Hanif Rahbari

Orcid: 0000-0001-7670-6542

According to our database1, Hanif Rahbari authored at least 31 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fair and Secure 5G and Wi-Fi Coexistence Using Robust Implicit Channel Coordination.
IEEE Trans. Inf. Forensics Secur., 2024

When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Deep Learning Models as Moving Targets to Counter Modulation Classification Attacks.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Toward Protecting 5G Sidelink Scheduling in C-V2X Against Intelligent DoS Attacks.
IEEE Trans. Wirel. Commun., November, 2023

Adaptive Preamble Embedding With MIMO to Support User-Defined Functionalities in WLANs.
IEEE Trans. Mob. Comput., 2023

Circumventing the Defense against Modulation Classification Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

2022
Drive (Quantum) Safe! â€" Towards Post-Quantum Security for V2V Communications.
IACR Cryptol. ePrint Arch., 2022

Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks.
Proceedings of the IEEE INFOCOM 2022, 2022

Non-cooperative Learning for Robust Spectrum Sharing in Connected Vehicles with Malicious Agents.
Proceedings of the IEEE Global Communications Conference, 2022

Implicit Channel Coordination to Tackle Starvation Attacks in 5G and Wi-Fi Coexistence Systems.
Proceedings of the IEEE Global Communications Conference, 2022

Systematically Analyzing Vulnerabilities in the Connection Establishment Phase of Wi-Fi Systems.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Message sieving to mitigate smart gridlock attacks in V2V.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Evaluating V2V Security on an SDR Testbed.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Targeted Discreditation Attack against Trust Management in Connected Vehicles.
Proceedings of the ICC 2021, 2021

POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Expanding the Role of Preambles to Support User-defined Functionality in MIMO-based WLANs.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Lightweight Machine Learning for Efficient Frequency-Offset-Aware Demodulation.
IEEE J. Sel. Areas Commun., 2019

2018
Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems.
IEEE Trans. Wirel. Commun., 2017

2016
Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems.
IEEE Trans. Mob. Comput., 2016

Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier.
IEEE Trans. Inf. Forensics Secur., 2016

Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Multicast Rendezvous in Fast-Varying DSA Networks.
IEEE Trans. Mob. Comput., 2015

Secrecy beyond encryption: obfuscating transmission signatures in wireless communications.
IEEE Commun. Mag., 2015

Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Friendly CryptoJam: a mechanism for securing physical-layer attributes.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Security vulnerability and countermeasures of frequency offset correction in 802.11a systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Fast and secure rendezvous protocols for mitigating control channel DoS attacks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Adaptive frequency hopping algorithms for multicast rendezvous in DSA networks.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012


  Loading...