Andrea Toma

ORCID: 0000-0002-2826-0803
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Structural Load-Bearing Analysis
  • Cognitive Radio Networks and Spectrum Sensing
  • Wireless Signal Modulation Classification
  • Speech and Audio Processing
  • Structural Engineering and Materials Analysis
  • Indoor and Outdoor Localization Technologies
  • Civil and Structural Engineering Research
  • UAV Applications and Optimization
  • Structural Analysis of Composite Materials
  • Wireless Communication Security Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Video Surveillance and Tracking Methods
  • Structural Analysis and Optimization
  • Speech Recognition and Synthesis
  • Underwater Vehicles and Communication Systems
  • Energy Efficient Wireless Sensor Networks
  • IoT Networks and Protocols
  • Advanced Surface Polishing Techniques
  • Music and Audio Processing
  • Network Time Synchronization Technologies
  • PAPR reduction in OFDM
  • Wireless Communication Networks Research
  • Digital Filter Design and Implementation
  • Terahertz technology and applications
  • Millimeter-Wave Propagation and Modeling

University of Udine
2021-2024

University of Genoa
2018-2020

Queen Mary University of London
2019-2020

University of Salento
2014

In the context of real-time wireless multimedia transmission from Unmanned Aerial Vehicles (UAVs), equipped with microphone arrays and cameras, data security is crucial. Data should be guaranteed acquisition onboard drones to its delivery destination node or ground station. A light-weight application-level Advanced Encryption Standard (AES) encryption algorithm has been considered applied supported by single-board-computers mounted drones, low computational power. The study shows that main...

10.1109/mcom.001.2200611 article EN IEEE Communications Magazine 2023-05-01

Introducing a data-driven Self-Awareness (SA) module in Cognitive Radio (CR) can support the system to establish secure networks against various attacks from malicious users. Such users manipulate radio spectrum order make CR learn wrong behaviours and take mistaken actions. A basic SA includes ability generative models detect abnormalities inside spectrum. In this work, we propose implement Artificial Intelligence (AI)-based Abnormality Detection techniques at physical (PHY)-layer enabled...

10.1109/tccn.2020.2970693 article EN IEEE Transactions on Cognitive Communications and Networking 2020-01-30

10.1016/0263-8231(93)90046-d article EN Thin-Walled Structures 1993-01-01

This article proposes a framework of application-level security, an HW-SW implementation low-cost solution for real-time multimodal data encryption and decryption security applications in protected environments like espionage, situational awareness, monitoring, counter-UAV. Data is captured from drones equipped with microphone arrays cameras. performed by exploiting acoustic event analysis, video tracking, recognition, on ground station. All the communications are delivered secure channel....

10.1016/j.procs.2022.09.006 article EN Procedia Computer Science 2022-01-01

Millimeter Wave (mmWave) band can be a solution to serve the vast number of Internet Things (IoT) and Vehicle Everything (V2X) devices. In this context, Cognitive Radio (CR) is capable managing mmWave spectrum sharing efficiently. However, Radios are vulnerable malicious users due complex dynamic radio environment shared access medium. This indicates necessity implement techniques able detect precisely any anomalous behaviour in build secure efficient radios. work, we propose comparison...

10.1109/pimrc48278.2020.9217240 article EN 2020-08-01

Technologies such as cognitive radio and dynamic spectrum access rely on sensing which provides wireless devices with information about the in surrounding environment. One of main challenges communications is interference caused by malicious users shared spectrum. In this manuscript, an artificial intelligence enabled framework proposed at system‐level part a cyclic algorithm for mitigation wideband radios. It exploits cyclostationary feature signals to differentiate different modulation...

10.1049/iet-com.2018.5720 article EN IET Communications 2019-03-02

In this paper, we deal with the problem of RSS-based self-localization a wireless blind node using statistical path loss model for measurements. The considered environment is non-homogeneous, i.e., attenuation factors various links are different. We propose two-stage procedure: first stage exploits measurements between anchors to estimate transmitted powers and factors. Then, ML localization algorithm, fed by at only, used unknown position. second stage, modeled as IID RVs ruled Gaussian...

