Deep learning models for wireless signal classification with distributed low-cost spectrum sensors S Rajendran, W Meert, D Giustiniano, V Lenders, S Pollin IEEE Transactions on Cognitive Communications and Networking 4 (3), 433-445, 2018 | 697 | 2018 |
Bringing up OpenSky: A large-scale ADS-B sensor network for research M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014 | 498 | 2014 |
A realistic evaluation and comparison of indoor location technologies: Experiences and lessons learned D Lymberopoulos, J Liu, X Yang, RR Choudhury, V Handziski, S Sen Proceedings of the 14th international conference on information processing …, 2015 | 429 | 2015 |
Realities and challenges of nextgen air traffic management: the case of ADS-B M Strohmeier, M Schäfer, V Lenders, I Martinovic IEEE communications magazine 52 (5), 111-118, 2014 | 356 | 2014 |
On the security of the automatic dependent surveillance-broadcast protocol M Strohmeier, V Lenders, I Martinovic IEEE Communications Surveys & Tutorials 17 (2), 1066-1087, 2014 | 342 | 2014 |
Short paper: Reactive jamming in wireless networks: How realistic is the threat? M Wilhelm, I Martinovic, JB Schmitt, V Lenders Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011 | 334 | 2011 |
Wireless ad hoc podcasting V Lenders, M May, G Karlsson, C Wacha ACM SIGMOBILE Mobile Computing and Communications Review 12 (1), 65-67, 2008 | 283 | 2008 |
Experimental analysis of attacks on next generation air traffic communication M Schäfer, V Lenders, I Martinovic Applied Cryptography and Network Security: 11th International Conference …, 2013 | 205 | 2013 |
Location-based trust for mobile user-generated content: applications, challenges and implementations V Lenders, E Koukoumidis, P Zhang, M Martonosi Proceedings of the 9th workshop on Mobile computing systems and applications …, 2008 | 177 | 2008 |
Service discovery in mobile ad hoc networks: A field theoretic approach V Lenders, M May, B Plattner Pervasive and Mobile Computing 1 (3), 343-370, 2005 | 173 | 2005 |
Electrosense: Open and big spectrum data S Rajendran, R Calvo-Palomino, M Fuchs, B Van den Bergh, H Cordobés, ... IEEE Communications Magazine 56 (1), 210-217, 2017 | 159 | 2017 |
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt 2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018 | 148 | 2018 |
On perception and reality in wireless air traffic communication security M Strohmeier, M Schäfer, R Pinheiro, V Lenders, I Martinovic IEEE transactions on intelligent transportation systems 18 (6), 1338-1357, 2016 | 143 | 2016 |
Analyzing the impact of mobility in ad hoc networks V Lenders, J Wagner, M May Proceedings of the 2nd international workshop on Multi-hop ad hoc networks …, 2006 | 123 | 2006 |
Detection of reactive jamming in DSSS-based wireless communications M Spuhler, D Giustiniano, V Lenders, M Wilhelm, JB Schmitt IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014 | 117 | 2014 |
Multi-path routing protocols in wireless mobile ad hoc networks: A quantitative comparison G Parissidis, V Lenders, M May, B Plattner International Conference on Next Generation Wired/Wireless Networking, 313-326, 2006 | 113 | 2006 |
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics S Eberz, KB Rasmussen, V Lenders, I Martinovic Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 112 | 2017 |
Delay-tolerant broadcasting G Karlsson, V Lenders, M May Proceedings of the 2006 SIGCOMM workshop on Challenged networks, 197-204, 2006 | 93 | 2006 |
{NetHide}: Secure and practical network topology obfuscation R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev 27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018 | 86 | 2018 |
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics S Eberz, K Rasmussen, V Lenders, I Martinovic Network and Distributed System Security (NDSS) Symposium, 2015 | 86 | 2015 |