Raimondo Giuliani

ORCID: 0000-0002-4997-0919
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Wireless Signal Modulation Classification
  • Wireless Communication Security Techniques
  • User Authentication and Security Systems
  • Radar Systems and Signal Processing
  • Biometric Identification and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cognitive Radio Networks and Spectrum Sensing
  • Music and Audio Processing
  • Target Tracking and Data Fusion in Sensor Networks
  • Geophysical Methods and Applications
  • Bluetooth and Wireless Communication Technologies
  • Wireless Body Area Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Image Processing and 3D Reconstruction
  • Infrastructure Maintenance and Monitoring
  • Wireless Communication Networks Research
  • Data Management and Algorithms
  • Wireless Sensor Networks for Data Analysis
  • Advanced SAR Imaging Techniques
  • Speech and Audio Processing
  • Advanced Steganography and Watermarking Techniques
  • Blockchain Technology Applications and Security
  • Smart Grid Energy Management

Joint Research Centre
2012-2021

Agenzia Regionale Sanitaria della Puglia
2020

European Commission
2012-2020

Joint Research Center
2008

The authors investigate the application of deep convolutional neural networks (CNNs) to problem radiometric identification, i.e. task authenticating wireless devices on basis their radio frequency (RF) emissions, which contain features directly related physical properties devices. They collected digitised RF from 12 devices, and used various techniques transform time series derived images. A CNN is then applied authors' results show that identification performance combination with an image...

10.1049/el.2018.6229 article EN Electronics Letters 2018-11-16

Micro-generation promises to greatly contribute the energy balance of grid; however, so far, its market penetration is going slow due few, or not-existing, direct economic benefits end-users would enjoy by deploying an in-house micro-generation system. In this paper, taking advantage potentialities blockchain technologies, we propose a solar production and distribution architecture using smart contracts, particular distributed ledger paradigm, support automatic exchanges auctions,...

10.1109/es2de.2017.8015343 article EN 2017-07-01

The concept of RF fingerprinting is that electronic devices can be identified and authenticated through their radio frequency emissions. has been applied to enhance the security wireless networks based on WiFi or cellular communication standards. In this paper, we apply IoT basis entropy statistical features called permutation dispersion entropy. authentication accuracy obtained using these two compared other including shannon A comparison classification with different machine learning...

10.1109/giots.2017.8016272 article EN 2017-06-01

In this letter, we apply a Bernoulli Filter for moving target detection and tracking using real Multiple Input Output radar data in challenging environment. The interest MIMO radars has been growing since they can provide high performance at lower cost than conventional antenna arrays. performs the Track-Before-Detect approach, which is required to achieve satisfactory low signal-to-noise scenarios. algorithm validated with of walking person.

10.1109/lsp.2014.2325566 article EN IEEE Signal Processing Letters 2014-05-19

Vehicle automation and cooperation is progressively being introduced in traffic networks. As a consequence research to assess its impacts currently on-going. Adaptive Cruise Control (ACC) one of the first automated functionalities available for privately owned vehicles. An experimental study has been conducted investigate key features ACC controller using Global Navigation Satellite System data. The remarks based on data focus controller's reaction time desired gap. Both parameters are...

10.1109/ivs.2018.8500490 article EN 2022 IEEE Intelligent Vehicles Symposium (IV) 2018-06-01

The correct identification of smartphones has various applications in the field security or fight against counterfeiting. As level sophistication counterfeit electronics increases, detection procedures must become more accurate but also not destructive for smartphone under testing. Some components are likely to reveal their authenticity even without a physical inspection, since they characterized by hardware fingerprints detectable simply examining data provide. This is case MEMS (Micro...

10.3390/s16060818 article EN cc-by Sensors 2016-06-03

The detection and identification of road anomalies obstacles in the infrastructure has been investigated by research community using different types sensors. This paper evaluates anomalies/obstacles data collected from Inertial Measurement Unit (IMU) installed a vehicle particular generated accelerometers’ gyroscopes’ components. Inspired successes application deep learning to various problems, this investigates Convolutional Neural Network (CNN) specific problem. In particular, we propose...

10.3390/s20226425 article EN cc-by Sensors 2020-11-10

This paper addresses the problem of authentication and identification wireless devices using their physical properties derived from Radio Frequency (RF) emissions. technique is based on concept that small differences in implementation are significant enough they carried over to RF emissions distinguish with high accuracy. The can be used both authenticate claimed identity a device or identify one among others. In literature, this has been implemented by feature extraction 1D time domain,...

10.3390/app8112167 article EN cc-by Applied Sciences 2018-11-06

This letter addresses the problem of Internet Things (IoT) authentication when cryptographic means are not feasible or they have limited applicability due to constraints in context computing capabilities IoT devices. presents a novel approach for wireless devices using their Radio Frequency (RF) emissions where Convolutional Neural Networks (CNN) combination with Recurrence Plots (RP) applied. In recent years various studies demonstrated that can be authenticated on basis RF because physical...

