Deep learning-guided jamming for cross-technology wireless networks: Attack and defense D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021 | 29 | 2021 |
RF-Rhythm: Secure and usable two-factor RFID authentication J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2194-2203, 2020 | 29 | 2020 |
SpecKriging: GNN-based secure cooperative spectrum sensing Y Zhang, A Li, J Li, D Han, T Li, R Zhang, Y Zhang IEEE Transactions on Wireless Communications 21 (11), 9936-9946, 2022 | 19 | 2022 |
{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks A Li, J Li, D Han, Y Zhang, T Li, T Zhu, Y Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1-18, 2023 | 16 | 2023 |
Secure UHF RFID authentication with smart devices A Li, J Li, Y Zhang, D Han, T Li, Y Zhang IEEE Transactions on Wireless Communications 22 (7), 4520-4533, 2022 | 13 | 2022 |
DroneKey: a drone-aided group-key generation scheme for large-scale IoT networks D Han, A Li, J Li, Y Zhang, T Li, Y Zhang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 13 | 2021 |
Rcid: Fingerprinting passive rfid tags via wideband backscatter J Li, A Li, D Han, Y Zhang, T Li, Y Zhang IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 700-709, 2022 | 10 | 2022 |
Your home is insecure: Practical attacks on wireless home alarm systems T Li, D Han, J Li, A Li, Y Zhang, R Zhang, Y Zhang IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 7 | 2021 |
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021 | 7 | 2021 |
QoS-aware proportional fair energy-efficient resource allocation with imperfect CSI in downlink OFDMA systems J Wang, Y Zhang, H Hui, N Zhang 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and …, 2015 | 7 | 2015 |
WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID A Li, J Li, D Han, Y Zhang, T Li, Y Zhang Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 5 | 2022 |
Rhythmic RFID authentication J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang IEEE/ACM Transactions on Networking 31 (2), 877-890, 2022 | 4 | 2022 |
WristUnlock: Secure and usable smartphone unlocking with wrist wearables L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang 2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019 | 4 | 2019 |
SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets Y Zhang, D Han, A Li, J Li, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (7), 4266-4278, 2022 | 2 | 2022 |
(In) secure acoustic mobile authentication D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021 | 2 | 2021 |
Socialdistance: How far are you from verified users in online social media? A Li, T Li, Y Zhang, L Zhang, Y Zhang Proceedings of the International Symposium on Quality of Service, 1-10, 2019 | 2 | 2019 |
Outage performance of MIMO cooperative networks with selective OFDMA relaying J Wang, Y Zhang Electronics Letters 52 (20), 1731-1733, 2016 | 1 | 2016 |
TrustHeartbeat: A Trustworthy Multimodal Interactive System with Heartbeat Recognition and User Identification Y Zhang 2024 IEEE Conference on Communications and Network Security (CNS), 1-9, 2024 | | 2024 |
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems D Han, A Li, J Li, Y Zhang, T Li, Y Zhang 2024 IEEE 44th International Conference on Distributed Computing Systems …, 2024 | | 2024 |
A multi-user cognitive radio full-duplex channel under imperfect spectrum sensing: Achievable rates and energy efficiency M Ranjbar, NH Tran, T Karacolak, S Sastry, Y Zhang Physical Communication 63, 102267, 2024 | | 2024 |