Year |
Citation |
Score |
2019 |
Chang S, Kumar SLS, Hu Y, Park Y. Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks Acm Transactions On Sensor Networks. 15: 1-25. DOI: 10.1145/3317686 |
0.525 |
|
2019 |
Jagadeesh H, Hu Y. Convolution Attack on Frequency Hopping by Full-Duplex Radios Ieee Transactions On Vehicular Technology. 68: 5642-5656. DOI: 10.1109/Tvt.2019.2908008 |
0.344 |
|
2019 |
Li Q, Liu J, Hu Y, Xu M, Wu J. BGP with BGPsec: Attacks and Countermeasures Ieee Network. 33: 194-200. DOI: 10.1109/Mnet.2018.1800171 |
0.377 |
|
2018 |
Liu Z, Jin H, Hu Y, Bailey M. Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control Ieee Acm Transactions On Networking. 26: 1948-1961. DOI: 10.1109/Tnet.2018.2854795 |
0.391 |
|
2017 |
Chang S, Hu Y. SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks Ieee Transactions On Mobile Computing. 16: 3527-3540. DOI: 10.1109/Tmc.2017.2693990 |
0.551 |
|
2017 |
Ponniah J, Hu Y, Kumar PR. A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks Ieee Transactions On Control of Network Systems. 4: 37-48. DOI: 10.1109/Tcns.2016.2572398 |
0.419 |
|
2016 |
Chang SY, Hu YC, Laurenti N. SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers Ieee/Acm Transactions On Networking. 24: 1095-1108. DOI: 10.1109/Tnet.2015.2408716 |
0.542 |
|
2016 |
Ponniah J, Hu Y, Kumar PR. A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking Ieee Transactions On Control of Network Systems. 3: 206-217. DOI: 10.1109/Tcns.2015.2428309 |
0.375 |
|
2012 |
Hu Y, Kumar PR, Ponniah J. An Orthogonal Multiple Access Coding Scheme Communications in Information and Systems. 12: 41-76. DOI: 10.4310/Cis.2012.V12.N1.A3 |
0.333 |
|
2012 |
Chiang JT, Haas JJ, Choi J, Hu YC. Secure location verification using simultaneous multilateration Ieee Transactions On Wireless Communications. 11: 584-591. DOI: 10.1109/Twc.2011.120911.101147 |
0.702 |
|
2011 |
Chiang JT, Hu Y. Cross-layer jamming detection and mitigation in wireless broadcast networks Ieee Acm Transactions On Networking. 19: 286-298. DOI: 10.1109/Tnet.2010.2068576 |
0.646 |
|
2011 |
Haas JJ, Hu YC, Laberteaux KP. Efficient certificate revocation list organization and distribution Ieee Journal On Selected Areas in Communications. 29: 595-604. DOI: 10.1109/Jsac.2011.110309 |
0.671 |
|
2010 |
Liu B, Chiang JT, Haas JJ, Hu Y. Coward attacks in vehicular networks Mobile Computing and Communications Review. 14: 34-36. DOI: 10.1145/1923641.1923654 |
0.698 |
|
2010 |
Haas JJ, Hu YC, Laberteaux KP. The impact of key assignment on VANET privacy Security and Communication Networks. 3: 233-249. DOI: 10.1002/Sec.143 |
0.675 |
|
2009 |
Li Q, Zhao M, Walker J, Hu YC, Perrig A, Trappe W. SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks Security and Communication Networks. 2: 325-340. DOI: 10.1002/Sec.60 |
0.404 |
|
2006 |
Hu YC, Perrig A. Wormhole attacks in wireless networks Ieee Journal On Selected Areas in Communications. 24: 370-379. DOI: 10.1109/Jsac.2005.861394 |
0.426 |
|
2002 |
Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad hoc networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 12-23. DOI: 10.1007/S11276-004-4744-Y |
0.38 |
|
Show low-probability matches. |