Martin Andreoni

Orcid: 0000-0002-4170-4341

Affiliations:
  • Federal University of Rio de Janeiro, Brazil (PhD 2018)


According to our database1, Martin Andreoni authored at least 56 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Toward an Intrusion Detection System for a Virtualization Framework in Edge Computing.
CoRR, November, 2025

UNDREAM: Bridging Differentiable Rendering and Photorealistic Simulation for End-to-end Adversarial Attacks.
CoRR, October, 2025

Generative Adversarial Networks for Dynamic Malware Behavior: A Comprehensive Review, Categorization, and Analysis.
IEEE Trans. Artif. Intell., August, 2025

ComplicitSplat: Downstream Models are Vulnerable to Blackbox Attacks by 3D Gaussian Splat Camouflages.
CoRR, August, 2025

Guest Editorial: Special Issue on Zero Trust for Next-Generation Networking.
IEEE J. Sel. Areas Commun., June, 2025

3D Gaussian Splat Vulnerabilities.
CoRR, June, 2025

Learning Compact and Robust Representations for Anomaly Detection.
CoRR, January, 2025

Graph Neural Networks for Jamming Source Localization.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track and Applied Data Science Track, 2025

Leveraging Zero Trust for Enhanced Security and Connectivity in Ad-Hoc Mesh Networks.
Proceedings of the 12th IFIP International Conference on New Technologies, 2025

Secure Safety Filter: Towards Safe Flight Control under Sensor Attacks.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2025

RenderBender: A Survey on Adversarial Attacks Using Differentiable Rendering.
Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence, 2025

Contrastive Representation Modeling for Anomaly Detection.
Proceedings of the ECAI 2025 - 28th European Conference on Artificial Intelligence, 25-30 October 2025, Bologna, Italy, 2025

SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025

2024
RF Jamming Dataset: A Wireless Spectral Scan Approach for Malicious Interference Detection.
IEEE Commun. Mag., November, 2024

Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts.
Ann. des Télécommunications, October, 2024

Non-Robust Features are Not Always Useful in One-Class Classification.
CoRR, 2024

Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation.
Ad Hoc Networks, 2024

Enhancing Autonomous System Security and Resilience With Generative AI: A Comprehensive Survey.
IEEE Access, 2024

2023
ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., June, 2023

TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection.
IEEE Access, 2023

Exploiting Engineered IQ Samples for Physical Layer Authentication.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Experimental Evaluation of A Lightweight RSS-Based PLA Scheme in Multi-Node Multi-Cell Mesh Networks.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2023

An Empirical Analysis of MeshShield: a Network Security System for Fully Distributed Networks.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

Benchmarking and Security Considerations of Wi-Fi FTM for Ranging in IoT Devices.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

An Agile Conflict-Solving Framework for Intent-Based Management of Service Level Agreement.
Proceedings of the 2nd International Conference on 6G Networking, 2023

2022
A fast and accurate threat detection and prevention architecture using stream processing.
Concurr. Comput. Pract. Exp., 2022

A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms.
Ann. des Télécommunications, 2022

JamRF: Performance Analysis, Evaluation, and Implementation of RF Jamming Over Wi-Fi.
IEEE Access, 2022

Performance Analysis and Evaluation of RF Jamming in IoT Networks.
Proceedings of the IEEE Global Communications Conference, 2022

A Stream Learning Intrusion Detection System for Concept Drifting Network Traffic.
Proceedings of the 6th Cyber Security in Networking Conference, 2022

Deep Reinforcement Learning Based Anti-Jamming Using Clear Channel Assessment Information in a Cognitive Radio Environment.
Proceedings of the 5th International Conference on Advanced Communication Technologies and Networking, 2022

New Barriers on 6G Networking: An Exploratory Study on the Security, Privacy and Opportunities for Aerial Networks.
Proceedings of the 1st International Conference on 6G Networking, 2022

2021
Identifying Fake News on Social Networks Based on Natural Language Processing: Trends and Challenges.
Inf., 2021

Resumo de Grandes Volumes de Dados com Filtro de Bloom: Uma Abordagem Eficiente para Aprendizado Profundo com Redes Neurais Convolucionais em Fluxos de Rede.
Proceedings of the 39th Brazilian Symposium on Computer Networks and Distributed Systems, 2021

An Entropy-based Hybrid Mechanism for Large-Scale Wireless Network Traffic Prediction.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

A Time-Bound Continuous Authentication Protocol for Mesh Networking.
Proceedings of the 4th International Conference on Advanced Communication Technologies and Networking, 2021

2020
A survey on data analysis on large-Scale wireless networks: online stream processing, trends, and challenges.
J. Internet Serv. Appl., 2020

Correction to: MineCap: super incremental learning for detecting and blocking cryptocurrency mining on software-defined networking.
Ann. des Télécommunications, 2020

MineCap: super incremental learning for detecting and blocking cryptocurrency mining on software-defined networking.
Ann. des Télécommunications, 2020

A Lightweight Network-based Android Malware Detection System.
Proceedings of the 2020 IFIP Networking Conference, 2020

Attackers are not Stealthy: Statistical Analysis of the Well-Known and Infamous KDD Network Security Dataset.
Proceedings of the 4th Conference on Cloud and Internet of Things, 2020

2019
Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data.
Concurr. Comput. Pract. Exp., 2019

A fast unsupervised preprocessing method for network monitoring.
Ann. des Télécommunications, 2019

A Monitoring and Threat Detection System Using Stream Processing as a Virtual Function for Big Data.
Proceedings of the Companion Proceedings of the 37th Brazilian Symposium on Computer Networks and Distributed Systems, 2019

2018
A monitoring and threat detection system using stream processing as a virtual function for Big Data. (Un système de surveillance et détection de menaces utilisant le traitement de flux comme une fonction virtuelle pour le Big Data).
PhD thesis, 2018

Um Sistema de Detecção de Ameaças Distribuídas de Rede baseado em Aprendizagem por Grafos.
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018

An Adaptive Real-Time Architecture for Zero-Day Threat Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Um Algoritmo Não Supervisionado e Rápido para Seleção de Características em Classificação de Tráfego ∗.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

A cooperation-aware virtual network function for proactive detection of distributed port scanning.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Collecting and characterizing a real broadband access network traffic dataset.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2016
An elastic intrusion detection system for software networks.
Ann. des Télécommunications, 2016

Evaluating allocation heuristics for an efficient virtual Network Function chaining.
Proceedings of the 7th International Conference on the Network of the Future, 2016

A Performance Comparison of Open-Source Stream Processing Platforms.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Providing elasticity to intrusion detection systems in virtualized Software Defined Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2013
Experimenting Content-Centric Networks in the future internet testbed environment.
Proceedings of the IEEE International Conference on Communications, 2013


  Loading...