2024
vRetention: A User Viewing Dataset for Popular Video Streaming Services.
Proceedings of the 15th ACM Multimedia Systems Conference, 2024
Debuglet: Programmable and Verifiable Inter-Domain Network Telemetry.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
FlowBot: A Learning-Based Co-bottleneck Flow Detector for Video Servers.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023
2022
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems.
IEEE Trans. Smart Grid, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds.
Ad Hoc Networks, 2022
Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems.
Proceedings of the IEEE International Conference on Communications, 2022
TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2022
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems.
Proceedings of the IEEE INFOCOM 2022, 2022
Key Generation with Ambient Audio.
Proceedings of the IEEE Global Communications Conference, 2022
FlowTele: remotely shaping traffic on internet-scale networks.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022
2021
HASA-Net: A Non-Intrusive Hearing-Aid Speech Assessment Network.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2021
2020
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020
Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning.
Hum. centric Comput. Inf. Sci., 2020
BlindSignedID: Mitigating Denial-of-Service Attacks on Digital Contact Tracing.
CoRR, 2020
Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Mitigating denial-of-service attacks on digital contact tracing: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Convolution Attack on Frequency Hopping by Full-Duplex Radios.
IEEE Trans. Veh. Technol., 2019
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks.
ACM Trans. Sens. Networks, 2019
BGP with BGPsec: Attacks and Countermeasures.
IEEE Netw., 2019
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control.
IEEE/ACM Trans. Netw., 2018
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Detection of Anomaly in Train Speed for Intelligent Railway Systems.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2018
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks.
IEEE Trans. Mob. Comput., 2017
A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks.
IEEE Trans. Control. Netw. Syst., 2017
Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding.
CoRR, 2017
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation.
CoRR, 2017
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems.
CoRR, 2017
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Deadline-Aware Multipath Communication: An Optimization Problem.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Securing balise-based train control systems using cryptographic random fountains.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Protecting vehicular networks privacy in the presence of a single adversarial authority.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
The Case for In-Network Replay Suppression.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers.
IEEE/ACM Trans. Netw., 2016
A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking.
IEEE Trans. Control. Netw. Syst., 2016
Location Privacy with Randomness Consistency.
Proc. Priv. Enhancing Technol., 2016
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016
Demo: Free Data Communication Using Wireless Charging.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
A Clean Slate Approach to Secure Wireless Networking.
Found. Trends Netw., 2015
A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
Noah: Keyed Noise Flooding for Wireless Confidentiality.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015
Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Securing wireless medium access control against insider denial-of-service attackers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
A Study on False Channel Condition Reporting Attacks in Wireless Networks.
IEEE Trans. Mob. Comput., 2014
Lightweight source authentication and path validation.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.
Proceedings of the 2014 Internet Measurement Conference, 2014
Mechanized Network Origin and Path Authenticity Proofs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming.
Proceedings of the MobiWac'13, 2013
Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption.
Proceedings of the 32th IEEE Military Communications Conference, 2013
JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness.
Proceedings of the 32th IEEE Military Communications Conference, 2013
Did you also hear that? Spectrum sensing using Hermitian inner product.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Secure cooperative spectrum sensing based on Sybil-resilient clustering.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Secure Location Verification Using Simultaneous Multilateration.
IEEE Trans. Wirel. Commun., 2012
An orthogonal multiple access coding scheme.
Commun. Inf. Syst., 2012
Body Area Network Security: Robust Key Establishment Using Human Body Channel.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Power control for fair dynamic channel reservation in VANETs.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Bankrupting the jammer in WSN.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Load disaggregation using harmonic analysis and regularized optimization.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012
2011
Cross-layer jamming detection and mitigation in wireless broadcast networks.
IEEE/ACM Trans. Netw., 2011
Efficient Certificate Revocation List Organization and Distribution.
IEEE J. Sel. Areas Commun., 2011
Towards Deployable DDoS Defense for Web Applications
CoRR, 2011
Optimal physical carrier sense in wireless networks.
Ad Hoc Networks, 2011
Short paper: a practical view of "mixing" identities in vehicular networks.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
The jamming game in an OFDM setting.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Demo: bankrupting the jammer.
Proceedings of the 9th International Conference on Mobile Systems, 2011
Low-cost mitigation of privacy loss due to radiometric identification.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots.
Proceedings of IEEE International Conference on Communications, 2011
A Lightweight Deterministic MAC Protocol Using Low Cross-Correlation Sequences.
Proceedings of the Global Communications Conference, 2011
2010
Coward attacks in vehicular networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
The impact of key assignment on VANET privacy.
Secur. Commun. Networks, 2010
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.
Proceedings of the Security and Privacy in Communication Networks, 2010
Communication requirements for crash avoidance.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010
Secure network-wide clock synchronization in wireless sensor networks.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
CRAFT: a new secure congestion control architecture.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Data Security in Vehicular Communication Networks.
Proceedings of the VANET: Vehicular Applications and Inter-Networking Technologies, 2010
2009
SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009
Secure and precise location verification using distance bounding and simultaneous multilateration.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009
Design and analysis of a lightweight certificate revocation mechanism for VANET.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Real-World VANET Security Protocol Performance.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Secure Unified Cellular Ad Hoc Network Routing.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Security certificate revocation list distribution for vanet.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008
Dynamic Jamming Mitigation for Wireless Broadcast Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4.
RFC, February, 2007
Portcullis: protecting connection setup from denial-of-capability attacks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
Preserving location privacy in wireless lans.
Proceedings of the 5th International Conference on Mobile Systems, 2007
2006
Wormhole attacks in wireless networks.
IEEE J. Sel. Areas Commun., 2006
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
2005
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks.
Wirel. Networks, 2005
Efficient Constructions for One-Way Hash Chains.
Proceedings of the Applied Cryptography and Network Security, 2005
2004
A Survey of Secure Wireless Ad Hoc Routing.
IEEE Secur. Priv., 2004
SPV: secure path vector routing for securing BGP.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Securing quality-of-service route discovery in on-demand routing for ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
2003
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks.
Ad Hoc Networks, 2003
Rushing attacks and defense in wireless ad hoc network routing protocols.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture.
Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2003), 2003
Efficient Security Mechanisms for Routing Protocolsa.
Proceedings of the Network and Distributed System Security Symposium, 2003
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
2002
Ensuring cache freshness in on-demand ad hoc network routing protocols.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002
2001
Implicit source routes for on-demand ad hoc network routing.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001
2000
Caching strategies in on-demand routing protocols for wireless ad hoc networks.
Proceedings of the MOBICOM 2000, 2000
1998
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols.
Proceedings of the MOBICOM '98, 1998