default search action
Willian Tessaro Lunardi
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Martin Andreoni, Willian Tessaro Lunardi, George Lawton, Shreekant S. Thakkar:
Enhancing Autonomous System Security and Resilience With Generative AI: A Comprehensive Survey. IEEE Access 12: 109470-109493 (2024) - [j7]Abubakar S. Ali, Willian T. Lunardi, Govind Singh, Lina Bariah, Michael Baddeley, Martin Andreoni Lopez, Jean Pierre Giacalone, Sami Muhaidat:
RF Jamming Dataset: A Wireless Spectral Scan Approach for Malicious Interference Detection. IEEE Commun. Mag. 62(11): 114-120 (2024) - [j6]Moayad Aloqaily, Helen Paik, Willian T. Lunardi, Cihan Tunc, Fang He:
Guest Editorial: Zero Trust Security Methods for Wireless Networks. IEEE Wirel. Commun. 31(2): 12-13 (2024) - [i5]Matthew Lau, Haoran Wang, Alec Helbling, Matthew Hull, Shengyun Peng, Martin Andreoni, Willian T. Lunardi, Wenke Lee:
Non-Robust Features are Not Always Useful in One-Class Classification. CoRR abs/2407.06372 (2024) - 2023
- [j5]Dania Herzalla, Willian Tessaro Lunardi, Martin Andreoni Lopez:
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection. IEEE Access 11: 118577-118594 (2023) - [j4]Willian Tessaro Lunardi, Martin Andreoni Lopez, Jean Pierre Giacalone:
ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection. IEEE Trans. Netw. Serv. Manag. 20(2): 1305-1318 (2023) - [c14]Abdul Rahman Ba Nabila, Eduardo K. Viegas, Abdelrahman AlMahmoud, Willian T. Lunardi:
A Generative Adversarial Network-based Attack for Audio-based Condition Monitoring Systems. CCNC 2023: 275-280 - [c13]Selina Shrestha, Willian T. Lunardi, Martin Andreoni Lopez:
An Empirical Analysis of MeshShield: a Network Security System for Fully Distributed Networks. EWSN 2023: 403-408 - [c12]Markus Gallacher, Carlo Alberto Boano, M. S. Arun Sankar, Utz Roedig, Willian T. Lunardi, Michael Baddeley:
Poster Abstract: Towards Speaker Identification on Resource-Constrained Embedded Devices. SenSys 2023: 518-519 - [i4]Dania Herzalla, Willian T. Lunardi, Martin Andreoni Lopez:
TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection. CoRR abs/2310.10661 (2023) - 2022
- [j3]Abubakar S. Ali, Michael Baddeley, Lina Bariah, Martin Andreoni Lopez, Willian Tessaro Lunardi, Jean Pierre Giacalone, Sami Muhaidat:
JamRF: Performance Analysis, Evaluation, and Implementation of RF Jamming Over Wi-Fi. IEEE Access 10: 133370-133384 (2022) - [c11]Abubakar S. Ali, Willian T. Lunardi, Lina Bariah, Michael Baddeley, Martin Andreoni Lopez, Jean Pierre Giacalone, Sami Muhaidat:
Deep Reinforcement Learning Based Anti-Jamming Using Clear Channel Assessment Information in a Cognitive Radio Environment. CommNet 2022: 1-6 - [c10]Abubakar S. Ali, Michael Baddeley, Lina Bariah, Martin Andreoni Lopez, Willian T. Lunardi, Jean Pierre Giacalone, Sami Muhaidat:
Performance Analysis and Evaluation of RF Jamming in IoT Networks. GLOBECOM 2022: 2745-2751 - [i3]Willian T. Lunardi, Martin Andreoni Lopez, Jean Pierre Giacalone:
ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection. CoRR abs/2205.01432 (2022) - 2021
- [j2]Willian T. Lunardi, Ernesto G. Birgin, Débora P. Ronconi, Holger Voos:
Metaheuristics for the online printing shop scheduling problem. Eur. J. Oper. Res. 293(2): 419-441 (2021) - [c9]Martin Andreoni Lopez, Michael Baddeley, Willian T. Lunardi, Anshul Pandey, Jean Pierre Giacalone:
Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities. DCOSS 2021: 319-326 - [i2]Martin Andreoni Lopez, Michael Baddeley, Willian T. Lunardi, Anshul Pandey, Jean Pierre Giacalone:
Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities. CoRR abs/2108.13154 (2021) - 2020
- [b1]Willian Tessaro Lunardi:
A Real-World Flexible Job Shop Scheduling Problem With Sequencing Flexibility: Mathematical Programming, Constraint Programming, and Metaheuristics. University of Luxembourg, Luxembourg City, Luxembourg, 2020 - [j1]Willian T. Lunardi, Ernesto G. Birgin, Philippe Laborie, Débora P. Ronconi, Holger Voos:
Mixed Integer linear programming and constraint programming models for the online printing shop scheduling problem. Comput. Oper. Res. 123: 105020 (2020) - [i1]Willian T. Lunardi, Ernesto G. Birgin, Débora P. Ronconi, Holger Voos:
Metaheuristics for the Online Printing Shop Scheduling Problem. CoRR abs/2006.12344 (2020)
2010 – 2019
- 2019
- [c8]Haroldo de Faria Jr., Willian Tessaro Lunardi, Holger Voos:
A parallel multi-population biased random-key genetic algorithm for electric distribution network reconfiguration. GECCO (Companion) 2019: 281-282 - [c7]Willian Tessaro Lunardi, Holger Voos, Luiz Henrique Cherri:
An effective hybrid imperialist competitive algorithm and tabu search for an extended flexible job shop scheduling problem. SAC 2019: 204-211 - 2018
- [c6]Willian Tessaro Lunardi, Holger Voos, Luiz Henrique Cherri:
An Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem. ETFA 2018: 402-409 - [c5]Willian Tessaro Lunardi, Luiz Henrique Cherri, Holger Voos:
A Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints. ICAISC (1) 2018: 548-560 - [c4]Willian Tessaro Lunardi, Holger Voos:
Comparative study of genetic and discrete firefly algorithm for combinatorial optimization. SAC 2018: 300-308 - 2016
- [c3]Willian Tessaro Lunardi, Leonardo A. Amaral, Sabrina Marczak, Fabiano Hessel, Holger Voos:
Automated Decision Support IoT Framework. ETFA 2016: 1-8 - 2015
- [c2]Willian T. Lunardi, Everton de Matos, Ramão Tiago Tiburski, Leonardo A. Amaral, Sabrina Marczak, Fabiano Hessel:
Context-based search engine for industrial IoT: Discovery, search, selection, and usage of devices. ETFA 2015: 1-8 - [c1]Everton de Matos, Leonardo A. Amaral, Ramão Tiago Tiburski, Willian T. Lunardi, Fabiano Hessel, Sabrina Marczak:
Context-aware system for information services provision in the Internet of Things. ETFA 2015: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 01:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint