2009 |
12 | EE | Yingying Chen,
Konstantinos Kleisouris,
Xiaoyan Li,
Wade Trappe,
Richard P. Martin:
A security and robustness performance analysis of localization algorithms to signal strength attacks.
TOSN 5(1): (2009) |
2008 |
11 | EE | Jie Yang,
Yingying Chen:
A theoretical analysis of wireless localization using RF-based fingerprint matching.
IPDPS 2008: 1-6 |
10 | | Yingying Chen,
Jun Wang,
Shutang Yang:
A Virtual Private Overlay Network Model.
International Conference on Internet Computing 2008: 126-132 |
9 | | Jun Wang,
Yingying Chen,
Shutang Yang:
IP Hierarchy Stack: A New Network Architecture.
International Conference on Internet Computing 2008: 53-58 |
8 | EE | Shu Chen,
Yingying Chen,
Wade Trappe:
Exploiting Environmental Properties for Wireless Localization and Location Aware Applications.
PerCom 2008: 90-99 |
7 | EE | Konstantinos Kleisouris,
Yingying Chen,
Jie Yang,
Richard P. Martin:
The Impact of Using Multiple Antennas on Wireless Localization.
SECON 2008: 55-63 |
6 | EE | Constantin Serban,
Yingying Chen,
Wenxuan Zhang,
Naftaly H. Minsky:
The concept of decentralized and secure electronic marketplace.
Electronic Commerce Research 8(1-2): 79-101 (2008) |
2007 |
5 | EE | Yingying Chen,
Wade Trappe,
Richard P. Martin:
Attack Detection in Wireless Localization.
INFOCOM 2007: 1964-1972 |
4 | EE | Yingying Chen,
Wade Trappe,
Richard P. Martin:
ADLS: Attack Detection for Wireless Localization Using Least Squares.
PerCom Workshops 2007: 610-613 |
3 | EE | Yingying Chen,
Wade Trappe,
Richard P. Martin:
Detecting and Localizing Wireless Spoofing Attacks.
SECON 2007: 193-202 |
2006 |
2 | EE | Yingying Chen,
Konstantinos Kleisouris,
Xiaoyan Li,
Wade Trappe,
Richard P. Martin:
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study.
DCOSS 2006: 546-563 |
1 | EE | Yingying Chen,
John-Austen Francisco,
Konstantinos Kleisouris,
Hongyi Xue,
Richard P. Martin,
Eiman Elnahrawy,
Xiaoyan Li:
GRAIL: general real-time adaptable indoor localization.
SenSys 2006: 351-352 |