Indoor tracking: Theory, methods, and technologies

D Dardari, P Closas, PM Djurić - IEEE transactions on …, 2015 - ieeexplore.ieee.org
In the last decade, the research on and the technology for outdoor tracking have seen an
explosion of advances. It is expected that in the near future, we will witness similar trends for …

Survey on signal processing for GNSS under ionospheric scintillation: Detection, monitoring, and mitigation

J Vilà-Valls, N Linty, P Closas, F Dovis… - NAVIGATION: Journal of …, 2020 - navi.ion.org
Ionospheric scintillation is the physical phenomena affecting radio waves coming from the
space through the ionosphere. Such disturbance is caused by ionospheric electron-density …

A review of advanced localization techniques for crowdsensing wireless sensor networks

A Coluccia, A Fascista - Sensors, 2019 - mdpi.com
The wide availability of sensing modules and computing capabilities in modern mobile
devices (smartphones, smart watches, in-vehicle sensors, etc.) is driving the shift from mote …

An efficient pipeline to obtain 3D model for HBIM and structural analysis purposes from 3D point clouds

M Pepe, D Costantino, A Restuccia Garofalo - Applied Sciences, 2020 - mdpi.com
The aim of this work is to identify an efficient pipeline in order to build HBIM (heritage
building information modelling) and create digital models to be used in structural analysis …

Detecting GNSS spoofing using deep learning

P Borhani-Darian, H Li, P Wu, P Closas - EURASIP Journal on advances …, 2024 - Springer
Abstract Global Navigation Satellite System (GNSS) is pervasively used in position,
navigation, and timing (PNT) applications. As a consequence, important assets have …

Network experimentation for cooperative localization

A Conti, M Guerra, D Dardari… - IEEE Journal on …, 2012 - ieeexplore.ieee.org
This paper introduces the notion of network experimentation and proposes an
experimentation methodology particularly suited for cooperative wireless networks. Based …

Sybil attack detection in internet of flying things-ioft: A machine learning approach

D Chulerttiyawong, A Jamalipour - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Sybil attack refers to the situation when a malicious node falsely claims to have numerous
identities and is known to be one of the security threats to the Internet of Things (IoT). Due to …

Single-Anchor Localization and Orientation Performance Limits Using Massive Arrays: MIMO vs. Beamforming

A Guerra, F Guidi, D Dardari - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In the next generation of cellular networks, it is desirable to use single access points both for
communication and localization. This could be made possible thanks to the combination of …

Two-timescale joint precoding design and RIS optimization for user tracking in near-field MIMO systems

S Palmucci, A Guerra, A Abrardo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we propose a novel framework that aims to jointly design the reflection
coefficients of multiple reconfigurable intelligent surfaces and the precoding strategy of a …

Long-baseline differential doppler positioning using space-based SOP based on BPVGMM

N Wu, H Qin, C Zhao - IEEE Transactions on Instrumentation …, 2023 - ieeexplore.ieee.org
Positioning based on low Earth orbit (LEO) satellites' signals of opportunity (SOPs) is an
effective complement and backup positioning solution of global navigation satellite system …