E. Paul Ratazzi

Orcid: 0000-0002-9817-6025

According to our database1, E. Paul Ratazzi authored at least 25 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


TISIN: Traceable Information Sharing in Intermittent Networks.
Proceedings of the IEEE Military Communications Conference, 2023

Discovering Complex Correlations Among Multiple IoT Devices in Smart Environments.
Proceedings of the IEEE Global Communications Conference, 2023

VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques.
IEEE Secur. Priv., 2022

DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

Fine-Tuned Access Control for Internet of Things.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

Differentially Private Federated Learning for Resource-Constrained Internet of Things.
CoRR, 2020

PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy.
CoRR, 2019

A Light-Weight Authentication Scheme for Air Force Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Effective UAV and Ground Sensor Authentication.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

A control flow graph-based signature for packer identification.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

A Systematic Security Evaluation of Android's Multi-User Framework.
CoRR, 2014

Instructions-Based Detection of Sophisticated Obfuscation and Packing.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Near-Real-Time Cloud Auditing for Rapid Response.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Signal Classification in Fading Channels Using Cyclic Spectral Analysis.
EURASIP J. Wirel. Commun. Netw., 2009

Performance Evaluation of Adaptive Non-contiguous MC-CDMA and Non-contiguous CI/MC-CDMA for Dynamic Spectrum Access.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions.
J. Commun., 2007

Intelligent Sensor - WiFi.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

Array Redundancy and Diversity for Wireless Transmissions with Low Probability of Interception.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002