Follow
Vincent Lenders
Vincent Lenders
Cyber-Defence Campus, armasuisse
Verified email at lenders.ch - Homepage
Title
Cited by
Cited by
Year
Deep learning models for wireless signal classification with distributed low-cost spectrum sensors
S Rajendran, W Meert, D Giustiniano, V Lenders, S Pollin
IEEE Transactions on Cognitive Communications and Networking 4 (3), 433-445, 2018
7712018
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
5442014
A realistic evaluation and comparison of indoor location technologies: Experiences and lessons learned
D Lymberopoulos, J Liu, X Yang, RR Choudhury, V Handziski, S Sen
Proceedings of the 14th international conference on information processing …, 2015
4372015
Realities and challenges of nextgen air traffic management: the case of ADS-B
M Strohmeier, M Schäfer, V Lenders, I Martinovic
IEEE communications magazine 52 (5), 111-118, 2014
3792014
On the security of the automatic dependent surveillance-broadcast protocol
M Strohmeier, V Lenders, I Martinovic
IEEE Communications Surveys & Tutorials 17 (2), 1066-1087, 2014
3532014
Short paper: Reactive jamming in wireless networks: How realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
3412011
Wireless ad hoc podcasting
V Lenders, M May, G Karlsson, C Wacha
ACM SIGMOBILE Mobile Computing and Communications Review 12 (1), 65-67, 2008
2842008
Experimental analysis of attacks on next generation air traffic communication
M Schäfer, V Lenders, I Martinovic
Applied Cryptography and Network Security: 11th International Conference …, 2013
2152013
Electrosense: Open and big spectrum data
S Rajendran, R Calvo-Palomino, M Fuchs, B Van den Bergh, H Cordobés, ...
IEEE Communications Magazine 56 (1), 210-217, 2017
1792017
Location-based trust for mobile user-generated content: applications, challenges and implementations
V Lenders, E Koukoumidis, P Zhang, M Martonosi
Proceedings of the 9th workshop on Mobile computing systems and applications …, 2008
1792008
Service discovery in mobile ad hoc networks: A field theoretic approach
V Lenders, M May, B Plattner
Pervasive and Mobile Computing 1 (3), 343-370, 2005
1752005
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks
K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt
2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018
1602018
On perception and reality in wireless air traffic communication security
M Strohmeier, M Schäfer, R Pinheiro, V Lenders, I Martinovic
IEEE transactions on intelligent transportation systems 18 (6), 1338-1357, 2016
1492016
Detection of reactive jamming in DSSS-based wireless communications
M Spuhler, D Giustiniano, V Lenders, M Wilhelm, JB Schmitt
IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014
1252014
Analyzing the impact of mobility in ad hoc networks
V Lenders, J Wagner, M May
Proceedings of the 2nd international workshop on Multi-hop ad hoc networks …, 2006
1232006
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
1202017
Multi-path routing protocols in wireless mobile ad hoc networks: A quantitative comparison
G Parissidis, V Lenders, M May, B Plattner
International Conference on Next Generation Wired/Wireless Networking, 313-326, 2006
1132006
{NetHide}: Secure and practical network topology obfuscation
R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev
27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018
972018
Delay-tolerant broadcasting
G Karlsson, V Lenders, M May
Proceedings of the 2006 SIGCOMM workshop on Challenged networks, 197-204, 2006
942006
Intrusion detection for airborne communication using PHY-layer information
M Strohmeier, V Lenders, I Martinovic
International Conference on Detection of Intrusions and Malware, and …, 2015
932015
The system can't perform the operation now. Try again later.
Articles 1–20