Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Ponniah, J., Hu, Y-C. & Kumar, P. R., Mar 2017, In : IEEE Transactions on Control of Network Systems. 4, 1, p. 37-48 12 p., 7478115.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Wireless Ad Hoc Networks
Wireless ad hoc networks

A clean slate approach to secure wireless networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jan 1 2015, In : Foundations and Trends in Networking. 9, 1, p. 1-105 105 p.

Research output: Contribution to journalArticle

Slate
Network protocols
Wireless ad hoc networks
Communication systems

A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 175-182 8 p. 7151070. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Closed

A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 183-190 8 p. 7151071. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Vertex of a graph

A lightweight deterministic MAC protocol using low cross-correlation sequences

Kim, D., Esteki, D. J., Hu, Y. C. & Kumar, P. R., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134489. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gold
Network protocols
Binary sequences
Machinery
Clocks

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2005, In : Wireless Networks. 11, 1-2, p. 21-38 18 p.

Research output: Contribution to journalArticle

Ad hoc networks
Routing protocols
Network routing

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Dec 1 2002, p. 12-23. 12 p.

Research output: Contribution to conferencePaper

Ad hoc networks
Routing protocols
Network routing

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 107-124 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Feedback
Managers

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., May 2014, In : IEEE Transactions on Mobile Computing. 13, 5, p. 935-947 13 p., 6579605.

Research output: Contribution to journalArticle

Wireless networks
Network protocols
Feedback
Network performance
Managers

A survey of secure wireless ad hoc routing

Hu, Y. C. & Perrig, A., May 1 2004, In : IEEE Security and Privacy. 2, 3, p. 28-39 12 p.

Research output: Contribution to journalReview article

Routing protocols
Network protocols
Network routing
Network performance
Ad hoc networks

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jun 2016, In : IEEE Transactions on Control of Network Systems. 3, 2, p. 206-217 12 p., 7100909.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Vertex of a graph
Jamming

Bankrupting the jammer

Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
resilience
vulnerability
energy
Sensors

Bankrupting the jammer in WSN

Ashraf, F., Hu, Y-C. & Kravets, R. H., Dec 1 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 317-325 9 p. 6502531. (MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Game theory
Sensors
Testbeds
Sensor nodes

BGP with BGPsec: Attacks and Countermeasures

Li, Q., Liu, J., Hu, Y. C., Xu, M. & Wu, J., Jul 1 2019, In : IEEE Network. 33, 4, p. 194-200 7 p., 8594708.

Research output: Contribution to journalArticle

Network protocols
Internet

Caching strategies in on-demand routing protocols for wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2000, p. 231-242. 12 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Routing protocols
Network routing
Ad hoc networks

CLEF: Limiting the damage caused by large flows in the internet core

Wu, H., Hsiao, H. C., Asoni, D. E., Scherrer, S., Perrig, A. & Hu, Y. C., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer-Verlag, p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage
Limiting
Internet
Router
Routers

Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum

Harshan, J. & Hu, Y. C., Jun 8 2018, 2018 IEEE Wireless Communications and Networking Conference, WCNC 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel capacity
Jamming
Cognitive radio
Transceivers
Transmitters

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control for Near-Field Wireless Charging

Chang, S. Y., Kumar, S. L. S. & Hu, Y. C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2302-2307 6 p. 7980186. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Internet of things

Communication requirements for crash avoidance

Haas, J. J. & Hu, Y-C., Jan 1 2010, Proceedings of the 7th ACM Int. Workshop on VehiculAr InterNETworking, VANET '10, Co-located with MobiCom'10 and 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'10. Association for Computing Machinery, p. 1-10 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Accidents
Power control
Authentication
Automobiles

Convolution Attack on Frequency Hopping by Full-Duplex Radios

Jagadeesh, H. & Hu, Y. C., Jun 2019, In : IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.

Research output: Contribution to journalArticle

Frequency Hopping
Frequency hopping
Radio receivers
Convolution
Frequency shift keying

CRAFT: A new secure congestion control architecture

Kim, D., Chiang, J. T., Hu, Y-C., Perrig, A. & Kumar, P. R., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 705-707 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Bandwidth

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y. C., Dec 1 2007, MobiCom'07: Proceedings of the Thirteenth ACM International Conference on Mobile Computing and Networking. p. 346-349 4 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Wireless networks
Transmitters
Spread spectrum communication
Mobile telecommunication systems

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Feb 1 2011, In : IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.

Research output: Contribution to journalArticle

Jamming
Wireless networks
Transmitters
MATLAB
Communication systems

Data Security in Vehicular Communication Networks

Weimerskirch, A., Haas, J. J., Hu, Y. C. & Laberteaux, K. P., Nov 23 2009, VANET: Vehicular Applications and Inter-Networking Technologies. John Wiley and Sons Ltd, p. 299-363 65 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Security of data
Telecommunication networks

Deadline-Aware Multipath Communication: An Optimization Problem

Chuat, L., Perrig, A. & Hu, Y. C., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 487-498 12 p. 8023147. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Throughput
Communication
Packet loss
Network performance

Demo: Free data communication using wireless charging

Kumar, S. L. S., Chang, S. Y., Viswanathan, S. & Hu, Y. C., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Communication

Deployment and Operation

Hu, Y. C., Klausmann, T., Perrig, A., Reischuk, R. M., Shirley, S., Szalachowski, P. & Ucan, E., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 191-239 49 p. (Information Security and Cryptography; no. 9783319670799).

Research output: Chapter in Book/Report/Conference proceedingChapter

Design and analysis of a lightweight certificate revocation mechanism for VANET

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Nov 9 2009, VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking. p. 89-98 10 p. 1614285. (VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

certification
Railroad cars
Hardware
Bandwidth
Communication

Design and demonstration of live audio and video over multihop wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2002, p. 1211-1216. 6 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Ad hoc networks
Routing protocols
Demonstrations
Radio receivers

Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture

Jetcheva, J. G., Hu, Y. C., PalChaudhuri, S., Saha, A. K. & Johnson, D. B., Jan 1 2003, Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003. Institute of Electrical and Electronics Engineers Inc., p. 32-43 12 p. 1240765. (Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Ad hoc networks
Network architecture
Network routing
Mobile ad hoc networks

Detection of anomaly in train speed for intelligent railway systems

Kang, S., Sristi, S., Karachiwala, J. & Hu, Y-C., Mar 2018, 2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018. Institute of Electrical and Electronics Engineers Inc., 8751374. (2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent systems
Railway
Anomaly
Anomaly Detection
Bayesian Learning

Did you also hear that? Spectrum sensing using Hermitian inner product

Chiang, J. T. & Hu, Y. C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2229-2237 9 p. 6567026. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors
Matched filters
Cognitive radio
Clocks
Uncertainty

Diffie's wireless phone: Heterodyning-based physical-layer encryption

Chiang, J. T. & Hu, Y. C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 470-475 6 p. 6735667. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterodyning
Cryptography
Telephone systems
Networks (circuits)
Costs

Dynamic jamming mitigation for wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Sep 15 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1885-1893 9 p. 4509772. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Wireless networks
Atmospheric spectra
Communication
MATLAB

Efficient certificate revocation list organization and distribution

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.

Research output: Contribution to journalArticle

Vehicle to vehicle communications
Hardware
Bandwidth
Radio receivers
Communication

Efficient constructions for one-way hash chains

Hu, Y. C., Jakobsson, M. & Perrig, A., Oct 17 2005, In : Lecture Notes in Computer Science. 3531, p. 423-441 19 p.

