Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 19 Similar Profiles
Jamming Engineering & Materials Science
Network protocols Engineering & Materials Science
Routing protocols Engineering & Materials Science
Ad hoc networks Engineering & Materials Science
Wireless networks Engineering & Materials Science
Wireless ad hoc networks Engineering & Materials Science
Network routing Engineering & Materials Science
Communication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2000 2019

BGP with BGPsec: Attacks and Countermeasures

Li, Q., Liu, J., Hu, Y-C., Xu, M. & Wu, J., Jul 1 2019, In : IEEE Network. 33, 4, p. 194-200 7 p., 8594708.

Research output: Contribution to journalArticle

Network protocols
Internet

Convolution Attack on Frequency Hopping by Full-Duplex Radios

Jagadeesh, H. & Hu, Y-C., Jun 2019, In : IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.

Research output: Contribution to journalArticle

Frequency Hopping
Frequency hopping
Radio receivers
Convolution
Frequency shift keying

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, M. J., Shen, M. & Yang, F., Jan 22 2019, 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018. Institute of Electrical and Electronics Engineers Inc., 8624169. (2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Testbeds
Servers
Throughput
Internet

Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks

Chang, S. Y., Kumar, S. L. S., Hu, Y-C. & Park, Y., Jan 1 2019, In : ACM Transactions on Sensor Networks. 15, 3, 27.

Research output: Contribution to journalArticle

Embedded systems
Data transfer
Authentication
Availability
Hardware

CLEF: Limiting the damage caused by large flows in the internet core

Wu, H., Hsiao, H. C., Asoni, D. E., Scherrer, S., Perrig, A. & Hu, Y-C., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer-Verlag, p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage
Limiting
Internet
Router
Routers