Year |
Citation |
Score |
2020 |
Fan X, Ding H, Zhang Y, Trappe W, Han Z, Howard R. Distributed beamforming based wireless power transfer: Analysis and realization Tsinghua Science and Technology. 25: 758-775. DOI: 10.26599/Tst.2020.9010008 |
0.447 |
|
2020 |
Garnaev A, Trappe W, Petropulu A. A Dilemma in the Communication of a UAV with its Controller International Game Theory Review. 22: 2040003. DOI: 10.1142/S0219198920400034 |
0.312 |
|
2020 |
Garnaev A, Petropulu AP, Trappe W, Vincent Poor H. A Jamming Game With Rival-Type Uncertainty Ieee Transactions On Wireless Communications. 19: 5359-5372. DOI: 10.1109/Twc.2020.2992665 |
0.324 |
|
2020 |
Garnaev A, Petropulu A, Trappe W, Poor HV. A Multi-Jammer Game With Latency as the User’s Communication Utility Ieee Communications Letters. 24: 1899-1903. DOI: 10.1109/Lcomm.2020.2995661 |
0.347 |
|
2017 |
Liu X, Zhao M, Li S, Zhang F, Trappe W. A Security Framework for the Internet of Things in the Future Internet Architecture Future Internet. 9: 27. DOI: 10.3390/Fi9030027 |
0.382 |
|
2017 |
Garnaev A, Trappe W. Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies Entropy. 19: 363. DOI: 10.3390/E19070363 |
0.371 |
|
2017 |
Garnaev A, Trappe W. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities Ieee Transactions On Information Forensics and Security. 12: 1916-1930. DOI: 10.1109/Tifs.2017.2694766 |
0.349 |
|
2016 |
Li B, Petropulu AP, Trappe W. Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System Ieee Transactions On Signal Processing. 64: 4562-4575. DOI: 10.1109/Tsp.2016.2569479 |
0.366 |
|
2016 |
Sun T, Zhang Y, Trappe W. Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing Ieee Transactions On Mobile Computing. 15: 1157-1167. DOI: 10.1109/Tmc.2015.2442254 |
0.388 |
|
2016 |
Garnaev A, Trappe W. A bandwidth monitoring strategy under uncertainty of the adversary's activity Ieee Transactions On Information Forensics and Security. 11: 837-849. DOI: 10.1109/Tifs.2015.2510959 |
0.361 |
|
2016 |
Yuan X, Qin X, Tian F, Jalaian B, Shi Y, Hou YT, Lou W, Trappe W. An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm Ieee Transactions On Cognitive Communications and Networking. 2: 411-426. DOI: 10.1109/Tccn.2016.2615943 |
0.358 |
|
2016 |
Liu Y, Garnarv A, Trappe W. Connectivity jamming game for physical layer attack in peer to peer networks Security and Communication Networks. 9: 6080-6093. DOI: 10.1002/Sec.1758 |
0.409 |
|
2016 |
Liu X, Trappe W. Overlay tunneling as a policy tool for defending mobile ad hoc networks Security and Communication Networks. 9: 4482-4494. DOI: 10.1002/Sec.1640 |
0.399 |
|
2015 |
Liu Y, Trappe W. Topology adaptation for robust ad hoc cyberphysical networks under puncture-style attacks Tsinghua Science and Technology. 20: 364-375. DOI: 10.1109/Tst.2015.7173452 |
0.407 |
|
2015 |
Garnaev A, Trappe W. One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious Ieee Transactions On Information Forensics and Security. 10: 1064-1075. DOI: 10.1109/Tifs.2015.2398360 |
0.377 |
|
2015 |
Trappe W. The challenges facing physical layer security Ieee Communications Magazine. 53: 16-20. DOI: 10.1109/Mcom.2015.7120011 |
0.337 |
|
2015 |
Sagari S, Baysting S, Saha D, Seskar I, Trappe W, Raychaudhuri D. Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks 2015 Ieee International Symposium On Dynamic Spectrum Access Networks, Dyspan 2015. 209-220. DOI: 10.1109/DySPAN.2015.7343904 |
0.303 |
|
2014 |
Garnaev A, Trappe W. Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary’s Characteristics Icst Transactions On Mobile Communications and Applications. 2: e6. DOI: 10.4108/Mca.2.5.E6 |
0.361 |
|
2013 |
Kravtsov K, Wang Z, Trappe W, Prucnal PR. Physical layer secret key generation for fiber-optical networks. Optics Express. 21: 23756-71. PMID 24104288 DOI: 10.1364/Oe.21.023756 |
0.354 |
|
2013 |
