Deep learning-guided jamming for cross-technology wireless networks: Attack and defense D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021 | 29 | 2021 |
RF-Rhythm: Secure and usable two-factor RFID authentication J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2194-2203, 2020 | 29 | 2020 |
SpecKriging: GNN-based secure cooperative spectrum sensing Y Zhang, A Li, J Li, D Han, T Li, R Zhang, Y Zhang IEEE Transactions on Wireless Communications 21 (11), 9936-9946, 2022 | 19 | 2022 |
PhyAuth:Physical-Layer Message Authentication for ZigBee Networks A Li, J Li, D Han, Y Zhang, T Li, T Zhu, Y Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1-18, 2023 | 16 | 2023 |
Secure UHF RFID authentication with smart devices A Li, J Li, Y Zhang, D Han, T Li, Y Zhang IEEE Transactions on Wireless Communications 22 (7), 4520-4533, 2022 | 14 | 2022 |
DroneKey: a drone-aided group-key generation scheme for large-scale IoT networks D Han, A Li, J Li, Y Zhang, T Li, Y Zhang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 13 | 2021 |
Rcid: Fingerprinting passive rfid tags via wideband backscatter J Li, A Li, D Han, Y Zhang, T Li, Y Zhang IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 700-709, 2022 | 10 | 2022 |
Your home is insecure: Practical attacks on wireless home alarm systems T Li, D Han, J Li, A Li, Y Zhang, R Zhang, Y Zhang IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 8 | 2021 |
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021 | 7 | 2021 |
WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID A Li, J Li, D Han, Y Zhang, T Li, Y Zhang Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 5 | 2022 |
Rhythmic RFID authentication J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang IEEE/ACM Transactions on Networking 31 (2), 877-890, 2022 | 4 | 2022 |
WristUnlock: Secure and usable smartphone unlocking with wrist wearables L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang 2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019 | 4 | 2019 |
(In) secure acoustic mobile authentication D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021 | 3 | 2021 |
Socialdistance: How far are you from verified users in online social media? A Li, T Li, Y Zhang, L Zhang, Y Zhang Proceedings of the International Symposium on Quality of Service, 1-10, 2019 | 2 | 2019 |
SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets Y Zhang, D Han, A Li, J Li, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (7), 4266-4278, 2022 | 1 | 2022 |
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems D Han, A Li, J Li, Y Zhang, T Li, Y Zhang 2024 IEEE 44th International Conference on Distributed Computing Systems …, 2024 | | 2024 |
Securing Heterogeneous IoT systems A Li Arizona State University, 2023 | | 2023 |