Guevara Noubir

Orcid: 0000-0001-5876-2874

According to our database1, Guevara Noubir authored at least 129 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
WRIST: Wideband, Real-Time, Spectro-Temporal RF Identification System Using Deep Learning.
IEEE Trans. Mob. Comput., February, 2024

Forward Security with Crash Recovery for Secure Logs.
ACM Trans. Priv. Secur., 2024

Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption.
IACR Cryptol. ePrint Arch., 2024

Establishing Trust in the Beyond-5G Core Network using Trusted Execution Environments.
CoRR, 2024

Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous.
CoRR, 2024

2023
An Efficient OFDM-Based Monostatic Radar Design for Multitarget Detection.
IEEE Access, 2023

JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
DEFORM: A Practical, Universal Deep Beamforming System.
CoRR, 2022

Towards an AI-Driven Universal Anti-Jamming Solution with Convolutional Interference Cancellation Network.
CoRR, 2022

Universal Beamforming: A Deep RFML Approach.
Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems on International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2022

Rapid Interoperability with OverlAI Gateways.
Proceedings of the IEEE Military Communications Conference, 2022

On the Implications of Spoofing and Jamming Aviation Datalink Applications.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Spectro-Temporal RF Identification using Deep Learning.
CoRR, 2021

SELEST: secure elevation estimation of drones using MPC.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Spectrum-flexible secure broadcast ranging.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

SigUnder: a stealthy 5G low power attack and defenses.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Amazon echo dot or the reverberating secrets of IoT devices.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Wideband, Real-time Spectro-Temporal RF Identification.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

Deep Neural Networks for Multicarrier Waveforms Classification in UAV Networks.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

FEDBS: Learning on Non-IID Data in Federated Learning using Batch Normalization.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Pilotless FS-FBMC for Flexible Spectrum Access and Sharing.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

2020
Cascading Attacks on Wi-Fi Networks: Theory and Experiments.
IEEE Trans. Control. Netw. Syst., 2020

Reliability for Smart Healthcare: A Network Slicing Perspective.
IEEE Netw., 2020

Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing.
Proc. Priv. Enhancing Technol., 2019

Cryptographic Algorithms in Wearable Communications: An Empirical Analysis.
IEEE Commun. Lett., 2019

Forward Integrity and Crash Recovery for Secure Logs.
IACR Cryptol. ePrint Arch., 2019

A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR, 2019

EPiC: efficient privacy-preserving counting for MapReduce.
Computing, 2019

Wireless attacks on aircraft landing systems: demo.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Towards Adversarial and Unintentional Collisions Detection Using Deep Learning.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Proceedings of the 28th USENIX Security Symposium, 2019

Wireless Attacks on Aircraft Instrument Landing Systems.
Proceedings of the 28th USENIX Security Symposium, 2019

Security of GPS/INS Based On-road Location Tracking Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Deep Cross-Modal Age Estimation.
Proceedings of the Advances in Computer Vision, 2019

Wireless Transfer of Energy Alongside Information in Wireless Sensor Networks.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

2018
My Magnetometer Is Telling You Where I've Been?: A Mobile Device Permissionless Location Attack.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
The Perils of User Tracking Using Zero-Permission Mobile Apps.
IEEE Secur. Priv., 2017

Secure Logging with Crash Tolerance.
IACR Cryptol. ePrint Arch., 2017

An autonomic and permissionless Android covert channel.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Multi-client Oblivious RAM Secure Against Malicious Servers.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Linearly Constrained Bimatrix Games in Wireless Communications.
IEEE Trans. Commun., 2016

On GitHub's Programming Languages.
CoRR, 2016

Special issue on NETYS'14 selected papers.
Computing, 2016

Interleaving Jamming in Wi-Fi Networks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Fingerprinting Wi-Fi Devices Using Software Defined Radios.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Inferring User Routes and Locations Using Zero-Permission Mobile Sensors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Wi(deband)-Fi: A Proposal for an Opportunistic Wideband Architecture based on Wi-Fi.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

Reproducibility in wireless experimentation: need, challenges, and approaches.
Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, 2016

Cascading denial of service attacks on Wi-Fi networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Recursive Trees for Practical ORAM.
Proc. Priv. Enhancing Technol., 2015

Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists.
Proc. Priv. Enhancing Technol., 2015

Multi-User Oblivious RAM Secure Against Malicious Servers.
IACR Cryptol. ePrint Arch., 2015

Constrained Bimatrix Games in Wireless Communications.
CoRR, 2015

BaPu: Efficient and Practical Bunching of Access Point Uplinks.
Proceedings of the Networked Systems - Third International Conference, 2015

Mitigating Rate Attacks through Crypto-Coded Modulation.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Authenticating Privately over Public Wi-Fi Hotspots.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Return of the Covert Channel, Data Center Style.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

2014
On the Performance of Adaptive Packetized Wireless Communication Links Under Jamming.
IEEE Trans. Wirel. Commun., 2014

Game theory-based resource management strategy for cognitive radio networks.
Multim. Tools Appl., 2014

Toward Robust Hidden Volumes using Write-Only Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

CBM: A Crypto-Coded Modulation Scheme for Rate Information Concealing and Robustness Boosting.
CoRR, 2014

Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Packetized wireless communication under jamming, a constrained bimatrix game.
Proceedings of the IEEE Global Communications Conference, 2014

Quadratic program solution of communication links under jamming.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Distributed Cooperation and Diversity for Hybrid Wireless Networks.
IEEE Trans. Mob. Comput., 2013

Efficient Spread Spectrum Communication without Preshared Secrets.
IEEE Trans. Mob. Comput., 2013

Performance of IEEE 802.11 under Jamming.
Mob. Networks Appl., 2013

Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists.
IACR Cryptol. ePrint Arch., 2013

Welcome message from the D-SPAN 2013 chairs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Counter-jamming using mixed mechanical and software interference cancellation.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Application-awareness in SDN.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

On the performance of multi-layer superposition coding scheme under constrained jamming.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

2012
Efficient broadcast communication in the presence of inside attackers: A non-cooperative game.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Message from the workshop chairs.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

On the capacity of rate-adaptive packetized wireless communication links under jamming.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Jamming games against multi-rate superposition coding transmitters.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Secur. Comput., 2011

Message from the workshop chairs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Demo: SNEAP: a social network-enabled EAP method no more open hotspots.
Proceedings of the 9th International Conference on Mobile Systems, 2011

WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient magnetic torque transduction in biological environments using tunable nanomechanical resonators.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Superposition coding in an adversarial environment.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Distributed Cooperation and Diversity for Hybrid Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 8th International Conference, 2010

iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

2009
Experimentation-oriented platform for development and evaluation of MANET cross-layer protocols.
Ad Hoc Networks, 2009

RF Control of Biological Systems: Applications to Wireless Sensor Networks.
Proceedings of the Nano-Net - 4th International ICST Conference, 2009

Zero pre-shared secret key establishment in the presence of jammers.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

2008
The F<sub>f</sub>-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptol. ePrint Arch., 2008

Linear programming models for jamming attacks on network traffic flows.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

2007
Cross-Layer Distributed Diversity for Heterogeneous Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007

Broadcast Control Channel Jamming: Resilience and Identification of Traitors.
Proceedings of the IEEE International Symposium on Information Theory, 2007

SPREAD: Foiling Smart Jammers Using Multi-Layer Agility.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Steganographic Communication in Ordered Channels.
Proceedings of the Information Hiding, 8th International Workshop, 2006

GIST: Group-Independent Spanning Tree for Data Aggregation in Dense Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
On link layer denial of service in data wireless LANs.
Wirel. Commun. Mob. Comput., 2005

Efficient Multicast Trees with Local Knowledge on Wireless Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, Third International Conference, 2005

Transmission power control for ad hoc wireless networks: throughput, energy and fairness.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Universal approximations for TSP, Steiner tree, and set cover.
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005

Minimum energy accumulative routing in wireless networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

Mobility Models for Ad hoc Network Simulation.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Secure sharing of location information over Ad hoc networks: an application of secure multicast.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Low-power DoS attacks in data wireless LANs and countermeasures.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Improving Goodput of the IEEE 802.11 MAC Protocol by Using Congestion Control Methods.
Int. J. Wirel. Opt. Commun., 2003

Secure multicast groups on ad hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

2001
Improving performance of MAC layer by using congestion control/avoidance methods in wireless network.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

Hierarchy-based access control in distributed environments.
Proceedings of the IEEE International Conference on Communications, 2001

1998
Signature-based method for run-time fault detection in communication protocols.
Comput. Commun., 1998

Inter-layer resource management for hierarchical cell structures.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

On the Computation of Local Interchangeability in Discrete Constraint Satisfaction Problems.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1996
Self-correcting polynomial programs.
Reliab. Comput., 1996

Using Error Control Codes to Reduce the Communication Complexity of Voting in NMR Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

Fault tolerant multiple observers using error control codes.
Proceedings of the 1996 International Conference on Network Protocols, 1996

Algebraic Techniques for the Optimization of Control Flow Checking.
Proceedings of the Digest of Papers: FTCS-26, 1996

1995
A robust transport protocol for run-time fault detection.
Proceedings of the 1995 International Conference on Network Protocols, 1995

1993
Static and Dynamic Polling Mechanisms for Fieldbus Networks.
ACM SIGOPS Oper. Syst. Rev., 1993

Analysis of polling protocols for fieldbus networks.
Comput. Commun. Rev., 1993

Scheduling for Absolute Temporal Consistency.
Proceedings of the Knowledge-Based Reactive Scheduling, 1993

Analysis of a Class of Polling Protocols for Fieldbus Networks.
Proceedings of the Decentralized and Distributed Systems, 1993

A software architecture for maintaining temporal consistency in a distributed real-time environment.
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993


  Loading...