


Остановите войну!
for scientists:
Wenyuan Xu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j52]Taimin Zhang, Xiaoyu Ji
, Wenyuan Xu:
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks. Mob. Networks Appl. 27(1): 329-342 (2022) - [j51]Jiayu Zhang, Min Li
, Min-Jian Zhao, Xiaoyu Ji
, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. IEEE Trans. Inf. Forensics Secur. 17: 1528-1543 (2022) - [j50]Xiaoyu Ji
, Xinyan Zhou
, Chen Yan
, Jiangyi Deng
, Wenyuan Xu:
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices. IEEE Trans. Mob. Comput. 21(4): 1155-1171 (2022) - [j49]Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen:
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules. ACM Trans. Sens. Networks 18(2): 23:1-23:28 (2022) - [i10]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. CoRR abs/2204.02675 (2022) - [i9]Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. CoRR abs/2205.03971 (2022) - 2021
- [j48]Wenyuan Xu
, Weiwei Fang
, Yi Ding
, Meixia Zou
, Naixue Xiong
:
Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating. IEEE Access 9: 38457-38466 (2021) - [j47]Mengran Liu, Weiwei Fang
, Xiaodong Ma, Wenyuan Xu, Naixue Xiong, Yi Ding:
Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing. Appl. Soft Comput. 110: 107636 (2021) - [j46]Jiayu Zhang, Zhiyun Wang
, Xiaoyu Ji
, Wenyuan Xu, Gang Qu
, Minjian Zhao:
Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. IEEE Internet Things J. 8(4): 2992-2999 (2021) - [j45]Keke Li
, Wenyuan Xu, Liang Yang:
Deformation Characteristics of Raising, Widening of Old Roadway on Soft Soil Foundation. Symmetry 13(11): 2117 (2021) - [j44]Chen Yan
, Guoming Zhang, Xiaoyu Ji
, Tianchen Zhang, Taimin Zhang, Wenyuan Xu
:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. IEEE Trans. Dependable Secur. Comput. 18(3): 1108-1124 (2021) - [j43]Chaohao Li, Xiaoyu Ji, Bin Wang, Kai Wang, Wenyuan Xu:
SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity. ACM Trans. Sens. Networks 17(2): 19:1-19:22 (2021) - [j42]Yilin Xiao, Liang Xiao
, Zefang Lv, Guohang Niu, Yuzhen Ding, Wenyuan Xu:
Learning-Based Low-Latency VIoT Video Streaming Against Jamming and Interference. IEEE Wirel. Commun. 28(4): 12-18 (2021) - [c95]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CCS 2021: 1861-1883 - [c94]Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu:
CapSpeaker: Injecting Voices to Microphones via Capacitors. CCS 2021: 1915-1929 - [c93]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. DSN Workshops 2021: 7-14 - [c92]Zhuoyang Shi, Chaohao Li, Zizhi Jin, Weinong Sun, Xiaoyu Ji, Wenyuan Xu:
Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System. ICPADS 2021: 169-176 - [c91]Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation. NDSS 2021 - [c90]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. IEEE Symposium on Security and Privacy 2021: 160-175 - [c89]Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:
mID: Tracing Screen Photos via Moiré Patterns. USENIX Security Symposium 2021: 2969-2986 - [c88]Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu:
OutletSpy: cross-outlet application inference via power factor correction signal. WISEC 2021: 181-191 - [i8]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
Towards Fortifying the Multi-Factor-Based Online Account Ecosystem. CoRR abs/2104.08651 (2021) - [i7]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CoRR abs/2109.09958 (2021) - 2020
- [j41]Guoming Zhang
, Xiaoyu Ji, Yanjie Li, Wenyuan Xu:
Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors 20(13): 3635 (2020) - [j40]Wenyuan Xu
, Jing Tian
, Yu Cao, Song Wang
:
Challenge-Response Authentication Using In-Air Handwriting Style Verification. IEEE Trans. Dependable Secur. Comput. 17(1): 51-64 (2020) - [j39]Weili Han
, Chang Cao
, Hao Chen
, Dong Li
, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. IEEE Trans. Dependable Secur. Comput. 17(2): 407-421 (2020) - [j38]Xiaoyu Ji, Chaohao Li
, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu
:
Authenticating Smart Home Devices via Home Limited Channels. ACM Trans. Internet Things 1(4): 24:1-24:24 (2020) - [j37]Yushi Cheng
, Xiaoyu Ji
, Tianyang Lu, Wenyuan Xu:
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach. IEEE Trans. Mob. Comput. 19(4): 907-921 (2020) - [j36]Hui Chen
