João P. Vilela

Orcid: 0000-0001-5805-1351

According to our database1, João P. Vilela authored at least 66 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Computation-Limited Signals: A Channel Capacity Regime Constrained by Computational Complexity.
CoRR, 2023

Poster: Privacy-Preserving Joint Communication and Sensing.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023


Velocity-Aware Geo-Indistinguishability.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Is FFT Fast Enough for Beyond 5G Communications? A Throughput-Complexity Analysis for OFDM Signals.
IEEE Access, 2022

Effect of User Expectation on Mobile App Privacy: A Field Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022

Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences.
Proceedings of the Computer Security - ESORICS 2022, 2022

Prediction of Mobile App Privacy Preferences with User Profiles via Federated Learning.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security.
Sensors, 2021

On the Secure Spectral Efficiency of URLLC With Randomly Located Colluding Eavesdroppers.
IEEE Internet Things J., 2021

A survey of privacy-preserving mechanisms for heterogeneous data types.
Comput. Sci. Rev., 2021

A Security Gateway for power distribution systems in open networks.
Comput. Secur., 2021

Bringing Network Coding into SDN: Architectural Study for Meshed Heterogeneous Communications.
IEEE Commun. Mag., 2021

CROCUS: An Objective Approach for SDN Controllers Security Assessment.
Proceedings of the Security and Privacy in Communication Networks, 2021

Efficient Privacy Preserving Distributed K-Means for Non-IID Data.
Proceedings of the Advances in Intelligent Data Analysis XIX, 2021

Keyed Polar Coding for Physical-Layer Security without Channel State Information.
Proceedings of the ICC 2021, 2021

Enumeration of the Degree Distribution Space for Finite Block Length LDPC Codes.
Proceedings of the ICC 2021, 2021

2020
Maximal Spectral Efficiency of OFDM With Index Modulation Under Polynomial Space Complexity.
IEEE Wirel. Commun. Lett., 2020

Impact of Frequency of Location Reports on the Privacy Level of Geo-indistinguishability.
Proc. Priv. Enhancing Technol., 2020

Is FFT Fast Enough for Beyond-5G Communications?
CoRR, 2020

Bringing Network Coding into SDN: A Case-study for Highly Meshed Heterogeneous Communications.
CoRR, 2020

Optimal Mapper for OFDM With Index Modulation: A Spectro-Computational Analysis.
IEEE Access, 2020

Blockchain-based scalable authentication for IoT: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

SDR Testbed of Full-Duplex Jamming for Secrecy.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
Generating a Binary Symmetric Channel for Wiretap Codes.
IEEE Trans. Inf. Forensics Secur., 2019

Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.
Entropy, 2019

What is the Cost of the Index Selector Task for OFDM with Index Modulation?
Proceedings of the 2019 Wireless Days, 2019

Polar Coding for Physical-Layer Security without Knowledge of the Eavesdropper's Channel.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

A Prediction-based Approach for Anomaly Detection in the Cloud.
Proceedings of the Companion Proceedings of the 37th Brazilian Symposium on Computer Networks and Distributed Systems, 2019

Clustering Geo-Indistinguishability for Privacy of Continuous Location Traces.
Proceedings of the 2019 4th International Conference on Computing, 2019

Full-Duplex Jamming for Enhanced Hidden-Key Secrecy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Adaptive Physical-Layer Security Through Punctured Coding for Secrecy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers.
IEEE Trans. Inf. Forensics Secur., 2018

Analysis of short blocklength codes for secrecy.
EURASIP J. Wirel. Commun. Netw., 2018

Triple-Similarity Mechanism for alarm management in the cloud.
Comput. Secur., 2018

Exploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropper.
IEEE Access, 2018

On the Effect of Update Frequency on Geo-Indistinguishability of Mobility Traces.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Testbed Implementation and Evaluation of Interleaved and Scrambled Coding for Physical-Layer Security.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Nested QPSK Encoding for Information Theoretic Security.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Joint Design of Massive MIMO Precoder and Security Scheme for Multiuser Scenarios under Reciprocal Channel Conditions.
Wirel. Commun. Mob. Comput., 2017

Performance Analysis of Network Traffic Predictors in the Cloud.
J. Netw. Syst. Manag., 2017

Privacy-Preserving Data Mining: Methods, Metrics, and Applications.
IEEE Access, 2017

Quantifying equivocation for finite blocklength wiretap codes.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime.
IEEE Signal Process. Lett., 2016

Online traffic prediction in the cloud.
Int. J. Netw. Manag., 2016

Workshop message: Smart Vehicles 2016.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Geometry-Based Propagation Modeling and Simulation of Vehicle-to-Infrastructure Links.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Expedite feature extraction for enhanced cloud anomaly detection.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Breaking through the Full-Duplex Wi-Fi capacity gain.
Proceedings of the 7th International Conference on the Network of the Future, 2016

2015
Uncoordinated Frequency Hopping for secrecy with broadband jammers and eavesdroppers.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Physical-Layer Security against Non-Degraded Eavesdroppers.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Interleaved Coding for Secrecy with a Hidden Key.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
A characterization of uncoordinated frequency hopping for wireless secrecy.
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014

Online Traffic Prediction in the Cloud: A Dynamic Window Approach.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
Collision-free jamming for enhanced wireless secrecy.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Predicting Traffic in the Cloud: A Statistical Approach.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Security and privacy issues for the network of the future.
Secur. Commun. Networks, 2012

A cooperative protocol for jamming eavesdroppers in wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Position-Based Jamming for Enhanced Wireless Secrecy.
IEEE Trans. Inf. Forensics Secur., 2011

Wireless Secrecy Regions With Friendly Jamming.
IEEE Trans. Inf. Forensics Secur., 2011

2010
Friendly Jamming for Wireless Secrecy.
Proceedings of IEEE International Conference on Communications, 2010

2008
Network Coding Security: Attacks and Countermeasures
CoRR, 2008

Lightweight Security for Network Coding.
Proceedings of IEEE International Conference on Communications, 2008

2007
A feedback reputation mechanism to secure the optimized link state routing protocol.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007


  Loading...