Jerry T. Chiang

According to our database1, Jerry T. Chiang authored at least 19 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming.
Proceedings of the MobiWac'13, 2013

Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption.
Proceedings of the 32th IEEE Military Communications Conference, 2013

JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Did you also hear that? Spectrum sensing using Hermitian inner product.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Secure cooperative spectrum sensing based on Sybil-resilient clustering.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Secure Location Verification Using Simultaneous Multilateration.
IEEE Trans. Wirel. Commun., 2012

Using anisotropic magnetoresistive (AMR) sensor arrays for electric sub-metering.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Load disaggregation using harmonic analysis and regularized optimization.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Providing availability in the lower layers of a wireless network: philosophies and case studies
PhD thesis, 2011

Cross-layer jamming detection and mitigation in wireless broadcast networks.
IEEE/ACM Trans. Netw., 2011

Short paper: a practical view of "mixing" identities in vehicular networks.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

2010
Coward attacks in vehicular networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.
Proceedings of the Security and Privacy in Communication Networks, 2010

Secure network-wide clock synchronization in wireless sensor networks.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

CRAFT: a new secure congestion control architecture.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Secure and precise location verification using distance bounding and simultaneous multilateration.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Dynamic Jamming Mitigation for Wireless Broadcast Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008


  Loading...