no code implementations • 3 Feb 2023 • Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti
We first derive the optimal attack strategy against a Gaussian transmission from Alice, by minimizing an outer bound on the achievable error probability region of the spoofing detection test.
no code implementations • 22 Oct 2022 • Francesco Ardizzon, Stefano Tomasin
The artificial dataset is used only for training, while the OCC is used on negative-class samples generated from a different pdf.
no code implementations • 19 Aug 2022 • Francesco Ardizzon, Roee Diamant, Paolo Casari, Stefano Tomasin
We propose a technique to authenticate received packets in underwater acoustic networks based on the physical layer features of the underwater acoustic channel (UWAC).