Stephen B. Wicker

Orcid: 0000-0003-3799-5171

Affiliations:
  • Cornell University, Ithaca, NY, USA


According to our database1, Stephen B. Wicker authored at least 114 papers between 1989 and 2021.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2011, "For contributions to wireless information systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The ethics of zero-day exploits - : the NSA meets the trolley car.
Commun. ACM, 2021

2020
eBook surveillance and the threat to freedom of association.
J. Inf. Secur. Appl., 2020

Reading in the panopticon - : your kindle may be spying on you, but you can't be sure.
Commun. ACM, 2020

2019
eBook Readers, Location Surveillance and the Threat to Freedom of Association.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Forced Decryption and the Fifth Amendment: A Technical Perspective.
Proc. IEEE, 2018

Smartphones, contents of the mind, and the fifth amendment.
Commun. ACM, 2018

Vegvisir: A Partition-Tolerant Blockchain for the Internet-of-Things.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Untethered: Deployable Blockchains for IoT Environments.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Internet advertising: technology, ethics, and a serious difference of opinion.
Commun. ACM, 2017

Towards an emergency edge supercloud.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
The future of three-dimensional printing: Intellectual property or intellectual confinement?
New Media Soc., 2016

The Effect of Location Granularity on Semantic Location Inferences.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Digital rights management: The cost to consumers.
Proc. IEEE, 2015

Spatial subterfuge: an experience sampling study to predict deceptive location disclosures.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Hierarchical key management for multi-resolution load data representation.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

2013
Access to the internet is a human right.
Commun. ACM, 2013

Channel Estimation and Feedback in OFDM Systems.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

A Privacy-Aware Design for the Vehicle-to-Grid Framework.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Channel estimation and feedback with continuous time domain parameters.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
On the Rekeying Load in Group Key Distributions Using Cover-Free Families.
IEEE Trans. Inf. Theory, 2012

Selfish Random Access over Wireless Channels with Multipacket Reception.
IEEE J. Sel. Areas Commun., 2012

The loss of location privacy in the cellular age.
Commun. ACM, 2012

Economic analysis of privacy-aware Advanced Metering Infrastructure adoption.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

2011
Privacy-Aware Design Principles for Information Networks.
Proc. IEEE, 2011

Cellular telephony and the question of privacy.
Commun. ACM, 2011

Game theoretic analysis of privacy-aware Advanced Metering Infrastructure.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

A Privacy-Aware Architecture for Demand Response Systems.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Introduction to the Special Issue on Signal and Information Processing for Social Networks.
IEEE J. Sel. Top. Signal Process., 2010

Inferring Personal Information from Demand-Response Systems.
IEEE Secur. Priv., 2010

Application of Reed-Muller Codes for Localization of Malicious Nodes.
Proceedings of IEEE International Conference on Communications, 2010

Partial Connectivity of Multi-hop Two-Dimensional Finite Hybrid Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
On Unbounded Path-Loss Models: Effects of Singularity on Wireless Network Performance.
IEEE J. Sel. Areas Commun., 2009

Redundancy minimizing techniques for robust transmission in wireless networks.
J. Commun. Networks, 2009

Connectivity of Finite Wireless Networks with Random Communication Range Nodes.
Proceedings of IEEE International Conference on Communications, 2009

DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications.
Proceedings of the Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 2009

2008
The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes.
IEEE/ACM Trans. Netw., 2008

Game Theory in Communication Systems [Guest Editorial].
IEEE J. Sel. Areas Commun., 2008

Co-designed anchor-free localization and location-based routing algorithm for rapidly-deployed wireless sensor networks.
Inf. Fusion, 2008

A Combined Localization and Geographic Routing Algorithm for Rapidly-Deployed Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2008

Transactional Confidentiality in Sensor Networks.
IEEE Secur. Priv., 2008

Toward an analytical approach to anonymous wireless networking.
IEEE Commun. Mag., 2008

Reconfiguration in heterogeneous mobile wireless sensor networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

On the asymptotic behavior of selfish transmitters sharing a common channel.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Taking advantage of data correlation to control the topology of wireless sensor networks.
Proceedings of the 2008 International Conference on Telecommunications, 2008

On the Connectivity of Finite Wireless Networks with Multiple Base Stations.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

CareNet: an integrated wireless sensor networking environment for remote healthcare.
Proceedings of the 3rd International ICST Conference on Body Area Networks, 2008

2007
Successive Coding in Multiuser Information Theory.
IEEE Trans. Inf. Theory, 2007

A Duopoly Pricing Game for Wireless IP Services.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Random access game over noisy channels with capture effect.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Optimal Sleep Strategies with Respect to Traffic Patterns in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Event Detection Time for Mobile Sensor Networks Using First Passage Processes.
Proceedings of the Global Communications Conference, 2007

Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Networks of Sensors in Public Spaces: Combining Technology with Art.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Link Dynamics and Protocol Design in a Multihop Mobile Environment.
IEEE Trans. Mob. Comput., 2006

The Analysis of a Game Theoretic MAC Protocol for Wireless Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Anchor-Free Localization in Rapidly-Deployed Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

2005
On the optimal distribution of sensors in a random field.
ACM Trans. Sens. Networks, 2005

Robustness vs. efficiency in sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

2004
Optimal Sequential Paging in Cellular Wireless Networks.
Wirel. Networks, 2004

An upper bound on the sum-rate distortion function and its corresponding rate allocation schemes for the CEO problem.
IEEE J. Sel. Areas Commun., 2004

Asymptotic Pheromone Behavior in Swarm Intelligent Manets.
Proceedings of the Mobile and Wireless Communication Networks, 2004

On the behavior of communication links of a node in a multi-hop mobile environment.
Proceedings of the 5th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2004

How to distribute sensors in a random field?
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004

Characterizing the communication links of a node in a mobile ad hoc network.
Proceedings of IEEE International Conference on Communications, 2004

2003
On the Complexity of Distributed Self-Configuration in Wireless Networks.
Telecommun. Syst., 2003

Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

The energy-robustness tradeoff for routing in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2003

On Selection of Optimal Transmission Power for Ad hoc Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Termite: ad-hoc networking with stigmergy.
Proceedings of the Global Telecommunications Conference, 2003

2002
Design challenges for energy-constrained ad hoc wireless networks.
IEEE Wirel. Commun., 2002

The Impact of Data Aggregation in Wireless Sensor Networks.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

Distributed Problem Solving and the Boundaries of Self-Configuration in Multi-hop Wireless Networks.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
Game theory and the design of self-configuring, adaptive wireless networks.
IEEE Commun. Mag., 2001

Selfish users in Aloha: a game-theoretic approach.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

On the performance of sequential paging for mobile user location.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

Game theory in communications: motivation, explanation, and application to power control.
Proceedings of the Global Telecommunications Conference, 2001

Phase transition phenomena in wireless ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2001

2000
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems.
IEEE Trans. Veh. Technol., 2000

The design and performance of a neural network for predicting turbo decoding error with application to hybrid ARQ protocols.
IEEE Trans. Commun., 2000

Perceptually-Based Robust Image Transmission over Wireless Channels.
Proceedings of the 2000 International Conference on Image Processing, 2000

Solving Large Scale Channel Allocation Problems with Splitting Algorithms.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

A decision-theoretic approach to resource allocation in wireless multimedia networks.
Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 2000), 2000

Analysis of Random Noise and Random Walk Algorithms.
Proceedings of the Principles and Practice of Constraint Programming, 2000

1999
Extended Hamming and BCH soft decision decoders for mobile data applications.
IEEE Trans. Commun., 1999

Iterative maximum-likelihood trellis decoding for block codes.
IEEE Trans. Commun., 1999

A neural network for predicting decoder error in turbo decoders.
IEEE Commun. Lett., 1999

The BCJR Trellis and Trellis Decoders for Some BCH Codes.
Appl. Algebra Eng. Commun. Comput., 1999

Reconfigurable two-stage trellis Reed-Solomon decoding.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
Applications of Error-Control Coding.
IEEE Trans. Inf. Theory, 1998

1997
Use of sigma-trees as constellations in trellis-coded modulation.
IEEE Trans. Inf. Theory, 1997

Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
A soft-output decoding algorithm for concatenated systems.
IEEE Trans. Inf. Theory, 1996

An artificial neural net Viterbi decoder.
IEEE Trans. Commun., 1996

1995
A comparison of trellis coded and Reed-Solomon coded hybrid-ARQ protocols over slowly fading Rayleigh channels.
Wirel. Pers. Commun., 1995

Trellis-coded, type-I hybrid-ARQ protocols based on CRC error-detecting codes.
IEEE Trans. Commun., 1995

Dynamic performance of a random access code combining CDMA system.
Proceedings of the 6th IEEE International Symposium on Personal, 1995

1994
The performance of type-I trellis coded hybrid-ARQ protocols over AWGN and slowly fading channels.
IEEE Trans. Inf. Theory, 1994

Type-II hybrid-ARQ protocols using punctured MDS codes.
IEEE Trans. Commun., 1994

The design and implementation of type-I and type-II hybrid-ARQ protocols based on first-order Reed-Muller codes.
IEEE Trans. Commun., 1994

A sequential scheme for adaptive error control over slowly varying channels.
IEEE Trans. Commun., 1994

Adaptive error control for slowly varying channels.
IEEE Trans. Commun., 1994

Packet combining systems based on the Viterbi decoder.
IEEE Trans. Commun., 1994

A performance analysis for two TCM code combining diversity receivers.
Proceedings of the 5th IEEE International Symposium on Personal, 1994

A Digital Signature Scheme Based on Linear Error-correcting Block Codes.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery.
Proceedings of the Error Control, Cryptology, and Speech Compression, 1993

1992
Modified majority logic decoding of cyclic codes in hybrid-ARQ systems.
IEEE Trans. Commun., 1992

1991
Adaptive rate error control through the use of diversity combining and majority-logic decoding in a hybrid-ARQ protocol.
IEEE Trans. Commun., 1991

Reed-Solomon Hybrid-ARQ Error Control With Erasure Decoding For Mobile Communication Networks.
Proceedings of the IEEE International Symposium On Personal, 1991

1990
Modified majority-logic decoders for use in convolutionally encoded hybrid-ARQ systems.
IEEE Trans. Commun., 1990

1989
An Error Control Technique for High Data Rate Communication Networks.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989


  Loading...