Wireless attacks on aircraft landing systems

H Sathaye, D Schepers, A Ranganathan… - Proceedings of the 12th …, 2019 - dl.acm.org
Modern aircraft heavily rely on several wireless technologies for communications, control,
and navigation. In this work, we demonstrate the vulnerability of aircraft instrument landing …

Adversarial example generation with adaptive gradient search for single and ensemble deep neural network

Y Xiao, CM Pun, B Liu - Information Sciences, 2020 - Elsevier
Abstract Deep Neural Networks (DNNs) have achieved remarkable success in specific
domains, such as computer vision, audio processing, and natural language processing …

Audio-based security techniques for secure device-to-device communications

D Chen, N Zhang, H Wu, K Zhang, R Lu… - IEEE Network, 2022 - ieeexplore.ieee.org
In this article, we investigate audio-based security techniques to secure Device-to-Device
(D2D) communications. First, the key distribution techniques for secure D2D communication …

Short-range audio channels security: Survey of mechanisms, applications, and research challenges

M Caprolu, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Short-range audio channels have appealing distinguishing characteristics: ease of use, low
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …

Behavioral acoustic emanations: Attack and verification of pin entry using keypress sounds

S Panda, Y Liu, GP Hancke, UM Qureshi - Sensors, 2020 - mdpi.com
This paper explores the security vulnerability of Personal Identification Number (PIN) or
numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or …

Detection of Overshadowing Attack in 4G and 5G Networks

J Dai, U Saeed, Y Wang, Y Pan, H Wang… - … /ACM Transactions on …, 2024 - computer.org
Despite the promises of current and future cellular networks to increase security, privacy,
and robustness, 5G networks are designed to streamline discovery and initiate connections …

Diffie-hellman in the air: A link layer approach for in-band wireless pairing

W Shen, Y Cheng, B Yin, J Du… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Key establishment is one fundamental issue in wireless security. The widely used Diffie-
Hellman key exchange is vulnerable to the man-in-the-middle (MITM) attack due to its lack of …

Towards Secure Autonomous Aerial Vehicle Navigation

H Sathaye - 2023 - search.proquest.com
The modern aerial vehicle ecosystem relies heavily on various wireless communication and
navigation technologies that are often unauthenticated and vulnerable to adversarial …

Off-the-Shelf Security Testing Platform for Contactless Systems

Y Liu, GP Hancke, UM Qureshi - … 19–20, 2020, Revised Selected Papers …, 2021 - Springer
RFID is widely used in many security sensitive areas. Researchers proposed many
theoretical attacks and security implementation models on RFID devices. To test these …

Adaptive Gradient-Based Adversarial Attacks on Deep Neural Networks

Y Xiao - 2021 - search.proquest.com
Abstract Deep Neural Networks (DNNs) have achieved remarkable success in specific
domains, such as computer vision, audio processing, and natural language processing …