![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Alessandro Brighente
Person information
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Andrea De Salve
, Alessandro Brighente
, Mauro Conti
:
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction. Future Gener. Comput. Syst. 154: 413-425 (2024) - [j21]Alessandro Brighente
, Mauro Conti
, Gabriele Di Renzone
, Giacomo Peruzzi
, Alessandro Pozzebon
:
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective. IEEE Internet Things J. 11(5): 7309-7324 (2024) - [j20]Jin Han
, Ran Cao
, Alessandro Brighente
, Mauro Conti
:
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras. IEEE Internet Things J. 11(6): 11046-11057 (2024) - [j19]Alessandro Brighente
, Mauro Conti
, Denis Donadel
, Federico Turrin
:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Trans. Cyber Phys. Syst. 8(2): 11 (2024) - [j18]Jin Han
, Yun-Feng Ren
, Alessandro Brighente
, Mauro Conti
:
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems. ACM Trans. Intell. Syst. Technol. 15(2): 31:1-31:21 (2024) - [j17]Yanan Zhao
, Haiyang Yu
, Yuhao Liang, Alessandro Brighente
, Mauro Conti
, Jianfei Sun
, Yilong Ren
:
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon. IEEE Trans. Intell. Transp. Syst. 25(5): 3671-3684 (2024) - [j16]Simone Soderi
, Alessandro Brighente
, Saiqin Xu
, Mauro Conti
:
Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks. IEEE Trans. Mob. Comput. 23(12): 15182-15195 (2024) - [j15]Miao He
, Jianbing Ni
, Meng Li
, Alessandro Brighente
, Mauro Conti
:
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach. IEEE Trans. Wirel. Commun. 23(1): 276-289 (2024) - [j14]Saiqin Xu
, Alessandro Brighente
, Mauro Conti
, Baixiao Chen
, Shuo Wang
:
Evaporative Angle: A Generative Approach to Mitigate Jamming Attacks in DOA Estimation. IEEE Wirel. Commun. Lett. 13(10): 2922-2926 (2024) - [c40]Alessandro Brighente
, Mauro Conti
, Sitora Salaeva
, Federico Turrin
:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. ACNS Workshops (2) 2024: 55-74 - [c39]Emad Efatinasab
, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti
:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. DIMVA 2024: 503-524 - [c38]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. ESORICS (1) 2024: 374-393 - [c37]Alessandro Brighente, Mauro Conti
, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. EuroS&P Workshops 2024: 352-360 - [c36]Francesco Marchiori, Alessandro Brighente, Mauro Conti
:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? EuroS&P Workshops 2024: 367-372 - [c35]Filippo Giambartolomei, Marc Barcelo, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. ICC 2024: 702-707 - [c34]Alessandro Brighente, Saiqin Xu, Simone Soderi, Mauro Conti:
Physical Layer Authentication for Distributed RIS (DRIS) Enabled VLC Systems. ICC 2024: 3340-3345 - [c33]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti
, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. NetSoft 2024: 185-189 - [c32]Kavya Balasubramanian
, Adithya Gowda Baragur
, Denis Donadel
, Dinuka Sahabandu
, Alessandro Brighente
, Bhaskar Ramasubramanian
, Mauro Conti
, Radha Poovendran
:
CANLP: NLP-Based Intrusion Detection System for CAN. SAC 2024: 212-214 - [c31]Johanna Ansohn McDougall
, Alessandro Brighente
, Anne Kunstmann, Niklas Zapatka, Hannes Federrath:
Reduce to the MACs - Privacy Friendly Generic Probe Requests. SEC 2024: 31-45 - [c30]Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hanna Schambach, Hannes Federrath:
Probing with a Generic MAC Address: An Alternative to MAC Address Randomisation. SoftCOM 2024: 1-6 - [c29]Marco Palazzo, Florine W. Dekker
, Alessandro Brighente, Mauro Conti, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries. USENIX Security Symposium 2024 - [c28]Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. WISEC 2024: 174-184 - [e2]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - [i30]Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti:
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols. CoRR abs/2401.10736 (2024) - [i29]Filippo Giambartolomei, Marc Barceló Lladó, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. CoRR abs/2403.01871 (2024) - [i28]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. CoRR abs/2403.17494 (2024) - [i27]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. CoRR abs/2405.01888 (2024) - [i26]Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? CoRR abs/2405.08466 (2024) - [i25]Johanna Ansohn McDougall, Alessandro Brighente, Anne Kunstmann, Niklas Zapatka, Hannes Federrath:
Reduce to the MACs - Privacy Friendly Generic Probe Requests. CoRR abs/2405.09230 (2024) - [i24]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. CoRR abs/2405.12076 (2024) - [i23]Tommaso Bianchi
, Alessandro Brighente, Mauro Conti, Andrea Valori:
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data. CoRR abs/2407.00585 (2024) - [i22]Alessandro Brighente, Mauro Conti, Matthijs Schotsman, Savio Sciancalepore:
Obfuscated Location Disclosure for Remote ID Enabled Drones. CoRR abs/2407.14256 (2024) - [i21]Giacomo Benedetti, Serena Cofano, Alessandro Brighente, Mauro Conti:
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach. CoRR abs/2409.06390 (2024) - [i20]Alessandro Lotto, Alessandro Brighente, Mauro Conti:
Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check. CoRR abs/2411.14394 (2024) - 2023
- [j13]Alessandro Brighente
, Mauro Conti
, Radha Poovendran
, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023) - [j12]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(2): 1775-1789 (2023) - [j11]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Xiancheng Cheng, Dongchen Zhu:
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios. IEEE Trans. Veh. Technol. 72(4): 4683-4696 (2023) - [j10]Sanaz Soltani
, Mohammad Shojafar
, Alessandro Brighente
, Mauro Conti
, Rahim Tafazolli
:
Poisoning Bearer Context Migration in O-RAN 5G Network. IEEE Wirel. Commun. Lett. 12(3): 401-405 (2023) - [c27]Emilie Bout, Valentin Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks. ICC 2023: 5210-5215 - [c26]Johanna Ansohn McDougall, Alessandro Brighente, Willi Großmann
, Ben Ansohn McDougall, Joshua Stock
, Hannes Federrath:
LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors. ICC 2023: 6040-6045 - [c25]Marco Alecci
, Luca Attanasio
, Alessandro Brighente
, Mauro Conti
, Eleonora Losiouk
, Hideki Ochiai
, Federico Turrin
:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206 - [c24]Alessandro Brighente, Mauro Conti
, Giacomo Peruzzi
, Alessandro Pozzebon
:
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning. SAS 2023: 1-6 - [c23]Tommaso Bianchi
, Surudhi Asokraj, Alessandro Brighente, Mauro Conti
, Radha Poovendran
:
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer. VTC2023-Spring 2023: 1-6 - [c22]Ankit Gangwal, Apoorva Thirupathi, Alessandro Brighente, Mauro Conti
:
A First Look at Shill Looping in NFT Ecosystem. WIFS 2023: 1-6 - [c21]Alessandro Lotto
, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. WISEC 2023: 133-144 - [i19]Alessandro Brighente, Mauro Conti, Denis Donadel
, Radha Poovendran
, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i18]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - [i17]Emad Efatinasab
, Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti:
GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems. CoRR abs/2306.05923 (2023) - [i16]Fatemeh Najafi, Masoud Kaveh, Mohammad Reza Mosavi, Alessandro Brighente, Mauro Conti:
