Paul L. Yu

Orcid: 0000-0003-1577-3914

According to our database1, Paul L. Yu authored at least 51 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TenGAN: adversarially generating multiplex tensor graphs.
Data Min. Knowl. Discov., January, 2024

Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Proceedings of the 33rd USENIX Security Symposium, 2024

DNS Exfiltration Guided by Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Keyless Authentication for AWGN Channels.
IEEE Trans. Inf. Theory, 2023

2022
Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication.
IEEE Trans. Inf. Theory, 2022

Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication.
IEEE Trans. Inf. Theory, 2022

Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Adaptive Monitoring for Analytics Placement in Tactical Networks.
Proceedings of the IEEE Military Communications Conference, 2022

2021
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI.
IEEE Trans. Inf. Forensics Secur., 2021

A TTL-based Approach for Content Placement in Edge Networks.
Proceedings of the Performance Evaluation Methodologies and Tools, 2021

2020
Secret key authentication capacity region, Part I: average authentication rate.
CoRR, 2020

Secret key authentication capacity region, Part II: typical authentication rate.
CoRR, 2020

UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Authentication with Mildly Myopic Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Jointly Compressing and Caching Data in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Magnalium: Highly Reliable SDC Networks with Multiple Control Plane Composition.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Employing attack graphs for intrusion detection.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Identifying Bottleneck Nodes using Packet Delay Statistics.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Structured Coding for Authentication in the Presence of a Malicious Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Figment: Fine-grained Permission Management for Mobile Apps.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Fingerprint Embedding Authentication with Artificial Noise: MISO Regime.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Authentication Against a Myopic Adversary.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

Principled Unearthing of TCP Side Channel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding.
IEEE Trans. Inf. Forensics Secur., 2018

An Environment for Tactical SDN Experimentation.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Graph Filters and the Z-Laplacian.
IEEE J. Sel. Top. Signal Process., 2017

What, When and Where to Cache: A Unified Optimization Approach.
CoRR, 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Jaal: Towards Network Intrusion Detection at ISP Scale.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Messages per secret bit when authentication and a min-entropy secrecy criterion are required.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Keyless authentication in the presence of a simultaneously transmitting adversary.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Optimal Monitor Placement for Detection of Persistent Threats.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Authenticated side channel via physical layer fingerprinting.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Fingerprinting by Design: Embedding and Authentication.
Proceedings of the Digital Fingerprinting, 2016

2015
Wireless physical layer authentication via fingerprint embedding.
IEEE Commun. Mag., 2015

Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios.
IEEE Access, 2015

Measurement and characterization of the short-range low-VHF channel.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Fisher Information-based Experiment Design for Network Tomography.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Multicast vs. unicast for loss tomography on tree topologies.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2013
Efficient base station connectivity area discovery.
Int. J. Robotics Res., 2013

A parsimonious model for wireless connectivity in robotic networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
RSS gradient-assisted frontier exploration and radio source localization.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

2011
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer.
IEEE Trans. Inf. Forensics Secur., 2011

2010
Securing the communication of medical information using local biometric authentication and commercial wireless links.
Health Informatics J., 2010

2008
Physical-Layer Authentication.
IEEE Trans. Inf. Forensics Secur., 2008

Multicarrier authentication at the physical layer.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008


  Loading...