Wenyuan Xu

According to our database1, Wenyuan Xu authored at least 111 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid.
Sensors, 2019

On Cuba, diplomats, ultrasound, and intermodulation distortion.
Comp. in Bio. and Med., 2019

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

MagAttack: Guessing Application Launching and Operation via Smartphone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Sec. Comput., 2018

Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Sec. Comput., 2018

Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

LESS: Link Estimation with Sparse Sampling in Intertidal WSNs.
Sensors, 2018

User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.
Security and Communication Networks, 2018

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.
IEEE Internet of Things Journal, 2018

Personalized project recommendation on GitHub.
SCIENCE CHINA Information Sciences, 2018

Risks of trusting the physics of sensors.
Commun. ACM, 2018

iCare: Automatic and User-friendly Child Identification on Smartphones.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

ADMM for Hybrid Precoding of Relay in Millimeter-Wave Massive MIMO System.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Research on the Design Method of the Command Simulation Training System.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Research on Simulation Scenario Editing Method Based on Instruction Rules.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Research on Embedded and Monitoring Test Technology of C4ISR System.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Cubic Spline Smoothing Algorithm for General Aviation Track.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Research and Implementation of Interactive Analysis and Mining Technology for Big Data.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers.
Frontiers of IT & EE, 2017

Socialized policy administration.
Computers & Security, 2017

SADO: State-associated and delay-oriented data collection for intertidal WSNs.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

A robust backup routing protocol for neighbor area network in the smart grid.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Scalable Relevant Project Recommendation on GitHub.
Proceedings of the 9th Asia-Pacific Symposium on Internetware, 2017

REPERSP: Recommending Personalized Software Projects on GitHub.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

PSK/QAM modulation recognition by convolutional neural network.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Researches on the Analysis Framework of Application Layer Communication Protocol Based on SQLite.
Proceedings of the Human Centered Computing - Third International Conference, 2017

WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

DolphinAttack: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

A Feature-Based Food Recommendation on Apache Spark.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

Are You Lying: Validating the Time-Location of Outdoor Images.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Energy-Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation.
TOSN, 2016

Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
IEEE Trans. Information Forensics and Security, 2016

On modeling of electrical cyber-physical systems considering cyber security.
Frontiers of IT & EE, 2016

WindCompass: Determine Wind Direction Using Smartphones.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Jamming mobility in 802.11p networks: Modeling, evaluation, and detection.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

On Code Execution Tracking via Power Side-Channel.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
SPA: Inviting Your Friends to Help Set Android Apps.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

MC2: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring.
TOSN, 2014

A Large-Scale Empirical Analysis of Chinese Web Passwords.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Cooperative localization using angle-of-arrival information.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

Three-dimensional formation merging control of second-order agents under directed and switching topologies.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

CETAD: Detecting evil twin access point attacks in wireless hotspots.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones.
Mobile Computing and Communications Review, 2013

WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

KinWrite: Handwriting-Based Authentication Using Kinect.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

TACO: Temperature-Aware Compensation for Time Synchronization in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Proceedings of the Computer Security - ESORICS 2013, 2013

Lightweight secure communication protocols for in-vehicle sensor networks.
Proceedings of the CyCAR'13, 2013

2012
Energy-efficient information routing in sensor networks for robotic target tracking.
Wireless Networks, 2012

Determining sink location through Zeroing-In attackers in wireless sensor networks.
Wireless Networks, 2012

Exploiting Jamming-Caused Neighbor Changes for Jammer Localization.
IEEE Trans. Parallel Distrib. Syst., 2012

Jamming-Resilient Multipath Routing.
IEEE Trans. Dependable Sec. Comput., 2012

Long-term microclimate monitoring in wildland cultural heritage sites with wireless sensor networks.
IJHPCN, 2012

Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity.
IJDSN, 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Extracting jamming signals to locate radio interferers and jammers.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Distributed transmit beamforming via feedback-based inter-cluster synchronization.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Neighborhood watch: security and privacy analysis of automatic meter reading systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Jamming Attack Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Determining the position of a jammer using a virtual-force iterative approach.
Wireless Networks, 2011

Short paper: Jamming-resilient multipath routing leveraging availability-based correlation.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Content-Aware Data Dissemination for Enhancing Privacy and Availability in Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Localizing Multiple Jamming Attackers in Wireless Networks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Accurate Accident Reconstruction in VANET.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Multi-mode user-centric design of wireless sensor networks for long-term monitoring.
Mobile Computing and Communications Review, 2010

Zeroing-in on network metric minima for sink location determination.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Proceedings of the 19th USENIX Security Symposium, 2010

Network-assisted target tracking via smart local routing.
Proceedings of the 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2010

Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas.
Proceedings of the Global Communications Conference, 2010

Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
Temporal privacy in wireless sensor networks: Theory and practice.
TOSN, 2009

Localizing Jammers in Wireless Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Energy-efficient target tracking with a sensorless robot and a network of unreliable one-bit proximity sensors.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

Securing Emerging Wireless Systems - Lower-layer Approaches.
Springer, ISBN: 978-0-387-88490-5, 2009

2008
Defending wireless sensor networks from radio interference through channel adaptation.
TOSN, 2008

Anti-jamming timing channels for wireless networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Service Discovery and Device Identification in Cognitive Radio Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

On Adjusting Power to Defend Wireless Networks from Jamming.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Channel surfing: defending wireless sensor networks from interference.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Temporal Privacy in Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Jamming sensor networks: attack and defense strategies.
IEEE Network, 2006

Securing wireless systems via lower layer enforcements.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Channel surfing: defending wireless sensor networks from jamming and interference.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

2005
The feasibility of launching and detecting jamming attacks in wireless networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

2004
Channel surfing and spatial retreats: defenses against wireless denial of service.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Key management for 3G MBMS security.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

1996
Design of two MUSIC-like estimators based on bias minimization.
IEEE Trans. Signal Processing, 1996

Behavioral analysis of anisotropic diffusion in image processing .
IEEE Trans. Image Processing, 1996

Comparative study of the biases of MUSIC-like estimators.
Signal Processing, 1996

L∞ blind deconvolution for the generalized AR model.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
Analysis of the performance and sensitivity of eigendecomposition-based detectors.
IEEE Trans. Signal Processing, 1995

On ill-posed anisotropic diffusion models.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Theoretical comparison for biases of MUSIC-like DOA estimators.
Proceedings of the 1995 International Conference on Acoustics, 1995

1994
Analysis and Design of Anisotropic Diffusion for Image Processing.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

Alternatives for the definition and evaluation of resolution thresholds of signal-subspace parameter estimators.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994


  Loading...