10.1109/icassp.2014.6854396 article EN 2014-05-01

A novel source localization algorithm is investigated for application to MAVs. It introduces a DOA and distance prediction method based on processing RF data. CNN with 2-stage network proposed perform this task the perspective of helping enhancement acoustic signals UAV security applications. An experimental sensor data streaming architecture also presented where complexity concentrated ground station control capacity. Experiments results are then discussed.

10.1109/icmcis52405.2021.9486424 article EN 2021-05-04

Abstract The experimental research described in this manuscript proposes a complete network system for distributed multimedia acquisition by mobile remote nodes, streaming to central unit, and centralized real-time processing of the collected signals. Particular attention is placed on hardware structure best performances an efficient secure streaming. Specifically, these acoustic video sensors, microphone arrays cameras respectively, can be employed any robotic vehicles systems, both fixed....

10.1007/s11042-023-14677-7 article EN cc-by Multimedia Tools and Applications 2023-03-15

Nowadays, UAVs are of fundamental importance in numerous civil applications like search and rescue military monitoring patrolling or counter-UAV where the remote UAV nodes collect sensor data. In last case, flying environmental data to be used contrast external attacks launched by adversary drones. However, due limited computing resources on board acquisition UAVs, most signal processing is still performed a ground central unit sent wirelessly. This poses serious security problems from...

10.1016/j.procs.2022.09.003 article EN Procedia Computer Science 2022-01-01

Research on drone systems is expanding rapidly and finds application in many fields. These provide powerful precise means several domains from surveillance to agriculture. If we look inside a system, will find parts: the aerial vehicle(s), onboard sensors, computing device, autopilot, communication network, ground control station, software, security module, encrypting commands messages. In multi-drone application, system becomes more complex coordination along with synchronization of...

10.1142/s2301385025500633 article EN Unmanned Systems 2024-08-11

Nowadays, set of cooperative drones are commonly used as aerial sensors, in order to monitor areas and track objects interest (think, e.g., border coastal security surveillance, crime control, disaster management, emergency first responder, forest wildlife, traffic monitoring). The generate a quite large continuous time multimodal (audio, video telemetry) data stream towards ground control station with enough computing power resources store process it. Hence, due the distributed nature this...

10.3233/ica-230723 article EN Integrated Computer-Aided Engineering 2023-11-14

Abstract For all building structures national and international Codes are important in the design process. This is also true for connections cold‐formed structures. Lightweight construction has developed rapidly this field, but Codes, by their very nature far slower development. reason a number of connection types not fully covered, or covered at all, existing Codes. Designers thus face different situation with respect to than usual steel buildings. paper describes relation between...

10.1002/pse.152 article EN Progress in Structural Engineering and Materials 2003-07-01

Detection of acoustic events and direction arrival estimation sources are nowadays central topics in the field array signal processing, providing both theoretical practical relevant perspectives. Reconnaissance surveillance against intrusions, search rescue hostile environments, speaker detection localization examples real applications which an accurate efficient analysis scene is required. In this context, we have been investigating CNN neural network-based method capable learning from...

10.1109/ijcnn55064.2022.9892709 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2022-07-18

We present an integrated and intelligent cooperative platform for the detection, recognition tracking of objects in air, underwater on surface. The system is based a data integration process driven by coordinated use Unmanned Aerial Vehicles (UAVs) Underwater (UUVs) equipped with heterogeneous sensors (e.g., magnetometers, electro-optical sensors, cameras microphones) sending acquired to centralized Ground Control Station (GCS). When area be monitored large, it needed partition it, assigning...

10.1109/techdefense59795.2023.10380896 article EN 2023-11-20
Coming Soon ...