ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2106.05039
  4. Cited By
AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks
v1v2v3 (latest)

AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks

ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2021
9 June 2021
Simon Erni
Martin Kotuliak
Patrick Leu
Marc Roeschlin
Srdjan Capkun
    AAML
ArXiv (abs)PDFHTML

Papers citing "AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks"

13 / 13 papers shown
Security Analysis of LTE Connectivity in Connected Cars: A Case Study of Tesla
Security Analysis of LTE Connectivity in Connected Cars: A Case Study of Tesla
Evangelos Bitsikas
Jason Veara
Aanjhan Ranganathan
83
0
0
24 Oct 2025
From Description to Detection: LLM based Extendable O-RAN Compliant Blind DoS Detection in 5G and Beyond
From Description to Detection: LLM based Extendable O-RAN Compliant Blind DoS Detection in 5G and Beyond
Thusitha Dayaratne
Ngoc Duy Pham
Viet Vo
Shangqi Lai
Sharif Abuadbba
Hajime Suzuki
Xingliang Yuan
Carsten Rudolph
127
1
0
08 Oct 2025
Finding Phones Fast: Low-Latency and Scalable Monitoring of Cellular Communications in Sensitive Areas
Finding Phones Fast: Low-Latency and Scalable Monitoring of Cellular Communications in Sensitive Areas
Martin Kotuliak
Simon Erni
Jakub Polák
Marc Roeschlin
Richard Baker
Ivan Martinovic
Srdjan Čapkun
52
2
0
29 Sep 2025
MobiLLM: An Agentic AI Framework for Closed-Loop Threat Mitigation in 6G Open RANs
MobiLLM: An Agentic AI Framework for Closed-Loop Threat Mitigation in 6G Open RANs
Prakhar Sharma
Haohuang Wen
V. Yegneswaran
Ashish Gehani
Phillip A. Porras
Zhiqiang Lin
242
1
0
25 Sep 2025
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks
Thusitha Dayaratne
Ngoc Duy Pham
Viet Vo
Shangqi Lai
Sharif Abuadbba
Hajime Suzuki
Xingliang Yuan
Carsten Rudolph
AAML
143
1
0
11 Aug 2025
The Security Overview and Analysis of 3GPP 5G MAC CE
The Security Overview and Analysis of 3GPP 5G MAC CE
Jin Cao
Yuanyuan Yang
Ruhui Ma
Sheng Li
Hui Li
229
1
0
11 Jun 2025
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and
  Security Attacks
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks
Stavros Eleftherakis
Domenico Giustiniano
Nicolas Kourtellis
231
3
0
10 Sep 2024
Enabling Physical Localization of Uncooperative Cellular Devices
Enabling Physical Localization of Uncooperative Cellular DevicesACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2024
Taekkyung Oh
Sangwook Bae
Junho Ahn
Yonghwa Lee
Dinh-Tuan Hoang
Min Suk Kang
Nils Ole Tippenhauer
Yongdae Kim
151
14
0
22 Mar 2024
Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous
Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous
Norbert Ludant
Marinos Vomvas
G. Noubir
102
13
0
11 Mar 2024
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based
  Wireless Communication Systems
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication SystemsNetwork and Distributed System Security Symposium (NDSS), 2023
Jung-Woo Chang
Ke Sun
Nasimeh Heydaribeni
Seira Hidano
Xinyu Zhang
F. Koushanfar
AAML
326
2
0
01 Nov 2023
P3LI5: Practical and Confidential Lawful Interception on the 5G Core
P3LI5: Practical and Confidential Lawful Interception on the 5G CoreIEEE Conference on Communications and Network Security (CNS), 2023
Francesco Intoci
Julian Sturm
Daniel Fraunholz
Apostolos Pyrgelis
C. Barschel
AILaw
105
1
0
27 Aug 2023
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks
Watching your call: Breaking VoLTE Privacy in LTE/5G NetworksProceedings on Privacy Enhancing Technologies (PoPETs), 2023
Zishuai Cheng
Mihai Ordean
Flavio D. Garcia
Baojiang Cui
Dominik Rys
114
10
0
06 Jan 2023
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security
  Ecosystem
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem
A. Michalas
Constantinos Patsakis
D. Vergados
D. Vergados
240
1
0
18 Dec 2022
1
Page 1 of 1