2025
Sensor Attacks on Grid-Tie Photovoltaic Inverters: Synthetic Analysis and Real-Time Robust Detection.
IEEE Trans. Ind. Informatics, January, 2025
Laser-Based LiDAR Spoofing: Effects Validation, Capability Quantification, and Countermeasures.
IEEE Internet Things J., January, 2025
2024
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
ACM Trans. Sens. Networks, November, 2024
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference.
IEEE Internet Things J., September, 2024
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices.
ACM Trans. Sens. Networks, May, 2024
Evaluating Compressive Sensing on the Security of Computer Vision Systems.
ACM Trans. Sens. Networks, May, 2024
Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data.
Symmetry, April, 2024
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024
MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding.
IEEE Trans. Mob. Comput., March, 2024
A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid.
Symmetry, March, 2024
Toward Pitch-Insensitive Speaker Verification via Soundfield.
IEEE Internet Things J., January, 2024
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification.
IEEE Trans. Inf. Forensics Secur., 2024
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur., 2024
On Tracing Screen Photos - A Moiré Pattern-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2024
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens.
IEEE Trans. Dependable Secur. Comput., 2024
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors.
IEEE Trans. Dependable Secur. Comput., 2024
Marionette: Manipulate Your Touchscreen via a Charging Cable.
IEEE Trans. Dependable Secur. Comput., 2024
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate.
IEEE Trans. Dependable Secur. Comput., 2024
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors.
IEEE Trans. Dependable Secur. Comput., 2024
Topology-based multi-jammer localization in wireless networks.
Secur. Saf., 2024
Security and Privacy of Current and Emerging IoT Devices and Systems (Dagstuhl Seminar 24312).
Dagstuhl Reports, 2024
POEX: Policy Executable Embodied AI Jailbreak Attacks.
CoRR, 2024
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
CoRR, 2024
ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters.
CoRR, 2024
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
CoRR, 2024
RAGLAB: A Modular and Research-Oriented Unified Framework for Retrieval-Augmented Generation.
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR, 2024
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024
Understanding and Benchmarking the Commonality of Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
CamPro: Camera-based Anti-Facial Recognition.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
UniID: Spoofing Face Authentication System by Universal Identity.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
Adversarial for Good - Defending Training Data Privacy with Adversarial Attack Wisdom.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Legilimens: Practical and Unified Content Moderation for Large Language Model Services.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
SafeEar: Content Privacy-Preserving Audio Deepfake Detection.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Alchemy: Data-Free Adversarial Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Multi-Agent Reinforcement Learning Based UAV Swarm Communications Against Jamming.
IEEE Trans. Wirel. Commun., December, 2023
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones.
ACM Trans. Sens. Networks, November, 2023
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters.
ACM Trans. Internet Techn., 2023
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones.
IEEE Trans. Mob. Comput., 2023
A Survey on Voice Assistant Security: Attacks and Countermeasures.
ACM Comput. Surv., 2023
Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving.
CoRR, 2023
TPatch: A Triggered Physical Adversarial Patch.
Proceedings of the 32nd USENIX Security Symposium, 2023
CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Proceedings of the 32nd USENIX Security Symposium, 2023
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
Proceedings of the 32nd USENIX Security Symposium, 2023
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Proceedings of the 32nd USENIX Security Symposium, 2023
VILLAIN: Backdoor Attacks Against Vertical Split Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
BitDance: Manipulating UART Serial Communication with IEMI.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Attack Detection for Distributed Photovoltaic Generation Systems Leveraging Cyber and Power Side Channel Data.
Proceedings of the IEEE PES Innovative Smart Grid Technologies - Asia, 2023
Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting.
Proceedings of the IEEE INFOCOM 2023, 2023
Reinforcement Learning Based UAV Swarm Communications Against Jamming.
Proceedings of the IEEE International Conference on Communications, 2023
MicPro: Microphone-based Voice Privacy Protection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules.
ACM Trans. Sens. Networks, 2022
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices.
IEEE Trans. Mob. Comput., 2022
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
IEEE Trans. Inf. Forensics Secur., 2022
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks.
Mob. Networks Appl., 2022
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Proceedings of the 31st USENIX Security Symposium, 2022
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Proceedings of the 31st USENIX Security Symposium, 2022
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Proceedings of the 31st USENIX Security Symposium, 2022
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Learning-Based Low-Latency VIoT Video Streaming Against Jamming and Interference.
IEEE Wirel. Commun., 2021
SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.
ACM Trans. Sens. Networks, 2021
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants.
IEEE Trans. Dependable Secur. Comput., 2021
Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting.
IEEE Internet Things J., 2021
Towards Fortifying the Multi-Factor-Based Online Account Ecosystem.
CoRR, 2021
Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing.
