Wade Trappe
Wade Trappe
Professor, Electrical and Computer Engineering, WINLAB, Rutgers University
Verified email at winlab.rutgers.edu
Title
Cited by
Cited by
Year
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
14662005
Introduction to cryptography with coding theory
W Trappe
Pearson Education India, 2006
10812006
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
7322008
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS …, 2005
7192005
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
7152006
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
6052005
Anti-collusion fingerprinting for multimedia
W Trappe, M Wu, ZJ Wang, KJR Liu
IEEE Transactions on Signal Processing 51 (4), 1069-1087, 2003
5362003
Detecting and localizing wireless spoofing attacks
Y Chen, W Trappe, RP Martin
2007 4th Annual IEEE Communications Society Conference on sensor, mesh and …, 2007
4922007
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor …, 2004
4912004
Parknet: drive-by sensing of road-side parking statistics
S Mathur, T Jin, N Kasturirangan, J Chandrasekaran, W Xue, M Gruteser, ...
Proceedings of the 8th international conference on Mobile systems …, 2010
4842010
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
I Rouf, RD Miller, HA Mustafa, T Taylor, S Oh, W Xu, M Gruteser, ...
USENIX Security Symposium 10, 2010
4692010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
4492004
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
4182010
Using the physical layer for wireless authentication in time-variant channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008
3442008
Collusion-resistant fingerprinting for multimedia
M Wu, W Trappe, ZJ Wang, KJR Liu
IEEE Signal Processing Magazine 21 (2), 15-27, 2004
2892004
Securing wireless communications at the physical layer
R Liu
Springer, 2010
2842010
Fingerprints in the ether: Using the physical layer for wireless authentication
L Xiao, L Greenstein, N Mandayam, W Trappe
2007 IEEE International conference on communications, 4646-4651, 2007
2572007
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
2007 6th International Symposium on Information Processing in Sensor …, 2007
2552007
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing …, 2013
2442013
An authentication framework for hierarchical ad hoc sensor networks
M Bohge, W Trappe
Proceedings of the 2nd ACM workshop on Wireless security, 79-87, 2003
2312003
The system can't perform the operation now. Try again later.
Articles 1–20