Vincent Lenders
Orcid: 0000-0002-2289-3722Affiliations:
- armasuisse, Thun, Switzerland
According to our database1,
Vincent Lenders
authored at least 163 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SkyPos: Real-World Evaluation of Self-Positioning With Aircraft Signals for IoT Devices.
IEEE J. Sel. Areas Commun., January, 2024
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don't-Care Hardware Trojans to Shared Cloud FPGAs.
IEEE Access, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS).
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of Joint Workshop of the 5th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2024) and the 4th AI + Informetrics (AII2024) co-located with the ( iConference2024), 2024
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
Defeating and Improving Network Flow Classifiers Through Adversarial Machine Learning.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
2023
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach.
IEEE Secur. Priv., 2023
Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era.
ACM Comput. Surv., 2023
Lessons Learned in ATCO2: 5000 hours of Air Traffic Control Communications for Robust Automatic Speech Recognition and Understanding.
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023
2022
Improving Aircraft Localization: Experiences and Lessons Learned from an Open Competition.
CoRR, 2022
Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing.
CoRR, 2022
DFAulted: Analyzing and Exploiting CPU Software Faults Caused by FPGA-Driven Undervolting Attacks.
IEEE Access, 2022
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022
Proceedings of the Critical Information Infrastructures Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
ACM Trans. Intell. Syst. Technol., 2021
From Scattered Sources to Comprehensive Technology Landscape: A Recommendation-based Retrieval Approach.
CoRR, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 13th International Conference on Cyber Conflict, 2021
Proceedings of the 13th International Conference on Cyber Conflict, 2021
Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021
You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
2020
IEEE Trans. Cogn. Commun. Netw., 2020
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020
Comput. Networks, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
SkySense: terrestrial and aerial spectrum use analysed using lightweight sensing technology with weather balloons.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
2019
IEEE Trans. Cogn. Commun. Netw., 2019
On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019
Proceedings of the 18th International Conference on Information Processing in Sensor Networks, 2019
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise.
Proceedings of the 11th International Conference on Cyber Conflict, 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
Proceedings of the 11th International Conference on Cyber Conflict, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Deep Learning Models for Wireless Signal Classification With Distributed Low-Cost Spectrum Sensors.
IEEE Trans. Cogn. Commun. Netw., 2018
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018
Nanosecond-precision time-of-arrival estimation for aircraft signals with low-cost SDR receivers.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds.
Proceedings of the 10th International Conference on Cyber Conflict, 2018
Proceedings of the 10th International Conference on Cyber Conflict, 2018
2017
Filtering Noisy 802.11 Time-of-Flight Ranging Measurements From Commoditized WiFi Radios.
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Intell. Transp. Syst., 2017
Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors.
CoRR, 2017
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017
LTESS-track: A Precise and Fast Frequency Offset Estimation for low-cost SDR Platforms.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Semantic Web - 14th International Conference, 2017
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 9th International Conference on Cyber Conflict, 2017
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
ACM Trans. Priv. Secur., 2016
CoRR, 2016
CoRR, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 8th International Conference on Cyber Conflict, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IEEE Secur. Priv., 2015
Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
IEEE Secur. Priv., 2015
Digit. Investig., 2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 18th ACM International Conference on Modeling, 2015
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Trans. Wirel. Commun., 2014
IEEE Commun. Mag., 2014
Proceedings of the IPSN'14, 2014
Proceedings of the IPSN'14, 2014
Proceedings of the IPSN'14, 2014
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
CoRR, 2013
CoRR, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Workshop on Sensor Data Fusion: Trends, Solutions, Applications, 2013
Proceedings of the Wireless Sensor Networks - 10th European Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012
2011
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
2009
IEEE Trans. Mob. Comput., 2009
2008
An empirical study of the impact of mobility on link failures in an 802.11 ad hoc network.
IEEE Wirel. Commun., 2008
IEEE/ACM Trans. Netw., 2008
Location-based trust for mobile user-generated content: applications, challenges and implementations.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the Third Workshop on Challenged Networks, CHANTS 2008, San Francisco, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007
2006
PhD thesis, 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006
Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
Pervasive Mob. Comput., 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005