Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning P Robyns, E Marin, W Lamotte, P Quax, D Singelée, B Preneel Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 131 | 2017 |
A Multi-Channel Software Decoder for the LoRa Modulation Scheme P Robyns, P Quax, W Lamotte, W Thenaers Proceedings of the 3rd International Conference on Internet of Things, Big …, 2018 | 111 | 2018 |
Personal Information Leakage by Abusing the GDPR “Right of Access” M Di Martino, P Robyns, W Weyts, P Quax, W Lamotte, K Andries | 70* | |
Noncooperative 802.11 mac layer fingerprinting and tracking of mobile devices P Robyns, B Bonné, P Quax, W Lamotte Security and Communication Networks 2017, 2017 | 50 | 2017 |
Improving CEMA using correlation optimization P Robyns, P Quax, W Lamotte IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-24, 2019 | 45 | 2019 |
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles P Robyns, B Bonné, P Quax, W Lamotte Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 25* | 2014 |
gr-lora: An efficient LoRa decoder for GNU Radio P Robyns, P Quax, W Lamotte, W Thenaers Zenodo Ed 10, 5281, 2017 | 14 | 2017 |
From 5g sniffing to harvesting leakages of privacy-preserving messengers N Ludant, P Robyns, G Noubir 2023 IEEE Symposium on Security and Privacy (SP), 3146-3161, 2023 | 12 | 2023 |
PHY-layer security is no alternative to cryptography P Robyns, P Quax, W Lamotte Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 12 | 2017 |
Injection attacks on 802.11 n MAC frame aggregation P Robyns, P Quax, W Lamotte Proceedings of the 8th ACM conference on security & privacy in wireless and …, 2015 | 10 | 2015 |
Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering P Robyns, M Di Martino, D Giese, W Lamotte, P Quax, G Noubir Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 9 | 2020 |
POSTER: assessing the impact of 802.11 vulnerabilities using wicability P Robyns, B Bonné, P Quax, W Lamotte Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 5 | 2016 |
Wireless network privacy P Robyns Hasselt University, 2014 | 5 | 2014 |
IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic Webpages. M Di Martino, P Robyns, P Quax, W Lamotte WEBIST, 102-112, 2018 | 3 | 2018 |
IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI Context M Di Martino, P Robyns, P Quax, W Lamotte International Conference on Web Information Systems and Technologies, 99-124, 2018 | 1 | 2018 |
Explicit and Implicit Information Leakage in Wireless Communication: Doctoral Dissertation P Robyns | | 2019 |
EOS quota node visualization and permissions analysis P Robyns | | 2013 |
Latency hiding in NVE’s P Robyns, P Quax, W Lamotte | | |