2009 | ||
---|---|---|
49 | EE | Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin: A security and robustness performance analysis of localization algorithms to signal strength attacks. TOSN 5(1): (2009) |
2008 | ||
48 | EE | Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe: SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. ASIACCS 2008: 201-204 |
47 | EE | Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: MIMO-assisted channel-based authentication in wireless networks. CISS 2008: 642-646 |
46 | EE | Aliye Özge Kaya, Larry J. Greenstein, Wade Trappe: Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements. GLOBECOM 2008: 4170-4174 |
45 | EE | Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. ICC 2008: 1520-1524 |
44 | EE | Shweta Medhekar, Richard Howard, Wade Trappe, Yanyong Zhang, Peter Wolniansky: Mining joules and bits: towards a long-life pervasive system. IPDPS 2008: 1-8 |
43 | EE | Suhas Mathur, Wade Trappe, Narayan B. Mandayam, Chunxuan Ye, Alex Reznik: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. MOBICOM 2008: 128-139 |
42 | EE | Shu Chen, Yingying Chen, Wade Trappe: Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. PerCom 2008: 90-99 |
41 | EE | Wenyuan Xu, Wade Trappe, Yanyong Zhang: Anti-jamming timing channels for wireless networks. WISEC 2008: 203-213 |
40 | EE | Ke Ma, Yanyong Zhang, Wade Trappe: Managing the Mobility of a Mobile Sensor Network Using Network Dynamics. IEEE Trans. Parallel Distrib. Syst. 19(1): 106-120 (2008) |
39 | EE | Yu Zhang, Zang Li, Wade Trappe: Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. IEEE Transactions on Information Forensics and Security 3(2): 259-272 (2008) |
38 | EE | Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 7(7): 2571-2579 (2008) |
37 | EE | Pandurang Kamat, Arati Baliga, Wade Trappe: Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Security and Communication Networks 1(3): 233-244 (2008) |
36 | EE | Wenyuan Xu, Wade Trappe, Yanyong Zhang: Defending wireless sensor networks from radio interference through channel adaptation. TOSN 4(4): (2008) |
2007 | ||
35 | EE | Zang Li, Wade Trappe, Roy D. Yates: Secret Communication via Multi-antenna Transmission. CISS 2007: 905-910 |
34 | EE | Yu Zhang, Zang Li, Wade Trappe: Power-Modulated Challenge-Response Schemes for Verifying Location Claims. GLOBECOM 2007: 39-43 |
33 | EE | Michael Loiacono, Justinian Rosca, Wade Trappe: The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation. GLOBECOM 2007: 5117-5122 |
32 | EE | Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe: Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. ICC 2007: 4646-4651 |
31 | EE | Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang: Temporal Privacy in Wireless Sensor Networks. ICDCS 2007: 23 |
30 | EE | Yingying Chen, Wade Trappe, Richard P. Martin: Attack Detection in Wireless Localization. INFOCOM 2007: 1964-1972 |
29 | EE | Wenyuan Xu, Wade Trappe, Yanyong Zhang: Channel surfing: defending wireless sensor networks from interference. IPSN 2007: 499-508 |
28 | EE | Yingying Chen, Wade Trappe, Richard P. Martin: ADLS: Attack Detection for Wireless Localization Using Least Squares. PerCom Workshops 2007: 610-613 |
27 | EE | Yingying Chen, Wade Trappe, Richard P. Martin: Detecting and Localizing Wireless Spoofing Attacks. SECON 2007: 193-202 |
26 | EE | Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong Zhang, Richard Howard: Facilitating an Active Transmit-only RFID System Through Receiver-based Processing. SECON 2007: 421-430 |
25 | EE | Robert C. Miller, Wenyuan Xu, Pandurang Kamat, Wade Trappe: Service Discovery and Device Identification in Cognitive Radio Networks. SECON 2007: 670-677 |
24 | EE | Masahiro Kuroda, Ritsu Nomura, Wade Trappe: A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. SECON 2007: 70-79 |
23 | EE | Qing Li, Wade Trappe: Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. IEEE Transactions on Information Forensics and Security 2(4): 793-808 (2007) |
2006 | ||
22 | EE | Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin: The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study. DCOSS 2006: 546-563 |
21 | EE | Hyukjoon Lee, Seung Hyong Rhee, Dipankar Raychaudhuri, Wade Trappe: Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet. International Conference on Computational Science (4) 2006: 930-937 |
20 | EE | Shu Chen, Yu Zhang, Wade Trappe: Inverting sensor networks and actuating the environment for spatio-temporal access control. SASN 2006: 1-12 |
19 | EE | Wenyuan Xu, Wade Trappe, Yanyong Zhang: Channel surfing: defending wireless sensor networks from jamming and interference. SenSys 2006: 403-404 |
18 | EE | Pandurang Kamat, Arati Baliga, Wade Trappe: An identity-based security framework For VANETs. Vehicular Ad Hoc Networks 2006: 94-95 |
17 | EE | Zang Li, Wenyuan Xu, Rob Miller, Wade Trappe: Securing wireless systems via lower layer enforcements. Workshop on Wireless Security 2006: 33-42 |
16 | EE | Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang: Jamming sensor networks: attack and defense strategies. IEEE Network 20(3): 41-47 (2006) |
15 | EE | Qing Li, Wade Trappe: Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. IEEE Transactions on Information Forensics and Security 1(2): 190-204 (2006) |
2005 | ||
14 | EE | Wade Trappe, Yanyong Zhang, Badri Nath: MIAMI: methods and infrastructure for the assurance of measurement information. DMSN 2005: 11-17 |
13 | EE | Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Ozturk: Enhancing Source-Location Privacy in Sensor Network Routing. ICDCS 2005: 599-608 |
12 | EE | Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath: Robust statistical methods for securing wireless localization in sensor networks. IPSN 2005: 91-98 |
11 | EE | Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood: The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005: 46-57 |
10 | EE | Z. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing 14(6): 804-821 (2005) |
9 | EE | Wade Trappe, Yuke Wang, K. J. Ray Liu: Resource-aware conference key establishment for heterogeneous networks. IEEE/ACM Trans. Netw. 13(1): 134-146 (2005) |
2004 | ||
8 | EE | Celal Ozturk, Yanyong Zhang, Wade Trappe: Source-location privacy in energy-constrained sensor network routing. SASN 2004: 88-93 |
7 | Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu: Collusion-resistant multimedia fingerprinting: a unified framework. Security, Steganography, and Watermarking of Multimedia Contents 2004: 748-759 | |
6 | EE | Celal Ozturk, Yanyong Zhang, Wade Trappe, Maximilian Ott: Source-Location Privacy for Networks of Energy-Constrained Sensors. WSTFEUS 2004: 68- |
5 | EE | Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang: Channel surfing and spatial retreats: defenses against wireless denial of service. Workshop on Wireless Security 2004: 80-89 |
4 | EE | Yan Sun, Wade Trappe, K. J. Ray Liu: A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Trans. Netw. 12(4): 653-666 (2004) |
2003 | ||
3 | EE | Mathias Bohge, Wade Trappe: An authentication framework for hierarchical ad hoc sensor networks. Workshop on Wireless Security 2003: 79-87 |
2 | EE | Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu: Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia 5(4): 544-557 (2003) |
2002 | ||
1 | Wade Trappe, Min Wu, K. J. Ray Liu: Anti-collusion codes: multi-user and multimedia perspectives. ICIP (2) 2002: 149-152 |