Cross-layer enhanced source location privacy in sensor networks M Shao, W Hu, S Zhu, G Cao, S Krishnamurth, T La Porta 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009 | 85 | 2009 |
Duet: library integrity verification for android applications W Hu, D Octeau, PD McDaniel, P Liu Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 42 | 2014 |
Improvement on OTP authentication and a possession-based authentication framework S Zhao, W Hu International Journal of Multimedia Intelligence and Security 3 (2), 187-203, 2018 | 16 | 2018 |
Compromise-resilient anti-jamming for wireless sensor networks X Jiang, W Hu, S Zhu, G Cao Information and Communications Security: 12th International Conference …, 2010 | 10 | 2010 |
Compromise-resilient anti-jamming communication in wireless sensor networks X Jiang, W Hu, S Zhu, G Cao Wireless Networks 17, 1513-1527, 2011 | 5 | 2011 |
Third-party library security management for mobile applications W Hu | 1 | 2016 |
Fast Solutions for AP-to-AP Handoffs W Hu, D Forsberg NordSec 2006, 2006 | | 2006 |