BibTeX records: Tao Wang 0026

download as .bib file

@inproceedings{DBLP:conf/infocom/FangWLZL19,
  author    = {Song Fang and
               Tao Wang and
               Yao Liu and
               Shangqing Zhao and
               Zhuo Lu},
  title     = {Entrapment for Wireless Eavesdroppers},
  booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
               Paris, France, April 29 - May 2, 2019},
  pages     = {2530--2538},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/INFOCOM.2019.8737394},
  doi       = {10.1109/INFOCOM.2019.8737394},
  timestamp = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/infocom/FangWLZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLHPF18,
  author    = {Tao Wang and
               Yao Liu and
               Tao Hou and
               Qingqi Pei and
               Song Fang},
  title     = {Signal Entanglement Based Pinpoint Waveforming for Location-Restricted
               Service Access Control},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {15},
  number    = {5},
  pages     = {853--867},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2016.2614820},
  doi       = {10.1109/TDSC.2016.2614820},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/WangLHPF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/FangLSZW17,
  author    = {Song Fang and
               Yao Liu and
               Wenbo Shen and
               Haojin Zhu and
               Tao Wang},
  title     = {Virtual Multipath Attack and Defense for Location Distinction in Wireless
               Networks},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {566--580},
  year      = {2017},
  url       = {https://doi.org/10.1109/TMC.2016.2549519},
  doi       = {10.1109/TMC.2016.2549519},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tmc/FangLSZW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/WangLV15,
  author    = {Tao Wang and
               Yao Liu and
               Athanasios V. Vasilakos},
  title     = {Survey on channel reciprocity based key establishment techniques for
               wireless systems},
  journal   = {Wirel. Networks},
  volume    = {21},
  number    = {6},
  pages     = {1835--1846},
  year      = {2015},
  url       = {https://doi.org/10.1007/s11276-014-0841-8},
  doi       = {10.1007/s11276-014-0841-8},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/winet/WangLV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangLPH15,
  author    = {Tao Wang and
               Yao Liu and
               Qingqi Pei and
               Tao Hou},
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Location-restricted Services Access Control Leveraging Pinpoint Waveforming},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {292--303},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2810103.2813709},
  doi       = {10.1145/2810103.2813709},
  timestamp = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/WangLPH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLL14,
  author    = {Tao Wang and
               Yao Liu and
               Jay Ligatti},
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {Fingerprinting Far Proximity from Radio Emissions},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8712},
  pages     = {508--525},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11203-9\_29},
  doi       = {10.1007/978-3-319-11203-9\_29},
  timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/esorics/WangLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics