Vincent Lenders

According to our database1, Vincent Lenders authored at least 125 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Crowdsourced Wireless Spectrum Anomaly Detection.
IEEE Trans. Cogn. Commun. Netw., 2020

LocaRDS: A Localization Reference Data Set.
CoRR, 2020

Understanding Realistic Attacks on Airborne Collision Avoidance Systems.
CoRR, 2020

Contact Tracing: An Overview of Technologies and Cyber Risks.
CoRR, 2020

QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020

Electrosense+: Crowdsourcing radio spectrum decoding using IoT receivers.
Comput. Networks, 2020

A Tale of Sea and Sky On the Security of Maritime VSAT Communications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SkySense: terrestrial and aerial spectrum use analysed using lightweight sensing technology with weather balloons.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

2019
Unsupervised Wireless Spectrum Anomaly Detection With Interpretable Features.
IEEE Trans. Cogn. Commun. Netw., 2019

Classi-Fly: Inferring Aircraft Categories from Open Data.
CoRR, 2019

Safety vs. Security: Attacking Avionic Systems with Humans in the Loop.
CoRR, 2019

On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019

Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Digital radio signal cancellation attacks: an experimental evaluation.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Jamming/Garbling assessment and possible mitigations in the OpenSky network.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

Higher than a kite: ADS-B communication analysis using a high-altitude balloon.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

Collaborative wideband signal decoding using non-coherent receivers.
Proceedings of the 18th International Conference on Information Processing in Sensor Networks, 2019

(Self) Driving Under the Influence: Intoxicating Adversarial Network Inputs.
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019

Secure Location Verification: Why You Want Your Verifiers to Be Mobile.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

Detection of Malicious Remote Shell Sessions.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

BlackWidow: Monitoring the Dark Web for Cyber Security Information.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Deep Learning Models for Wireless Signal Classification With Distributed Low-Cost Spectrum Sensors.
IEEE Trans. Cogn. Commun. Netw., 2018

A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018

Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018

Electrosense+: Empowering People to Decode the Radio Spectrum.
CoRR, 2018

Electrosense: Open and Big Spectrum Data.
IEEE Commun. Mag., 2018

Interference Suppression in Bandwidth Hopping Spread Spectrum Communications.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

NetHide: Secure and Practical Network Topology Obfuscation.
Proceedings of the 27th USENIX Security Symposium, 2018

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Monitoring meteorological parameters with crowdsourced air traffic control data.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Data fusion for hybrid and autonomous time-of-flight positioning.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Nanosecond-precision time-of-arrival estimation for aircraft signals with low-cost SDR receivers.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Demo: Electrosense - spectrum sensing with increased frequency range.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Surveying Aviation Professionals on the Security of the Air Traffic Control System.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Utilizing air traffic communications for OSINT on state and government aircraft.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

Screen watermarking for data theft investigation and attribution.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Filtering Noisy 802.11 Time-of-Flight Ranging Measurements From Commoditized WiFi Radios.
IEEE/ACM Trans. Netw., 2017

On Perception and Reality in Wireless Air Traffic Communication Security.
IEEE Trans. Intell. Transp. Syst., 2017

Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors.
CoRR, 2017

Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017

Measuring Spectrum Similarity in Distributed Radio Monitoring Systems.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

LTESS-track: A Precise and Fast Frequency Offset Estimation for low-cost SDR Platforms.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Crowdsourcing spectrum data decoding.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017

ArmaTweet: Detecting Events by Semantic Tweet Analysis.
Proceedings of the Semantic Web - 14th International Conference, 2017

Electrosense: Crowdsourcing spectrum monitoring.
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

Unsupervised Detection of APT C&C Channels using Web Request Graphs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Crowdsourcing security for wireless air traffic communications.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics.
ACM Trans. Priv. Secur., 2016

Quantifying Web Adblocker Privacy.
IACR Cryptol. ePrint Arch., 2016

A Localization Approach for Crowdsourced Air Traffic Communication Networks.
CoRR, 2016

On Perception and Reality in Wireless Air Traffic Communications Security.
CoRR, 2016

Secure Motion Verification using the Doppler Effect.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Evaluation of self-positioning algorithms for time-of-flight based localization.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Quantifying Location Privacy Leakage from Transaction Prices.
Proceedings of the Computer Security - ESORICS 2016, 2016

Assessing the impact of aviation security on cyber power.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
An Automated Approach for Complementing Ad Blockers' Blacklists.
Proc. Priv. Enhancing Technol., 2015

Gaining an Edge in Cyberspace with Advanced Situational Awareness.
IEEE Secur. Priv., 2015

Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
IEEE Secur. Priv., 2015

Hviz: HTTP(S) traffic aggregation and visualization for network forensics.
Digit. Investig., 2015

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol.
IEEE Commun. Surv. Tutorials, 2015

Security by mobility in location and track verification.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Secure Track Verification.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Deep Inspection of the Noise in WiFi Time-of-Flight Echo Techniques.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Towards understanding upstream Web traffic.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A software-defined sensor architecture for large-scale wideband spectrum monitoring.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

A low-cost sensor platform for large-scale wideband spectrum monitoring.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

Intrusion Detection for Airborne Communication Using PHY-Layer Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Jamming mitigation by randomized bandwidth hopping.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

Lightweight Location Verification in Air Traffic Surveillance Networks.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
On the Reception of Concurrent Transmissions in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

Detection of Reactive Jamming in DSSS-based Wireless Communications.
IEEE Trans. Wirel. Commun., 2014

Realities and challenges of nextgen air traffic management: the case of ADS-B.
IEEE Commun. Mag., 2014

Poster abstract: practical limits of wifi time-of-flight echo techniques.
Proceedings of the IPSN'14, 2014

Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Bringing up OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Filtering Noisy 802.11 Time-of-Flight Ranging Measurements.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

Towards Classifying Third-Party Web Services at Scale.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
CoRR, 2013

An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks.
CoRR, 2013

Security of ADS-B: State of the Art and Beyond.
CoRR, 2013

Detection of reactive jamming in DSSS-based wireless networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Semantic fusion of live Web content: System design and implementation experiences.
Proceedings of the Workshop on Sensor Data Fusion: Trends, Solutions, Applications, 2013

BLITZ: Wireless Link Quality Estimation in the Dark.
Proceedings of the Wireless Sensor Networks - 10th European Conference, 2013

Horizon extender: long-term preservation of data leakage evidence in web traffic.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Obfuscating IEEE 802.15.4 communication using secret spreading codes.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

Fast and accurate packet delivery estimation based on DSSS chip errors.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

AFR: automatic multi-stage forensic data retrieval.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

2011
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Holmes: A data theft forensic framework.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

WiFire: a firewall for wireless networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

2009
Repeatable and Realistic Experimentation in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2009

2008
An empirical study of the impact of mobility on link failures in an 802.11 ad hoc network.
IEEE Wirel. Commun., 2008

Density-based anycast: a robust routing strategy for wireless ad hoc networks.
IEEE/ACM Trans. Netw., 2008

Wireless ad hoc podcasting.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Location-based trust for mobile user-generated content: applications, challenges and implementations.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

The limits of theory: Pragmatic challenges in mobile ad hoc systems.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Narrowcasting: an empirical performance evaluation study.
Proceedings of the Third Workshop on Challenged Networks, CHANTS 2008, San Francisco, 2008

2007
Delay-Tolerant Broadcasting.
IEEE Trans. Broadcast., 2007

HEAT: Scalable Routing in Wireless Mesh Networks Using Temperature Fields.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Routing Packets into Wireless Mesh Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Wireless Ad Hoc Podcasting.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Wireless opportunistic podcasting: implementation and design tradeoffs.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007

2006
Field based routing and its application to wireless ad hoc networks.
PhD thesis, 2006

Measurements from an 802.11b Mobile Ad Hoc Network.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

Analyzing the impact of mobility in ad hoc networks.
Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality, 2006

Density-Based vs. Proximity-Based Anycast Routing for Mobile Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Service discovery in mobile ad hoc networks: A field theoretic approach.
Pervasive Mob. Comput., 2005

Towards a new communication paradigm for mobile ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005


  Loading...