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks. CoRR abs/2307.09968 (2023) - [i15]Johanna Ansohn McDougall, Alessandro Brighente, Willi Großmann, Ben Ansohn McDougall, Joshua Stock, Hannes Federrath:
LoVe is in the Air - Location Verification of ADS-B Signals using Distributed Public Sensors. CoRR abs/2308.15104 (2023) - [i14]Tommaso Bianchi
, Alessandro Brighente, Mauro Conti:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. CoRR abs/2312.12879 (2023) - 2022
- [j9]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j8]Ankur O. Bang
, Udai Pratap Rao
, Andrea Visconti, Alessandro Brighente, Mauro Conti
:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j7]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022) - [j6]Alessandro Brighente
, Jafar Mohammadi, Paolo Baracca, Silvio Mandelli
, Stefano Tomasin
:
Interference Prediction for Low-Complexity Link Adaptation in Beyond 5G Ultra-Reliable Low-Latency Communications. IEEE Trans. Wirel. Commun. 21(10): 8403-8415 (2022) - [c20]Emilie Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. ARES 2022: 21:1-21:10 - [c19]Alessandro Brighente, Mauro Conti
, Savio Sciancalepore:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. ARES 2022: 134:1-134:11 - [c18]Alessandro Brighente, Mauro Conti
, Harsha Vasudev:
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8 - [c17]Adriaan de Vos
, Alessandro Brighente
, Mauro Conti
:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 67-80 - [c16]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering. M&N 2022: 1-6 - [c15]Alessandro Brighente, Martina Camaioni, Mauro Conti
, Emilio Olivastri
:
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses. PerCom Workshops 2022: 279-284 - [c14]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti
:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. SECON 2022: 370-378 - [c13]Alessandro Brighente, Mauro Conti, Harsha Vasudev:
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles. SoftCOM 2022: 1-6 - [i13]Alessandro Brighente, Mauro Conti, Sathish A. P. Kumar:
Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit. CoRR abs/2203.09843 (2022) - [i12]Alessandro Brighente, Mauro Conti, Hanan Idriss, Stefano Tomasin:
Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy. CoRR abs/2205.02506 (2022) - [i11]Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. CoRR abs/2205.03915 (2022) - [i10]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. CoRR abs/2205.09026 (2022) - [i9]Tommaso Bianchi
, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran
:
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems. CoRR abs/2205.10292 (2022) - [i8]Alessandro Brighente, Mauro Conti, Savio Sciancalepore
:
Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles. CoRR abs/2205.13808 (2022) - [i7]Surudhi Asokraj, Tommaso Bianchi
, Alessandro Brighente, Mauro Conti, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. CoRR abs/2208.02857 (2022) - [i6]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. CoRR abs/2209.03095 (2022) - 2021
- [j5]S. Sullivan, Alessandro Brighente
, Sathish A. P. Kumar
, Mauro Conti
:
5G Security Challenges and Solutions: A Review by OSI Layers. IEEE Access 9: 116294-116314 (2021) - [c12]Rahul Saha
, Gulshan Kumar, Alessandro Brighente, Mauro Conti
:
Towards An Enhanced Reputation System for IOTA's Coordicide. BCCA 2021: 26-33 - [c11]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Knocking on Tangle's Doors: Security Analysis of IOTA Ports. Blockchain 2021: 433-439 - [c10]Alessandro Brighente, Mauro Conti
, Izza Sadaf:
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand. ESORICS (1) 2021: 651-667 - [c9]Federico Moretto, Alessandro Brighente, Stefano Tomasin
:
