Follow
Pieter Robyns
Pieter Robyns
Verified email at uhasselt.be - Homepage
Title
Cited by
Cited by
Year
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning
P Robyns, E Marin, W Lamotte, P Quax, D Singelée, B Preneel
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
1302017
A Multi-Channel Software Decoder for the LoRa Modulation Scheme
P Robyns, P Quax, W Lamotte, W Thenaers
Proceedings of the 3rd International Conference on Internet of Things, Big …, 2018
1102018
Personal Information Leakage by Abusing the GDPR “Right of Access”
M Di Martino, P Robyns, W Weyts, P Quax, W Lamotte, K Andries
70*
Noncooperative 802.11 mac layer fingerprinting and tracking of mobile devices
P Robyns, B Bonné, P Quax, W Lamotte
Security and Communication Networks 2017, 2017
492017
Improving CEMA using correlation optimization
P Robyns, P Quax, W Lamotte
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-24, 2019
452019
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles
P Robyns, B Bonné, P Quax, W Lamotte
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
25*2014
gr-lora: An efficient LoRa decoder for GNU Radio
P Robyns, P Quax, W Lamotte, W Thenaers
Zenodo Ed 10, 5281, 2017
142017
From 5g sniffing to harvesting leakages of privacy-preserving messengers
N Ludant, P Robyns, G Noubir
2023 IEEE Symposium on Security and Privacy (SP), 3146-3161, 2023
122023
PHY-layer security is no alternative to cryptography
P Robyns, P Quax, W Lamotte
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
122017
Injection attacks on 802.11 n MAC frame aggregation
P Robyns, P Quax, W Lamotte
Proceedings of the 8th ACM conference on security & privacy in wireless and …, 2015
102015
Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering
P Robyns, M Di Martino, D Giese, W Lamotte, P Quax, G Noubir
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
92020
POSTER: assessing the impact of 802.11 vulnerabilities using wicability
P Robyns, B Bonné, P Quax, W Lamotte
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
52016
Wireless network privacy
P Robyns
Hasselt University, 2014
52014
IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic Webpages.
M Di Martino, P Robyns, P Quax, W Lamotte
WEBIST, 102-112, 2018
32018
IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI Context
M Di Martino, P Robyns, P Quax, W Lamotte
International Conference on Web Information Systems and Technologies, 99-124, 2018
12018
Explicit and Implicit Information Leakage in Wireless Communication
P ROBYNS
2019
Explicit and Implicit Information Leakage in Wireless Communication: Doctoral Dissertation
P Robyns
2019
EOS quota node visualization and permissions analysis
P Robyns
2013
Latency hiding in NVE’s
P Robyns, P Quax, W Lamotte
The system can't perform the operation now. Try again later.
Articles 1–19