Gianmarco Baldini

Orcid: 0000-0003-4830-1227

According to our database1, Gianmarco Baldini authored at least 127 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Misbehavior detection in intelligent transportation systems based on federated learning.
Internet Things, April, 2024

Intrusion Detection System for MIL-STD-1553 Based on Convolutional Neural Networks With Binary Images and Adaptive Quantization.
IEEE Netw. Lett., March, 2024

Wireless Interference Identification With Convolutional Neural Networks Based on the FPGA Implementation of the LTE Cell-Specific Reference Signal (CRS).
IEEE Trans. Cogn. Commun. Netw., February, 2024

2023
Convolutional neural networks combined with feature selection for radio-frequency fingerprinting.
Comput. Intell., October, 2023

Nakagami-m Fading Channel Identification Using Adaptive Continuous Wavelet Transform and Convolutional Neural Networks.
Algorithms, June, 2023

GSM Radio Frequency Fingerprinting.
Dataset, January, 2023

In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms.
Inf., 2023

Fading Channel Classification with Walsh-Hadamard Transform and Convolutional Neural Network.
Proceedings of the International Conference on Smart Applications, 2023

Specific Emitter Identification with Principal Component Analysis (PCA) Dimensionality Reduction and Convolutional Neural Network.
Proceedings of the International Conference on Smart Applications, 2023

Classification of Optical Transmission Anomalies with Convolutional Neural Networks and 2D Histograms.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

Multi scale histogram-based intrusion detection system for the MIL-STD-1553 protocol.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

2022
IoT Transient Radio Frequency signals.
Dataset, May, 2022

Channel identification with Improved Variational Mode Decomposition.
Phys. Commun., 2022

Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525.
Int. J. Crit. Infrastructure Prot., 2022

VetaDetect: Vehicle tampering detection with closed-loop model ensemble.
Int. J. Crit. Infrastructure Prot., 2022

Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities.
Computer, 2022

Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis.
Comput. Commun., 2022

Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges.
Comput. Networks, 2022

Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension.
Comput. Networks, 2022

Experimental assessment of electromagnetic field exposure from 802.11ax devices.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

Microphone Identification based on Spectral Entropy with Convolutional Neural Network.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

2021
Image and Video Forensics.
J. Imaging, 2021

Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions.
IEEE Secur. Priv., 2021

Spectrum Sensing Implemented with Improved Fluctuation-Based Dispersion Entropy and Machine Learning.
Entropy, 2021

A Survey of Cybersecurity Certification for the Internet of Things.
ACM Comput. Surv., 2021

On the application of sensor authentication with intrinsic physical features to vehicle security.
Comput. Electr. Eng., 2021

Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions.
IEEE Access, 2021

Performance Analysis of Long Short-Term Memory-Based Markovian Spectrum Prediction.
IEEE Access, 2021

Soft Fusion based Cooperative Spectrum Prediction using LSTM.
Proceedings of the 15th International Conference on Signal Processing and Communication Systems, 2021

Intrusion detection systems in in-vehicle networks based on bag-of-words.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles.
Symmetry, 2020

Autopolicy: Automated Traffic Policing for Improved IoT Network Security.
Sensors, 2020

On the Application of Time Frequency Convolutional Neural Networks to Road Anomalies' Identification with Accelerometers and Gyroscopes.
Sensors, 2020

An Interledger Blockchain Platform for Cross-Border Management of Cybersecurity Information.
IEEE Internet Comput., 2020

A Review on the Application of Distributed Ledgers in the Evolution of Road Transport.
IEEE Internet Comput., 2020

Not Quite Yourself Today: Behaviour-Based Continuous Authentication in IoT Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Transient-Based Internet of Things Emitter Identification Using Convolutional Neural Networks and Optimized General Linear Chirplet Transform.
IEEE Commun. Lett., 2020

An Evaluation of Entropy Measures for Microphone Identification.
Entropy, 2020

On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks.
Entropy, 2020

Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Updating IoT devices: challenges and potential approaches.
Proceedings of the 2020 Global Internet of Things Summit, 2020

On the application of Policy-based Frameworks to Autonomous Vehicles.
Proceedings of the 2020 Global Internet of Things Summit, 2020

Analysis of Encrypted Traffic with time-based features and time frequency analysis.
Proceedings of the 2020 Global Internet of Things Summit, 2020

2019
Continuous Authentication of Automotive Vehicles Using Inertial Measurement Units.
Sensors, 2019

Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots.
Internet Technol. Lett., 2019

Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices.
Comput. Stand. Interfaces, 2019

Radiometric identification using variational mode decomposition.
Comput. Electr. Eng., 2019

Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network.
IEEE Access, 2019

A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS.
Proceedings of the 2019 Global IoT Summit, 2019

Zone Keys Trust Management in Vehicular Networks based on Blockchain.
Proceedings of the 2019 Global IoT Summit, 2019

An assessment of the impact of IQ imbalances on the physical layer authentication of IoT wireless devices.
Proceedings of the 2019 Global IoT Summit, 2019

An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN.
Proceedings of the 2019 Global IoT Summit, 2019

Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019

A Performance Evaluation on Distance Measures in KNN for Mobile Malware Detection.
Proceedings of the 6th International Conference on Control, 2019

2018
Speed Consistency in the Smart Tachograph.
Sensors, 2018

Ethical Design in the Internet of Things.
Sci. Eng. Ethics, 2018

Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union.
Int. J. Crit. Infrastructure Prot., 2018

Synchrosqueezing Transform Based Methodology for Radiometric Identification.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Towards a Mobile Malware Detection Framework with the Support of Machine Learning.
Proceedings of the Security in Computer and Information Sciences, 2018

2017
GNSS Receiver Identification Using Clock-Derived Metrics.
Sensors, 2017

Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns.
Sensors, 2017

An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting.
Mob. Inf. Syst., 2017

Future evolution of public safety communications in the 5G Era.
Trans. Emerg. Telecommun. Technol., 2017

Mobile phone identification through the built-in magnetometers.
CoRR, 2017

A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components.
IEEE Commun. Surv. Tutorials, 2017

Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017

A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Security and privacy issues for an IoT based smart home.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Imaging time series for internet of things radio frequency fingerprinting.
Proceedings of the International Carnahan Conference on Security Technology, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Improving Internet of Things device certification with policy-based management.
Proceedings of the Global Internet of Things Summit, 2017

Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy.
Proceedings of the Global Internet of Things Summit, 2017

2016
Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS).
Sensors, 2016

Security certification and labelling in Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Informed consent in Internet of Things: The case study of cooperative intelligent transport systems.
Proceedings of the 23rd International Conference on Telecommunications, 2016

LTE D2D communication for collaborative wearable sensor networks: A connectivity analysis.
Proceedings of the European Conference on Networks and Communications, 2016

2015
Apodization Method for Standard Load Modulation Amplitude Measurement on Proximity Integrated Circuit Cards.
IEEE Trans. Instrum. Meas., 2015

Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios.
Secur. Commun. Networks, 2015

DIAT: A Scalable Distributed Architecture for IoT.
IEEE Internet Things J., 2015

Experimental detection of mobile satellite transmissions with cyclostationary features.
Int. J. Satell. Commun. Netw., 2015

SecKit: A Model-based Security Toolkit for the Internet of Things.
Comput. Secur., 2015

An agent-based framework for Informed Consent in the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Detection of DECT identity spoofing through radio frequency fingerprinting.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

2014
Public Protection and Disaster Relief Communication System Integrity: A Radio-Flexibility and Identity-Based Cryptography Approach.
IEEE Veh. Technol. Mag., 2014

An urn occupancy approach for cognitive radio networks in DTVB white spaces.
Telecommun. Syst., 2014

Building Trust in the Human?Internet of Things Relationship.
IEEE Technol. Soc. Mag., 2014

An emergency communication system based on software-defined radio.
EURASIP J. Wirel. Commun. Netw., 2014

Survey of Wireless Communication Technologies for Public Safety.
IEEE Commun. Surv. Tutorials, 2014

Enforcement of security policy rules for the Internet of Things.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Connectivity and security in a D2D communication protocol for public safety applications.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Propagation measurements in 5.8GHz and pathloss study for CEN-DSRC.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Privacy leakages in Smart Home wireless technologies.
Proceedings of the International Carnahan Conference on Security Technology, 2014

European Citizens and Their Trust in Social Networks.
Proceedings of the Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration, 2014

A Model-Based Security Toolkit for the Internet of Things.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Software Radio Implementation of Centralized MAC Protocol for Cognitive Radio Networks.
Wirel. Pers. Commun., 2013

Public Safety Mobile Broadband: A Techno-Economic Perspective.
IEEE Veh. Technol. Mag., 2013

Distributed access control policies for spectrum sharing.
Secur. Commun. Networks, 2013

LTE: the technology driver for future public safety communications.
IEEE Commun. Mag., 2013

Cyclostationary feature analysis of CEN-DSRC for cognitive vehicular networks.
Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), 2013

Identity-based security systems for vehicular ad-hoc networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Applying generalized urn models to cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2013

An Architecture for Secure m-Commerce Applications.
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013

A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Future of wireless communication: RadioApps and related security and radio computer framework.
IEEE Wirel. Commun., 2012

Public Safety Communications: Enhancement Through Cognitive Radio and Spectrum Sharing Principles.
IEEE Veh. Technol. Mag., 2012

A Cognitive Management Framework to Support Exploitation of the Future Internet of Things.
Scalable Comput. Pract. Exp., 2012

Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead.
IEEE Commun. Surv. Tutorials, 2012

Security Aspects of Policy Controlled Cognitive Radio.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
The EULER project: application of software defined radio in joint security operations.
IEEE Commun. Mag., 2011

Design of a Robust Cognitive Control Channel for Cognitive Radio Networks Based on Ultra Wideband Pulse Shaped Signal.
Proceedings of the Multiple Access Communications - 4th International Workshop, 2011

2010
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure.
Int. J. Crit. Infrastructure Prot., 2010

ETSI reconfigurable radio systems: status and future directions on software defined radio and cognitive radio standards.
IEEE Commun. Mag., 2010

Aggregate interference in white spaces.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Implementation of a wireless test bed for the functional verification of the ultra-wideband Detect-and-Avoid mechanism.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Adaptive and Distributed Access Control in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

European Standardization and SDR Certification.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Experimentally detecting IEEE 802.11n Wi-Fi based on cyclostationarity features for ultra-wide band cognitive radios.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

ETSI Reconfigurable Radio Systems - Software Defined Radio and Cognitive Radio standards.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Test bed design for detect and avoid of ultra wideband devices.
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009

Preliminary experimental results on the spectrum sensing performances for UWB-Cognitive Radios for detecting IEEE 802.11n systems.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

2008
Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms.
Proceedings of the Intelligence and Security Informatics, 2008

Service Modeling Language Applied to Critical Infrastructure.
Proceedings of the Critical Information Infrastructure Security, 2008

1999
A dynamic model of moving flames for the analysis and control of combustion instabilities.
Proceedings of the 5th European Control Conference, 1999


  Loading...