Paul L Yu
Paul L Yu
Vahvistettu sähköpostiosoite verkkotunnuksessa
Physical-layer authentication
PL Yu, JS Baras, BM Sadler
IEEE Transactions on Information Forensics and Security 3 (1), 38-51, 2008
Wireless physical layer authentication via fingerprint embedding
PL Yu, G Verma, BM Sadler
IEEE Communications Magazine 53 (6), 48-53, 2015
RSS gradient-assisted frontier exploration and radio source localization
JN Twigg, JR Fink, PL Yu, BM Sadler
2012 IEEE International Conference on Robotics and Automation, 889-895, 2012
Physical layer authentication via fingerprint embedding using software-defined radios
G Verma, P Yu, BM Sadler
IEEE Access 3, 81-88, 2015
MIMO authentication via deliberate fingerprinting at the physical layer
PL Yu, BM Sadler
IEEE Transactions on Information Forensics and Security 6 (3), 606-615, 2011
Short-range low-VHF channel characterization in cluttered environments
FT Dagefu, G Verma, CR Rao, PL Yu, JR Fink, BM Sadler, K Sarabandi
IEEE Transactions on Antennas and Propagation 63 (6), 2719-2727, 2015
Multicarrier authentication at the physical layer
PL Yu, JS Baras, BM Sadler
2008 International Symposium on a World of Wireless, Mobile and Multimedia …, 2008
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
D Wang, A Neupane, Z Qian, NB Abu-Ghazaleh, SV Krishnamurthy, ...
NDSS, 2019
Cryptographic side-channel signaling and authentication via fingerprint embedding
JB Perazzone, PL Yu, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 13 (9), 2216-2225, 2018
Fisher information-based experiment design for network tomography
T He, C Liu, A Swami, D Towsley, T Salonidis, AI Bejan, P Yu
ACM SIGMETRICS Performance Evaluation Review 43 (1), 389-402, 2015
Efficient base station connectivity area discovery
JN Twigg, JR Fink, PL Yu, BM Sadler
The International Journal of Robotics Research 32 (12), 1398-1410, 2013
Wireless communication method and system for transmission authentication at the physical layer
JS Baras, PL Yu, BM Sadler
US Patent App. 12/676,689, 2010
Jaal: Towards network intrusion detection at isp scale
A Aqil, K Khalil, AOF Atya, EE Papalexakis, SV Krishnamurthy, T Jaeger, ...
Proceedings of the 13th international conference on emerging networking …, 2017
Radio signal strength tracking and control for robotic networks
PL Yu, JN Twigg, BM Sadler
Micro-and Nanotechnology Sensors, Systems, and Applications III 8031, 803116, 2011
Securing the communication of medical information using local biometric authentication and commercial wireless links
VI Ivanov, PL Yu, JS Baras
Health informatics journal 16 (3), 211-223, 2010
Graph filters and the Z-Laplacian
X Yan, BM Sadler, RJ Drost, PL Yu, K Lerman
IEEE Journal of Selected Topics in Signal Processing 11 (6), 774-784, 2017
Principled unearthing of TCP side channel vulnerabilities
Y Cao, Z Wang, Z Qian, C Song, SV Krishnamurthy, P Yu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Employing attack graphs for intrusion detection
F Capobianco, R George, K Huang, T Jaeger, S Krishnamurthy, Z Qian, ...
Proceedings of the New Security Paradigms Workshop, 16-30, 2019
Keyless authentication in the presence of a simultaneously transmitting adversary
E Graves, P Yu, P Spasojevic
2016 IEEE Information Theory Workshop (ITW), 201-205, 2016
Inner bound for the capacity region of noisy channels with an authentication requirement
J Perazzone, E Graves, P Yu, R Blum
2018 IEEE International Symposium on Information Theory (ISIT), 126-130, 2018
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20