Yang J, Chen YJ, Trappe W, Cheng J. Detection and localization of multiple spoofing attackers in wireless networks Ieee Transactions On Parallel and Distributed Systems. 24: 44-58. DOI: 10.1109/Tpds.2012.104 |
0.438 |
|
2013 |
Sankar L, Trappe W, Poor HV, Debbah M. Signal processing for cybersecurity and privacy [from the guest editors] Ieee Signal Processing Magazine. 30: 14-15. DOI: 10.1109/Msp.2013.2264854 |
0.388 |
|
2013 |
Sankar L, Trappe W, Ramchandran K, Poor HV, Debbah M. The role of signal processing in meeting privacy challenges: An overview Ieee Signal Processing Magazine. 30: 95-106. DOI: 10.1109/Msp.2013.2264541 |
0.325 |
|
2012 |
Kaya AO, Trappe W, Greenstein LJ, Chizhik D. Predicting MIMO performance in Urban microcells using ray tracing to characterize the channel Ieee Transactions On Wireless Communications. 11: 2402-2411. DOI: 10.1109/Twc.2012.041612.102335 |
0.328 |
|
2012 |
Miller R, Trappe W. On the vulnerabilities of CSI in MIMO wireless communication systems Ieee Transactions On Mobile Computing. 11: 1386-1398. DOI: 10.1109/Tmc.2011.156 |
0.41 |
|
2011 |
Sun T, Trappe W, Zhang Y. Improved AP association management using machine learning Acm Sigmobile Mobile Computing and Communications Review. 14: 4. DOI: 10.1145/1942268.1942271 |
0.376 |
|
2011 |
Zhang Y, Wu Z, Trappe W. Adaptive location-oriented content delivery in delay-sensitive pervasive applications Ieee Transactions On Mobile Computing. 10: 362-376. DOI: 10.1109/Tmc.2010.167 |
0.365 |
|
2011 |
Trappe W, Poor V, Iwai H, Yener A, Prucnal P, Barros J. Guest Editorial special issue on using the physical layer for securing the next generation of communication systems Ieee Transactions On Information Forensics and Security. 6: 521-522. DOI: 10.1109/Tifs.2011.2160572 |
0.32 |
|
2011 |
Mathur S, Trappe W. BIT-TRAPS: Building information-theoretic traffic privacy into packet streams Ieee Transactions On Information Forensics and Security. 6: 752-762. DOI: 10.1109/Tifs.2011.2138696 |
0.394 |
|
2011 |
Trappe W, Baliga A, Poovendran R. Opening up the last frontiers for securing the future wireless internet Emerging Wireless Technologies and the Future Mobile Internet. 242-282. DOI: 10.1017/CBO9780511921117.010 |
0.312 |
|
2011 |
Russell B, Littman ML, Trappe W. Integrating machine learning in ad hoc routing: A wireless adaptive routing protocol International Journal of Communication Systems. 24: 950-966. DOI: 10.1002/Dac.1202 |
0.39 |
|
2010 |
Li Z, Yates R, Trappe W. Achieving secret communication for fast Rayleigh fading channels Ieee Transactions On Wireless Communications. 9: 2792-2799. DOI: 10.1109/Twc.2010.080210.090948 |
0.327 |
|
2010 |
Chen Y, Yang J, Trappe W, Martin RP. Detecting and localizing identity-based attacks in wireless and sensor networks Ieee Transactions On Vehicular Technology. 59: 2418-2434. DOI: 10.1109/Tvt.2010.2044904 |
0.44 |
|
2010 |
Chen S, Chen Y, Trappe W. Inverting systems of embedded sensors for position verification in location-aware applications Ieee Transactions On Parallel and Distributed Systems. 21: 722-736. DOI: 10.1109/Tpds.2009.110 |
0.336 |
|
2010 |
Ye C, Mathur S, Reznik A, Shah Y, Trappe W, Mandayam NB. Information-Theoretically secret key generation for fading wireless channels Ieee Transactions On Information Forensics and Security. 5: 240-254. DOI: 10.1109/Tifs.2010.2043187 |
0.411 |
|
2010 |
Mathur S, Reznik A, Ye C, Mukherjee R, Rahman A, Shah Y, Trappe W, Mandayam N. Exploiting the physical layer for enhanced security Ieee Wireless Communications. 17: 63-70. DOI: 10.1109/Mwc.2010.5601960 |
0.415 |
|
2010 |
Li Z, Yates R, Trappe W. Secrecy capacity of independent parallel channels Securing Wireless Communications At the Physical Layer. 1-18. DOI: 10.1007/978-1-4419-1385-2_1 |
0.346 |
|
2009 |
Kamat P, Xu W, Trappe W, Zhang Y. Temporal privacy in wireless sensor networks: Theory and practice Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1614379.1614380 |
0.399 |
|
2009 |
Chen Y, Kleisouris K, Li X, Trappe W, Martin RP. A security and robustness performance analysis of localization algorithms to signal strength attacks Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1464420.1464422 |
0.347 |
|
2009 |
Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based spoofing detection in frequency-selective Rayleigh channels Ieee Transactions On Wireless Communications. 8: 5948-5956. DOI: 10.1109/Twc.2009.12.081544 |
0.366 |
|
2009 |
Kaya AO, Greenstein LJ, Trappe W. Characterizing indoor wireless channels via ray tracing combined with stochastic modeling Ieee Transactions On Wireless Communications. 8: 4165-4175. DOI: 10.1109/Twc.2009.080785 |
0.316 |
|
2009 |
Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based detection of sybil attacks in wireless networks Ieee Transactions On Information Forensics and Security. 4: 492-503. DOI: 10.1109/Tifs.2009.2026454 |
0.459 |
|
2009 |
Yang J, Chen Y, Trappe W. Detecting spoofing attacks in mobile wireless environments 2009 6th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2009. DOI: 10.1109/SAHCN.2009.5168926 |
0.318 |
|
2009 |
Rodoper M, Trappe W, Jung E. An IBC and certificate based hybrid approach to WiMAX security Journal of Communications and Networks. 11: 615-625. DOI: 10.1109/Jcn.2009.6388415 |
0.38 |
|
2009 |
Perrig A, Trappe W, Gligor V, Poovendran R, Lee H. Secure wireless networking Journal of Communications and Networks. 11: 533-537. DOI: 10.1109/Jcn.2009.6388406 |
0.376 |
|
2009 |
Yang J, Chen Y, Trappe W, Cheng J. Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks Proceedings - Ieee Infocom. 666-674. DOI: 10.1109/INFCOM.2009.5061974 |
0.324 |
|
2009 |
Chen Y, Xu W, Trappe W, Zhang Y. Securing emerging wireless systems: Lower-layer approaches Securing Emerging Wireless Systems: Lower-Layer Approaches. 1-361. DOI: 10.1007/978-0-387-88491-2 |
0.346 |
|
2009 |
Li Q, Zhao M, Walker J, Hu YC, Perrig A, Trappe W. SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks Security and Communication Networks. 2: 325-340. DOI: 10.1002/Sec.60 |
0.397 |
|
2008 |
Xu W, Trappe W, Zhang Y. Defending wireless sensor networks from radio interference through channel adaptation Acm Transactions On Sensor Networks. 4. DOI: 10.1145/1387663.1387664 |
0.392 |
|
2008 |
Chen S, Chen Y, Trappe W. Exploiting environmental properties for wireless localization Acm Sigmobile Mobile Computing and Communications Review. 12: 49. DOI: 10.1145/1374512.1374528 |
0.369 |
|
2008 |
Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Using the physical layer for wireless authentication in time-variant channels Ieee Transactions On Wireless Communications. 7: 2571-2579. DOI: 10.1109/Twc.2008.070194 |
0.382 |
|
2008 |
Ma K, Zhang Y, Trappe W. Managing the mobility of a mobile sensor network using network dynamics Ieee Transactions On Parallel and Distributed Systems. 19: 106-120. DOI: 10.1109/Tpds.2007.1113 |
0.352 |
|
2008 |
Zhang Y, Li Z, Trappe W. Evaluation of localization attacks on power-modulated challenge-response systems Ieee Transactions On Information Forensics and Security. 3: 259-272. DOI: 10.1109/Tifs.2008.919121 |
0.401 |
|
2008 |
Yang J, Chen Y, Trappe W. Detecting sybil attacks in wireless and sensor networks using cluster analysis 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 834-839. DOI: 10.1109/MAHSS.2008.4660139 |
0.322 |
|
2008 |
Xiao L, Greenstein L, Mandayam N, Trappe W. A physical-layer technique to enhance authentication for mobile terminals Ieee International Conference On Communications. 1520-1524. DOI: 10.1109/ICC.2008.294 |
0.306 |
|
2008 |
Kamat P, Baliga A, Trappe W. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks Security and Communication Networks. 1: 233-244. DOI: 10.1002/Sec.27 |
0.428 |
|
2007 |
Li Q, Trappe W. Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships Ieee Transactions On Information Forensics and Security. 2: 793-808. DOI: 10.1109/Tifs.2007.910236 |
0.394 |
|
2007 |
Chen Y, Trappe W, Martin RP. Detecting and localizing wireless spoofing attacks 2007 4th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 193-202. DOI: 10.1109/SAHCN.2007.4292831 |
0.304 |
|
2007 |
Kuroda M, Nomurcr R, Trappe W. A radio-independent authentication protocol (EAP-CRP) for networks of cognitive radios 2007 4th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 70-79. DOI: 10.1109/SAHCN.2007.4292819 |
0.327 |
|
2007 |
Li Q, Trappe W. Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks 2006 3rd Annual Ieee Communications Society On Sensor and Adhoc Communications and Networks, Secon 2006. 1: 50-59. DOI: 10.1109/SAHCN.2006.288408 |
0.304 |
|
2007 |
Chen Y, Trappe W, Martin RP. Attack detection in wireless localization Proceedings - Ieee Infocom. 1964-1972. DOI: 10.1109/INFCOM.2007.228 |
0.312 |
|
2006 |
Zang L, Wenyuan X, Miller R, Trappe W. Securing wireless systems via lower layer enforcements Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 33-42. DOI: 10.1145/1161289.1161297 |
0.337 |
|
2006 |
Li Q, Trappe W. Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security Ieee Transactions On Information Forensics and Security. 1: 190-204. DOI: 10.1109/Tifs.2006.873599 |
0.427 |
|
2006 |
Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: Attack and defense strategies Ieee Network. 20: 41-47. DOI: 10.1109/Mnet.2006.1637931 |
0.45 |
|
2005 |
Wang ZJ, Wu M, Zhao HV, Trappe W, Liu KJ. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 14: 804-21. PMID 15971779 DOI: 10.1109/Tip.2005.847284 |
0.477 |
|
2005 |
Trappe W, Wang Y, Liu KJR. Resource-aware conference key establishment for heterogeneous networks Ieee/Acm Transactions On Networking. 13: 134-146. DOI: 10.1109/Tnet.2004.842236 |
0.39 |
|
2005 |
Li Q, Trappe W. Staggered TESLA: A multicast authentication scheme resistant to DoS attacks Globecom - Ieee Global Telecommunications Conference. 3: 1670-1675. DOI: 10.1109/GLOCOM.2005.1577934 |
0.304 |
|
2005 |
Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 46-57. |
0.359 |
|
2004 |
Wang ZJ, Wu M, Trappe W, Liu KJR. Group-oriented fingerprinting for multimedia forensics Eurasip Journal On Applied Signal Processing. 2004: 2153-2173. DOI: 10.1155/S1110865704312151 |
0.374 |
|
2004 |
Sun Y, Trappe W, Liu KJR. A scalable multicast key management scheme for heterogeneous wireless networks Ieee/Acm Transactions On Networking. 12: 653-666. DOI: 10.1109/Tnet.2004.833129 |
0.483 |
|
2004 |
Xu W, Wood T, Trappe W, Zhang Y. Channel surfing and spatial retreats: Defenses against wireless denial of service Proceedings of the 2004 Acm Workshop On Wireless Security, Wise. 80-89. |
0.324 |
|
2004 |
Xu W, Trappe W, Paul S. Key management for 3G MBMS security Globecom - Ieee Global Telecommunications Conference. 4: 2276-2280. |
0.32 |
|
2003 |
Trappe W, Wu M, Wang ZJ, Liu KJR. Anti-collusion fingerprinting for multimedia Ieee Transactions On Signal Processing. 51: 1069-1087. DOI: 10.1109/Tsp.2003.809378 |
0.343 |
|
2003 |
Trappe W, Song J, Poovendran R, Liu KJR. Key Management and Distribution for Secure Multimedia Multicast Ieee Transactions On Multimedia. 5: 544-557. DOI: 10.1109/Tmm.2003.813279 |
0.531 |
|
2003 |
Sun Y, Trappe W, Ray Liu KJ. Topology-aware Key Management Schemes for Wireless Multicast Globecom - Ieee Global Telecommunications Conference. 3: 1471-1475. |
0.328 |
|
2001 |
Song J, Poovendran R, Trappe W, Liu KJR. A dynamic key distribution scheme using data embedding for secure multimedia multicast Proceedings of Spie - the International Society For Optical Engineering. 4314: 618-628. DOI: 10.1117/12.435446 |
0.421 |
|
Show low-probability matches. |