2009 |
49 | EE | Yingying Chen,
Konstantinos Kleisouris,
Xiaoyan Li,
Wade Trappe,
Richard P. Martin:
A security and robustness performance analysis of localization algorithms to signal strength attacks.
TOSN 5(1): (2009) |
2008 |
48 | EE | Qing Li,
Yih-Chun Hu,
Meiyuan Zhao,
Adrian Perrig,
Jesse Walker,
Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
ASIACCS 2008: 201-204 |
47 | EE | Liang Xiao,
Larry J. Greenstein,
Narayan B. Mandayam,
Wade Trappe:
MIMO-assisted channel-based authentication in wireless networks.
CISS 2008: 642-646 |
46 | EE | Aliye Özge Kaya,
Larry J. Greenstein,
Wade Trappe:
Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements.
GLOBECOM 2008: 4170-4174 |
45 | EE | Liang Xiao,
Larry J. Greenstein,
Narayan B. Mandayam,
Wade Trappe:
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals.
ICC 2008: 1520-1524 |
44 | EE | Shweta Medhekar,
Richard Howard,
Wade Trappe,
Yanyong Zhang,
Peter Wolniansky:
Mining joules and bits: towards a long-life pervasive system.
IPDPS 2008: 1-8 |
43 | EE | Suhas Mathur,
Wade Trappe,
Narayan B. Mandayam,
Chunxuan Ye,
Alex Reznik:
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel.
MOBICOM 2008: 128-139 |
42 | EE | Shu Chen,
Yingying Chen,
Wade Trappe:
Exploiting Environmental Properties for Wireless Localization and Location Aware Applications.
PerCom 2008: 90-99 |
41 | EE | Wenyuan Xu,
Wade Trappe,
Yanyong Zhang:
Anti-jamming timing channels for wireless networks.
WISEC 2008: 203-213 |
40 | EE | Ke Ma,
Yanyong Zhang,
Wade Trappe:
Managing the Mobility of a Mobile Sensor Network Using Network Dynamics.
IEEE Trans. Parallel Distrib. Syst. 19(1): 106-120 (2008) |
39 | EE | Yu Zhang,
Zang Li,
Wade Trappe:
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems.
IEEE Transactions on Information Forensics and Security 3(2): 259-272 (2008) |
38 | EE | Liang Xiao,
Larry J. Greenstein,
Narayan B. Mandayam,
Wade Trappe:
Using the physical layer for wireless authentication in time-variant channels.
IEEE Transactions on Wireless Communications 7(7): 2571-2579 (2008) |
37 | EE | Pandurang Kamat,
Arati Baliga,
Wade Trappe:
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks.
Security and Communication Networks 1(3): 233-244 (2008) |
36 | EE | Wenyuan Xu,
Wade Trappe,
Yanyong Zhang:
Defending wireless sensor networks from radio interference through channel adaptation.
TOSN 4(4): (2008) |
2007 |
35 | EE | Zang Li,
Wade Trappe,
Roy D. Yates:
Secret Communication via Multi-antenna Transmission.
CISS 2007: 905-910 |
34 | EE | Yu Zhang,
Zang Li,
Wade Trappe:
Power-Modulated Challenge-Response Schemes for Verifying Location Claims.
GLOBECOM 2007: 39-43 |
33 | EE | Michael Loiacono,
Justinian Rosca,
Wade Trappe:
The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation.
GLOBECOM 2007: 5117-5122 |
32 | EE | Liang Xiao,
Larry J. Greenstein,
Narayan B. Mandayam,
Wade Trappe:
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication.
ICC 2007: 4646-4651 |
31 | EE | Pandurang Kamat,
Wenyuan Xu,
Wade Trappe,
Yanyong Zhang:
Temporal Privacy in Wireless Sensor Networks.
ICDCS 2007: 23 |
30 | EE | Yingying Chen,
Wade Trappe,
Richard P. Martin:
Attack Detection in Wireless Localization.
INFOCOM 2007: 1964-1972 |
29 | EE | Wenyuan Xu,
Wade Trappe,
Yanyong Zhang:
Channel surfing: defending wireless sensor networks from interference.
IPSN 2007: 499-508 |
28 | EE | Yingying Chen,
Wade Trappe,
Richard P. Martin:
ADLS: Attack Detection for Wireless Localization Using Least Squares.
PerCom Workshops 2007: 610-613 |
27 | EE | Yingying Chen,
Wade Trappe,
Richard P. Martin:
Detecting and Localizing Wireless Spoofing Attacks.
SECON 2007: 193-202 |
26 | EE | Yu Zhang,
Gautam D. Bhanage,
Wade Trappe,
Yanyong Zhang,
Richard Howard:
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing.
SECON 2007: 421-430 |
25 | EE | Robert C. Miller,
Wenyuan Xu,
Pandurang Kamat,
Wade Trappe:
Service Discovery and Device Identification in Cognitive Radio Networks.
SECON 2007: 670-677 |
24 | EE | Masahiro Kuroda,
Ritsu Nomura,
Wade Trappe:
A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios.
SECON 2007: 70-79 |
23 | EE | Qing Li,
Wade Trappe:
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships.
IEEE Transactions on Information Forensics and Security 2(4): 793-808 (2007) |
2006 |
22 | EE | Yingying Chen,
Konstantinos Kleisouris,
Xiaoyan Li,
Wade Trappe,
Richard P. Martin:
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study.
DCOSS 2006: 546-563 |
21 | EE | Hyukjoon Lee,
Seung Hyong Rhee,
Dipankar Raychaudhuri,
Wade Trappe:
Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet.
International Conference on Computational Science (4) 2006: 930-937 |
20 | EE | Shu Chen,
Yu Zhang,
Wade Trappe:
Inverting sensor networks and actuating the environment for spatio-temporal access control.
SASN 2006: 1-12 |
19 | EE | Wenyuan Xu,
Wade Trappe,
Yanyong Zhang:
Channel surfing: defending wireless sensor networks from jamming and interference.
SenSys 2006: 403-404 |
18 | EE | Pandurang Kamat,
Arati Baliga,
Wade Trappe:
An identity-based security framework For VANETs.
Vehicular Ad Hoc Networks 2006: 94-95 |
17 | EE | Zang Li,
Wenyuan Xu,
Rob Miller,
Wade Trappe:
Securing wireless systems via lower layer enforcements.
Workshop on Wireless Security 2006: 33-42 |
16 | EE | Wenyuan Xu,
Ke Ma,
Wade Trappe,
Yanyong Zhang:
Jamming sensor networks: attack and defense strategies.
IEEE Network 20(3): 41-47 (2006) |
15 | EE | Qing Li,
Wade Trappe:
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security.
IEEE Transactions on Information Forensics and Security 1(2): 190-204 (2006) |
2005 |
14 | EE | Wade Trappe,
Yanyong Zhang,
Badri Nath:
MIAMI: methods and infrastructure for the assurance of measurement information.
DMSN 2005: 11-17 |
13 | EE | Pandurang Kamat,
Yanyong Zhang,
Wade Trappe,
Celal Ozturk:
Enhancing Source-Location Privacy in Sensor Network Routing.
ICDCS 2005: 599-608 |
12 | EE | Zang Li,
Wade Trappe,
Yanyong Zhang,
Badri Nath:
Robust statistical methods for securing wireless localization in sensor networks.
IPSN 2005: 91-98 |
11 | EE | Wenyuan Xu,
Wade Trappe,
Yanyong Zhang,
Timothy Wood:
The feasibility of launching and detecting jamming attacks in wireless networks.
MobiHoc 2005: 46-57 |
10 | EE | Z. Jane Wang,
Min Wu,
H. Vicky Zhao,
Wade Trappe,
K. J. Ray Liu:
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation.
IEEE Transactions on Image Processing 14(6): 804-821 (2005) |
9 | EE | Wade Trappe,
Yuke Wang,
K. J. Ray Liu:
Resource-aware conference key establishment for heterogeneous networks.
IEEE/ACM Trans. Netw. 13(1): 134-146 (2005) |
2004 |
8 | EE | Celal Ozturk,
Yanyong Zhang,
Wade Trappe:
Source-location privacy in energy-constrained sensor network routing.
SASN 2004: 88-93 |
7 | | Min Wu,
Wade Trappe,
Z. Jane Wang,
K. J. Ray Liu:
Collusion-resistant multimedia fingerprinting: a unified framework.
Security, Steganography, and Watermarking of Multimedia Contents 2004: 748-759 |
6 | EE | Celal Ozturk,
Yanyong Zhang,
Wade Trappe,
Maximilian Ott:
Source-Location Privacy for Networks of Energy-Constrained Sensors.
WSTFEUS 2004: 68- |
5 | EE | Wenyuan Xu,
Timothy Wood,
Wade Trappe,
Yanyong Zhang:
Channel surfing and spatial retreats: defenses against wireless denial of service.
Workshop on Wireless Security 2004: 80-89 |
4 | EE | Yan Sun,
Wade Trappe,
K. J. Ray Liu:
A scalable multicast key management scheme for heterogeneous wireless networks.
IEEE/ACM Trans. Netw. 12(4): 653-666 (2004) |
2003 |
3 | EE | Mathias Bohge,
Wade Trappe:
An authentication framework for hierarchical ad hoc sensor networks.
Workshop on Wireless Security 2003: 79-87 |
2 | EE | Wade Trappe,
Jie Song,
Radha Poovendran,
K. J. Ray Liu:
Key management and distribution for secure multimedia multicast.
IEEE Transactions on Multimedia 5(4): 544-557 (2003) |
2002 |
1 | | Wade Trappe,
Min Wu,
K. J. Ray Liu:
Anti-collusion codes: multi-user and multimedia perspectives.
ICIP (2) 2002: 149-152 |