default search action
Ang Li 0013
Person information
- affiliation: Arizona State University, Tempe, AZ, USA
Other persons with the same name
- Ang Li — disambiguation page
- Ang Li 0001 — University of Maryland, College Park, MD, USA
- Ang Li 0002 — Duke University, Durham, NC, USA
- Ang Li 0003 — Xi'an Jiaotong University, Faculty of Electronic and Information Engineering, Shaanxi, China (and 3 more)
- Ang Li 0004 — Beijing Forestry University, Department of Psychology, China (and 2 more)
- Ang Li 0005 — University of Maryland, College Park, MD, USA (and 2 more)
- Ang Li 0006 — Pacific Northwest National Laboratory, Richland, WA, USA
- Ang Li 0007 (aka: Ang Leon Li) — University of Queensland, Brisbane, QLD, Australia
- Ang Li 0008 — University of Melbourne, School of Computing and Information Systems, Parkville, Victoria, Australia
- Ang Li 0009 — Florida State University, Department of Computer Science, Tallahassee, FL, USA (and 1 more)
- Ang Li 0010 — Stanford University, CA, USA
- Ang Li 0011 — University of Washington, Seattle, WA, USA (and 1 more)
- Ang Li 0012 — Nanjing University of Posts and Telecommunications, Nanjing, China
- Ang Li 0014 — Shanghai Normal University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c9]Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang:
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems. ICDCS 2024: 1342-1353 - 2023
- [j7]Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, Yanchao Zhang:
MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist Wearables. IEEE Trans. Mob. Comput. 22(1): 311-327 (2023) - [j6]Yan Zhang, Dianqi Han, Ang Li, Jiawei Li, Tao Li, Yanchao Zhang:
SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets. IEEE Trans. Mob. Comput. 22(7): 4266-4278 (2023) - [j5]Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:
Rhythmic RFID Authentication. IEEE/ACM Trans. Netw. 31(2): 877-890 (2023) - [j4]Ang Li, Jiawei Li, Yan Zhang, Dianqi Han, Tao Li, Yanchao Zhang:
Secure UHF RFID Authentication With Smart Devices. IEEE Trans. Wirel. Commun. 22(7): 4520-4533 (2023) - [c8]Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang:
PhyAuth: Physical-Layer Message Authentication for ZigBee Networks. USENIX Security Symposium 2023: 1-18 - 2022
- [j3]Dianqi Han, Ang Li, Tao Li, Lili Zhang, Yan Zhang, Jiawei Li, Rui Zhang, Yanchao Zhang:
(In)secure Acoustic Mobile Authentication. IEEE Trans. Mob. Comput. 21(9): 3193-3207 (2022) - [j2]Yan Zhang, Ang Li, Jiawei Li, Dianqi Han, Tao Li, Rui Zhang, Yanchao Zhang:
SpecKriging: GNN-Based Secure Cooperative Spectrum Sensing. IEEE Trans. Wirel. Commun. 21(11): 9936-9946 (2022) - [c7]Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang:
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID. AsiaCCS 2022: 508-520 - [c6]Jiawei Li, Ang Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang:
RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter. INFOCOM 2022: 700-709 - 2021
- [j1]Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Ting Zhu, Yanchao Zhang:
Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense. IEEE/ACM Trans. Netw. 29(5): 1922-1932 (2021) - [c5]Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang:
DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks. CCS 2021: 1306-1319 - [c4]Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, Yanchao Zhang:
Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems. INFOCOM 2021: 1-10 - 2020
- [c3]Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:
RF-Rhythm: Secure and Usable Two-Factor RFID Authentication. INFOCOM 2020: 2194-2203
2010 – 2019
- 2019
- [c2]Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, Yanchao Zhang:
WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables. CNS 2019: 28-36 - [c1]Ang Li, Tao Li, Yan Zhang, Lili Zhang, Yanchao Zhang:
SocialDistance: how far are you from verified users in online social media? IWQoS 2019: 40:1-40:10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint