Yih-Chun Hu

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2019

BGP with BGPsec: Attacks and Countermeasures

Li, Q., Liu, J., Hu, Y. C., Xu, M. & Wu, J., Jul 1 2019, In : IEEE Network. 33, 4, p. 194-200 7 p., 8594708.

Research output: Contribution to journalArticle

Convolution Attack on Frequency Hopping by Full-Duplex Radios

Jagadeesh, H. & Hu, Y. C., Jun 2019, In : IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.

Research output: Contribution to journalArticle

Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks

Chang, S. Y., Kumar, S. L. S., Hu, Y. C. & Park, Y., Jan 1 2019, In : ACM Transactions on Sensor Networks. 15, 3, 27.

Research output: Contribution to journalArticle

2018

Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control

Liu, Z., Jin, H., Hu, Y. C. & Bailey, M., Aug 2018, In : IEEE/ACM Transactions on Networking. 26, 4, p. 1948-1961 14 p., 8418343.

Research output: Contribution to journalArticle

2017

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Mar 2017, In : IEEE Transactions on Control of Network Systems. 4, 1, p. 37-48 12 p., 7478115.

Research output: Contribution to journalArticle

SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks

Chang, S. Y. & Hu, Y. C., Dec 1 2017, In : IEEE Transactions on Mobile Computing. 16, 12, p. 3527-3540 14 p., 7898430.

Research output: Contribution to journalArticle

2016

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jun 2016, In : IEEE Transactions on Control of Network Systems. 3, 2, p. 206-217 12 p., 7100909.

Research output: Contribution to journalArticle

SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers

Chang, S. Y., Hu, Y. C. & Laurenti, N., Apr 2016, In : IEEE/ACM Transactions on Networking. 24, 2, p. 1095-1108 14 p., 7091035.

Research output: Contribution to journalArticle

2015

A clean slate approach to secure wireless networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jan 1 2015, In : Foundations and Trends in Networking. 9, 1, p. 1-105 105 p.

Research output: Contribution to journalArticle

2014

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., May 2014, In : IEEE Transactions on Mobile Computing. 13, 5, p. 935-947 13 p., 6579605.

Research output: Contribution to journalArticle

2012

Secure location verification using simultaneous multilateration

Chiang, J. T., Haas, J. J., Choi, J. & Hu, Y. C., Feb 1 2012, In : IEEE Transactions on Wireless Communications. 11, 2, p. 584-591 8 p., 6108305.

Research output: Contribution to journalArticle

2011

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y. C., Feb 1 2011, In : IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.

Research output: Contribution to journalArticle

Efficient certificate revocation list organization and distribution

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.

Research output: Contribution to journalArticle

Optimal physical carrier sense in wireless networks

Park, K. J., Choi, J., Hou, J. C., Hu, Y. C. & Lim, H., Jan 2011, In : Ad Hoc Networks. 9, 1, p. 16-27 12 p.

Research output: Contribution to journalArticle

2010

The impact of key assignment on VANET privacy

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Jan 1 2010, In : Security and Communication Networks. 3, 2-3, p. 233-249 17 p.

Research output: Contribution to journalArticle

2009

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Zhao, M., Walker, J., Hu, Y-C., Perrig, A. & Trappe, W., Jan 1 2009, In : Security and Communication Networks. 2, 4, p. 325-340 16 p.

Research output: Contribution to journalArticle

2007

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y. C., Oct 1 2007, In : Computer Communication Review. 37, 4, p. 289-300 12 p.

Research output: Contribution to journalArticle

2006

Wormhole attacks in wireless networks

Hu, Y. C. & Perrig, A., Feb 1 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 370-379 10 p.

Research output: Contribution to journalArticle

2005

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2005, In : Wireless Networks. 11, 1-2, p. 21-38 18 p.

Research output: Contribution to journalArticle

2003

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y. C., Johnson, D. B. & Perrig, A., Jul 2003, In : Ad Hoc Networks. 1, 1, p. 175-192 18 p.

Research output: Contribution to journalArticle