Search Results for author: François Horlin

Found 7 papers, 0 papers with code

Hybrid Fusion for 802.11ax Wi-Fi-based Passive Radars Exploiting Beamforming Feedbacks

no code implementations22 Apr 2024 Martin Willame, Hasan Can Yildirim, Laurent Storrer, François Horlin, Jérôme Louveaux

In a classical PWR processing, only the preamble symbols from the NDP are exploited during the channel sounding session.

Multistatic OFDM Radar Fusion of MUSIC-based Angle Estimation

no code implementations20 Feb 2024 Martin Willame, Hasan Can Yildirim, Laurent Storrer, François Horlin, Jérôme Louveaux

This study investigates the problem of angle-based localization of multiple targets using a multistatic OFDM radar.

Deceptive Jamming in WLAN Sensing

no code implementations2 Jan 2024 Hasan Can Yildirim, Musa Furkan Keskin, Henk Wymeersch, François Horlin

Joint Communication and Sensing (JCAS) is taking its first shape in WLAN sensing under IEEE 802. 11bf, where standardized WLAN signals and protocols are exploited to enable radar-like sensing.

Monitoring Large Crowds With WiFi: A Privacy-Preserving Approach

no code implementations20 Oct 2020 Jean-François Determe, Sophia Azzagnuni, Utkarsh Singh, François Horlin, Philippe De Doncker

From this model, we derive a concentration inequality that highlights the accuracy of our crowd count estimator.

Privacy Preserving

MAC Address Anonymization for Crowd Counting

no code implementations21 Sep 2020 Jean-François Determe, Sophia Azzagnuni, Utkarsh Singh, François Horlin, Philippe De Doncker

Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area.

Cryptography and Security Networking and Internet Architecture

CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping

no code implementations22 Jun 2020 François Rottenberg, Trung-Hien Nguyen, Jean-Michel Dricot, François Horlin, Jérôme Louveaux

Physical-layer security (PLS) has the potential to strongly enhance the overall system security as an alternative to or in combination with conventional cryptographic primitives usually implemented at higher network layers.

Cannot find the paper you are looking for? You can Submit a new open access paper.