System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 270) Show all publications
Li, S., Ngai, E.-H. C. & Voigt, T. (2024). An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning. IEEE Transactions on Big Data, 10(6), Article ID 975.
Open this publication in new window or tab >>An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning
2024 (English)In: IEEE Transactions on Big Data, E-ISSN 2332-7790, Vol. 10, no 6, article id 975Article in journal (Refereed) Published
Abstract [en]

Byzantine-robust federated learning aims at mitigating Byzantine failures during the federated training process, where malicious participants (known as Byzantine clients) may upload arbitrary local updates to the central server in order to degrade the performance of the global model. In recent years, several robust aggregation schemes have been proposed to defend against malicious updates from Byzantine clients and improve the robustness of federated learning. These solutions were claimed to be Byzantine-robust, under certain assumptions. Other than that, new attack strategies are emerging, striving to circumvent the defense schemes. However, there is a lack of systematical comparison and empirical study thereof. In this paper, we conduct an experimental study of Byzantine-robust aggregation schemes under different attacks using two popular algorithms in federated learning, FedSGD and FedAvg. We first survey existing Byzantine attack strategies, as well as Byzantine-robust aggregation schemes that aim to defend against Byzantine attacks. We also propose a new scheme, ClippedClustering, to enhance the robustness of a clustering-based scheme by automatically clipping the updates. Then we provide an experimental evaluation of eight aggregation schemes in the scenario of five different Byzantine attacks. Our experimental results show that these aggregation schemes sustain relatively high accuracy in some cases, but they are not effective in all cases. In particular, our proposed ClippedClustering successfully defends against most attacks under independent and identically distributed (IID) local datasets. However, when the local datasets are Non-IID, the performance of all the aggregation schemes significantly decreases. With Non-IID data, some of these aggregation schemes fail even in the complete absence of Byzantine clients. Based on our experimental study, we conclude that the robustness of all the aggregation schemes is limited, highlighting the need for new defense strategies, in particular for Non-IID datasets.

National Category
Engineering and Technology
Identifiers
urn:nbn:se:ri:diva-66173 (URN)10.1109/tbdata.2023.3237397 (DOI)
Available from: 2023-09-11 Created: 2023-09-11 Last updated: 2025-02-18Bibliographically approved
Li, S., Ngai, E.-H. C. H., Ye, F., Ju, L., Zhang, T. & Voigt, T. (2024). Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning. In: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024Open AccessPages 158 - 169: . Paper presented at 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024 (pp. 158-169). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning
Show others...
2024 (English)In: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024Open AccessPages 158 - 169, Institute of Electrical and Electronics Engineers Inc. , 2024, p. 158-169Conference paper, Published paper (Refereed)
Abstract [en]

Federated learning (FL) facilitates distributed training across different IoT and edge devices, safeguarding the privacy of their data. The inherent distributed structure of FL introduces vulnerabilities, especially from adversarial devices aiming to skew local updates to their advantage. Despite the plethora of research focusing on Byzantine-resilient FL, the academic community has yet to establish a comprehensive benchmark suite, pivotal for impartial assessment and comparison of different techniques. This paper presents Blades, a scalable, extensible, and easily configurable benchmark suite that supports researchers and developers in efficiently implementing and validating novel strategies against baseline algorithms in Byzantine-resilient FL. Blades contains built-in implementations of representative attack and defense strategies and offers a user-friendly interface that seamlessly integrates new ideas. Using Blades, we re-evaluate representative attacks and defenses on wide-ranging experimental configurations (approximately 1,500 trials in total). Through our extensive experiments, we gained new insights into FL robustness and highlighted previously overlooked limitations due to the absence of thorough evaluations and comparisons of baselines under various attack settings. We maintain the source code and documents at https://github.com/lishenghui/blades. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Academic community; Benchmark suites; Byzantine attacks; Distributed learning; Distributed structures; Federated learning; IoT; Neural-networks; Novel strategies; Robustness; Internet of things
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-74878 (URN)10.1109/IoTDI61053.2024.00018 (DOI)2-s2.0-85196568437 (Scopus ID)9798350370256 (ISBN)
Conference
9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024
Note

This research was supported by the RGC General ResearchFunds No. 17203320 and No. 17209822 from Hong Kong, theSwedish Research Council project grant No. 2017-04543, andHKU-TCL joint research centre for artificial intelligence seedfunding.

