Yih-Chun Hu
Orcid: 0000-0002-7829-3929
According to our database1,
Yih-Chun Hu
authored at least 124 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 15th ACM Multimedia Systems Conference, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023
2022
IEEE Trans. Smart Grid, 2022
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds.
Ad Hoc Networks, 2022
Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2022
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022
2021
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning.
Hum. centric Comput. Inf. Sci., 2020
CoRR, 2020
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
IEEE Trans. Veh. Technol., 2019
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks.
ACM Trans. Sens. Networks, 2019
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control.
IEEE/ACM Trans. Netw., 2018
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the International Conference on Control, Automation and Diagnosis, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks.
IEEE Trans. Mob. Comput., 2017
A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks.
IEEE Trans. Control. Netw. Syst., 2017
Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding.
CoRR, 2017
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation.
CoRR, 2017
CoRR, 2017
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Protecting vehicular networks privacy in the presence of a single adversarial authority.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers.
IEEE/ACM Trans. Netw., 2016
A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking.
IEEE Trans. Control. Netw. Syst., 2016
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IEEE Trans. Mob. Comput., 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming.
Proceedings of the MobiWac'13, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
IEEE Trans. Wirel. Commun., 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012
2011
IEEE/ACM Trans. Netw., 2011
IEEE J. Sel. Areas Commun., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the VANET: Vehicular Applications and Inter-Networking Technologies, 2010
2009
SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009
Secure and precise location verification using distance bounding and simultaneous multilateration.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Quality of Service in Heterogeneous Networks, 2009
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
RFC, February, 2007
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
Proceedings of the 5th International Conference on Mobile Systems, 2007
2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
2005
Wirel. Networks, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Securing quality-of-service route discovery in on-demand routing for ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
2003
Ad Hoc Networks, 2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture.
Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2003), 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
2002
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002
2001
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001
2000
Proceedings of the MOBICOM 2000, 2000
1998
Proceedings of the MOBICOM '98, 1998