Wenyuan Xu

Orcid: 0000-0002-5043-9148

Affiliations:
  • Zhejiang University, China


According to our database1, Wenyuan Xu authored at least 172 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference.
IEEE Internet Things J., September, 2024

Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices.
ACM Trans. Sens. Networks, May, 2024

Evaluating Compressive Sensing on the Security of Computer Vision Systems.
ACM Trans. Sens. Networks, May, 2024

Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data.
Symmetry, April, 2024

Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024

MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding.
IEEE Trans. Mob. Comput., March, 2024

A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid.
Symmetry, March, 2024

Toward Pitch-Insensitive Speaker Verification via Soundfield.
IEEE Internet Things J., January, 2024

Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification.
IEEE Trans. Inf. Forensics Secur., 2024

Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur., 2024

On Tracing Screen Photos - A Moiré Pattern-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2024

Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens.
IEEE Trans. Dependable Secur. Comput., 2024

CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors.
IEEE Trans. Dependable Secur. Comput., 2024

Marionette: Manipulate Your Touchscreen via a Charging Cable.
IEEE Trans. Dependable Secur. Comput., 2024

Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
CoRR, 2024

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
CoRR, 2024

Legilimens: Practical and Unified Content Moderation for Large Language Model Services.
CoRR, 2024

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR, 2024

Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024

Understanding and Benchmarking the Commonality of Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CamPro: Camera-based Anti-Facial Recognition.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

UniID: Spoofing Face Authentication System by Universal Identity.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

Adversarial for Good - Defending Training Data Privacy with Adversarial Attack Wisdom.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
Multi-Agent Reinforcement Learning Based UAV Swarm Communications Against Jamming.
IEEE Trans. Wirel. Commun., December, 2023

PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones.
ACM Trans. Sens. Networks, November, 2023

Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters.
ACM Trans. Internet Techn., 2023

No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones.
IEEE Trans. Mob. Comput., 2023

A Survey on Voice Assistant Security: Attacks and Countermeasures.
ACM Comput. Surv., 2023

Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving.
CoRR, 2023

TPatch: A Triggered Physical Adversarial Patch.
Proceedings of the 32nd USENIX Security Symposium, 2023

CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Proceedings of the 32nd USENIX Security Symposium, 2023

V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
Proceedings of the 32nd USENIX Security Symposium, 2023

Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Proceedings of the 32nd USENIX Security Symposium, 2023

VILLAIN: Backdoor Attacks Against Vertical Split Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

BitDance: Manipulating UART Serial Communication with IEMI.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting.
Proceedings of the IEEE INFOCOM 2023, 2023

Reinforcement Learning Based UAV Swarm Communications Against Jamming.
Proceedings of the IEEE International Conference on Communications, 2023

MicPro: Microphone-based Voice Privacy Protection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules.
ACM Trans. Sens. Networks, 2022

A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices.
IEEE Trans. Mob. Comput., 2022

Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
IEEE Trans. Inf. Forensics Secur., 2022

Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks.
Mob. Networks Appl., 2022

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022

Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Proceedings of the 31st USENIX Security Symposium, 2022

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Proceedings of the 31st USENIX Security Symposium, 2022

"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Proceedings of the 31st USENIX Security Symposium, 2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022

FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Learning-Based Low-Latency VIoT Video Streaming Against Jamming and Interference.
IEEE Wirel. Commun., 2021

SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.
ACM Trans. Sens. Networks, 2021

The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants.
IEEE Trans. Dependable Secur. Comput., 2021

Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting.
IEEE Internet Things J., 2021

Towards Fortifying the Multi-Factor-Based Online Account Ecosystem.
CoRR, 2021

Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing.
Appl. Soft Comput., 2021

Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating.
IEEE Access, 2021

OutletSpy: cross-outlet application inference via power factor correction signal.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

mID: Tracing Screen Photos via Moiré Patterns.
Proceedings of the 30th USENIX Security Symposium, 2021

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

CapSpeaker: Injecting Voices to Microphones via Capacitors.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration.
ACM Trans. Sens. Networks, 2020

Identifying Child Users via Touchscreen Interactions.
ACM Trans. Sens. Networks, 2020

ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval.
ACM Trans. Multim. Comput. Commun. Appl., 2020

On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach.
IEEE Trans. Mob. Comput., 2020

Authenticating Smart Home Devices via Home Limited Channels.
ACM Trans. Internet Things, 2020

Challenge-Response Authentication Using In-Air Handwriting Style Verification.
IEEE Trans. Dependable Secur. Comput., 2020

senDroid: Auditing Sensor Access in Android System-Wide.
IEEE Trans. Dependable Secur. Comput., 2020

Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid.
Sensors, 2020

SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

EdgeLD: Locally Distributed Deep Learning Inference on Edge Device Clusters.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid.
Sensors, 2019

On Cuba, diplomats, ultrasound, and intermodulation distortion.
Comput. Biol. Medicine, 2019

Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

UltraComm: High-Speed and Inaudible Acoustic Communication.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019

AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

NoUCSR: Efficient Super-Resolution Network without Upsampling Convolution.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

MagAttack: Guessing Application Launching and Operation via Smartphone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

LESS: Link Estimation with Sparse Sampling in Intertidal WSNs.
Sensors, 2018

User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.
Secur. Commun. Networks, 2018

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.
IEEE Internet Things J., 2018

Which One to Go: Security and Usability Evaluation of Mid-Air Gestures.
CoRR, 2018

Validating the Contextual Information of Outdoor Images for Photo Misuse Detection.
CoRR, 2018

Risks of trusting the physics of sensors.
Commun. ACM, 2018

iCare: Automatic and User-friendly Child Identification on Smartphones.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers.
Frontiers Inf. Technol. Electron. Eng., 2017

DolphinAtack: Inaudible Voice Commands.
CoRR, 2017

Socialized policy administration.
Comput. Secur., 2017

SADO: State-associated and delay-oriented data collection for intertidal WSNs.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

A robust backup routing protocol for neighbor area network in the smart grid.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

DolphinAttack: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Are You Lying: Validating the Time-Location of Outdoor Images.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Energy-Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation.
ACM Trans. Sens. Networks, 2016

Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
IEEE Trans. Inf. Forensics Secur., 2016

On modeling of electrical cyber-physical systems considering cyber security.
Frontiers Inf. Technol. Electron. Eng., 2016

WindCompass: Determine Wind Direction Using Smartphones.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

On Code Execution Tracking via Power Side-Channel.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
SPA: Inviting Your Friends to Help Set Android Apps.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014

AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Cooperative localization using angle-of-arrival information.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

Three-dimensional formation merging control of second-order agents under directed and switching topologies.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

CETAD: Detecting evil twin access point attacks in wireless hotspots.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

KinWrite: Handwriting-Based Authentication Using Kinect.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization.
IEEE Trans. Parallel Distributed Syst., 2012

Jamming-Resilient Multipath Routing.
IEEE Trans. Dependable Secur. Comput., 2012

Enhancing Sink-Location Privacy in Wireless Sensor Networks through <i>k</i>-Anonymity.
Int. J. Distributed Sens. Networks, 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Distributed transmit beamforming via feedback-based inter-cluster synchronization.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Neighborhood watch: security and privacy analysis of automatic meter reading systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Determining the position of a jammer using a virtual-force iterative approach.
Wirel. Networks, 2011

Localizing Multiple Jamming Attackers in Wireless Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Proceedings of the 19th USENIX Security Symposium, 2010

Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas.
Proceedings of the Global Communications Conference, 2010

Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
Temporal privacy in wireless sensor networks: Theory and practice.
ACM Trans. Sens. Networks, 2009

Localizing Jammers in Wireless Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

2008
Defending wireless sensor networks from radio interference through channel adaptation.
ACM Trans. Sens. Networks, 2008

Anti-jamming timing channels for wireless networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Service Discovery and Device Identification in Cognitive Radio Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Channel surfing: defending wireless sensor networks from interference.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Temporal Privacy in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Jamming sensor networks: attack and defense strategies.
IEEE Netw., 2006

Securing wireless systems via lower layer enforcements.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

2005
The feasibility of launching and detecting jamming attacks in wireless networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

2004
Channel surfing and spatial retreats: defenses against wireless denial of service.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004


  Loading...