Appl. Soft Comput., 2021
Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating.
IEEE Access, 2021
OutletSpy: cross-outlet application inference via power factor correction signal.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
mID: Tracing Screen Photos via Moiré Patterns.
Proceedings of the 30th USENIX Security Symposium, 2021
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
CapSpeaker: Injecting Voices to Microphones via Capacitors.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration.
ACM Trans. Sens. Networks, 2020
Identifying Child Users via Touchscreen Interactions.
ACM Trans. Sens. Networks, 2020
ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval.
ACM Trans. Multim. Comput. Commun. Appl., 2020
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach.
IEEE Trans. Mob. Comput., 2020
Authenticating Smart Home Devices via Home Limited Channels.
ACM Trans. Internet Things, 2020
Challenge-Response Authentication Using In-Air Handwriting Style Verification.
IEEE Trans. Dependable Secur. Comput., 2020
senDroid: Auditing Sensor Access in Android System-Wide.
IEEE Trans. Dependable Secur. Comput., 2020
Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid.
Sensors, 2020
SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
EdgeLD: Locally Distributed Deep Learning Inference on Edge Device Clusters.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid.
Sensors, 2019
On Cuba, diplomats, ultrasound, and intermodulation distortion.
Comput. Biol. Medicine, 2019
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
UltraComm: High-Speed and Inaudible Acoustic Communication.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
NoUCSR: Efficient Super-Resolution Network without Upsampling Convolution.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
MagAttack: Guessing Application Launching and Operation via Smartphone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Secur. Comput., 2018
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Secur. Comput., 2018
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018
LESS: Link Estimation with Sparse Sampling in Intertidal WSNs.
Sensors, 2018
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.
Secur. Commun. Networks, 2018
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.
IEEE Internet Things J., 2018
Which One to Go: Security and Usability Evaluation of Mid-Air Gestures.
CoRR, 2018
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection.
CoRR, 2018
Risks of trusting the physics of sensors.
Commun. ACM, 2018
iCare: Automatic and User-friendly Child Identification on Smartphones.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers.
Frontiers Inf. Technol. Electron. Eng., 2017
DolphinAtack: Inaudible Voice Commands.
CoRR, 2017
Socialized policy administration.
Comput. Secur., 2017
SADO: State-associated and delay-oriented data collection for intertidal WSNs.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
A robust backup routing protocol for neighbor area network in the smart grid.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
DolphinAttack: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Are You Lying: Validating the Time-Location of Outdoor Images.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Energy-Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation.
ACM Trans. Sens. Networks, 2016
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
IEEE Trans. Inf. Forensics Secur., 2016
On modeling of electrical cyber-physical systems considering cyber security.
Frontiers Inf. Technol. Electron. Eng., 2016
WindCompass: Determine Wind Direction Using Smartphones.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
On Code Execution Tracking via Power Side-Channel.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
SPA: Inviting Your Friends to Help Set Android Apps.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2014
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Cooperative localization using angle-of-arrival information.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014
Three-dimensional formation merging control of second-order agents under directed and switching topologies.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
CETAD: Detecting evil twin access point attacks in wireless hotspots.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
KinWrite: Handwriting-Based Authentication Using Kinect.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization.
IEEE Trans. Parallel Distributed Syst., 2012
Jamming-Resilient Multipath Routing.
IEEE Trans. Dependable Secur. Comput., 2012
Enhancing Sink-Location Privacy in Wireless Sensor Networks through <i>k</i>-Anonymity.
Int. J. Distributed Sens. Networks, 2012
Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Distributed transmit beamforming via feedback-based inter-cluster synchronization.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Neighborhood watch: security and privacy analysis of automatic meter reading systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Determining the position of a jammer using a virtual-force iterative approach.
Wirel. Networks, 2011
Localizing Multiple Jamming Attackers in Wireless Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
2010
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Proceedings of the 19th USENIX Security Symposium, 2010
Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas.
Proceedings of the Global Communications Conference, 2010
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges.
Proceedings of the Distributed Computing in Sensor Systems, 2010
2009
Temporal privacy in wireless sensor networks: Theory and practice.
ACM Trans. Sens. Networks, 2009
Localizing Jammers in Wireless Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
2008
Defending wireless sensor networks from radio interference through channel adaptation.
ACM Trans. Sens. Networks, 2008
Anti-jamming timing channels for wireless networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
2007
Service Discovery and Device Identification in Cognitive Radio Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Channel surfing: defending wireless sensor networks from interference.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007
Temporal Privacy in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
2006
Jamming sensor networks: attack and defense strategies.
IEEE Netw., 2006
Securing wireless systems via lower layer enforcements.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
2005
The feasibility of launching and detecting jamming attacks in wireless networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
2004
Channel surfing and spatial retreats: defenses against wireless denial of service.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004