The feasibility of launching and detecting jamming attacks in wireless networks W Xu, W Trappe, Y Zhang, T Wood Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 1724 | 2005 |
Introduction to cryptography with coding theory W Trappe Pearson Education India, 2006 | 1222 | 2006 |
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel S Mathur, W Trappe, N Mandayam, C Ye, A Reznik Proceedings of the 14th ACM international conference on Mobile computing and …, 2008 | 922 | 2008 |
Jamming sensor networks: attack and defense strategies W Xu, K Ma, W Trappe, Y Zhang IEEE network 20 (3), 41-47, 2006 | 845 | 2006 |
Enhancing source-location privacy in sensor network routing P Kamat, Y Zhang, W Trappe, C Ozturk 25th IEEE international conference on distributed computing systems (ICDCS …, 2005 | 784 | 2005 |
Robust statistical methods for securing wireless localization in sensor networks Z Li, W Trappe, Y Zhang, B Nath IPSN 2005. Fourth International Symposium on Information Processing in …, 2005 | 640 | 2005 |
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ... 19th USENIX Security Symposium (USENIX Security 10), 2010 | 624 | 2010 |
Parknet: drive-by sensing of road-side parking statistics S Mathur, T Jin, N Kasturirangan, J Chandrasekaran, W Xue, M Gruteser, ... Proceedings of the 8th international conference on Mobile systems …, 2010 | 596 | 2010 |
Anti-collusion fingerprinting for multimedia W Trappe, M Wu, ZJ Wang, KJR Liu IEEE transactions on signal processing 51 (4), 1069-1087, 2003 | 577 | 2003 |
Detecting and localizing wireless spoofing attacks Y Chen, W Trappe, RP Martin 2007 4th Annual IEEE Communications Society Conference on sensor, mesh and …, 2007 | 560 | 2007 |
Source-location privacy in energy-constrained sensor network routing C Ozturk, Y Zhang, W Trappe Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor …, 2004 | 542 | 2004 |
Information-theoretically secret key generation for fading wireless channels C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010 | 504 | 2010 |
Channel surfing and spatial retreats: defenses against wireless denial of service W Xu, T Wood, W Trappe, Y Zhang Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004 | 498 | 2004 |
Using the physical layer for wireless authentication in time-variant channels L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008 | 446 | 2008 |
Optimum co-design for spectrum sharing between matrix completion based MIMO radars and a MIMO communication system B Li, AP Petropulu, W Trappe IEEE Transactions on Signal Processing 64 (17), 4562-4575, 2016 | 369 | 2016 |
Securing wireless communications at the physical layer R Liu Springer, 2010 | 326 | 2010 |
Low-energy security: Limits and opportunities in the internet of things W Trappe, R Howard, RS Moore IEEE Security & Privacy 13 (1), 14-21, 2015 | 323 | 2015 |
Fingerprints in the ether: Using the physical layer for wireless authentication L Xiao, L Greenstein, N Mandayam, W Trappe 2007 IEEE International conference on communications, 4646-4651, 2007 | 318 | 2007 |
Collusion-resistant fingerprinting for multimedia M Wu, W Trappe, ZJ Wang, KJR Liu IEEE Signal Processing Magazine 21 (2), 15-27, 2004 | 309 | 2004 |
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An Proceedings of the 12th international conference on Information Processing …, 2013 | 307 | 2013 |