Patrick Tague

Orcid: 0000-0002-7561-6112

According to our database1, Patrick Tague authored at least 85 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

2021
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Datanet: Enabling Seamless, Metered and Trusted Internet Connectivity without Subscriptions.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
LaNet: Real-time Lane Identification by Learning Road SurfaceCharacteristics from Accelerometer Data.
CoRR, 2020

Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces.
CoRR, 2020

Zigator: analyzing the security of zigbee-enabled smart homes.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
Procuring Spontaneous Session-Level Resource Guarantees for Real-Time Applications: An Auction Approach.
IEEE J. Sel. Areas Commun., 2019

Using bluetooth low energy spoofing to dispute device details: demo.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Mimicking Human Behavior in Shared-Resource Computer Networks.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

2018
Smart Home Occupant Identification via Sensor Fusion Across On-Object Devices.
ACM Trans. Sens. Networks, 2018

Privacy Partitioning: Protecting User Data During the Deep Learning Inference Phase.
CoRR, 2018

<i>UniverSense</i>: IoT Device Pairing through Heterogeneous Sensing Signals.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

Optimizing a MisInformation and MisBehavior (MIB) Attack Targeting Vehicle Platoons.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Large-Scale Realistic Network Data Generation on a Budget.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

To Accept or Not to Accept: The Question of Supplemental Discount Offers in Mobile Data Plans.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
Design Experiences in Minimalistic Flying Sensor Node Platform through SensorFly.
ACM Trans. Sens. Networks, 2017

XRec: Behavior-Based User Recognition Across Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Convoy: Physical Context Verification for Vehicle Platoon Admission.
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017

Towards continuous and passive authentication across mobile devices: an empirical study.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

SmartAuth: User-Centered Authorization for the Internet of Things.
Proceedings of the 26th USENIX Security Symposium, 2017

IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

<i>Sensetribute</i>: smart home occupant identification via fusion across on-object sensing devices.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017

Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

2016
Swords and shields: a study of mobile game hacks and existing defenses.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control.
Wirel. Networks, 2015

Is your commute driving you crazy?: a study of misbehavior in vehicular platoons.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Isolation of Multiple Anonymous Attackers in Mobile Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

Recognizing new activities with limited training data.
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

I did not smoke 100 cigarettes today!: avoiding false positives in real-world activity recognition.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

SuperAD: supervised activity discovery.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Supporting Privacy-Conscious App Update Decisions with User Reviews.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents.
Pervasive Mob. Comput., 2014

Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

PrivateDroid: Private Browsing Mode for Android.
Proceedings of the 13th IEEE International Conference on Trust, 2014

All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Proximity-based wireless access control through considerate jamming.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

IdentityLink: user-device linking through visual and RF-signal cues.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

JADE: Jamming-averse routing on cognitive radio mesh networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

A5: Automated Analysis of Adversarial Android Applications.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

OAuth Demystified for Mobile Application Developers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Energy-governed resilient networked systems.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Selfish manipulation of cooperative cellular communications via channel fabrication.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

ASIA: Accelerated secure in-network aggregation in vehicular sensing networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Network self-organization in the Internet of Things.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

UnLocIn: Unauthorized location inference on smartphones without being caught.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Wireless Mesh Network Simulator for Studying Cross-Layer Jamming Effects.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Self-organization of a mesh hierarchy for smart grid monitoring in outage scenarios.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Stochastic optimization of flow-jamming attacks in multichannel wireless networks.
Proceedings of IEEE International Conference on Communications, 2013

Designing for self-configuration and self-adaptation in the Internet of Things.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
S-SPAN: Secure smart posters in Android using NFC.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Living with boisterous neighbors: Studying the interaction of adaptive jamming and anti-jamming.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection.
Proceedings of the PECCS 2012, 2012

ShortMAC: Efficient Data-Plane Fault Localization.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

STIR-ing the wireless medium with self-tuned, inference-based, real-time jamming.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Survivable smart grid communication: Smart-meters meshes to the rescue.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

All your jammers belong to us - Localization of wireless sensors under jamming attack.
Proceedings of IEEE International Conference on Communications, 2012

Carving secure wi-fi zones with defensive jamming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Jamming-aware traffic allocation for multiple-path routing using portfolio selection.
IEEE/ACM Trans. Netw., 2011

Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Digital Filter Design for Jamming Mitigation in 802.15.4 Communication.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Improving anti-jamming capability and increasing jamming impact with mobility control.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

2009
Mitigation of Control Channel Jamming under Node Capture Attacks.
IEEE Trans. Mob. Comput., 2009

Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Secur. Comput., 2009

Tradeoffs between jamming resilience and communication efficiency in key establishment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

A coding-theoretic approach for efficient message verification over insecure channels.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Linear programming models for jamming attacks on network traffic flows.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Throughput optimization for multipath unicast routing under probabilistic jamming.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Modeling node capture attacks in wireless sensor networks.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
A canonical seed assignment model for key predistribution in wireless sensor networks.
ACM Trans. Sens. Networks, 2007

Modeling adaptive node capture attacks in multi-hop wireless networks.
Ad Hoc Networks, 2007

Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

2006
A general probabilistic model for improving key assignment in wireless networks.
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006


  Loading...