Pietro Tedeschi

Orcid: 0000-0003-3324-3706

According to our database1, Pietro Tedeschi authored at least 31 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions.
IEEE Trans. Ind. Informatics, February, 2024

2023
Federated learning for reliable model updates in network-based intrusion detection.
Comput. Secur., October, 2023

Toward a Reliable Evaluation of Machine Learning Schemes for Network-Based Intrusion Detection.
IEEE Internet Things Mag., June, 2023

PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles.
IEEE Trans. Dependable Secur. Comput., 2023

SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol.
IEEE Trans. Dependable Secur. Comput., 2023

A<sup>2</sup>RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones.
IEEE Internet Things J., 2023

Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts.
IEEE Trans. Dependable Secur. Comput., 2022

Localization of a Power-Modulated Jammer.
Sensors, 2022

Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons.
IEEE Secur. Priv., 2022

URANUS: Radio Frequency Tracking, Classification and Identification of Unmanned Aircraft Vehicles.
CoRR, 2022

Satellite-based communications security: A survey of threats, solutions, and research challenges.
Comput. Networks, 2022

Water quality prediction on a Sigfox-compliant IoT device: The road ahead of WaterS.
Ad Hoc Networks, 2022

Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless BLE Beacons.
CoRR, 2021

IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing.
IEEE Commun. Mag., 2021

Modelling a Communication Channel under Jamming: Experimental Model and Applications.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications.
IEEE Internet Things J., 2020

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges.
IEEE Commun. Surv. Tutorials, 2020

Vessels Cybersecurity: Issues, Challenges, and the Road Ahead.
IEEE Commun. Mag., 2020

Leveraging Jamming to Help Drones Complete Their Mission.
IEEE Access, 2020

SecureAIS - Securing Pairwise Vessels Communications.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Blockchain as a service: Securing bartering functionalities in the H2020 symbIoTe framework.
Internet Technol. Lett., 2019

WaterS: A Sigfox-compliant prototype for water monitoring.
Internet Technol. Lett., 2019

Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

JAM-ME: Exploiting Jamming to Accomplish Drone Mission.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Interoperation of IoT Platforms in Confined Smart Spaces: The SymbIoTe Smart Space Architecture.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World.
Proceedings of the IEEE Globecom Workshops, 2018

Multi-Domain Access Rights Composition in Federated IoT Platforms.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018


  Loading...