Pietro Tedeschi

Orcid: 0000-0003-3324-3706

According to our database1, Pietro Tedeschi authored at least 34 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions.
IEEE Trans. Ind. Informatics, February, 2024

Selective Authenticated Pilot Location Disclosure for Remote ID-enabled Drones.
Proc. Priv. Enhancing Technol., 2024

Detection of quality of service degradation on multi-tenant containerized services.
J. Netw. Comput. Appl., 2024

Privacy Preserving Underwater Collaborative Localization using Time Lock Puzzles.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Federated learning for reliable model updates in network-based intrusion detection.
Comput. Secur., October, 2023

Toward a Reliable Evaluation of Machine Learning Schemes for Network-Based Intrusion Detection.
IEEE Internet Things Mag., June, 2023

PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles.
IEEE Trans. Dependable Secur. Comput., 2023

SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol.
IEEE Trans. Dependable Secur. Comput., 2023

A<sup>2</sup>RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones.
IEEE Internet Things J., 2023

Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts.
IEEE Trans. Dependable Secur. Comput., 2022

Localization of a Power-Modulated Jammer.
Sensors, 2022

Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons.
IEEE Secur. Priv., 2022

URANUS: Radio Frequency Tracking, Classification and Identification of Unmanned Aircraft Vehicles.
CoRR, 2022

Satellite-based communications security: A survey of threats, solutions, and research challenges.
Comput. Networks, 2022

Water quality prediction on a Sigfox-compliant IoT device: The road ahead of WaterS.
Ad Hoc Networks, 2022

Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless BLE Beacons.
CoRR, 2021

IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing.
IEEE Commun. Mag., 2021

Modelling a Communication Channel under Jamming: Experimental Model and Applications.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications.
IEEE Internet Things J., 2020

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges.
IEEE Commun. Surv. Tutorials, 2020

Vessels Cybersecurity: Issues, Challenges, and the Road Ahead.
IEEE Commun. Mag., 2020

Leveraging Jamming to Help Drones Complete Their Mission.
IEEE Access, 2020

SecureAIS - Securing Pairwise Vessels Communications.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Blockchain as a service: Securing bartering functionalities in the H2020 symbIoTe framework.
Internet Technol. Lett., 2019

WaterS: A Sigfox-compliant prototype for water monitoring.
Internet Technol. Lett., 2019

Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

JAM-ME: Exploiting Jamming to Accomplish Drone Mission.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Interoperation of IoT Platforms in Confined Smart Spaces: The SymbIoTe Smart Space Architecture.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World.
Proceedings of the IEEE Globecom Workshops, 2018

Multi-Domain Access Rights Composition in Federated IoT Platforms.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018


  Loading...