, Guiguang Ding, Zijia Lin, Sicheng Zhao
, Xiaopeng Gu, Wenyuan Xu, Jungong Han:
ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval. ACM Trans. Multim. Comput. Commun. Appl. 16(Special): 1-21 (2020) - [j35]Xiaoyu Ji
, Xinyan Zhou
, Miao Xu, Wenyuan Xu, Yabo Dong:
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration. ACM Trans. Sens. Networks 16(2): 16:1-16:28 (2020) - [j34]Yushi Cheng, Xiaoyu Ji
, Xiaopeng Li, Tianchen Zhang, Sharaf J. Malebary
, Xianshan Qu, Wenyuan Xu:
Identifying Child Users via Touchscreen Interactions. ACM Trans. Sens. Networks 16(4): 35:1-35:25 (2020) - [c87]Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. EuroS&P Workshops 2020: 200-209 - [c86]Feng Xue, Weiwei Fang, Wenyuan Xu, Qi Wang, Xiaodong Ma, Yi Ding:
EdgeLD: Locally Distributed Deep Learning Inference on Edge Device Clusters. HPCC/DSS/SmartCity 2020: 613-619 - [c85]Li Guo, Boao Xu, Hao Li, Dongmei Zhao, Shengxiao Zhang, Wenyuan Xu:
Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database. HCC 2020: 319-325 - [c84]Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu:
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding. INFOCOM 2020: 357-366 - [c83]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. IEEE Symposium on Security and Privacy 2020: 233-248 - [i6]Zhiyun Wang, Jiayu Zhang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Min-Jian Zhao:
Who Is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. CoRR abs/2007.15348 (2020) - [i5]Mengran Liu, Weiwei Fang, Xiaodong Ma, Wenyuan Xu, Naixue Xiong, Yi Ding:
Channel Pruning Guided by Spatial and Channel Attention for DNNs in Intelligent Edge Computing. CoRR abs/2011.03891 (2020) - [i4]Xiu-Shen Wei, Yu-Yan Xu, Yazhou Yao, Jia Wei, Si Xi, Wenyuan Xu, Weidong Zhang, Xiaoxin Lv, Dengpan Fu, Qing Li, Baoying Chen, Haojie Guo, Taolue Xue, Haipeng Jing, Zhiheng Wang, Tianming Zhang, Mingwen Zhang:
Tips and Tricks for Webly-Supervised Fine-Grained Recognition: Learning from the WebFG 2020 Challenge. CoRR abs/2012.14672 (2020)
2010 – 2019
- 2019
- [j33]Chen Yan, Kevin Fu, Wenyuan Xu:
On Cuba, diplomats, ultrasound, and intermodulation distortion. Comput. Biol. Medicine 104: 250-266 (2019) - [j32]Taimin Zhang, Xiaoyu Ji, Zhou Zhuang, Wenyuan Xu:
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors 19(4): 909 (2019) - [c82]Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. AsiaCCS 2019: 283-294 - [c81]Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. CCS 2019: 1149-1170 - [c80]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c79]Dongliang Xiong
, Kai Huang, Siang Chen, Bowen Li, Haitian Jiang
, Wenyuan Xu:
NoUCSR: Efficient Super-Resolution Network without Upsampling Convolution. ICCV Workshops 2019: 3378-3387 - [c78]Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. INFOCOM 2019: 2080-2088 - [c77]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Dong-lian Qi, Wenyuan Xu:
UltraComm: High-Speed and Inaudible Acoustic Communication. QSHINE 2019: 184-204 - [c76]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks. QSHINE 2019: 235-251 - [c75]Andrew Kwong, Wenyuan Xu, Kevin Fu:
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone. IEEE Symposium on Security and Privacy 2019: 905-919 - 2018
- [j31]Kevin Fu, Wenyuan Xu:
Risks of trusting the physics of sensors. Commun. ACM 61(2): 20-23 (2018) - [j30]Xiaobing Sun, Wenyuan Xu, Xin Xia
, Xiang Chen, Bin Li:
Personalized project recommendation on GitHub. Sci. China Inf. Sci. 61(5): 050106:1-050106:14 (2018) - [j29]Wenyuan Xu, Chen Yan
, Weibin Jia, Xiaoyu Ji
, Jianhao Liu:
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles. IEEE Internet Things J. 5(6): 5015-5029 (2018) - [j28]Xiaoyu Ji
, Yushi Cheng, Wenyuan Xu
, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. Secur. Commun. Networks 2018: 3980371:1-3980371:10 (2018) - [j27]Xinyan Zhou
, Xiaoyu Ji, Yi-Chao Chen, Xiaopeng Li
, Wenyuan Xu:
LESS: Link Estimation with Sparse Sampling in Intertidal WSNs. Sensors 18(3): 747 (2018) - [j26]Xinyan Zhou
, Xiaoyu Ji, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi
, Brian Helmuth
, Wenyuan Xu:
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors 18(5): 1464 (2018) - [j25]Weili Han
, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. IEEE Trans. Dependable Secur. Comput. 15(2): 309-320 (2018) - [j24]Hossen A. Mustafa
, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. IEEE Trans. Dependable Secur. Comput. 15(3): 423-436 (2018) - [c74]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. AsiaCCS 2018: 1-13 - [c73]Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:
HlcAuth: Key-free and Secure Communications via Home-Limited Channel. AsiaCCS 2018: 29-35 - [c72]Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. AsiaCCS 2018: 261-272 - [c71]Wenyuan Xu, Wenjin Yang, Chunyu Li, Shuo Shi, Shengxiao Zhang, Hao Li, Haoyang Yu:
Research on Embedded and Monitoring Test Technology of C4ISR System. HCC 2018: 86-92 - [c70]Li Guo, Wenyuan Xu, Hao Li, Shengxiao Zhang, Dongmei Zhao, Haoyang Yu:
Research and Implementation of Interactive Analysis and Mining Technology for Big Data. HCC 2018: 359-364 - [c69]Shengxiao Zhang, Hao Li, Dongmei Zhao, Wenyuan Xu, Li Guo:
Research on Simulation Scenario Editing Method Based on Instruction Rules. HCC 2018: 365-371 - [c68]Wenyuan Xu, Ke Lv, Haoyang Yu, Chunyu Li, Weifeng Xu:
Cubic Spline Smoothing Algorithm for General Aviation Track. HCC 2018: 481-487 - [c67]Dongmei Zhao, Hao Li, Wenyuan Xu, Shengxiao Zhang, Li Guo, Yuxiao Yang:
Research on the Design Method of the Command Simulation Training System. HCC 2018: 560-570 - [c66]Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu:
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. IEEE Symposium on Security and Privacy 2018: 1048-1062 - [c65]Wenyuan Xu, Yongchao Wang, Xuan Xue:
ADMM for Hybrid Precoding of Relay in Millimeter-Wave Massive MIMO System. VTC Fall 2018: 1-5 - [c64]Xiaopeng Li
, Sharaf J. Malebary
, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, Wenyuan Xu:
iCare: Automatic and User-friendly Child Identification on Smartphones. HotMobile 2018: 43-48 - [i3]Xiaopeng Li
, Xianshan Qu, Wenyuan Xu, Song Wang, Yan Tong, Lannan Luo:
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection. CoRR abs/1811.08951 (2018) - [i2]Wenyuan Xu, Xiaopeng Li
, Jing Tian, Yujun Xiao, Xianshan Qu, Song Wang, Xiaoyu Ji:
Which One to Go: Security and Usability Evaluation of Mid-Air Gestures. CoRR abs/1811.10168 (2018) - 2017
- [j23]Zeqing Guo
, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. Comput. Secur. 67: 232-243 (2017) - [j22]Yujun Xiao, Wenyuan Xu, Zhenhua Jia, Zhuoran Ma, Dong-lian Qi:
NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers. Frontiers Inf. Technol. Electron. Eng. 18(4): 519-534 (2017) - [c63]Xiaopeng Li, Wenyuan Xu, Song Wang
, Xianshan Qu:
Are You Lying: Validating the Time-Location of Outdoor Images. ACNS 2017: 103-123 - [c62]Wenyuan Xu, Yun Li, Liting Wei, Zheng Wu:
A Feature-Based Food Recommendation on Apache Spark. CBD 2017: 123-128 - [c61]Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
DolphinAttack: Inaudible Voice Commands. CCS 2017: 103-117 - [c60]Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, Wenyuan Xu:
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback. CNS 2017: 1-9 - [c59]Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu:
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. EuroS&P 2017: 3-18 - [c58]Wenyuan Xu, Hao Li, Weifeng Xu:
Researches on the Analysis Framework of Application Layer Communication Protocol Based on SQLite. HCC 2017: 150-157 - [c57]Wenyuan Xu, Yongchao Wang, Fen Wang, Xi Chen:
PSK/QAM modulation recognition by convolutional neural network. ICCC 2017: 1-5 - [c56]Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu:
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. ICPADS 2017: 779-782 - [c55]Wenyuan Xu, Xiaobing Sun, Jiajun Hu, Bin Li:
REPERSP: Recommending Personalized Software Projects on GitHub. ICSME 2017: 648-652 - [c54]Wenyuan Xu, Xiaobing Sun, Xin Xia
, Xiang Chen:
Scalable Relevant Project Recommendation on GitHub. Internetware 2017: 9:1-9:10 - [c53]Xiaohan Lai
, Miao Xu, Xiaoyu Ji, Wenyuan Xu, Longdao Chen:
En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment. WCSP 2017: 1-6 - [c52]Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu:
A robust backup routing protocol for neighbor area network in the smart grid. WCSP 2017: 1-6 - [c51]Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
SADO: State-associated and delay-oriented data collection for intertidal WSNs. WCSP 2017: 1-6 - [i1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu:
DolphinAtack: Inaudible Voice Commands. CoRR abs/1708.09537 (2017) - 2016
- [j21]Yi-nan Wang, Zhiyun Lin
, Xiao Liang, Wenyuan Xu, Qiang Yang, Gangfeng Yan:
On modeling of electrical cyber-physical systems considering cyber security. Frontiers Inf. Technol. Electron. Eng. 17(5): 465-478 (2016) - [j20]Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu:
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords. IEEE Trans. Inf. Forensics Secur. 11(2): 258-272 (2016) - [j19]Miao Xu, Wenyuan Xu, Tingrui Han, Zhiyun Lin
:
Energy-Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation. ACM Trans. Sens. Networks 12(2): 12:1-12:29 (2016) - [c50]Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu:
On Code Execution Tracking via Power Side-Channel. CCS 2016: 1019-1031 - [c49]Sharaf J. Malebary
, Wenyuan Xu, Chin-Tser Huang:
Jamming mobility in 802.11p networks: Modeling, evaluation, and detection. IPCCC 2016: 1-7 - [c48]Jianwei Niu, Yier Jin
, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang:
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. SACMAT 2016: 49-50 - [c47]Xiaohui Wang, Yanjing Wu, Wenyuan Xu:
WindCompass: Determine Wind Direction Using Smartphones. SECON 2016: 1-9 - 2015
- [c46]Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni:
SPA: Inviting Your Friends to Help Set Android Apps. SACMAT 2015: 221-231 - 2014
- [j18]Ming Xia, Yabo Dong, Wenyuan Xu, Xiangyang Li, Dongming Lu:
MC2: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring. ACM Trans. Sens. Networks 10(3): 52:1-52:30 (2014) - [j17]Zhenhua Liu, Hongbo Liu
, Wenyuan Xu, Yingying Chen
:
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 25(2): 508-517 (2014) - [c45]Gorkem Kar
, Hossen A. Mustafa, Yan Wang, Yingying Chen
, Wenyuan Xu, Marco Gruteser, Tam Vu:
Detection of On-Road Vehicles Emanating GPS Interference. CCS 2014: 621-632 - [c44]Hossen A. Mustafa, Wenyuan Xu:
CETAD: Detecting evil twin access point attacks in wireless hotspots. CNS 2014: 238-246 - [c43]Hossen A. Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. DSN 2014: 168-179 - [c42]Jubin Zhong, Zhiyun Lin
, Zhiyong Chen, Wenyuan Xu:
Cooperative localization using angle-of-arrival information. ICCA 2014: 19-24 - [c41]Tingrui Han, Zhiyun Lin
, Wenyuan Xu, Minyue Fu
:
Three-dimensional formation merging control of second-order agents under directed and switching topologies. ICCA 2014: 225-230 - [c40]Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, Srihari Nelakuditi:
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS 2014 - [c39]Zhigong Li, Weili Han, Wenyuan Xu:
A Large-Scale Empirical Analysis of Chinese Web Passwords. USENIX Security Symposium 2014: 559-574 - 2013
- [j16]Sanorita Dey, Nirupam Roy, Wenyuan Xu, Srihari Nelakuditi:
ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones. ACM SIGMOBILE Mob. Comput. Commun. Rev. 17(3): 21-22 (2013) - [c38]Miao Xu, Wenyuan Xu, Jesse Walker, Benjamin Moore:
Lightweight secure communication protocols for in-vehicle sensor networks. CyCAR@CCS 2013: 19-30 - [c37]Shane S. Clark, Hossen A. Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu:
Current Events: Identifying Webpages by Tapping the Electrical Outlet. ESORICS 2013: 700-717 - [c36]Miao Xu, Wenyuan Xu:
TACO: Temperature-Aware Compensation for Time Synchronization in Wireless Sensor Networks. MASS 2013: 122-130 - [c35]Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang:
KinWrite: Handwriting-Based Authentication Using Kinect. NDSS 2013 - [c34]Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. IEEE Symposium on Security and Privacy 2013: 145-159 - [c33]Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, Kevin Fu:
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. HealthTech 2013 - 2012
- [j15]Guofei Chai, Miao Xu, Wenyuan Xu, Zhiyun Lin
:
Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity. Int. J. Distributed Sens. Networks 8 (2012) - [j14]Ming Xia, Yabo Dong, Wenyuan Xu, Dongming Lu, Ping Xue, Gang Liu:
Long-term microclimate monitoring in wildland cultural heritage sites with wireless sensor networks. Int. J. High Perform. Comput. Netw. 7(2): 111-122 (2012) - [j13]Hossen A. Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Jamming-Resilient Multipath Routing. IEEE Trans. Dependable Secur. Comput. 9(6): 852-864 (2012) - [j12]