Patrick Tague
Orcid: 0000-0002-7561-6112
According to our database1,
Patrick Tague
authored at least 86 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
2021
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Datanet: Enabling Seamless, Metered and Trusted Internet Connectivity without Subscriptions.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
LaNet: Real-time Lane Identification by Learning Road SurfaceCharacteristics from Accelerometer Data.
CoRR, 2020
Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces.
CoRR, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
2019
Procuring Spontaneous Session-Level Resource Guarantees for Real-Time Applications: An Auction Approach.
IEEE J. Sel. Areas Commun., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
2018
ACM Trans. Sens. Networks, 2018
CoRR, 2018
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
To Accept or Not to Accept: The Question of Supplemental Discount Offers in Mobile Data Plans.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
2017
ACM Trans. Sens. Networks, 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017
Towards continuous and passive authentication across mobile devices: an empirical study.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
<i>Sensetribute</i>: smart home occupant identification via fusion across on-object sensing devices.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017
Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017
2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control.
Wirel. Networks, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015
I did not smoke 100 cigarettes today!: avoiding false positives in real-world activity recognition.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents.
Pervasive Mob. Comput., 2014
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Living with boisterous neighbors: Studying the interaction of adaptive jamming and anti-jamming.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection.
Proceedings of the PECCS 2012, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
All your jammers belong to us - Localization of wireless sensors under jamming attack.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Jamming-aware traffic allocation for multiple-path routing using portfolio selection.
IEEE/ACM Trans. Netw., 2011
Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
Improving anti-jamming capability and increasing jamming impact with mobility control.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
2009
IEEE Trans. Mob. Comput., 2009
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Secur. Comput., 2009
Tradeoffs between jamming resilience and communication efficiency in key establishment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009
A coding-theoretic approach for efficient message verification over insecure channels.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
A canonical seed assignment model for key predistribution in wireless sensor networks.
ACM Trans. Sens. Networks, 2007
Ad Hoc Networks, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
2006
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006