10.1002/itl2.81 article EN Internet Technology Letters 2018-10-25

We investigate the identification of mobile phones through their built-in magnetometers. These electronic components have started to be widely deployed in mass market recent years, and they can exploited uniquely identify due physical differences, which appear digital output generated by them. This is similar approaches reported literature for other phone, including camera, microphones or RF transmission components. In this paper, performed an inexpensive device made up a platform that...

10.3390/s17040783 article EN cc-by Sensors 2017-04-06

In this paper, we investigate the impact of wireless interferences on physical Layer Authentication devices. The concept layer authentication is to identify devices from their RF emissions, which contain specific features (also called fingerprints) transmitter chain in device. This also Special Emitter Identification (SEI) or Radio Frequency-DNA (RF-DNA) and it has been researched recent years using different techniques machine learning algorithms. ideal conditions, classification accuracy...

10.1109/giots.2019.8766385 article EN 2019-06-01

The concept of Radio Frequency (RF) fingerprinting is that electronic devices can be identified and authenticated through their radio frequency emissions, which contain intrinsic features the device itself. RF used to enhance security wireless networks because fingerprints provide a form authentication. In previous research papers, have typically been obtained by extracting statistical from time series generated analog-to-digital conversion emissions. this paper, we investigate novel...

10.1109/ccst.2017.8167861 article EN 2017-10-01

Abstract The flexibility of software‐defined radio (SDR) technology has been proposed to support various applications from the dynamic usage frequency spectrum implementation access technologies in commercial and military domain. A new generation low‐cost SDR devices emerged last few years, opening possibilities implement inexpensive security attacks against protocols systems. Digital Enhanced Cordless Telecommunication (DECT) is a European Telecommunications Standards Institute standard for...

10.1002/sec.989 article EN Security and Communication Networks 2014-03-17

Recent studies have investigated the use of inertial measurement units to detect and report presence road irregularities on surface thus improve safety maintenance transportation infrastructure. The results from literature show that it is possible various in identify type irregularity with good accuracy using statistical features. This article addresses specific called features (RSF) focuses identification RSF instances themselves rather than identification, which leads a more challenging...

10.1109/lsens.2018.2880118 article EN IEEE Sensors Letters 2018-11-14

Radio Frequency (RF) fingerprinting is the problem of identifying and authenticating an electronic device through its radio frequency emissions. These emissions contain intrinsic features itself. RF can be used to enhance security wireless networks since fingerprints provide a form authentication complementing other measures. RF-based turns out practical use in applications as long delivers high identification verification accuracy, whole process computationally efficient. In this paper, we...

10.1109/scvt.2017.8240312 article EN 2017-11-01

Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transmitting. The reason is that such contain intrinsic features originating from physical structure and materials used to build device itself. These are usually called fingerprints in literature, uniquely identify a through process radiometric identification. fingerprinting support multifactor authentication of security applications. One main unresolved issues identification lack portability...

10.1109/ntms.2018.8328703 article EN 2018-02-01

In Vehicular Ad Hoc Networks (VANETs) used in the road transportation sector, privacy risks may arise because vehicles could be tracked on basis of information transmitted by Vehicle to (V2V) and Infrastructure (V2I) communications implemented with Dedicated Short Range Communications (DSRC) standards operating at 5.9 GHz. Various techniques have been proposed literature mitigate these including use pseudonym schemes, but they are mostly focused data anonymization network application layer....

10.1155/2017/3041749 article EN cc-by Mobile Information Systems 2017-01-01

In this study, the issue of phase discontinuity in multiple-input–multiple-output (MIMO) radar systems is analysed and described detail, together with an efficient way for processing MIMO data by means discrete-time Fourier transform (DFT) fast (FFT). particular, here it shown that history a point target illuminated shows number discontinuities because geometry antennas. It also these become negligible far range, whereas they represent short range if not compensated properly because, turn,...

10.1049/iet-rsn.2011.0246 article EN IET Radar Sonar & Navigation 2012-04-01

Physical Layer Authentication of wireless devices using their intrinsic physical features has been investigated in recent years by the research community. The concept is that small differences material and composition electronic circuits produce specific Radio Frequency (RF) signal transmitted over air. While these are usually not relevant to obstacle correct functioning services, they significant enough uniquely identify model or device itself once collected processed a RF receiver....

10.1109/giots.2019.8766387 article EN 2019-06-01

Odometer fraud is a serious offense in the automotive sector and indicates disconnection, resetting, or alteration of vehicle's odometer related sensor with intent to change number miles/Kms indicated recorded report false information. This paper focuses specifically on threat scenario where (i.e., Hall Sensor) manipulated replaced implement an fraud. proposes technique mitigate by performing physical layer authentication Sensor, which takes consideration limitation in-vehicle networks...

10.1109/uemcon51285.2020.9298039 article EN 2020-10-28
Coming Soon ...