{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T19:39:41Z","timestamp":1767382781217,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The Italian Ministry for Universities and Research (MUR)","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3643650.3658612","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T01:28:07Z","timestamp":1718328487000},"page":"71-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1272-7370","authenticated-orcid":false,"given":"Khaoula","family":"Hidawi","sequence":"first","affiliation":[{"name":"DISTA, Universit\u00e0 degli studi dell'Insubria, Varese, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3421-0493","authenticated-orcid":false,"given":"Omar","family":"Tornaghi","sequence":"additional","affiliation":[{"name":"DISTA, Universit\u00e0 degli studi dell'Insubria, Varese, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7502-4731","authenticated-orcid":false,"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[{"name":"DISTA, Universit\u00e0 degli studi dell'Insubria, Varese, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7312-6769","authenticated-orcid":false,"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[{"name":"DISTA, Universit\u00e0 degli studi dell'Insubria, Varese, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"14","article-title":"The Performance of Fast Frequency Hopping System in Additive White Gaussian Noise (AWGN)","volume":"46","author":"Ahmed A.","year":"2012","unstructured":"A. Ahmed, Q. Ahmed, A. Rehman, and S. Karim. 2012. The Performance of Fast Frequency Hopping System in Additive White Gaussian Noise (AWGN). International Journal of Computer Applications, Vol. 46, 20, 14--22.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3124201.3124241"},{"key":"e_1_3_2_1_3_1","volume-title":"IET Communications","volume":"14","author":"Aref M.","unstructured":"M. Aref, S. Jayaweera, and E. Yepez. 2020. A Survey on Cognitive Anti-jamming Communications. IET Communications , Vol. 14."},{"volume-title":"Proceedings of the 52nd Annual Design Automation Conference. ACM\/EDAC\/IEEE","author":"Beaulieu R.","key":"e_1_3_2_1_4_1","unstructured":"R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers. 2015. The SIMON and SPECK Lightweight Block Ciphers. In Proceedings of the 52nd Annual Design Automation Conference. ACM\/EDAC\/IEEE, San Francisco, CA, USA, 1--6."},{"volume-title":"Proceedings of the 2019 International Young Engineers Forum (YEF-ECE) (Costa de Caparica, Portugal). IEEE, 94--98","author":"Brito A.","key":"e_1_3_2_1_5_1","unstructured":"A. Brito, P. Sebasti\u00e3o, and N. Souto. 2019. Jamming for Unauthorized UAV Operations-Communications Link. In Proceedings of the 2019 International Young Engineers Forum (YEF-ECE) (Costa de Caparica, Portugal). IEEE, 94--98."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102324"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121190"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"P. Dhomane and R. Mathew. 2020. Counter-Measures to Spoofing and Jamming of Drone Signals. SSRN Electronic Journal.","DOI":"10.2139\/ssrn.3774955"},{"volume-title":"Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS). 1--9.","author":"Di Pietro R.","key":"e_1_3_2_1_9_1","unstructured":"R. Di Pietro, G. Oligeri, and P. Tedeschi. 2019. JAM-ME: Exploiting Jamming to Accomplish Drone Mission. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS). 1--9."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055718"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing","volume":"5","author":"Kleider J. E.","unstructured":"J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette. 2004. Radio Frequency Watermarking for OFDM Wireless Networks. In Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5. V--397."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3199038"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"F. Lakew Yihunie A. K. Singh and S. Bhatia. 2020. Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles. In Smart Systems and IoT: Innovations in Computing ( Vol. 160) Springer 701--710.","DOI":"10.1007\/978-981-13-8406-6_66"},{"volume-title":"Proceedings of the 2021 33rd Chinese Control and Decision Conference (CCDC). 1456--1461","author":"Lei Z.","key":"e_1_3_2_1_14_1","unstructured":"Z. Lei, P. Ding, W. Zheng, X. Fei, and H. Fan. 2021. UAV Countermeasure Technology Based on Partial-band Noise Jamming. In Proceedings of the 2021 33rd Chinese Control and Decision Conference (CCDC). 1456--1461."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3150020"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.282243"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the MILCOM 2005 - 2005 IEEE Military Communications Conference. 1637--1643","volume":"3","author":"Marcinak M. P.","unstructured":"M. P. Marcinak and B. G. Mobasseri. 2005. Digital Video Watermarking for Metadata Embedding in UAV Video. In Proceedings of the MILCOM 2005 - 2005 IEEE Military Communications Conference. 1637--1643 Vol. 3."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J. Mead C. Bobda and T. JL Whitaker. [n. d.]. Defeating drone jamming with hardware sandboxing. In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) (2016--12). 1--6.","DOI":"10.1109\/AsianHOST.2016.7835557"},{"volume-title":"Proc. of the 2007 17th International Conference Radioelektronika. 1--4.","author":"Mikulka J.","key":"e_1_3_2_1_19_1","unstructured":"J. Mikulka and S. Hanus. 2007. CCK and Barker Coding Implementation in IEEE 802.11b Standard. In Proc. of the 2007 17th International Conference Radioelektronika. 1--4."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11370-022-00452-4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"S. Sciancalepore F. Kusters N. K. Abdelhadi and G. Oligeri. 2023. Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning. IEEE Internet of Things Journal 1--1.","DOI":"10.1109\/JIOT.2023.3343611"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1987.1146600"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036027"}],"event":{"name":"CODASPY '24: Fourteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Porto Portugal","acronym":"CODASPY '24"},"container-title":["Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643650.3658612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643650.3658612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:38:39Z","timestamp":1755974319000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643650.3658612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":23,"alternative-id":["10.1145\/3643650.3658612","10.1145\/3643650"],"URL":"https:\/\/doi.org\/10.1145\/3643650.3658612","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2024-06-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}