Research output: Contribution to journalConference article

Hash Chain
Network protocols
Sensor networks
Data storage equipment
Electronic document identification systems

Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region

Wu, H., Hsiao, H. C. & Hu, Y. C., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 209-222 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Static random access storage
Throughput
Detectors
Data storage equipment

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, M. J., Shen, M. & Yang, F., Jan 22 2019, 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018. Institute of Electrical and Electronics Engineers Inc., 8624169. (2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Testbeds
Servers
Throughput
Internet

Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding

Liu, Z., Chen, K., Wu, H., Hu, S., Hu, Y. C., Wang, Y. & Zhang, G., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 8486219. (Proceedings - IEEE INFOCOM; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Conservation
Testbeds
Switches
Experiments

Ensuring Cache Freshness in On-Demand Ad Hoc Network Routing Protocols

Hu, Y. C. & Johnson, D. B., Dec 1 2002, Proceedings of the ACM International Workshop on Principles of Mobile Commerce. p. 25-30 6 p. (Proceedings of the ACM International Workshop on Principles of Mobile Commerce).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network routing
Wireless ad hoc networks
Ad hoc networks
Routing protocols
Pollution

Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Jun 1 2004, p. 301-310. 10 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Ad hoc networks
Routing protocols
Network protocols
Scalability

Friends Troubleshooting Network: Towards privacy-preserving, automatic troubleshooting

Wang, H. J., Hu, Y. C., Yuan, C., Zhang, Z. & Wang, Y. M., Dec 1 2004, In : Lecture Notes in Computer Science. 3279, p. 184-194 11 p.

Research output: Contribution to journalConference article

Peer-to-peer Systems
Privacy Preserving
Aggregation
Agglomeration
Privacy Preservation

Fundamental limits on secure clock synchronization and man-in-the-middle detection in fixed wireless networks

Chiang, J. T., Haas, J. J., Hu, Y-C., Kumar, P. R. & Choi, J., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1962-1970 9 p. 5062118. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clocks
Wireless networks
Synchronization
Network protocols
Turnaround time

Hyperservice: Interoperability and programmability across heterogeneous blockchains

Liu, Z., Xiang, Y., Shi, J., Gao, P., Wang, H., Xiao, X., Wen, B. & Hu, Y. C., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 549-566 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Interoperability
Facings
Cryptography
Experiments

Implicit source routes for on-demand ad hoc network routing

Hu, Y-C. & Johnson, D. B., Dec 1 2001, Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing: MobiHoc 2001. p. 1-10 10 p. (Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing: MobiHoc 2001).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network routing
Ad hoc networks
Routing protocols
Network protocols

Insider-attacks on physical-layer group secret-key generation in wireless networks

Harshan, J., Chang, S. Y. & Hu, Y-C., May 10 2017, 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7925526. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Communication
Broadcasting
Topology
Network protocols

Jamming with power boost: Leaky waveguide vulnerability in train systems

Chang, S. Y., Tran, B. A. N., Hu, Y. C. & Jones, D. L., Jan 15 2016, Proceedings - 2015 IEEE 21st International Conference on Parallel and Distributed Systems, ICPADS 2015. IEEE Computer Society, p. 37-43 7 p. 7384276. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2016-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Waveguides
Communication
Telecommunication repeaters
Security systems

JIM-beam: Jamming-resilient wireless flooding based on spatial randomness

Chiang, J. T. & Hu, Y-C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 464-469 6 p. 6735666. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Availability
Antennas
Monte Carlo simulation

JIM-beam: Using spatial randomness to build jamming-resilient wireless flooding networks

Chiang, J. T., Kim, D. & Hu, Y-C., Jul 11 2012, MobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 255-256 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frequency hopping
Jamming
Transmitters
Antennas

Key update at train stations: Two-layer dynamic key update scheme for secure train communications

Chang, S. Y., Cai, S., Seo, H. & Hu, Y. C., Jan 1 2017, Security and Privacy in Communication Networks -12th International Conference, SecureComm 2016, Proceedings. Deng, R., Yegneswaran, V., Weng, J. & Ren, K. (eds.). Springer-Verlag, p. 125-143 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 198 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Seed
Communication
Information technology