Available from: 2024-08-19 Created: 2024-08-19 Last updated: 2024-08-19Bibliographically approved
Li, S., Ngai, E.-H. C. H., Ye, F., Ju, L., Zhang, T. & Voigt, T. (2024). Demo Abstract: Blades: A Unified Benchmark Suite for Byzantine-Resilient in Federated Learning. In: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024: . Paper presented at 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024. Hong Kong. 13 May 2024 through 16 May 2024 (pp. 229-230). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Demo Abstract: Blades: A Unified Benchmark Suite for Byzantine-Resilient in Federated Learning
Show others...
2024 (English)In: Proceedings - 9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024, Institute of Electrical and Electronics Engineers Inc. , 2024, p. 229-230Conference paper, Published paper (Refereed)
Abstract [en]

Federated learning (FL) facilitates distributed training across different IoT and edge devices, safeguarding the privacy of their data. The inherently distributed nature of FL introduces vulnerabilities, especially from adversarial devices aiming to skew local updates to their desire. Despite the plethora of research focusing on Byzantine-resilient FL, the academic community has yet to establish a comprehensive benchmark suite, pivotal for the assessment and comparison of different techniques. This demonstration presents Blades, a scalable, extensible, and easily configurable benchmark suite that supports researchers and developers in efficiently implementing and validating strategies against baseline algorithms in Byzantine-resilient FL. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Academic community; Benchmark suites; Byzantine attacks; Distributed learning; Federated learning; IoT; Neural-networks; Robustness; Internet of things
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-74870 (URN)10.1109/IoTDI61053.2024.00030 (DOI)2-s2.0-85197801556 (Scopus ID)
Conference
9th ACM/IEEE Conference on Internet-of-Things Design and Implementation, IoTDI 2024. Hong Kong. 13 May 2024 through 16 May 2024
Available from: 2024-08-27 Created: 2024-08-27 Last updated: 2024-08-27Bibliographically approved
Bull, V., Finne, N., Agiollo, A., Kaliyar, P., Pajola, L., Voigt, T. & Conti, M. (2024). DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network. Paper presented at International Workshops which were held in conjunction with 28th European Symposium on Research in Computer Security, ESORICS 2023. The Hague, Neherlands. 25 September 2023 through 29 September 2023. Lecture Notes in Computer Science, 14399 LNCS, 198-213
Open this publication in new window or tab >>DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
Show others...
2024 (English)In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 14399 LNCS, p. 198-213Article in journal (Refereed) Published
Abstract [en]

The Internet of Things is expanding and since IoT devices and IoT networks are used in many crucial areas in modern societies, ranging from security and military applications to healthcare monitoring and production efficiency, the need to secure these devices is of great importance. Intrusion detection systems (IDS) play a significant role in securing IoT networks as their goal is to detect intruders that have gained access to one or several IoT nodes. While most IDS have been designed to detect a specific or at most a few attacks, the DETONAR framework detects multiple attacks. However, it is run on a designated sniffer network which adds additional cost in terms of hardware and maintenance. In this paper, we propose DETONAR-Light, adapting DETONAR to run using data collected at a border router rather than on sniffer logs. Our experiments show that this is possible almost without any decrease of detection and attack classification rate for many attacks

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Keywords
Internet of things; Intrusion detection; Network security; Production efficiency; Additional costs; Attack classifications; Border routers; Classification rates; Healthcare monitoring; Intrusion Detection Systems; Network intrusion detection; Production efficiency; Military applications
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-72877 (URN)10.1007/978-3-031-54129-2_12 (DOI)2-s2.0-85188663361 (Scopus ID)
Conference
International Workshops which were held in conjunction with 28th European Symposium on Research in Computer Security, ESORICS 2023. The Hague, Neherlands. 25 September 2023 through 29 September 2023
Available from: 2024-04-26 Created: 2024-04-26 Last updated: 2024-07-28Bibliographically approved
Zhu, S., Voigt, T., Rahimian, F. & Ko, J. (2024). On-device Training: A First Overview on Existing Systems. ACM transactions on sensor networks, 20(6), Article ID 118.
Open this publication in new window or tab >>On-device Training: A First Overview on Existing Systems
2024 (English)In: ACM transactions on sensor networks, ISSN 1550-4867, E-ISSN 1550-4859, Vol. 20, no 6, article id 118Article in journal (Refereed) Published
Abstract [en]

