Alessandro Brighente

Orcid: 0000-0001-6138-2995

According to our database1, Alessandro Brighente authored at least 57 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras.
IEEE Internet Things J., March, 2024

Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
IEEE Trans. Wirel. Commun., January, 2024

Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective.
IEEE Internet Things J., 2024

FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids.
CoRR, 2024

Penetration Testing of 5G Core Network Web Technologies.
CoRR, 2024

A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols.
CoRR, 2024

2023
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain.
IEEE Trans. Netw. Serv. Manag., June, 2023

Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023

Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios.
IEEE Trans. Veh. Technol., April, 2023

Poisoning Bearer Context Migration in O-RAN 5G Network.
IEEE Wirel. Commun. Lett., March, 2023

DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles.
CoRR, 2023

EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks.
CoRR, 2023

GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems.
CoRR, 2023

Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs.
CoRR, 2023

BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

A First Look at Shill Looping in NFT Ecosystem.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning.
Proceedings of the IEEE Sensors Applications Symposium, 2023

Beware of Pickpockets: A Practical Attack against Blocking Cards.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors.
Proceedings of the IEEE International Conference on Communications, 2023

Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Interference Prediction for Low-Complexity Link Adaptation in Beyond 5G Ultra-Reliable Low-Latency Communications.
IEEE Trans. Wirel. Commun., 2022

Effect of DIS Attack on 6TiSCH Network Formation.
IEEE Commun. Lett., 2022

Hyperloop: A Cybersecurity Perspective.
CoRR, 2022

Identity-Based Authentication for On-Demand Charging of Electric Vehicles.
CoRR, 2022

Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles.
CoRR, 2022

Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems.
CoRR, 2022

Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy.
CoRR, 2022

Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit.
CoRR, 2022

An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022

SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.
Comput. Networks, 2022

SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles.
Proceedings of the 30th International Conference on Software, 2022

VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering.
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022

Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
EVScout2.0: Electric Vehicle Profiling Through Charging Profile.
CoRR, 2021

5G Security Challenges and Solutions: A Review by OSI Layers.
IEEE Access, 2021

Greedy Maximum- Throughput Grant-Free Random Access For Correlated IoT Traffic.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Adaptive Coordinated Random Access For MTC With Correlated Traffic and Data Freshness.
Proceedings of the 22nd IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2021

Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
Proceedings of the Computer Security - ESORICS 2021, 2021

Knocking on Tangle's Doors: Security Analysis of IOTA Ports.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Towards An Enhanced Reputation System for IOTA's Coordicide.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
Modular Hybrid Beamforming for mmWave Fixed Wireless Access.
IEEE Trans. Commun., 2020

Estimation of Wideband Dynamic mmWave and THz Channels for 5G Systems and Beyond.
IEEE J. Sel. Areas Commun., 2020

Interference Distribution Prediction for Link Adaptation in Ultra-Reliable Low-Latency Communications.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

2019
Power Allocation for Non-Orthogonal Millimeter Wave Systems With Mixed Traffic.
IEEE Trans. Wirel. Commun., 2019

Machine Learning for In-Region Location Verification in Wireless Networks.
IEEE J. Sel. Areas Commun., 2019

Location-Verification and Network Planning via Machine Learning Approaches.
Proceedings of the International Symposium on Modeling and Optimization in Mobile, 2019

Ranking-Based Attacks to In-Region Location Verification Systems.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

2017
Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels with Non-Orthogonal and Orthogonal Multiple Access.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Centralized and Distributed Sparsification for Low-Complexity Message Passing Algorithm in C-RAN Architectures.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Keyword-based access to relational data: To reproduce, or to not reproduce?
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

Towards Open-Source Shared Implementations of Keyword-Based Access Systems to Relational Data.
Proceedings of the Workshops of the EDBT/ICDT 2017 Joint Conference (EDBT/ICDT 2017), 2017


  Loading...