Wade Trappe

Orcid: 0000-0002-0635-9458

Affiliations:
  • Rutgers University


According to our database1, Wade Trappe authored at least 239 papers between 1999 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2014, "For contributions to information and communication security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An IoT Game with Heterogeneous Communication Nodes.
Proceedings of the 11th International Conference on Wireless Networks and Mobile Communications, 2024

An ALOHA-type Network Game with Trade-off Between Throughput and Energy Saving.
Proceedings of the 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2024

A Jamming Game with Fair Trade-off between SINR and Power Saving.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2024

A Fair Detection Strategy of an Adversary.
Proceedings of the 10th International Conference on Control, 2024

A Fair Anti-Eavesdropping Strategy for Communication with Several Receivers.
Proceedings of the 58th Annual Conference on Information Sciences and Systems, 2024

2023
A multiple access channel game with users implementing throughput and latency metrics.
ICT Express, October, 2023

A Bandwidth Scanning Game with a Sophisticated Adversary.
IGTR, September, 2023

An eavesdropping and jamming dilemma with sophisticated players.
ICT Express, August, 2023

A non-zero sum game of a joint radar and communication system and a jammer.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

An Anti-jamming Game When None Player Knows Rival's Channel Gain.
Proceedings of the Performance Evaluation Methodologies and Tools, 2023

An ALOHA multi-user game with tradeoff between throughput and transmission proportional fairness.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

2022
A Sophisticated Anti-Eavesdropping Strategy.
IEEE Wirel. Commun. Lett., 2022

An Anti-Jamming Multiple Access Channel Game Using Latency as Metric.
IEEE Wirel. Commun. Lett., 2022

Drug-Resistant Cancer Treatment Strategies Based on the Dynamics of Clonal Evolution and PKPD Modeling of Drug Combinations.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

A Stochastic Bandwidth Scanning Game.
Proceedings of the Game Theory for Networks, 2022

A Sophisticated Anti-jamming Strategy for a Joint Radar and Communication System.
Proceedings of the Game Theory for Networks, 2022

A Non-Zero Sum Bandwidth Scanning Game with a Sophisticated Adversary.
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022

2021
A Multi-Jammer Power Control Game.
IEEE Commun. Lett., 2021

A Multiple Access Channel Game Using Latency Metric.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
A Jamming Game With Rival-Type Uncertainty.
IEEE Trans. Wirel. Commun., 2020

A Dilemma in the Communication of a UAV with its Controller.
IGTR, 2020

A Multi-Jammer Game With Latency as the User's Communication Utility.
IEEE Commun. Lett., 2020

A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

A Switching Transmission Game with Latency as the User's Communication Utility.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Dynamic Graph Theoretical Analysis of Functional Connectivity in Parkinson's Disease: The Importance of Fiedler Value.
IEEE J. Biomed. Health Informatics, 2019

Proportional Fair Information Freshness Under Jamming.
Proceedings of the Wired/Wireless Internet Communications, 2019

A Power Control Game Involving Jamming and Eavesdropping Defense.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

An Eavesdropping and Jamming Dilemma when the Adversary might be Subjective.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Connectivity Game with Incomplete Information on Jammer's Location.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Combating Jamming in Wireless Networks: A Bayesian Game with Jammer's Channel Uncertainty.
Proceedings of the IEEE International Conference on Acoustics, 2019

A Power Control Game with Uncertainty On the Type of the Jammer.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

Bandwidth Scanning when the Rivals Are Subjective.
Proceedings of the Game Theory for Networks, 2019

SC2 CIL: Evaluating the Spectrum Voxel Announcement Benefits.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

A Prospect Theoretical Extension of a Communication Game Under Jamming.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
Journal of Cybersecurity and Privacy: A New Open Access Journal.
J. Cybersecur. Priv., June, 2018

Cybersecurity: A New Open Access Journal.
J. Cybersecur. Priv., June, 2018

Energy-Ball: Wireless Power Transfer for Batteryless Internet of Things through Distributed Beamforming.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference.
Proceedings of the Wired/Wireless Internet Communications, 2018

The rival might be not smart: Revising a CDMA jamming game.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Optimal Design of a Dual-Purpose Communication-Radar System in the Presence of a Jammer.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

A Prospect Theoretic Look at a Joint Radar and Communication System.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

Demo abstract: A practical secret communication system by perturbing focused phases among distributed transmitters.
Proceedings of the IEEE INFOCOM 2018, 2018

Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmitters.
Proceedings of the IEEE INFOCOM 2018, 2018

Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

To Communicate or to Scan: Prospect Theory Extension of a Stochastic Game.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

Maxmin Strategy for a Dual Radar and Communication OFDM Waveforms System Facing Uncertainty About the Background Noise.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2018

ROSTER: Radio Context Attestation in Cognitive Radio Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Stability of fair trade-off solution between radar and communication objectives on hostile interference.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

A dual radar and communication system facing uncertainty about a jammer's capability.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities.
IEEE Trans. Inf. Forensics Secur., 2017

Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications.
IEEE Trans. Inf. Forensics Secur., 2017

No Need for Speed : More Signal Processing Innovation Is Required Before Adopting Automated Vehicles [In the Spotlight].
IEEE Signal Process. Mag., 2017

Data Treasure Hunters: Science Expanding to New Frontiers [In the Spotlight].
IEEE Signal Process. Mag., 2017

Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors].
IEEE Signal Process. Mag., 2017

Auto++: Detecting Cars Using Embedded Microphones in Real-Time.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

A Security Framework for the Internet of Things in the Future Internet Architecture.
Future Internet, 2017

Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies.
Entropy, 2017

Bargaining over Fair Channel Sharing Between Wi-Fi and LTE-U Networks.
Proceedings of the Wired/Wireless Internet Communications, 2017

Bargaining in a Dual Radar and Communication System Using Radar-Prioritized OFDM Waveforms.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

A Reinforcement Protection Game in the Internet of Things.
Proceedings of the Interoperability, Safety and Security in IoT, 2017

Spectrum attacks aimed at minimizing spectrum opportunities.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Stability of communication link connectivity against hostile interference.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Impact of Uncertainty About a User to be Active on OFDM Transmission Strategies.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2017

An OFDM-based dual radar/communication system facing uncertain jamming power.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Equilibrium strategies for an OFDM network that might be under a jamming attack.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Fair Scheduling of Two-Hop Transmission with Energy Harvesting.
Proceedings of the Ad Hoc Networks, 2017

2016
Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System.
IEEE Trans. Signal Process., 2016

Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary's Attack Type is Unknown.
IEEE Trans. Signal Inf. Process. over Networks, 2016

Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing.
IEEE Trans. Mob. Comput., 2016

A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity.
IEEE Trans. Inf. Forensics Secur., 2016

An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm.
IEEE Trans. Cogn. Commun. Netw., 2016

A Feature Article Cluster on Brain Signal Analytics: Analytical Approaches to Enhanced Understanding of Brain Function From the Editors.
IEEE Signal Process. Mag., 2016

Overlay tunneling as a policy tool for defending mobile ad hoc networks.
Secur. Commun. Networks, 2016

Connectivity jamming game for physical layer attack in peer to peer networks.
Secur. Commun. Networks, 2016

Practical Interpolation for Spectrum Cartography through Local Path Loss Modeling.
CoRR, 2016

Bo-ear: unsupervised car sound sensing and tracking using microphones on smartphones.
Proceedings of the Eighth Wireless of the Students, 2016

A practical wireless reciprocity-aware key establishment protocol.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A Secrecy and Security Dilemma in OFDM Communications.
Proceedings of the Multiple Access Communications - 9th International Workshop, 2016

HB-Phone: A Bed-Mounted Geophone-Based Heartbeat Monitoring System.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

Maintaining throughput network connectivity in ad hoc networks.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Fair Channel Sharing by Wi-Fi and LTE-U Networks with Equal Priority.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2016

Bargaining over secrecy and reliability for low SNR OFDM communications.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Bargaining over fair performing dual radar and communication task.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious.
IEEE Trans. Inf. Forensics Secur., 2015

Introduction to the Issue on Signal and Information Processing for Privacy.
IEEE J. Sel. Top. Signal Process., 2015

Low-Energy Security: Limits and Opportunities in the Internet of Things.
IEEE Secur. Priv., 2015

Optimum Design for Coexistence Between Matrix Completion Based MIMO Radars and a MIMO Communication System.
CoRR, 2015

The challenges facing physical layer security.
IEEE Commun. Mag., 2015

Impact of incomplete knowledge on scanning strategy.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Fair Allocation of Throughput Under Harsh Operational Conditions.
Proceedings of the Multiple Access Communications - 8th International Workshop, 2015

Jammer forensics: Localization in peer to peer networks based on Q-learning.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Spectrum scanning when the intruder might have knowledge about the scanner's capabilities.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

2014
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07356-9, 2014

Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics.
EAI Endorsed Trans. Mob. Commun. Appl., 2014

Fair resource allocation under an unknown jamming attack: a Bayesian game.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Anti-jamming Strategies: A Stochastic Game Approach.
Proceedings of the Mobile Networks and Management - 6th International Conference, 2014

A policy-driven approach to access control in future internet name resolution services.
Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture, 2014

Secret Communication When the Eavesdropper Might Be an Active Adversary.
Proceedings of the Multiple Access Communications - 7th International Workshop, 2014

Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Emulating co-channel interference in wireless networks using equivalent low-tap filters.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

2013
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2013

The Role of Signal Processing in Meeting Privacy Challenges: An Overview.
IEEE Signal Process. Mag., 2013

Signal Processing for Cybersecurity and Privacy [From the Guest Editors].
IEEE Signal Process. Mag., 2013

Equivalent Tapped Delay Line Channel Responses with Reduced Taps.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Efficient OFDM Denial in the Absence of Channel Information.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Resilient Leadership Delegation in Tactical Systems.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Stationary Equilibrium Strategies for Bandwidth Scanning.
Proceedings of the Multiple Access Communcations - 6th International Workshop, 2013

SCPL: indoor device-free multi-subject counting and localization using radio signal strength.
Proceedings of the 12th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2013), 2013

Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

The eavesdropping and Jamming Dilemma in multi-channel communications.
Proceedings of IEEE International Conference on Communications, 2013

Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

Law governed peer-to-peer secondary spectrum marketplaces.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

Welcome message.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

To Eavesdrop or Jam, That is the Question.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013

2012
Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the Channel.
IEEE Trans. Wirel. Commun., 2012

On the Vulnerabilities of CSI in MIMO Wireless Communication Systems.
IEEE Trans. Mob. Comput., 2012

Detecting anomalous spectrum usage in dynamic spectrum access networks.
Ad Hoc Networks, 2012

Association attacks: Identifying association protocols.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Securing Mobile Location-based Services through position verification leveraging key distribution.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

An efficient security framework for mobile WiMAX.
Proceedings of the ACM Symposium on Applied Computing, 2012

Dependence of optimal monitoring strategy on the application to be protected.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications.
IEEE Trans. Mob. Comput., 2011

Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2011

BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams.
IEEE Trans. Inf. Forensics Secur., 2011

Integrating machine learning in <i>ad hoc</i> routing: A wireless adaptive routing protocol.
Int. J. Commun. Syst., 2011

Short paper: ACE: authenticating the channel estimation process in wireless communication systems.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

ProxiMate: proximity-based secure pairing using ambient wireless signals.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Improving Access Point Association Protocols through Channel Utilization and Adaptive Switching.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2010
WBE-Based Anti-collusion Fingerprints: Design and Detection.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Exploiting the physical layer for enhanced security.
IEEE Wirel. Commun., 2010

Achieving Secret Communication for Fast Rayleigh Fading Channels.
IEEE Trans. Wirel. Commun., 2010

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.
IEEE Trans. Veh. Technol., 2010

Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications.
IEEE Trans. Parallel Distributed Syst., 2010

Information-theoretically secret key generation for fading wireless channels.
IEEE Trans. Inf. Forensics Secur., 2010

Improved AP association management using machine learning.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Reactive on-board regulation of cognitive radios.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Subverting MIMO wireless systems by jamming the channel estimation procedure.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Proceedings of the 19th USENIX Security Symposium, 2010

ParkNet: drive-by sensing of road-side parking statistics.
Proceedings of the 8th International Conference on Mobile Systems, 2010

Cross-Layer Link Adaptation for Wireless Video.
Proceedings of IEEE International Conference on Communications, 2010

Physical Layer Techniques for Enhanced Situational Awareness.
Proceedings of the IEEE International Conference on Acoustics, 2010

Adapting MIMO transmission mode along paths in urban environments.
Proceedings of the IEEE International Conference on Acoustics, 2010

PHY-Authentication Protocol for Spoofing Detection in Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Channel-based spoofing detection in frequency-selective rayleigh channels.
IEEE Trans. Wirel. Commun., 2009

Characterizing Indoor Wireless Channels via Ray Tracing Combined with Stochastic Modeling.
IEEE Trans. Wirel. Commun., 2009

Temporal privacy in wireless sensor networks: Theory and practice.
ACM Trans. Sens. Networks, 2009

A security and robustness performance analysis of localization algorithms to signal strength attacks.
ACM Trans. Sens. Networks, 2009

Channel-based detection of Sybil attacks in wireless networks.
IEEE Trans. Inf. Forensics Secur., 2009

SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009

An IBC and certificate based hybrid approach to WiMAX security.
J. Commun. Networks, 2009

Secure wireless networking.
J. Commun. Networks, 2009

An Eavesdropping Game with SINR as an Objective Function.
Proceedings of the Security and Privacy in Communication Networks, 2009

Detecting Spoofing Attacks in Mobile Wireless Environments.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Towards Continuous Asset Tracking: Low-Power Communication and Fail-Safe Presence Assurance.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

ParkNet: a mobile sensor network for harvesting real time vehicular parking information.
Proceedings of the 2009 MobiHoc S³ workshop on MobiHoc S³, 2009

Demo abstract: Towards continuous tracking: Low-power communication and fail-safe presence assurance.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Securing Emerging Wireless Systems - Lower-layer Approaches.
Springer, ISBN: 978-0-387-88490-5, 2009

2008
Using the physical layer for wireless authentication in time-variant channels.
IEEE Trans. Wirel. Commun., 2008

Managing the Mobility of a Mobile Sensor Network Using Network Dynamics.
IEEE Trans. Parallel Distributed Syst., 2008

Defending wireless sensor networks from radio interference through channel adaptation.
ACM Trans. Sens. Networks, 2008

Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems.
IEEE Trans. Inf. Forensics Secur., 2008

Exploiting environmental properties for wireless localization.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Secure, pseudonymous, and auditable communication in vehicular <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

Anti-jamming timing channels for wireless networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Exploiting Environmental Properties for Wireless Localization and Location Aware Applications.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Radio-telepathy: extracting a secret key from an unauthenticated wireless channel.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Detecting sybil attacks inwireless and sensor networks using cluster analysis.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Radio teaming: Establishing communication when communication is not possible.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Secrecy capacity region of a class of one-sided interference channel.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Mining joules and bits: towards a long-life pervasive system.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Physical-Layer Technique to Enhance Authentication for Mobile Terminals.
Proceedings of IEEE International Conference on Communications, 2008

Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

MIMO-assisted channel-based authentication in wireless networks.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Robust Wireless Localization: Attacks and Defenses.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships.
IEEE Trans. Inf. Forensics Secur., 2007

Facilitating an Active Transmit-only RFID System Through Receiver-based Processing.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Service Discovery and Device Identification in Cognitive Radio Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Detecting and Localizing Wireless Spoofing Attacks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

ADLS: Attack Detection for Wireless Localization Using Least Squares.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Secret Communication with a Fading Eavesdropper Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Channel surfing: defending wireless sensor networks from interference.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Attack Detection in Wireless Localization.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Temporal Privacy in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication.
Proceedings of IEEE International Conference on Communications, 2007

Power-Modulated Challenge-Response Schemes for Verifying Location Claims.
Proceedings of the Global Communications Conference, 2007

The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation.
Proceedings of the Global Communications Conference, 2007

Secret Communication via Multi-antenna Transmission.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security.
IEEE Trans. Inf. Forensics Secur., 2006

Jamming sensor networks: attack and defense strategies.
IEEE Netw., 2006

Securing wireless systems via lower layer enforcements.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Channel surfing: defending wireless sensor networks from jamming and interference.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

Relationship -based Detection of Spoofing -related Anomalous Traffic in Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

A Practical Approach to Landmark Deployment for Indoor Localization.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Inverting sensor networks and actuating the environment for spatio-temporal access control.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

An identity-based security framework For VANETs.
Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, 2006

Light-weight Detection of Spoofing Attacks in Wireless Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet.
Proceedings of the Computational Science, 2006

The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
Resource-aware conference key establishment for heterogeneous networks.
IEEE/ACM Trans. Netw., 2005

Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation.
IEEE Trans. Image Process., 2005

The feasibility of launching and detecting jamming attacks in wireless networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Mobile network management and robust spatial retreats via network dynamics.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Robust statistical methods for securing wireless localization in sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

Enhancing Source-Location Privacy in Sensor Network Routing.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Collusion-resistant fingerprints from WBE sequence sets.
Proceedings of IEEE International Conference on Communications, 2005

Staggered TESLA: a multicast authentication scheme resistant to DoS attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

MIAMI: methods and infrastructure for the assurance of measurement information.
Proceedings of the 2nd Workshop on Data Management for Sensor Networks, 2005

2004
A scalable multicast key management scheme for heterogeneous wireless networks.
IEEE/ACM Trans. Netw., 2004

Collusion-resistant fingerprinting for multimedia.
IEEE Signal Process. Mag., 2004

Group-Oriented Fingerprinting for Multimedia Forensics.
EURASIP J. Adv. Signal Process., 2004

Source-Location Privacy for Networks of Energy-Constrained Sensors.
Proceedings of the 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004

Channel surfing and spatial retreats: defenses against wireless denial of service.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Collusion-resistant multimedia fingerprinting: a unified framework.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Source-location privacy in energy-constrained sensor network routing.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Key management for 3G MBMS security.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Anti-collusion fingerprinting for multimedia.
IEEE Trans. Signal Process., 2003

Key management and distribution for secure multimedia multicast.
IEEE Trans. Multim., 2003

An authentication framework for hierarchical ad hoc sensor networks.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Anti-collusion of group-oriented fingerprinting.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Resistance of orthogonal Gaussian fingerprints to collusion attacks.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Topology-aware key management schemes for wireless multicast.
Proceedings of the Global Telecommunications Conference, 2003

2002
Multi-User Security: A Signal Processing and Networking Perspective.
PhD thesis, 2002

Anti-collusion codes: multi-user and multimedia perspectives.
Proceedings of the 2002 International Conference on Image Processing, 2002

Establishment of conference keys in heterogeneous networks.
Proceedings of the IEEE International Conference on Communications, 2002

A time-efficient contributory key agreement scheme for secure group communications.
Proceedings of the IEEE International Conference on Communications, 2002

An efficient key management scheme for secure wireless multicast.
Proceedings of the IEEE International Conference on Communications, 2002

Collusion-resistant fingerprinting for multimedia.
Proceedings of the IEEE International Conference on Acoustics, 2002

Joint coding and embedding for collusion-resistant fingerprinting.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
Dynamic key distribution scheme using data embedding for secure multimedia multicast.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Key distribution for secure multimedia multicasts via data embedding.
Proceedings of the IEEE International Conference on Acoustics, 2001

1999
Adaptive lifting coding scheme for video scene changes.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999


  Loading...