no code implementations • 22 Apr 2024 • Martin Willame, Hasan Can Yildirim, Laurent Storrer, François Horlin, Jérôme Louveaux
In a classical PWR processing, only the preamble symbols from the NDP are exploited during the channel sounding session.
no code implementations • 20 Mar 2024 • Martin Willame, Laurent Storrer, Hasan Can Yildirim, François Horlin, Jérôme Louveaux
In this study, we address the angle-based localization of multiple targets using a multistatic OFDM radar.
no code implementations • 20 Feb 2024 • Martin Willame, Hasan Can Yildirim, Laurent Storrer, François Horlin, Jérôme Louveaux
This study investigates the problem of angle-based localization of multiple targets using a multistatic OFDM radar.
no code implementations • 2 Jan 2024 • Hasan Can Yildirim, Musa Furkan Keskin, Henk Wymeersch, François Horlin
Joint Communication and Sensing (JCAS) is taking its first shape in WLAN sensing under IEEE 802. 11bf, where standardized WLAN signals and protocols are exploited to enable radar-like sensing.
no code implementations • 20 Oct 2020 • Jean-François Determe, Sophia Azzagnuni, Utkarsh Singh, François Horlin, Philippe De Doncker
From this model, we derive a concentration inequality that highlights the accuracy of our crowd count estimator.
no code implementations • 21 Sep 2020 • Jean-François Determe, Sophia Azzagnuni, Utkarsh Singh, François Horlin, Philippe De Doncker
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area.
Cryptography and Security Networking and Internet Architecture
no code implementations • 22 Jun 2020 • François Rottenberg, Trung-Hien Nguyen, Jean-Michel Dricot, François Horlin, Jérôme Louveaux
Physical-layer security (PLS) has the potential to strongly enhance the overall system security as an alternative to or in combination with conventional cryptographic primitives usually implemented at higher network layers.