Paul L. Yu
Orcid: 0000-0003-1577-3914
According to our database1,
Paul L. Yu
authored at least 51 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Data Min. Knowl. Discov., January, 2024
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
2022
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Theory, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the IEEE Military Communications Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the Performance Evaluation Methodologies and Tools, 2021
2020
CoRR, 2020
CoRR, 2020
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the IEEE International Conference on Smart Computing, 2019
Proceedings of the IEEE International Conference on Smart Computing, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017
Messages per secret bit when authentication and a min-entropy secrecy criterion are required.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
Proceedings of the 2016 IEEE Information Theory Workshop, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the Digital Fingerprinting, 2016
2015
IEEE Commun. Mag., 2015
Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios.
IEEE Access, 2015
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
2013
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
2012
Proceedings of the IEEE International Conference on Robotics and Automation, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
2010
Securing the communication of medical information using local biometric authentication and commercial wireless links.
Health Informatics J., 2010
2008
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008