Nicola Laurenti

Orcid: 0000-0001-7592-1929

According to our database1, Nicola Laurenti authored at least 71 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Age of information is not just a number: Status updates against an eavesdropping node.
Ad Hoc Networks, March, 2024

Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems.
IEEE Trans. Inf. Forensics Secur., 2024

On Mixing Authenticated and Non-Authenticated Signals Against GNSS Spoofing.
IEEE Trans. Inf. Forensics Secur., 2024

Enhancing Spreading Code Signal Authentication in GNSS: a GLRT-based Approach.
Proceedings of the International Conference on Localization and GNSS, 2024

Physical-Layer Challenge-Response Authentication with IRS and Single-Antenna Devices.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Divergence-Minimizing Attack Against Challenge-Response Authentication with IRSs.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
Multiround Message Scheduling for Fast GNSS Packet Broadcasting.
IEEE Trans. Aerosp. Electron. Syst., October, 2023

It Is Rude to Ask a Sensor Its Age-of-Information: Status Updates Against an Eavesdropping Node.
CoRR, 2023

On the Limits of Cross-Authentication Checks for GNSS Signals.
CoRR, 2023

Performance Evaluation of an Indistinguishability Based Attack Against Spreading Code Secured GNSS Signals.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2023

Adversarial Learning for Advantage Distillation in Secret Key Agreement Over UWAC.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Authenticated Timing Protocol Based on Galileo ACAS.
Sensors, 2022

Experimental Testing and Impact Analysis of Jamming and Spoofing Attacks on Professional GNSS Receivers.
Proceedings of the ICL-GNSS 2022 WiP Proceedings co-located with 12th International Conference on Localization and GNSS (2022), 2022

2021
Generalized Likelihood Ratio Test for GNSS Spoofing Detection in Devices With IMU.
IEEE Trans. Inf. Forensics Secur., 2021

On Trading the Spreading Gain With the Coding Rate and Its Application to GNSS Data Component Design.
IEEE Trans. Aerosp. Electron. Syst., 2021

Information Theoretic Key Agreement Protocol based on ECG signals.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy.
ACM Trans. Sens. Networks, 2020

Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication.
Proceedings of the 2020 International Conference on Localization and GNSS, 2020

Sub-Messages Scheduling in GNSS Packet Broadcasting By Message Splitting.
Proceedings of the 2020 International Conference on Localization and GNSS, 2020

Detection of GNSS Spoofing by a Receiver in Space via Fusion of Consistency Metrics.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Adversarial Networks for Secure Wireless Communications.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2018
Exploiting side-information for resilient GNSS positioning in mobile phones.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2018

Authentication of Galileo GNSS Signal by Superimposed Signature with Artificial Noise.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
Optimization of anchor nodes' usage for location verification systems.
Proceedings of the International Conference on Localization and GNSS, 2017

A game-theoretic analysis of energy-depleting jamming attacks.
Proceedings of the 2017 International Conference on Computing, 2017

2016
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers.
IEEE/ACM Trans. Netw., 2016

Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages.
IEEE Trans. Commun., 2016

Achievable Secrecy Rates of an Energy Harvesting Device.
IEEE J. Sel. Areas Commun., 2016

Free-space optical channel estimation for physical layer security.
CoRR, 2016

Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes.
Proceedings of the International Conference on Localization and GNSS, 2016

Energy-based anchor node selection for IoT physical layer authentication.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Resource Allocation for Downlink of 5G Systems with OFDMA under Secrecy Outage Constraints.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading.
IEEE Trans. Inf. Forensics Secur., 2015

Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis.
IEEE Trans. Inf. Forensics Secur., 2014

Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes.
IEEE Trans. Inf. Forensics Secur., 2014

Secret Key Agreement by LLR Thresholding and Syndrome Feedback over AWGN Channel.
IEEE Commun. Lett., 2014

On the Secrecy Capacity Region of Parallel Broadcast Channel with Common and Confidential Messages.
CoRR, 2014

LQG-like control of scalar systems over communication channels: The role of data losses, delays and SNR limitations.
Autom., 2014

Achievable secrecy rates over MIMOME Gaussian channels with GMM signals in low-noise regime.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Secret message transmission by HARQ with multiple encoding.
Proceedings of the IEEE International Conference on Communications, 2014

Resource allocation for secret transmissions on parallel Rayleigh channels.
Proceedings of the IEEE International Conference on Communications, 2014

Parallel BCC with one common and two confidential messages and imperfect CSIT.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
Semi-Blind Key-Agreement over MIMO Fading Channels.
IEEE Trans. Commun., 2013

Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes
CoRR, 2013

On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels
CoRR, 2013

Low-power Secret-key Agreement over OFDM
CoRR, 2013

Design optimization for quantum communications in a GNSS intersatellite network.
Proceedings of the International Conference on Localization and GNSS, 2013

LQG cheap control subject to packet loss and SNR limitations.
Proceedings of the 12th European Control Conference, 2013

LQG cheap control over SNR-limited lossy channels with delay.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
Physical Layer Authentication over MIMO Fading Wiretap Channels.
IEEE Trans. Wirel. Commun., 2012

Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels.
IEEE Trans. Inf. Forensics Secur., 2012

SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

2011
New Results on the Spectral Analysis of Multi-h CPM Signals.
IEEE Trans. Commun., 2011

Achievable secrecy rates for wiretap OFDM with QAM constellations.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

The jamming game in an OFDM setting.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Physical layer authentication over an OFDM fading wiretap channel.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Low-cost mitigation of privacy loss due to radiometric identification.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

A prototype of a free-space QKD scheme based on the B92 protocol.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

2010
An Analysis of GLRT Packet Detection for WiMedia UWB Applications.
IEEE Trans. Veh. Technol., 2010

High SNR secrecy rates with OFDM signaling over fading channels.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

2008
A Reconfigurable Narrow-Band MB-OFDM UWB Receiver Architecture.
IEEE Trans. Circuits Syst. II Express Briefs, 2008

2007
A Nonlinear Method for Stochastic Spectrum Estimation in the Modeling of Musical Sounds.
IEEE Trans. Speech Audio Process., 2007

2006
Design and performance evaluation of a full-duplex operating receiver for time-hopping UWB.
Mob. Networks Appl., 2006

Exact Spectral Analysis of Single-h and Multi-h CPM Signals through PAM decomposition and Matrix Series Evaluation
CoRR, 2006

2005
A multicarrier architecture based upon the affine Fourier transform.
IEEE Trans. Commun., 2005

2002
Time and Frequency Synchronization for Hiperlan/2.
Proceedings of the NETWORKING 2002, 2002

2001
Efficient implementations and alternative architectures for OFDM-OQAM systems.
IEEE Trans. Commun., 2001

2000
Multiplicity of fractional Fourier transforms and their relationships.
IEEE Trans. Signal Process., 2000

1998
A unified framework for the fractional Fourier transform.
IEEE Trans. Signal Process., 1998

Comments on "Orthogonal multiple carrier data transmission".
Eur. Trans. Telecommun., 1998


  Loading...