 2015
Comput. Secur., 2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the 38th International Convention on Information and Communication Technology, 2015
2014
Public Protection and Disaster Relief Communication System Integrity: A Radio-Flexibility and Identity-Based Cryptography Approach.
IEEE Veh. Technol. Mag., 2014
Telecommun. Syst., 2014
IEEE Technol. Soc. Mag., 2014
EURASIP J. Wirel. Commun. Netw., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014
Connectivity and security in a D2D communication protocol for public safety applications.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
Proceedings of the Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
A Software Radio Implementation of Centralized MAC Protocol for Cognitive Radio Networks.
Wirel. Pers. Commun., 2013
IEEE Veh. Technol. Mag., 2013
Secur. Commun. Networks, 2013
IEEE Commun. Mag., 2013
Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), 2013
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013
A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario.
Proceedings of the Critical Information Infrastructures Security, 2013
2012
Future of wireless communication: RadioApps and related security and radio computer framework.
IEEE Wirel. Commun., 2012
Public Safety Communications: Enhancement Through Cognitive Radio and Spectrum Sharing Principles.
IEEE Veh. Technol. Mag., 2012
A Cognitive Management Framework to Support Exploitation of the Future Internet of Things.
Scalable Comput. Pract. Exp., 2012
Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead.
IEEE Commun. Surv. Tutorials, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
2011
The EULER project: application of software defined radio in joint security operations.
IEEE Commun. Mag., 2011
Design of a Robust Cognitive Control Channel for Cognitive Radio Networks Based on Ultra Wideband Pulse Shaped Signal.
Proceedings of the Multiple Access Communications - 4th International Workshop, 2011
2010
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure.
Int. J. Crit. Infrastructure Prot., 2010
ETSI reconfigurable radio systems: status and future directions on software defined radio and cognitive radio standards.
IEEE Commun. Mag., 2010
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010
Implementation of a wireless test bed for the functional verification of the ultra-wideband Detect-and-Avoid mechanism.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
Experimentally detecting IEEE 802.11n Wi-Fi based on cyclostationarity features for ultra-wide band cognitive radios.
Proceedings of the IEEE 20th International Symposium on Personal, 2009
ETSI Reconfigurable Radio Systems - Software Defined Radio and Cognitive Radio standards.
Proceedings of the IEEE 20th International Symposium on Personal, 2009
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009
Preliminary experimental results on the spectrum sensing performances for UWB-Cognitive Radios for detecting IEEE 802.11n systems.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009
2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Critical Information Infrastructure Security, 2008
1999
A dynamic model of moving flames for the analysis and control of combustion instabilities.
Proceedings of the 5th European Control Conference, 1999