Wenyuan Xu
Wenyuan Xu
Professor, Zhejiang University, College of EE
Verifierad e-postadress på zju.edu.cn
TitelCiteras avÅr
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
RM Ishtiaq Roufa, H Mustafaa, SO Travis Taylora, W Xua, M Gruteserb, ...
19th USENIX Security Symposium, Washington DC, 11-13, 2010
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
Proceedings of the 6th international conference on Information processing in …, 2007
Securing wireless systems via lower layer enforcements
Z Li, W Xu, R Miller, W Trappe
Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi
NDSS, 2014
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Anti-jamming timing channels for wireless networks
W Xu, W Trappe, Y Zhang
Proceedings of the first ACM conference on Wireless network security, 203-213, 2008
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
Presented as part of the 2013 {USENIX} Workshop on Health Information …, 2013
Temporal privacy in wireless sensor networks
P Kamat, W Xu, W Trappe, Y Zhang
27th International Conference on Distributed Computing Systems (ICDCS'07), 23-23, 2007
WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks
T Trippel, O Weisse, W Xu, P Honeyman, K Fu
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 3-18, 2017
Localizing jammers in wireless networks
H Liu, X Wenyuan, Y Chen, Z Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
KinWrite: Handwriting-Based Authentication Using Kinect.
J Tian, C Qu, W Xu, S Wang
NDSS 93, 94, 2013
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
DEF CON 24, 2016
A large-scale empirical analysis of chinese web passwords
Z Li, W Han, W Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 559-574, 2014
Exploiting jamming-caused neighbor changes for jammer localization
Z Liu, H Liu, W Xu, Y Chen
IEEE Transactions on Parallel and Distributed Systems 23 (3), 547-555, 2011
Defending wireless sensor networks from radio interference through channel adaptation
W Xu, W Trappe, Y Zhang
ACM Transactions on Sensor Networks (TOSN) 4 (4), 18, 2008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20