Search concepts
|
Selected Filters |
- 1 - 50 out of 61 results
- Export search results
Search results
-
2017
Name Resolution
Asoni, D., Hu, Y. C., Reischuk, R. M. & Trammell, B., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 101-118 18 p. (Information Security and Cryptography; no. 9783319670799).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
2015
A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks
Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 183-190 8 p. 7151071. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
JIM-beam: Using spatial randomness to build jamming-resilient wireless flooding networks
Chiang, J. T., Kim, D. & Hu, Y-C., Jul 11 2012, MobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 255-256 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Optimal physical carrier sense in wireless networks
Park, K. J., Choi, J., Hou, J. C., Hu, Y. C. & Lim, H., Jan 2011, In: Ad Hoc Networks. 9, 1, p. 16-27 12 p.Research output: Contribution to journal › Article › peer-review
-
2017
Protecting vehicular networks privacy in the presence of a single adversarial authority
Chen, C. W., Chang, S. Y., Hu, Y. C. & Chen, Y. W., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. (2017 IEEE Conference on Communications and Network Security, CNS 2017; vol. 2017-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2018
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding
Liu, Z., Chen, K., Wu, H., Hu, S., Hu, Y. C., Wang, Y. & Zhang, G., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 8486219. (Proceedings - IEEE INFOCOM; vol. 2018-April).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Secure MAC-layer protocol for captive portals in wireless hotspots
Choi, J., Chang, S. Y., Ko, D. & Hu, Y. C., Sep 2 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5963508. (IEEE International Conference on Communications).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2019
SmartCrowd: Decentralized and automated incentives for distributed IoT system detection
Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y. C., Zhang, Z., Du, X., Liu, B. & Ren, S., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 1106-1116 11 p. 8884853. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2015
Securing wireless medium access control against insider denial-of-service attackers
Chang, S. Y., Hu, Y. C. & Liu, Z., Dec 3 2015, 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 370-378 9 p. 7346848. (2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2019
BGP with BGPsec: Attacks and Countermeasures
Li, Q., Liu, J., Hu, Y. C., Xu, M. & Wu, J., Jul 1 2019, In: IEEE Network. 33, 4, p. 194-200 7 p., 8594708.Research output: Contribution to journal › Article › peer-review
-
2017
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks
Chang, S. Y. & Hu, Y. C., Dec 1 2017, In: IEEE Transactions on Mobile Computing. 16, 12, p. 3527-3540 14 p., 7898430.Research output: Contribution to journal › Article › peer-review
-
2015
Noah: Keyed noise flooding for wireless confidentiality
Chang, S. Y., Lee, J. & Hu, Y. C., Nov 2 2015, Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 141-148 8 p. (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
Bankrupting the jammer in WSN
Ashraf, F., Hu, Y-C. & Kravets, R. H., Dec 1 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 317-325 9 p. 6502531. (MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2017
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y. C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2019
Hyperservice: Interoperability and programmability across heterogeneous blockchains
Liu, Z., Xiang, Y., Shi, J., Gao, P., Wang, H., Xiao, X., Wen, B. & Hu, Y. C., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 549-566 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
2017
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging
Chang, S. Y., Kumar, S. L. S. & Hu, Y. C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2555-2556 2 p. 7980230. (Proceedings - International Conference on Distributed Computing Systems).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2018
Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum
Harshan, J. & Hu, Y. C., Jun 8 2018, 2018 IEEE Wireless Communications and Networking Conference, WCNC 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2018-April).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
Power control for fair dynamic channel reservation in VANETs
Haghani, P. & Hu, Y-C., Nov 1 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012. p. 659-667 9 p. 6275841. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops; vol. 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Short paper: A practical view of "mixing" identities in vehicular networks
Liu, B., Chiang, J. T., Haas, J. J. & Hu, Y-C., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 157-162 6 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2014
Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region
Wu, H., Hsiao, H. C. & Hu, Y. C., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 209-222 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2018
Signal jamming attacks against communication-based train control: Attack impact and countermeasure
Lakshminarayana, S., Revadigar, G., Karachiwala, J. S., Sravana Kumar, S. L., Hu, Y. C., Chang, S. Y. & Yau, D. K. Y., Jun 18 2018, WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 160-171 12 p. (WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2016
A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking
Ponniah, J., Hu, Y. C. & Kumar, P. R., Jun 2016, In: IEEE Transactions on Control of Network Systems. 3, 2, p. 206-217 12 p., 7100909.Research output: Contribution to journal › Article › peer-review
-
2019
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking
Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y. C., Reed, M. J., Shen, M. & Yang, F., Jan 22 2019, 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018. Institute of Electrical and Electronics Engineers Inc., 8624169. (2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2016
Demo: Free data communication using wireless charging
Kumar, S. L. S., Chang, S. Y., Viswanathan, S. & Hu, Y. C., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Efficient certificate revocation list organization and distribution
Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In: IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.Research output: Contribution to journal › Article › peer-review
-
2014
Mechanized network origin and path authenticity proofs
Zhang, F., Jia, L., Basescu, C., Kim, T. H. J., Hu, Y. C. & Perrig, A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 346-357 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2018
CLEF: Limiting the damage caused by large flows in the internet core
Wu, H., Hsiao, H. C., Asoni, D. E., Scherrer, S., Perrig, A. & Hu, Y. C., 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer-Verlag Berlin Heidelberg, p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
Secure location verification using simultaneous multilateration
Chiang, J. T., Haas, J. J., Choi, J. & Hu, Y. C., Feb 1 2012, In: IEEE Transactions on Wireless Communications. 11, 2, p. 584-591 8 p., 6108305.Research output: Contribution to journal › Article › peer-review
-
2014
A study on false channel condition reporting attacks in wireless networks
Kim, D. & Hu, Y-C., May 2014, In: IEEE Transactions on Mobile Computing. 13, 5, p. 935-947 13 p., 6579605.Research output: Contribution to journal › Article › peer-review
-
2017
Deadline-Aware Multipath Communication: An Optimization Problem
Chuat, L., Perrig, A. & Hu, Y. C., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 487-498 12 p. 8023147. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2015
Lightweight source authentication and path validation
Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y. C. & Perrig, A., Feb 25 2015, In: Computer Communication Review. 44, 4, p. 271-282 12 p.Research output: Contribution to journal › Conference article › peer-review
-
2017
Deployment and Operation
Hu, Y. C., Klausmann, T., Perrig, A., Reischuk, R. M., Shirley, S., Szalachowski, P. & Ucan, E., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 191-239 49 p. (Information Security and Cryptography; no. 9783319670799).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
2012
SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination
Chang, S. Y., Hu, Y. C. & Laurenti, N., Sep 28 2012, MobiCom'12 - Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. p. 77-88 12 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Low-cost mitigation of privacy loss due to radiometric identification
Haas, J. J., Hu, Y. C. & Laurenti, N., 2011, MobiCom'11 - Proceedings of the 17th Annual International Conference on Mobile Computing and Networking and Co-Located Workshops - VANET 2011 Workshop, VANET'11. p. 31-40 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
A lightweight deterministic MAC protocol using low cross-correlation sequences
Kim, D., Esteki, D. J., Hu, Y. C. & Kumar, P. R., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134489. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2017
Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks
Chang, S. Y., Kumar, S. L. S., Tran, B. A. N., Viswanathan, S., Park, Y. & Hu, Y. C., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 52-57 6 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks
Ponniah, J., Hu, Y. C. & Kumar, P. R., Mar 2017, In: IEEE Transactions on Control of Network Systems. 4, 1, p. 37-48 12 p., 7478115.Research output: Contribution to journal › Article › peer-review
-
2015
A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks
Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 175-182 8 p. 7151070. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2017
Securing balise-based train control systems using cryptographic random fountains
Harshan, J., Chang, S. Y., Kang, S. & Hu, Y. C., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., p. 405-410 6 p. (2017 IEEE Conference on Communications and Network Security, CNS 2017; vol. 2017-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2016
Jamming with power boost: Leaky waveguide vulnerability in train systems
Chang, S. Y., Tran, B. A. N., Hu, Y. C. & Jones, D. L., Jan 15 2016, Proceedings - 2015 IEEE 21st International Conference on Parallel and Distributed Systems, ICPADS 2015. IEEE Computer Society, p. 37-43 7 p. 7384276. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2016-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2015
A clean slate approach to secure wireless networking
Ponniah, J., Hu, Y. C. & Kumar, P. R., 2015, In: Foundations and Trends in Networking. 9, 1, p. 1-105 105 p.Research output: Contribution to journal › Article › peer-review
-
2016
SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers
Chang, S. Y., Hu, Y. C. & Laurenti, N., Apr 2016, In: IEEE/ACM Transactions on Networking. 24, 2, p. 1095-1108 14 p., 7091035.Research output: Contribution to journal › Article › peer-review
-
2020
Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning
Kim, T., Jung, I. Y. & Hu, Y. C., Dec 1 2020, In: Human-centric Computing and Information Sciences. 10, 1, 36.Research output: Contribution to journal › Article › peer-review
Open Access -
2017
Insider-attacks on physical-layer group secret-key generation in wireless networks
Harshan, J., Chang, S. Y. & Hu, Y. C., May 10 2017, 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7925526. (IEEE Wireless Communications and Networking Conference, WCNC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
Body area network security: Robust key establishment using human body channel
Chang, S. Y., Hu, Y. C., Anderson, H., Fu, T. & Huang, E. Y. L., 2012.Research output: Contribution to conference › Paper › peer-review
-
2019
Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks
Chang, S. Y., Kumar, S. L. S., Hu, Y. C. & Park, Y., 2019, In: ACM Transactions on Sensor Networks. 15, 3, 27.Research output: Contribution to journal › Article › peer-review
-
2018
Detection of anomaly in train speed for intelligent railway systems
Kang, S., Sristi, S., Karachiwala, J. & Hu, Y. C., Mar 2018, 2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018. Institute of Electrical and Electronics Engineers Inc., 8751374. (2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2017
Key update at train stations: Two-layer dynamic key update scheme for secure train communications
Chang, S. Y., Cai, S., Seo, H. & Hu, Y. C., Jan 1 2017, Security and Privacy in Communication Networks -12th International Conference, SecureComm 2016, Proceedings. Deng, R., Yegneswaran, V., Weng, J. & Ren, K. (eds.). Springer-Verlag Berlin Heidelberg, p. 125-143 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 198 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2011
Bankrupting the jammer
Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2019
Convolution Attack on Frequency Hopping by Full-Duplex Radios
Jagadeesh, H. & Hu, Y. C., Jun 2019, In: IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.Research output: Contribution to journal › Article › peer-review