Yih-Chun Hu - Publications

Affiliations: 
Electrical and Computer Engineering University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Computer Engineering
Website:
https://ece.illinois.edu/about/directory/faculty/yihchun

17 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Chang S, Kumar SLS, Hu Y, Park Y. Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks Acm Transactions On Sensor Networks. 15: 1-25. DOI: 10.1145/3317686  0.525
2019 Jagadeesh H, Hu Y. Convolution Attack on Frequency Hopping by Full-Duplex Radios Ieee Transactions On Vehicular Technology. 68: 5642-5656. DOI: 10.1109/Tvt.2019.2908008  0.344
2019 Li Q, Liu J, Hu Y, Xu M, Wu J. BGP with BGPsec: Attacks and Countermeasures Ieee Network. 33: 194-200. DOI: 10.1109/Mnet.2018.1800171  0.377
2018 Liu Z, Jin H, Hu Y, Bailey M. Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control Ieee Acm Transactions On Networking. 26: 1948-1961. DOI: 10.1109/Tnet.2018.2854795  0.391
2017 Chang S, Hu Y. SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks Ieee Transactions On Mobile Computing. 16: 3527-3540. DOI: 10.1109/Tmc.2017.2693990  0.551
2017 Ponniah J, Hu Y, Kumar PR. A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks Ieee Transactions On Control of Network Systems. 4: 37-48. DOI: 10.1109/Tcns.2016.2572398  0.419
2016 Chang SY, Hu YC, Laurenti N. SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers Ieee/Acm Transactions On Networking. 24: 1095-1108. DOI: 10.1109/Tnet.2015.2408716  0.542
2016 Ponniah J, Hu Y, Kumar PR. A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking Ieee Transactions On Control of Network Systems. 3: 206-217. DOI: 10.1109/Tcns.2015.2428309  0.375
2012 Hu Y, Kumar PR, Ponniah J. An Orthogonal Multiple Access Coding Scheme Communications in Information and Systems. 12: 41-76. DOI: 10.4310/Cis.2012.V12.N1.A3  0.333
2012 Chiang JT, Haas JJ, Choi J, Hu YC. Secure location verification using simultaneous multilateration Ieee Transactions On Wireless Communications. 11: 584-591. DOI: 10.1109/Twc.2011.120911.101147  0.702
2011 Chiang JT, Hu Y. Cross-layer jamming detection and mitigation in wireless broadcast networks Ieee Acm Transactions On Networking. 19: 286-298. DOI: 10.1109/Tnet.2010.2068576  0.646
2011 Haas JJ, Hu YC, Laberteaux KP. Efficient certificate revocation list organization and distribution Ieee Journal On Selected Areas in Communications. 29: 595-604. DOI: 10.1109/Jsac.2011.110309  0.671
2010 Liu B, Chiang JT, Haas JJ, Hu Y. Coward attacks in vehicular networks Mobile Computing and Communications Review. 14: 34-36. DOI: 10.1145/1923641.1923654  0.698
2010 Haas JJ, Hu YC, Laberteaux KP. The impact of key assignment on VANET privacy Security and Communication Networks. 3: 233-249. DOI: 10.1002/Sec.143  0.675
2009 Li Q, Zhao M, Walker J, Hu YC, Perrig A, Trappe W. SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks Security and Communication Networks. 2: 325-340. DOI: 10.1002/Sec.60  0.404
2006 Hu YC, Perrig A. Wormhole attacks in wireless networks Ieee Journal On Selected Areas in Communications. 24: 370-379. DOI: 10.1109/Jsac.2005.861394  0.426
2002 Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad hoc networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 12-23. DOI: 10.1007/S11276-004-4744-Y  0.38
Show low-probability matches.