Search concepts
|
Selected Filters |
- 50 - 66 out of 66 results
- Export search results
Search results
-
2017
Key update at train stations: Two-layer dynamic key update scheme for secure train communications
Chang, S. Y., Cai, S., Seo, H. & Hu, Y. C., Jan 1 2017, Security and Privacy in Communication Networks -12th International Conference, SecureComm 2016, Proceedings. Deng, R., Yegneswaran, V., Weng, J. & Ren, K. (eds.). Springer-Verlag Berlin Heidelberg, p. 125-143 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 198 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2013
Redundancy offset narrow spectrum: Countermeasure for signal-cancellation based jamming
Chang, S. Y., Hu, Y-C., Chiang, J. & Chang, S. Y., Jan 1 2013, MobiWac 2013 - Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, Co-located with ACM MSWiM 2013. Association for Computing Machinery, p. 51-58 8 p. (MobiWac 2013 - Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, Co-located with ACM MSWiM 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Bankrupting the jammer
Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2013
Did you also hear that? Spectrum sensing using Hermitian inner product
Chiang, J. T. & Hu, Y. C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2229-2237 9 p. 6567026. (Proceedings - IEEE INFOCOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2019
Convolution Attack on Frequency Hopping by Full-Duplex Radios
Jagadeesh, H. & Hu, Y. C., Jun 2019, In: IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.Research output: Contribution to journal › Article › peer-review
-
2012
Load disaggregation using harmonic analysis and regularized optimization
Chiang, J. T., Zhang, T., Chen, B. & Hu, Y. C., Dec 1 2012, 2012 Conference Handbook - Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2012. 6411916. (2012 Conference Handbook - Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2012).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2020
Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks
Harshan, J., Vithalkar, A., Jhunjhunwala, N., Kabra, M., Manav, P. & Hu, Y. C., May 2020, 2020 IEEE Wireless Communications and Networking Conference, WCNC 2020 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9120640. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2020-May).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
MobiHoc'12 program chairs' welcome
Hu, Y-C. & Shakkottai, S., Jul 11 2012, In: Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc).Research output: Contribution to journal › Editorial › peer-review
-
2016
Middlepolice: Toward enforcing destination-defined policies in the middle of the internet
Liu, Z., Jiny, H., Hu, Y. C. & Bailey, M., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1268-1279 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2020
Mitigating denial-of-service attacks on digital contact tracing: Poster abstract
Chen, B. R. & Hu, Y. C., Nov 16 2020, SenSys 2020 - Proceedings of the 2020 18th ACM Conference on Embedded Networked Sensor Systems. Association for Computing Machinery, Inc, p. 770-771 2 p. (SenSys 2020 - Proceedings of the 2020 18th ACM Conference on Embedded Networked Sensor Systems).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks
Jagadeesh, H., Vithalkar, A., Kabra, M., Jhunjhunwala, N., Manav, P. & Hu, Y. C., 2020, (Accepted/In press) In: IEEE Transactions on Dependable and Secure Computing.Research output: Contribution to journal › Article › peer-review
-
2017
The case for in-network replay suppression
Lee, T., Pappas, C., Perrig, A., Gligor, V. & Hu, Y. C., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 862-873 12 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control for Near-Field Wireless Charging
Chang, S. Y., Kumar, S. L. S. & Hu, Y. C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2302-2307 6 p. 7980186. (Proceedings - International Conference on Distributed Computing Systems).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2018
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control
Liu, Z., Jin, H., Hu, Y. C. & Bailey, M., Aug 2018, In: IEEE/ACM Transactions on Networking. 26, 4, p. 1948-1961 14 p., 8418343.Research output: Contribution to journal › Article › peer-review
-
2014
Lightweight source authentication and path validation
Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y. C. & Perrig, A., 2014, SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, p. 271-282 12 p. (SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Cross-layer jamming detection and mitigation in wireless broadcast networks
Chiang, J. T. & Hu, Y. C., Feb 1 2011, In: IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.Research output: Contribution to journal › Article › peer-review