关注
Yao Liu
Yao Liu
Associate Professor of Computer Science, University of South Florida
在 cse.usf.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
32692011
Detection of faults and attacks including false data injection attack in smart grid using Kalman filter
K Manandhar, X Cao, F Hu, Y Liu
IEEE transactions on control of network systems 1 (4), 370-379, 2014
6212014
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
Y Liu, P Ning, H Dai, A Liu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
2472010
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
Y Liu, P Ning, H Dai
2010 IEEE symposium on security and privacy, 286-301, 2010
2182010
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1822016
NSDMiner: Automated discovery of network service dependencies
A Natarajan, P Ning, Y Liu, S Jajodia, SE Hutchinson
2012 Proceedings IEEE INFOCOM, 2507-2515, 2012
1702012
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
Z Gao, H Zhu, Y Liu, M Li, Z Cao
2013 Proceedings IEEE INFOCOM, 2751-2759, 2013
1402013
Survey on channel reciprocity based key establishment techniques for wireless systems
T Wang, Y Liu, AV Vasilakos
Wireless Networks 21, 1835-1846, 2015
1182015
Wireless communications under broadband reactive jamming attacks
S Fang, Y Liu, P Ning
IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015
792015
Wivo: Enhancing the security of voice control system via wireless signal in iot environment
Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu
Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018
672018
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing
H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen
IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016
612016
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure
A Liu, P Ning, H Dai, Y Liu
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010
572010
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
A Liu, P Ning, H Dai, Y Liu, C Wang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
552010
Secret key establishment via RSS trajectory matching between wearable devices
Z Li, Q Pei, I Markwood, Y Liu, H Zhu
IEEE Transactions on Information Forensics and security 13 (3), 802-817, 2017
532017
Combating false data injection attacks in smart grid using kalman filter
K Manandhar, X Cao, F Hu, Y Liu
2014 International Conference on Computing, Networking and Communications …, 2014
462014
BitTrickle: Defending against broadband and high-power reactive jamming attacks
Y Liu, P Ning
2012 Proceedings IEEE INFOCOM, 909-917, 2012
442012
Enhanced wireless channel authentication using time-synched link signature
Y Liu, P Ning
2012 Proceedings IEEE INFOCOM, 2636-2640, 2012
392012
Measurement and analysis of an internet streaming service to mobile devices
Y Liu, F Li, L Guo, B Shen, S Chen, Y Lan
IEEE Transactions on Parallel and Distributed Systems 24 (11), 2240-2250, 2012
352012
Where are you from? Confusing location distinction using virtual multipath camouflage
S Fang, Y Liu, W Shen, H Zhu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
322014
Resource allocation and dynamic power control for D2D communication underlaying uplink multi-cell networks
F Jiang, B Wang, C Sun, Y Liu, X Wang
Wireless Networks 24, 549-563, 2018
312018
系统目前无法执行此操作,请稍后再试。
文章 1–20