Patrick Tague, Ph.D. - Publications

Affiliations: 
2009 University of Washington, Seattle, Seattle, WA 
Area:
Electronics and Electrical Engineering, Computer Engineering

33 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Harishankar M, Pilaka S, Sharma P, Srinivasan N, Joe-Wong C, Tague P. Procuring Spontaneous Session-Level Resource Guarantees for Real-Time Applications: An Auction Approach Ieee Journal On Selected Areas in Communications. 37: 1534-1548. DOI: 10.1109/Jsac.2019.2916487  0.487
2015 Kim YS, Tague P, Lee H, Kim H. A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control Wireless Networks. 21: 2631-2647. DOI: 10.1007/S11276-015-0935-Y  0.518
2015 Ricks B, Tague P. Isolation of multiple anonymous attackers in mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 32-45. DOI: 10.1007/978-3-319-25645-0_3  0.425
2014 Kim YS, Tague P. Proximity-based wireless access control through considerate jamming Spme 2014 - Proceedings of the Acm Mobicom Workshop On Security and Privacy in Mobile Environments. 19-23. DOI: 10.1145/2646584.2646588  0.307
2014 Kim YS, Tian Y, Nguyen LT, Tague P. LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks 2014 Ieee Conference On Communications and Network Security, Cns 2014. 427-435. DOI: 10.1109/CNS.2014.6997512  0.368
2014 Kim YS, Debruhl B, Tague P. JADE: Jamming-averse routing on cognitive radio mesh networks 2014 Ieee Conference On Communications and Network Security, Cns 2014. 21-28. DOI: 10.1109/CNS.2014.6997461  0.502
2014 Debruhl B, Tague P. Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents Pervasive and Mobile Computing. 12: 244-257. DOI: 10.1016/J.Pmcj.2013.12.005  0.331
2014 Athreya AP, Wang X, Kim YS, Tian Y, Tague P. Resistance is not futile: Detecting DDoS attacks without packet inspection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8267: 174-188. DOI: 10.1007/978-3-319-05149-9_11  0.489
2013 Adhikarla S, Kang MS, Tague P. Selfish manipulation of cooperative cellular communications via channel fabrication Wisec 2013 - Proceedings of the 6th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 49-54. DOI: 10.1145/2462096.2462105  0.371
2013 Wang X, Tague P. ASIA: Accelerated secure in-network aggregation in vehicular sensing networks 2013 Ieee International Conference On Sensing, Communications and Networking, Secon 2013. 514-522. DOI: 10.1109/SAHCN.2013.6645023  0.467
2013 Kim YS, Tague P. Wireless mesh network simulator for studying cross-layer jamming effects Proceedings - Ieee 10th International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2013. 437-438. DOI: 10.1109/MASS.2013.92  0.527
2013 Kim YS, Debruhl B, Tague P. MeshJam: Intelligent jamming attack and defense in IEEE 802.11s wireless mesh networks Proceedings - Ieee 10th International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2013. 560-564. DOI: 10.1109/MASS.2013.59  0.543
2013 Athreya AP, Tague P. Self-organization of a mesh hierarchy for smart grid monitoring in outage scenarios 2013 Ieee Pes Innovative Smart Grid Technologies Conference, Isgt 2013. DOI: 10.1109/ISGT.2013.6497871  0.303
2013 Kim YS, Debruhl B, Tague P. Stochastic optimization of flow-jamming attacks in multichannel wireless networks Ieee International Conference On Communications. 2165-2170. DOI: 10.1109/ICC.2013.6654848  0.446
2012 Kim YS, Tague P, Lee H, Kim H. Carving secure Wi-Fi zones with defensive jamming Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 53-54. DOI: 10.1145/2414456.2414487  0.408
2012 DeBruhl B, Kim YS, Weinberg Z, Tague P. STIR-ing the wireless medium with self-tuned, inference-based, real-time jamming Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 326-334. DOI: 10.1109/MASS.2012.6502532  0.389
2012 Kim YS, Mokaya F, Chen E, Tague P. All your jammers belong to us - Localization of wireless sensors under jamming attack Ieee International Conference On Communications. 949-954. DOI: 10.1109/ICC.2012.6364441  0.471
2011 Tague P, Nabar S, Ritcey JA, Poovendran R. Jamming-aware traffic allocation for multiple-path routing using portfolio selection Ieee/Acm Transactions On Networking. 19: 184-194. DOI: 10.1109/Tnet.2010.2057515  0.72
2011 Athreya AP, Tague P. Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 146-148. DOI: 10.1109/SAHCN.2011.5984886  0.431
2010 Tague P. Improving anti-jamming capability and increasing jamming impact with mobility control 2010 Ieee 7th International Conference On Mobile Adhoc and Sensor Systems, Mass 2010. 501-506. DOI: 10.1109/MASS.2010.5663920  0.538
2009 Slater D, Poovendran R, Tague P, Matt BJ. Tradeoffs between jamming resilience and communication efficiency in key establishment Mobile Computing and Communications Review. 13: 14-25. DOI: 10.1145/1558590.1558593  0.632
2009 Slater D, Tague P, Poovendran R, Matt BJ. A coding-theoretic approach for efficient message verification over insecure channels Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 151-160. DOI: 10.1145/1514274.1514297  0.595
2009 Tague P, Li M, Poovendran R. Mitigation of control channel jamming under node capture attacks Ieee Transactions On Mobile Computing. 8: 1221-1234. DOI: 10.1109/Tmc.2009.33  0.611
2009 Tague P, Slater D, Rogers J, Poovendran R. Evaluating the vulnerability of network traffic using joint security and routing analysis Ieee Transactions On Dependable and Secure Computing. 6: 111-123. DOI: 10.1109/Tdsc.2008.60  0.712
2009 Slater D, Tague P, Poovendran R, Li M. A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference 0.659
2008 Tague P, Slater D, Poovendran R, Noubir G. Linear programming models for jamming attacks on network traffic flows Proceedings of the 6th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2008. 207-216. DOI: 10.1109/WIOPT.2008.4586066  0.587
2008 Tague P, Nabar S, Ritcey JA, Slater D, Poovendran R. Throughput optimization for multipath unicast routing under probabilistic jamming Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2008.4699741  0.698
2008 Tague P, Slater D, Rogers J, Poovendran R. Vulnerability of network traffic under node capture attacks using circuit theoretic analysis Proceedings - Ieee Infocom. 664-672. DOI: 10.1109/INFOCOM.2007.41  0.694
2008 Tague P, Poovendran R. Modeling node capture attacks in wireless sensor networks 46th Annual Allerton Conference On Communication, Control, and Computing. 1221-1224. DOI: 10.1109/ALLERTON.2008.4797699  0.66
2007 Tague P, Poovendran R. A canonical seed assignment model for key predistribution in wireless sensor networks Acm Transactions On Sensor Networks. 3. DOI: 10.1145/1281492.1281494  0.688
2007 Tague P, Li M, Poovendran R. Probabilistic mitigation of control channel jamming via random key distribution Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2007.4394778  0.545
2007 Tague P, Poovendran R. Modeling adaptive node capture attacks in multi-hop wireless networks Ad Hoc Networks. 5: 801-814. DOI: 10.1016/j.adhoc.2007.01.002  0.641
2006 Tague P, Poovendran R. A general probabilistic model for improving key assignment in wireless networks 2006 4th International Symposium On Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Wiopt 2006. DOI: 10.1109/WIOPT.2006.1666460  0.699
Show low-probability matches.