default search action
Hanif Rahbari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Siddharth Dongre, Hanif Rahbari:
Fair and Secure 5G and Wi-Fi Coexistence Using Robust Implicit Channel Coordination. IEEE Trans. Inf. Forensics Secur. 19: 6679-6692 (2024) - [c21]Naureen Hoque, Hanif Rahbari:
Deep Learning Models as Moving Targets to Counter Modulation Classification Attacks. INFOCOM 2024: 1601-1610 - [c20]Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy:
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications. NDSS 2024 - 2023
- [j8]Zhengguang Zhang, Hanif Rahbari, Marwan Krunz:
Adaptive Preamble Embedding With MIMO to Support User-Defined Functionalities in WLANs. IEEE Trans. Mob. Comput. 22(2): 691-707 (2023) - [j7]Geoff Twardokus, Hanif Rahbari:
Toward Protecting 5G Sidelink Scheduling in C-V2X Against Intelligent DoS Attacks. IEEE Trans. Wirel. Commun. 22(11): 7273-7286 (2023) - [c19]Naureen Hoque, Hanif Rahbari:
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems. WISEC 2023: 275-285 - [c18]Naureen Hoque, Hanif Rahbari:
Circumventing the Defense against Modulation Classification Attacks. WISEC 2023: 377-382 - 2022
- [c17]Naureen Hoque, Hanif Rahbari, Cullen Rezendes:
Systematically Analyzing Vulnerabilities in the Connection Establishment Phase of Wi-Fi Systems. CNS 2022: 64-72 - [c16]Haoran Peng, Hanif Rahbari, Shanchieh Jay Yang, Li-Chun Wang:
Non-cooperative Learning for Robust Spectrum Sharing in Connected Vehicles with Malicious Agents. GLOBECOM 2022: 1769-1775 - [c15]Siddharth Dongre, Hanif Rahbari:
Implicit Channel Coordination to Tackle Starvation Attacks in 5G and Wi-Fi Coexistence Systems. GLOBECOM 2022: 4136-4141 - [c14]Geoff Twardokus, Hanif Rahbari:
Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks. INFOCOM 2022: 1629-1638 - [i1]Nina Bindel, Sarah McCarthy, Geoff Twardokus, Hanif Rahbari:
Drive (Quantum) Safe! â" Towards Post-Quantum Security for V2V Communications. IACR Cryptol. ePrint Arch. 2022: 483 (2022) - 2021
- [c13]Naureen Hoque, Hanif Rahbari:
POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation. CCS 2021: 2402-2404 - [c12]Geoff Twardokus, Jaime Ponicki, Samantha Baker, Peter Carenzo, Hanif Rahbari, Sumita Mishra:
Targeted Discreditation Attack against Trust Management in Connected Vehicles. ICC 2021: 1-6 - [c11]Geoff Twardokus, Hanif Rahbari:
Evaluating V2V Security on an SDR Testbed. INFOCOM Workshops 2021: 1-3 - [c10]Siddharth Dongre, Hanif Rahbari:
Message sieving to mitigate smart gridlock attacks in V2V. WISEC 2021: 129-134 - 2020
- [c9]Zhengguang Zhang, Hanif Rahbari, Marwan Krunz:
Expanding the Role of Preambles to Support User-defined Functionality in MIMO-based WLANs. INFOCOM 2020: 1191-1200
2010 – 2019
- 2019
- [j6]Peyman Siyari, Hanif Rahbari, Marwan Krunz:
Lightweight Machine Learning for Efficient Frequency-Offset-Aware Demodulation. IEEE J. Sel. Areas Commun. 37(11): 2544-2558 (2019) - 2018
- [c8]Hanif Rahbari, Jinshan Liu, Jung-Min "Jerry" Park:
SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques. CNS 2018: 1-9 - [c7]Hanif Rahbari, Peyman Siyari, Marwan Krunz, Jung-Min "Jerry" Park:
Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors. INFOCOM 2018: 1592-1600 - 2017
- [j5]Hanif Rahbari, Marwan Krunz:
Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems. IEEE Trans. Wirel. Commun. 16(6): 3775-3786 (2017) - 2016
- [j4]Hanif Rahbari, Marwan Krunz:
Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier. IEEE Trans. Inf. Forensics Secur. 11(12): 2732-2747 (2016) - [j3]Hanif Rahbari, Marwan Krunz, Loukas Lazos:
Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems. IEEE Trans. Mob. Comput. 15(5): 1264-1278 (2016) - [c6]Hanif Rahbari, Marwan Krunz:
Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems. CNS 2016: 118-126 - 2015
- [j2]Hanif Rahbari, Marwan Krunz:
Secrecy beyond encryption: obfuscating transmission signatures in wireless communications. IEEE Commun. Mag. 53(12): 54-60 (2015) - [j1]Mohammad Abdel-Rahman, Hanif Rahbari, Marwan Krunz:
Multicast Rendezvous in Fast-Varying DSA Networks. IEEE Trans. Mob. Comput. 14(7): 1449-1462 (2015) - [c5]Rashad Eletreby, Hanif Rahbari, Marwan Krunz:
Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming. GLOBECOM 2015: 1-6 - 2014
- [c4]Hanif Rahbari, Marwan Krunz, Loukas Lazos:
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. INFOCOM 2014: 1015-1023 - [c3]Hanif Rahbari, Marwan Krunz:
Friendly CryptoJam: a mechanism for securing physical-layer attributes. WISEC 2014: 129-140 - 2013
- [c2]Mohammad Abdel-Rahman, Hanif Rahbari, Marwan Krunz, Philippe Nain:
Fast and secure rendezvous protocols for mitigating control channel DoS attacks. INFOCOM 2013: 370-374 - 2012
- [c1]Mohammad J. Abdel-Rahman, Hanif Rahbari, Marwan Krunz:
Adaptive frequency hopping algorithms for multicast rendezvous in DSA networks. DySPAN 2012: 517-528
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint