Yih-Chun Hu

Orcid: 0000-0002-7829-3929

According to our database1, Yih-Chun Hu authored at least 124 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
vRetention: A User Viewing Dataset for Popular Video Streaming Services.
Proceedings of the 15th ACM Multimedia Systems Conference, 2024

Debuglet: Programmable and Verifiable Inter-Domain Network Telemetry.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

2023
FlowBot: A Learning-Based Co-bottleneck Flow Detector for Video Servers.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

2022
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems.
IEEE Trans. Smart Grid, 2022

Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds.
Ad Hoc Networks, 2022

Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems.
Proceedings of the IEEE International Conference on Communications, 2022

TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2022

HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

Key Generation with Ambient Audio.
Proceedings of the IEEE Global Communications Conference, 2022

FlowTele: remotely shaping traffic on internet-scale networks.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

2021
HASA-Net: A Non-Intrusive Hearing-Aid Speech Assessment Network.
Proceedings of the IEEE Automatic Speech Recognition and Understanding Workshop, 2021

2020
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning.
Hum. centric Comput. Inf. Sci., 2020

BlindSignedID: Mitigating Denial-of-Service Attacks on Digital Contact Tracing.
CoRR, 2020

Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Mitigating denial-of-service attacks on digital contact tracing: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Convolution Attack on Frequency Hopping by Full-Duplex Radios.
IEEE Trans. Veh. Technol., 2019

Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks.
ACM Trans. Sens. Networks, 2019

BGP with BGPsec: Attacks and Countermeasures.
IEEE Netw., 2019

SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control.
IEEE/ACM Trans. Netw., 2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018

Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Detection of Anomaly in Train Speed for Intelligent Railway Systems.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks.
IEEE Trans. Mob. Comput., 2017

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks.
IEEE Trans. Control. Netw. Syst., 2017

Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding.
CoRR, 2017

MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation.
CoRR, 2017

TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems.
CoRR, 2017

Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Deadline-Aware Multipath Communication: An Optimization Problem.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Securing balise-based train control systems using cryptographic random fountains.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Protecting vehicular networks privacy in the presence of a single adversarial authority.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

The Case for In-Network Replay Suppression.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers.
IEEE/ACM Trans. Netw., 2016

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking.
IEEE Trans. Control. Netw. Syst., 2016

Location Privacy with Randomness Consistency.
Proc. Priv. Enhancing Technol., 2016

Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Demo: Free Data Communication Using Wireless Charging.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Clean Slate Approach to Secure Wireless Networking.
Found. Trends Netw., 2015

A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Noah: Keyed Noise Flooding for Wireless Confidentiality.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Securing wireless medium access control against insider denial-of-service attackers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
A Study on False Channel Condition Reporting Attacks in Wireless Networks.
IEEE Trans. Mob. Comput., 2014

Lightweight source authentication and path validation.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.
Proceedings of the 2014 Internet Measurement Conference, 2014

Mechanized Network Origin and Path Authenticity Proofs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming.
Proceedings of the MobiWac'13, 2013

Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption.
Proceedings of the 32th IEEE Military Communications Conference, 2013

JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Did you also hear that? Spectrum sensing using Hermitian inner product.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Secure cooperative spectrum sensing based on Sybil-resilient clustering.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Secure Location Verification Using Simultaneous Multilateration.
IEEE Trans. Wirel. Commun., 2012

An orthogonal multiple access coding scheme.
Commun. Inf. Syst., 2012

Body Area Network Security: Robust Key Establishment Using Human Body Channel.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Power control for fair dynamic channel reservation in VANETs.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Bankrupting the jammer in WSN.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Load disaggregation using harmonic analysis and regularized optimization.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Cross-layer jamming detection and mitigation in wireless broadcast networks.
IEEE/ACM Trans. Netw., 2011

Efficient Certificate Revocation List Organization and Distribution.
IEEE J. Sel. Areas Commun., 2011

Towards Deployable DDoS Defense for Web Applications
CoRR, 2011

Optimal physical carrier sense in wireless networks.
Ad Hoc Networks, 2011

Short paper: a practical view of "mixing" identities in vehicular networks.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

The jamming game in an OFDM setting.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Bankrupting the jammer.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Demo: bankrupting the jammer.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Low-cost mitigation of privacy loss due to radiometric identification.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots.
Proceedings of IEEE International Conference on Communications, 2011

A Lightweight Deterministic MAC Protocol Using Low Cross-Correlation Sequences.
Proceedings of the Global Communications Conference, 2011

2010
Coward attacks in vehicular networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

The impact of key assignment on VANET privacy.
Secur. Commun. Networks, 2010

Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.
Proceedings of the Security and Privacy in Communication Networks, 2010

Communication requirements for crash avoidance.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

Secure network-wide clock synchronization in wireless sensor networks.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

CRAFT: a new secure congestion control architecture.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Data Security in Vehicular Communication Networks.
Proceedings of the VANET: Vehicular Applications and Inter-Networking Technologies, 2010

2009
SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009

Secure and precise location verification using distance bounding and simultaneous multilateration.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Design and analysis of a lightweight certificate revocation mechanism for VANET.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Real-World VANET Security Protocol Performance.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Secure Unified Cellular Ad Hoc Network Routing.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Security certificate revocation list distribution for vanet.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

Dynamic Jamming Mitigation for Wireless Broadcast Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4.
RFC, February, 2007

Portcullis: protecting connection setup from denial-of-capability attacks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Preserving location privacy in wireless lans.
Proceedings of the 5th International Conference on Mobile Systems, 2007

2006
Wormhole attacks in wireless networks.
IEEE J. Sel. Areas Commun., 2006

(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

2005
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks.
Wirel. Networks, 2005

Efficient Constructions for One-Way Hash Chains.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
A Survey of Secure Wireless Ad Hoc Routing.
IEEE Secur. Priv., 2004

SPV: secure path vector routing for securing BGP.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Securing quality-of-service route discovery in on-demand routing for ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks.
Ad Hoc Networks, 2003

Rushing attacks and defense in wireless ad hoc network routing protocols.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture.
Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2003), 2003

Efficient Security Mechanisms for Routing Protocolsa.
Proceedings of the Network and Distributed System Security Symposium, 2003

Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
Ensuring cache freshness in on-demand ad hoc network routing protocols.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

2001
Implicit source routes for on-demand ad hoc network routing.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

2000
Caching strategies in on-demand routing protocols for wireless ad hoc networks.
Proceedings of the MOBICOM 2000, 2000

1998
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols.
Proceedings of the MOBICOM '98, 1998


  Loading...