ROBYNS, Pieter

Full Name
ROBYNS, Pieter
Email
pieter.robyns@uhasselt.be
 
Loading... 5 0 5 0 false
Loading... 6 0 5 0 false

Publications

Refined By:
Author:  ROBYNS, Pieter

Results 1-16 of 16 (Search time: 0.006 seconds).

Issue DateTitleContributor(s)TypeCat.
12023From 5G Sniffing to Harvesting Leakages of Privacy-Preserving MessengersLudant, Norbert; ROBYNS, Pieter; Noubir, GuevaraProceedings PaperC1
22020Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse EngineeringROBYNS, Pieter; DI MARTINO, Mariano; Giese, Dennis; LAMOTTE, Wim; QUAX, Peter; Noubir, GuevaraProceedings PaperC1
32019Explicit and Implicit Information Leakage in Wireless CommunicationROBYNS, PieterTheses and DissertationsT1
42019IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI ContextDI MARTINO, Mariano; ROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
52019Personal Information Leakage by Abusing the GDPR 'Right of Access'DI MARTINO, Mariano; ROBYNS, Pieter; Weyts, Winnie; QUAX, Peter; LAMOTTE, Wim; ANDRIES, KenProceedings PaperC1
62018IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic WebpagesDI MARTINO, Mariano; ROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
72018A Multi-Channel Software Decoder for the LoRa Modulation SchemeROBYNS, Pieter; QUAX, Peter; LAMOTTE, Wim; Thenaers, WilliamProceedings PaperC1
82018Improving CEMA using Correlation OptimizationROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimJournal ContributionA1
92017Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot LearningROBYNS, Pieter; Marin, Eduard; LAMOTTE, Wim; QUAX, Peter; SingelĂ©e, Dave; Preneel, BartProceedings PaperC1
102017Non-cooperative 802.11 MAC layer fingerprinting and tracking of mobile devicesROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimJournal ContributionA1
112017Opinion: PHY-Layer Security is no Alternative to CryptographyROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
122016POSTER: Assessing the Impact of 802.11 Vulnerabilities using WicabilityROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
132016Assessing the Impact of 802.11 Vulnerabilities using WicabilityROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimConference MaterialC2
142015Injection attacks on 802.11n MAC frame aggregationROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
152014Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oraclesROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
162014Wireless Network PrivacyROBYNS, PieterTheses and DissertationsT2