The feasibility of launching and detecting jamming attacks in wireless networks W Xu, W Trappe, Y Zhang, T Wood Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 1627 | 2005 |
Jamming sensor networks: attack and defense strategies W Xu, K Ma, W Trappe, Y Zhang IEEE network 20 (3), 41-47, 2006 | 784 | 2006 |
Dolphinattack: Inaudible voice commands G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 659 | 2017 |
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. I Rouf, RD Miller, HA Mustafa, T Taylor, S Oh, W Xu, M Gruteser, ... USENIX Security Symposium 10, 2010 | 565 | 2010 |
Channel surfing and spatial retreats: defenses against wireless denial of service W Xu, T Wood, W Trappe, Y Zhang Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004 | 477 | 2004 |
Ghost talk: Mitigating EMI signal injection attacks against analog sensors DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu 2013 IEEE Symposium on Security and Privacy, 145-159, 2013 | 454 | 2013 |
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi NDSS 14, 23-26, 2014 | 336 | 2014 |
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle C Yan, W Xu, J Liu Def Con 24 (8), 109, 2016 | 323 | 2016 |
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks T Trippel, O Weisse, W Xu, P Honeyman, K Fu 2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017 | 271 | 2017 |
Channel surfing: defending wireless sensor networks from interference W Xu, W Trappe, Y Zhang Proceedings of the 6th international conference on Information processing in …, 2007 | 266 | 2007 |
Securing wireless systems via lower layer enforcements Z Li, W Xu, R Miller, W Trappe Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006 | 240 | 2006 |
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu 2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13), 2013 | 172 | 2013 |
Anti-jamming timing channels for wireless networks W Xu, W Trappe, Y Zhang Proceedings of the first ACM conference on Wireless network security, 203-213, 2008 | 150 | 2008 |
Neighborhood watch: Security and privacy analysis of automatic meter reading systems I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 141 | 2012 |
A large-scale empirical analysis of chinese web passwords Z Li, W Han, W Xu 23rd {USENIX} Security Symposium ({USENIX} Security 14), 559-574, 2014 | 127 | 2014 |
KinWrite: Handwriting-Based Authentication Using Kinect. J Tian, C Qu, W Xu, S Wang NDSS 93, 94, 2013 | 118 | 2013 |
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles W Xu, C Yan, W Jia, X Ji, J Liu IEEE Internet of Things Journal 5 (6), 5015-5029, 2018 | 117 | 2018 |
Temporal privacy in wireless sensor networks P Kamat, W Xu, W Trappe, Y Zhang 27th International Conference on Distributed Computing Systems (ICDCS'07), 23-23, 2007 | 110 | 2007 |
Localizing jammers in wireless networks H Liu, X Wenyuan, Y Chen, Z Liu 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 98 | 2009 |
Exploiting jamming-caused neighbor changes for jammer localization Z Liu, H Liu, W Xu, Y Chen IEEE Transactions on Parallel and Distributed Systems 23 (3), 547-555, 2011 | 85 | 2011 |