The recent breakthroughs in machine learning (ML) and deep learning (DL) have catalyzed the design and development of various intelligent systems over wide application domains. While most existing machine learning models require large memory and computing power, efforts have been made to deploy some models on resource-constrained devices as well. A majority of the early application systems focused on exploiting the inference capabilities of ML and DL models, where data captured from different mobile and embedded sensing components are processed through these models for application goals such as classification and segmentation. More recently, the concept of exploiting the mobile and embedded computing resources for ML/DL model training has gained attention, as such capabilities allow the training of models via local data without the need to share data over wireless links, thus enabling privacy-preserving computation by design, model personalization and environment adaptation, and deployment of accurate models in remote and hardly accessible locations without stable internet connectivity. This work summarizes and analyzes state-of-the-art systems research that allows such on-device model training capabilities and provides a survey of on-device training from a systems perspective.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2024
Keywords
Machine learning; IoT devices; on-device training
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-77079 (URN)10.1145/3696003 (DOI)
Available from: 2025-02-13 Created: 2025-02-13 Last updated: 2025-02-13Bibliographically approved
Krentz, K.-F. & Voigt, T. (2024). Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR. Computer Communications, 217, 57-69
Open this publication in new window or tab >>Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR
2024 (English)In: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 217, p. 57-69Article in journal (Refereed) Published
Abstract [en]

The IEEE 802.15.4 radio standard features the possibility for IEEE 802.15.4 nodes to run on batteries for several years. This is made possible by duty-cycling medium access control (MAC) protocols, which allow IEEE 802.15.4 nodes to leave their radios in energy-saving sleep modes most of the time. Yet, duty-cycling MAC protocols usually incur long routing delays since it may take a while until a particular forwarder becomes available for forwarding a packet. Opportunistic routing alleviates this problem by opportunistically using a currently available forwarder, rather than waiting for a particular forwarder. Among all opportunistic routing schemes, so-called dynamic switch-based forwarding (DSF) schemes are most promising from a security and practical perspective, but some security and reliability issues with them persist. In this paper, we propose secure multipath opportunistic routing (SMOR), a DSF scheme that improves on current DSF schemes in three regards. First, SMOR builds on a denial-of-sleep-resilient MAC layer. Current DSF schemes, by comparison, rest on MAC protocols that put the limited energy reserves of battery-powered IEEE 802.15.4 nodes at risk. Second, SMOR operates in a distributed fashion and efficiently supports point-to-point traffic. All current DSF schemes, by contrast, suffer from a single point of failure and focus on convergecast traffic. Third, SMOR duplicates packets on purpose and routes them along disjoint paths. This makes SMOR tolerant of compromises of single IEEE 802.15.4 nodes, whereas current DSF schemes lack intrusion tolerance. We integrated SMOR into the network stack of the Contiki-NG operating system and benchmarked SMOR against the Routing Protocol for Low-Power and Lossy Networks (RPL) with the Cooja network simulator. Indeed, SMOR turns out to improve on RPL’s delays by between 33.51% and 39.84%, depending on the exact configurations and network dynamics. Furthermore, SMOR achieves between 0.16% and 2.03% higher mean packet delivery ratios (PDRs), thereby attaining mean PDRs of 99.999% in all simulated scenarios. Beyond that, SMOR has only a fraction of RPL’s memory requirements. SMOR’s intrusion tolerance, on the other hand, increases the mean energy consumption per IEEE 802.15.4 node by between 1.55% and 2.74% compared to RPL in our simulations. SMOR specifically targets IEEE 802.15.4 networks with a network diameter of 2, such as body area networks. © 2024 The Authors

Place, publisher, year, edition, pages
Elsevier B.V., 2024
Keywords
Energy conservation; Fault tolerance; IEEE Standards; Low power electronics; Medium access control; Network security; Power management (telecommunication); Routing protocols; Current dynamics; Duty-cycling; IEEE 802.15.4 networks; Ieee 802.15.4/zigbee; Intrusion tolerance; Medium access control protocols; Multipath; Opportunistic routing; Packet delivery ratio; Secure routing; Internet of things
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-72822 (URN)10.1016/j.comcom.2024.01.024 (DOI)2-s2.0-85185186272 (Scopus ID)
Note

This work was supported by the Swedish Foundation for Strategic Research [grant number 2017-045989 ].

Available from: 2024-05-14 Created: 2024-05-14 Last updated: 2024-05-14Bibliographically approved
Engstrand, J., Krentz, K.-F., Asan, N. B., Padmal, M., Yan, W., Joseph, L., . . . Voigt, T. (2024). Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack. In: Proceedings - Conference on Local Computer Networks, LCN: . Paper presented at 49th IEEE Conference on Local Computer Networks, LCN 2024. Caen. 8 October 2024 through 10 October 2024. IEEE Computer Society
Open this publication in new window or tab >>Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack
Show others...
2024 (English)In: Proceedings - Conference on Local Computer Networks, LCN, IEEE Computer Society , 2024Conference paper, Published paper (Refereed)
Abstract [en]

Innovative medical applications based on networked implants foster the development of in-body communication technologies. Among the in-body communication technologies that are being considered, fat intra-body communication (Fat-IBC) is a very recent approach. Its main advantage lies in its higher data rate compared to earlier approaches based on capacitive and galvanic coupling. However, Fat-IBC faces privacy-, security-, as well as safety-related attacks. In this paper, we discuss security and privacy concerns about Fat-IBC, as well as corresponding countermeasures. Furthermore, we present our secure protocol stack for Fat-IBC and suggest directions for future research. 

Place, publisher, year, edition, pages
IEEE Computer Society, 2024
Keywords
Capacitive couplings; Communication mechanisms; Communications protocols; Communicationtechnology; High data rate; High data-rates; In-body communications; Intra-body communications; Protocol stack; Security and privacy; Differential privacy
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-76456 (URN)10.1109/LCN60385.2024.10639677 (DOI)2-s2.0-85214941362 (Scopus ID)
Conference
49th IEEE Conference on Local Computer Networks, LCN 2024. Caen. 8 October 2024 through 10 October 2024
Note

This work has been financially supported the SwedishFoundation for Strategic Research.

Available from: 2025-01-29 Created: 2025-01-29 Last updated: 2025-01-29Bibliographically approved
Song, W., Kaxiras, S., Voigt, T., Yao, Y. & Mottola, L. (2024). TaDA: Task Decoupling Architecture for the Battery-less Internet of Things. Paper presented at 22nd ACM Conference on Embedded Networked Sensor Systems, SenSys 2024. Hangzhou. 4 November 2024 through 7 November 2024. SenSys 2024 - Proceedings of the 2024 ACM Conference on Embedded Networked Sensor Systems, 409-421
Open this publication in new window or tab >>TaDA: Task Decoupling Architecture for the Battery-less Internet of Things
Show others...
2024 (English)In: SenSys 2024 - Proceedings of the 2024 ACM Conference on Embedded Networked Sensor Systems, p. 409-421Article in journal (Refereed) Published
Abstract [en]

We present TaDA, a system architecture enabling efficient execution of Internet of Things (IoT) applications across multiple computing units, powered by ambient energy harvesting. Low-power microcontroller units (MCUs) are increasingly specialized; for example, custom designs feature hardware acceleration of neural network inference, next to designs providing energy-efficient input/output. As application requirements are growingly diverse, we argue that no single MCU can efficiently fulfill them. TaDA allows programmers to assign the execution of different slices of the application logic to the most efficient MCU for the job. We achieve this by decoupling task executions in time and space, using a special-purpose hardware interconnect we design, while providing persistent storage to cross periods of energy unavailability. We compare our prototype performance against the single most efficient computing unit for a given workload. We show that our prototype saves up to 96.7% energy per application round. Given the same energy budget, this yields up to a 68.7x throughput improvement. 

Place, publisher, year, edition, pages
Association for Computing Machinery, Inc, 2024
Keywords
Microcontrollers; Ambients; Battery-less; Computing units; Decouplings; Energy; Intermittent computing; Internet of thing; Microcontroller unit; Systems architecture; Task decoupling; Budget control
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-76474 (URN)10.1145/3666025.3699347 (DOI)2-s2.0-85211759485 (Scopus ID)
Conference
22nd ACM Conference on Embedded Networked Sensor Systems, SenSys 2024. Hangzhou. 4 November 2024 through 7 November 2024
Note

This work is supported by the Swedish Foundation for Strategic Research (SSF) and by the National Recoveryand Resilience Plan (NRRP), Mission 4 Component 2 Investment 1.3 - Call for tender No. 1561 of 11.10.2022 of the Italian Ministero dell’Università e della Ricerca (MUR); funded by the EuropeanUnion - NextGenerationEU.

