default search action
John D. Roth
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c23]Chad A. Bollmann, James Scrofani, John D. Roth, Britta Hale:
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security. HICSS 2022: 1-2 - 2021
- [j8]Matthew Lanoue, Chad A. Bollmann, James Bret Michael, John D. Roth, Duminda Wijesekera:
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities. Computer 54(4): 76-84 (2021) - [c22]Alexander Schacht, Kayla Foster, John D. Roth:
Location Privacy in the Era of 5G. HICSS 2021: 1-9 - [c21]James Scrofani, Chad A. Bollmann, John D. Roth, Britta Hale:
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security. HICSS 2021: 1-2 - [c20]John D. Roth, David Alan Garren, R. Clark Robertson:
Integer Carrier Frequency Offset Estimation in OFDM with Zadoff-Chu Sequences. ICASSP 2021: 4850-4854 - 2020
- [j7]Sean M. Kennedy, William Williamson, John D. Roth, James W. Scrofani:
Cluster-Based Spectral-Spatial Segmentation of Hyperspectral Imagery. IEEE Access 8: 140361-140391 (2020) - [j6]John D. Roth, Murali Tummala, John C. McEachen:
A New Probability Density Function for Minimizing Geometric Dilution of Precision in Location-Aware Wireless Communications. IEEE Access 8: 160461-160479 (2020) - [c19]John D. Roth, James Scrofani, Chad A. Bollmann:
Introduction to the Minitrack on The Science and Engineering of Cyber Systems. HICSS 2020: 1-2 - [c18]Alexander Schacht, James Long, John D. Roth:
Timing Management in 5G and Its Implications for Location Privacy. HICSS 2020: 1-8 - [c17]Benjamin E. Gardner, John D. Roth:
An Efficient Methodology to De-Anonymize the 5G-New Radio Physical Downlink Control Channel. ICASSP 2020: 2917-2921
2010 – 2019
- 2019
- [j5]John D. Roth, Corey E. Lutton, James Bret Michael:
Security Through Simplicity: A Case Study in Logical Segmentation Inference. Computer 52(7): 76-79 (2019) - [j4]John D. Roth, Murali Tummala, John C. McEachen:
Fundamental Implications for Location Accuracy in Ultra-Dense 5G Cellular Networks. IEEE Trans. Veh. Technol. 68(2): 1784-1795 (2019) - [c16]John D. Roth:
On the Lower Bound of Modularity for Graph Fission. ACSSC 2019: 353-357 - [c15]James Long, John D. Roth:
A Novel Denial of Service Vulnerability in Long Term Evolution Cellular Networks. HICSS 2019: 1-7 - [c14]James Scrofani, John D. Roth, Chad A. Bollmann:
Introduction to the Minitrack on Cyber Systems and Analytics. HICSS 2019: 1-2 - 2018
- [j3]John D. Roth, Murali Tummala, John C. McEachen:
Efficient System Geolocation Architecture in Next-Generation Cellular Networks. IEEE Syst. J. 12(4): 3414-3425 (2018) - [c13]Carson McAbee, Max D. Wakefield, John D. Roth, James W. Scrofani:
A Topological Approach to Understanding Location-Based Data. ACSSC 2018: 1772-1776 - [c12]Sean M. Kennedy, John D. Roth, James W. Scrofani:
A Novel Method for Topological Embedding of Time-Series Data. EUSIPCO 2018: 2350-2354 - [c11]John D. Roth, Murali Tummala, John McEachen, James Scrofani:
Quantifying Location Privacy in Urban Next-Generation Cellular Networks. HICSS 2018: 1-8 - [c10]Scott Lord, John D. Roth, John McEachen, Murali Tummala:
A Novel Method for Physical-Layer Authentication via Channel State Information. ICSPCS 2018: 1-9 - 2017
- [j2]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. IEEE Trans. Inf. Forensics Secur. 12(6): 1358-1368 (2017) - [c9]John D. Roth, Jeremy Martin, Travis Mayberry:
A graph-theoretic approach to virtual access point correlation. CNS 2017: 1-9 - [c8]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
Location Privacy in LTE: A Case Study on Exploiting the Cellular Signaling Plane's Timing Advance. HICSS 2017: 1-8 - 2016
- [j1]John D. Roth, Murali Tummala, John C. McEachen:
A computationally efficient approach for hidden-Markov model-augmented fingerprint-based positioning. Int. J. Syst. Sci. 47(12): 2847-2858 (2016) - [c7]Allison Hunt, Alex DeGabriele, John D. Roth, Justin A. Blanco, T. Owens Walker, Jeremy Martin:
Effects of channel environment on timing advance for mobile device positioning in long-term evolution networks. ACSSC 2016: 643-647 - [c6]John D. Roth, Murali Tummala, James W. Scrofani:
Cellular Synchronization Assisted Refinement (CeSAR): A Method for Accurate Geolocation in LTE-A Networks. HICSS 2016: 5842-5850 - [c5]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani, Robert A. DeGabriele:
Maximum likelihood geolocation in LTE cellular networks using the timing advance parameter. ICSPCS 2016: 1-10 - 2015
- [c4]John D. Roth, Murali Tummala, John C. McEachen, James Scrofani, Allison Hunt:
Location Estimation via Sparse Signal Reconstruction in Subsampled Overcomplete Dictionaries for Wireless 4G Networks. HICSS 2015: 5432-5438 - [c3]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
On mobile positioning via Cellular Synchronization Assisted Refinement (CeSAR) in LTE and GSM networks. ICSPCS 2015: 1-8 - 2014
- [c2]John D. Roth, Murali Tummala, John C. McEachen, James Scrofani:
A Scalable Hidden-Markov Model Algorithm for Location-Based Services in WiMAX Networks. HICSS 2014: 5101-5108 - 2013
- [c1]John D. Roth, Murali Tummala, John C. McEachen, James Scrofani:
A configurable fingerprint-based hidden-Markov model for tracking in variable channel conditions. ICSPCS 2013: 1-9
Coauthor Index
aka: John McEachen
aka: James Scrofani
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint