Wenyuan Xu
Cited by
Cited by
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
I Rouf, RD Miller, HA Mustafa, T Taylor, S Oh, W Xu, M Gruteser, ...
USENIX Security Symposium 10, 2010
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi
NDSS, 2014
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
2007 6th International Symposium on Information Processing in Sensor …, 2007
Securing wireless systems via lower layer enforcements
Z Li, W Xu, R Miller, W Trappe
Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
Def Con 24 (8), 109, 2016
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks
T Trippel, O Weisse, W Xu, P Honeyman, K Fu
2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13), 2013
Anti-jamming timing channels for wireless networks
W Xu, W Trappe, Y Zhang
Proceedings of the first ACM conference on Wireless network security, 203-213, 2008
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
A large-scale empirical analysis of chinese web passwords
Z Li, W Han, W Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 559-574, 2014
Temporal privacy in wireless sensor networks
P Kamat, W Xu, W Trappe, Y Zhang
27th International Conference on Distributed Computing Systems (ICDCS'07), 23-23, 2007
KinWrite: Handwriting-Based Authentication Using Kinect.
J Tian, C Qu, W Xu, S Wang
NDSS 93, 94, 2013
Localizing jammers in wireless networks
H Liu, X Wenyuan, Y Chen, Z Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
Exploiting jamming-caused neighbor changes for jammer localization
Z Liu, H Liu, W Xu, Y Chen
IEEE Transactions on Parallel and Distributed Systems 23 (3), 547-555, 2011
Defending wireless sensor networks from radio interference through channel adaptation
W Xu, W Trappe, Y Zhang
ACM Transactions on Sensor Networks (TOSN) 4 (4), 1-34, 2008
The system can't perform the operation now. Try again later.
Articles 1–20