Available from: 2025-01-28 Created: 2025-01-28 Last updated: 2025-01-28Bibliographically approved
Piumwardane, D., Padmal, M., Ranganathan, V., Hewage, K., Rohner, C. & Voigt, T. (2024). Unlocking the Potential of Low-Cost High-Resolution Sensing with Analog Backscatter. In: : . Paper presented at 2024 IEEE International Conference on RFID, RFID 2024. Cambridge. 4 June 2024 through 6 June 2024 (pp. 95-100). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Unlocking the Potential of Low-Cost High-Resolution Sensing with Analog Backscatter
Show others...
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Analog backscatter enables sensing and communication while consuming significantly lower power than digital backscatter. An analog backscatter tag maps sensor readings directly to backscatter transmissions avoiding power hungry blocks such as ADCs. The sensor value variations are backseat-tered atop a carrier as changes in frequency and amplitude. Frequency variations are commonly used in backscatter, to avoid the strong self-interference from the carrier. The range of the sensor output linearly maps to the range of base-band frequency variation. Hence a sensor with a wider output range requires a larger base-band frequency range to encode sensor data. This increases the tag oscillator’s switching frequency and hence the tag’s power consumption. We propose to use higher order harmonic frequencies which allows us to reduce the tag switching frequency and read sensor data even when the carrier masks the fundamental frequency. Our system design lowers the cost and power consumption of the analog backscatter system making it suitable for mobile-based sensing applications. We present experimental results demonstrating the viability of our approach and implement a complete system that includes a low-cost radio receiver. Using a carrier with 0 dBm power, we detect the 15th harmonic up to three meters resulting in 15 times more frequency resolution than the fundamental while reducing the tag oscillator’s power consumption by more than 43%. The 7th harmonic is visible up to 18 meters. Increasing the carrier power enables the detection of additional harmonic frequencies. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Backscattering; Costs; Harmonic analysis; Analog backscatter; Band frequencies; Base bands; Frequency resolutions; Frequency variation; Harmonic; Low-costs; Power; Sensing; Sensors data; Electric power utilization
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-74621 (URN)10.1109/RFID62091.2024.10582681 (DOI)2-s2.0-85199886254 (Scopus ID)
Conference
2024 IEEE International Conference on RFID, RFID 2024. Cambridge. 4 June 2024 through 6 June 2024
Note

This work has been financially supported by the Swedish Research Council (Grants 2018-05480 and 2021-04968) and the Swedish Foundation for Strategic Research.

Available from: 2024-08-07 Created: 2024-08-07 Last updated: 2024-08-07Bibliographically approved
Sathi, V. N., Rohner, C. & Voigt, T. (2023). A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices. In: IEEE International Conference on Communications (ICC): . Paper presented at IEEE International Conference on Communications (ICC) (pp. 615-621). Institute of Electrical and Electronics Engineers Inc., 2023-May, Article ID 193943.
Open this publication in new window or tab >>A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
2023 (English)In: IEEE International Conference on Communications (ICC), Institute of Electrical and Electronics Engineers Inc. , 2023, Vol. 2023-May, p. 615-621, article id 193943Conference paper, Published paper (Refereed)
Abstract [en]

Microwave communication through the fat tissue in the human body enables a new channel for wearable devices to communicate with each other. The wearable devices can communicate to the external world through a powerful device in their network called central control unit (CU); for example, a smartphone. Some wearable devices may be out of the range of the CU temporarily due to body movements or permanently due to low signal strength, in a fat channel communication network. Such devices can connect to the CU with the help of their neighbor device in the same network. In this paper, we propose a protocol to ensure secure indirect authentication and key establishment between the out-of-range device and the CU in a fat channel communication network, via an untrusted intermediate device in the network. The proposed protocol is lightweight and resistant to denial-of-sleep attacks on the intermediate device. We analyze the security and the computation overhead of the proposed protocol. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Cryptography; Network security; Wearable technology; Channel communication; Communications networks; Control unit; Denial-of-sleep attack; Fat channel communication; Key establishment protocol; Key establishments; Microwave communications; PUF-based authentication; Wearable devices; Authentication
National Category
Communication Systems Other Medical Engineering
Identifiers
urn:nbn:se:ri:diva-68777 (URN)10.1109/ICC45041.2023.10278883 (DOI)2-s2.0-85178295514 (Scopus ID)
Conference
IEEE International Conference on Communications (ICC)
Funder
Swedish Foundation for Strategic Research
Note

This project is financed by the Swedish Foundation for Strategic Research. 

Available from: 2024-01-15 Created: 2024-01-15 Last updated: 2024-02-06Bibliographically approved
Projects
Secure and Reliable In-body Backscatter [2021-04968_VR]; Uppsala University
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-2586-8573

Search in DiVA

Show all publications