Adaptive Coordinated Random Access For MTC With Correlated Traffic and Data Freshness. SPAWC 2021: 206-210 - [c8]Federico Moretto, Alessandro Brighente, Stefano Tomasin
:
Greedy Maximum- Throughput Grant-Free Random Access For Correlated IoT Traffic. VTC Fall 2021: 1-5 - [e1]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents] - [i5]Alessandro Brighente, Jafar Mohammadi, Paolo Baracca, Silvio Mandelli, Stefano Tomasin:
Interference Prediction for Low-Complexity Link Adaptation in Beyond 5G Ultra-Reliable Low-Latency Communications. CoRR abs/2105.05152 (2021) - [i4]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling Through Charging Profile. CoRR abs/2106.16016 (2021) - 2020
- [j4]Alessandro Brighente
, Mattia Cerutti
, Monica Nicoli
, Stefano Tomasin
, Umberto Spagnolini
:
Estimation of Wideband Dynamic mmWave and THz Channels for 5G Systems and Beyond. IEEE J. Sel. Areas Commun. 38(9): 2026-2040 (2020) - [j3]Alessandro Brighente
, Jonathan Gambini, Stefano Tomasin
:
Modular Hybrid Beamforming for mmWave Fixed Wireless Access. IEEE Trans. Commun. 68(8): 5145-5158 (2020) - [c7]Alessandro Brighente
, Jafar Mohammadi, Paolo Baracca:
Interference Distribution Prediction for Link Adaptation in Ultra-Reliable Low-Latency Communications. VTC Spring 2020: 1-7 - [i3]Alessandro Brighente, Jafar Mohammadi, Paolo Baracca:
Interference Distribution Prediction for Link Adaptation in Ultra-Reliable Low-Latency Communications. CoRR abs/2007.00306 (2020)
2010 – 2019
- 2019
- [j2]Alessandro Brighente
, Francesco Formaggio, Giorgio Maria Di Nunzio
, Stefano Tomasin
:
Machine Learning for In-Region Location Verification in Wireless Networks. IEEE J. Sel. Areas Commun. 37(11): 2490-2502 (2019) - [j1]Alessandro Brighente
, Stefano Tomasin
:
Power Allocation for Non-Orthogonal Millimeter Wave Systems With Mixed Traffic. IEEE Trans. Wirel. Commun. 18(1): 432-443 (2019) - [c6]Alessandro Brighente
, Francesco Formaggio, G. Ruvoletto, Stefano Tomasin
:
Ranking-Based Attacks to In-Region Location Verification Systems. WIFS 2019: 1-6 - [c5]Alessandro Brighente
, Francesco Formaggio, Marco Centenaro, Giorgio Maria Di Nunzio, Stefano Tomasin
:
Location-Verification and Network Planning via Machine Learning Approaches. WiOpt 2019: 1-7 - 2017
- [c4]Alex Badan, Luca Benvegnù, Matteo Biasetton, Giovanni Bonato, Alessandro Brighente, Alberto Cenzato, Piergiorgio Ceron, Giovanni Cogato, Stefano Marchesin, Alberto Minetto, Leonardo Pellegrina, Alberto Purpura, Riccardo Simionato, Nicolò Soleti, Matteo Tessarotto, Andrea Tonon, Federico Vendramin, Nicola Ferro:
Towards Open-Source Shared Implementations of Keyword-Based Access Systems to Relational Data. EDBT/ICDT Workshops 2017 - [c3]Alex Badan, Luca Benvegnù, Matteo Biasetton, Giovanni Bonato, Alessandro Brighente, Stefano Marchesin, Alberto Minetto, Leonardo Pellegrina, Alberto Purpura, Riccardo Simionato, Matteo Tessarotto, Andrea Tonon, Nicola Ferro:
Keyword-based access to relational data: To reproduce, or to not reproduce? SEBD 2017: 166 - [c2]Alessandro Brighente
, Stefano Tomasin
:
Centralized and Distributed Sparsification for Low-Complexity Message Passing Algorithm in C-RAN Architectures. VTC Fall 2017: 1-6 - [c1]Alessandro Brighente
, Stefano Tomasin
:
Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels with Non-Orthogonal and Orthogonal Multiple Access. VTC Fall 2017: 1-6 - [i2]Alessandro Brighente, Stefano Tomasin:
Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels With Non-Orthogonal and Orthogonal Multiple Access. CoRR abs/1706.08745 (2017) - [i1]Alessandro Brighente, Stefano Tomasin:
Centralized and Distributed Sparsification for Low-Complexity Message Passing Algorithm in C-RAN Architectures. CoRR abs/1706.08762 (2017)
Coauthor Index
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint