default search action
Song Fang 0001
Person information
- affiliation: University of Oklahoma, School of Computer Science, Norman, OK, USA
Other persons with the same name
- Song Fang — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Qiuye He, Edwin Yang, Song Fang:
A Survey on Human Profile Information Inference via Wireless Signals. IEEE Commun. Surv. Tutorials 26(4): 2577-2610 (2024) - [j9]Yan He, Qiuye He, Song Fang, Yao Liu:
Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial Analysis. IEEE Trans. Mob. Comput. 23(6): 7256-7269 (2024) - [j8]Qiuye He, Edwin Yang, Song Fang, Shangqing Zhao:
Revisiting Wireless Breath and Crowd Inference Attacks With Defensive Deception. IEEE/ACM Trans. Netw. 32(6): 4976-4988 (2024) - 2023
- [j7]Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 20(1): 637-649 (2023) - [c14]Yan He, Qiuye He, Song Fang, Yao Liu:
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. CCS 2023: 651-665 - [c13]Jinmiao Chen, Zhaohe John Zhang, Shangqing Zhao, Song Fang, Thomas M. Peters, Evan L. Floyd, Changjie Cai:
Poster: Noninvasive Respirator Fit Factor Inference by Semi-Supervised Learning. CHASE 2023: 200-202 - [c12]Qiuye He, Song Fang:
Phantom-CSI Attacks against Wireless Liveness Detection. RAID 2023: 440-454 - 2022
- [j6]Edwin Yang, Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Trans. Netw. 30(4): 1733-1748 (2022) - [c11]Edwin Yang, Qiuye He, Song Fang:
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. CCS 2022: 3033-3047 - [c10]Edwin Yang, Song Fang, Dakun Shen:
DASK: Driving-Assisted Secret Key Establishment. CNS 2022: 73-81 - [c9]Qiuye He, Edwin Yang, Song Fang, Shangqing Zhao:
HoneyBreath: An Ambush Tactic Against Wireless Breath Inference. MobiQuitous 2022: 203-226 - 2021
- [j5]Song Fang, Ian D. Markwood, Yao Liu:
Wireless-Assisted Key Establishment Leveraging Channel Manipulation. IEEE Trans. Mob. Comput. 20(1): 263-275 (2021) - [c8]Zhaohe John Zhang, Edwin Yang, Song Fang:
CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. ACSAC 2021: 720-731 - [c7]Yan He, Qiuye He, Song Fang, Yao Liu:
MotionCompass: pinpointing wireless camera via motion-activated traffic. MobiSys 2021: 215-227 - 2020
- [c6]Yan He, Hanyan Zhang, Edwin Yang, Song Fang:
Virtual Step PIN Pad: Towards Foot-input Authentication Using Geophones. MASS 2020: 649-657
2010 – 2019
- 2019
- [c5]Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Entrapment for Wireless Eavesdroppers. INFOCOM 2019: 2530-2538 - 2018
- [b1]Song Fang:
Channel Camouflage and Manipulation Techniques in Wireless Networks. University of South Florida, Tampa, USA, 2018 - [j4]Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. IEEE Trans. Dependable Secur. Comput. 15(5): 853-867 (2018) - [c4]Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. CCS 2018: 1747-1760 - 2017
- [j3]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, Tao Wang:
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks. IEEE Trans. Mob. Comput. 16(2): 566-580 (2017) - [c3]Song Fang, Ian D. Markwood, Yao Liu:
Manipulatable wireless key establishment. CNS 2017: 1-9 - 2016
- [j2]Song Fang, Yao Liu, Peng Ning:
Wireless Communications under Broadband Reactive Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 13(3): 394-408 (2016) - [j1]Song Fang, Yao Liu, Peng Ning:
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature. IEEE Trans. Inf. Forensics Secur. 11(7): 1515-1527 (2016) - 2014
- [c2]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu:
Where are you from?: confusing location distinction using virtual multipath camouflage. MobiCom 2014: 225-236 - 2013
- [c1]Song Fang, Tao Luo:
A Novel Two-Timer-Based Broadcast Routing Algorithm for Vehicular Ad-Hoc Networks. GreenCom/iThings/CPScom 2013: 1518-1522
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint