default search action
Wade Trappe
Person information
- affiliation: Rutgers University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c158]Andrey Garnaev, Wade Trappe:
A Fair Anti-Eavesdropping Strategy for Communication with Several Receivers. CISS 2024: 1-6 - [c157]Andrey Garnaev, Wade Trappe:
A Fair Detection Strategy of an Adversary. CoDIT 2024: 1084-1089 - [c156]Andrey Garnaev, Wade Trappe:
A Jamming Game with Fair Trade-off between SINR and Power Saving. MeditCom 2024: 541-546 - [c155]Andrey Garnaev, Wade Trappe:
An ALOHA-type Network Game with Trade-off Between Throughput and Energy Saving. SPAWC 2024: 21-25 - [c154]Andrey Garnaev, Wade Trappe:
An IoT Game with Heterogeneous Communication Nodes. WINCOM 2024: 1-6 - 2023
- [j75]Andrey Garnaev, Wade Trappe:
An eavesdropping and jamming dilemma with sophisticated players. ICT Express 9(4): 691-696 (2023) - [j74]Andrey Garnaev, Wade Trappe:
A multiple access channel game with users implementing throughput and latency metrics. ICT Express 9(5): 869-874 (2023) - [j73]Andrey Garnaev, Wade Trappe:
A Bandwidth Scanning Game with a Sophisticated Adversary. IGTR 25(3): 2340002:1-2340002:16 (2023) - [c153]Andrey Garnaev, Wade Trappe:
An ALOHA multi-user game with tradeoff between throughput and transmission proportional fairness. CISS 2023: 1-6 - [c152]Andrey Garnaev, Wade Trappe:
An Anti-jamming Game When None Player Knows Rival's Channel Gain. VALUETOOLS 2023: 3-17 - [c151]Andrey Garnaev, Wade Trappe:
A non-zero sum game of a joint radar and communication system and a jammer. WINCOM 2023: 1-6 - 2022
- [j72]Vahideh Vakil, Wade Trappe:
Drug-Resistant Cancer Treatment Strategies Based on the Dynamics of Clonal Evolution and PKPD Modeling of Drug Combinations. IEEE ACM Trans. Comput. Biol. Bioinform. 19(3): 1603-1614 (2022) - [j71]Andrey Garnaev, Wade Trappe:
A Sophisticated Anti-Eavesdropping Strategy. IEEE Wirel. Commun. Lett. 11(7): 1463-1467 (2022) - [j70]Andrey Garnaev, Athina P. Petropulu, Wade Trappe, H. Vincent Poor:
An Anti-Jamming Multiple Access Channel Game Using Latency as Metric. IEEE Wirel. Commun. Lett. 11(9): 1800-1804 (2022) - [c150]Andrey Garnaev, Wade Trappe:
A Non-Zero Sum Bandwidth Scanning Game with a Sophisticated Adversary. CISS 2022: 72-77 - [c149]Andrey Garnaev, Wade Trappe:
A Sophisticated Anti-jamming Strategy for a Joint Radar and Communication System. GAMENETS 2022: 55-69 - [c148]Andrey Garnaev, Wade Trappe:
A Stochastic Bandwidth Scanning Game. GAMENETS 2022: 237-250 - 2021
- [j69]Andrey Garnaev, Athina P. Petropulu, Wade Trappe, H. Vincent Poor:
A Multi-Jammer Power Control Game. IEEE Commun. Lett. 25(9): 3031-3035 (2021) - [c147]Andrey Garnaev, Athina P. Petropulu, Wade Trappe:
A Multiple Access Channel Game Using Latency Metric. ICASSP 2021: 5060-5064 - 2020
- [j68]Andrey Garnaev, Athina P. Petropulu, Wade Trappe, H. Vincent Poor:
A Multi-Jammer Game With Latency as the User's Communication Utility. IEEE Commun. Lett. 24(9): 1899-1903 (2020) - [j67]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
A Dilemma in the Communication of a UAV with its Controller. IGTR 22(2): 2040003:1-2040003:15 (2020) - [j66]Andrey Garnaev, Athina P. Petropulu, Wade Trappe, H. Vincent Poor:
A Jamming Game With Rival-Type Uncertainty. IEEE Trans. Wirel. Commun. 19(8): 5359-5372 (2020) - [c146]Andrey Garnaev, Athina P. Petropulu, Wade Trappe, H. Vincent Poor:
A Switching Transmission Game with Latency as the User's Communication Utility. ICASSP 2020: 2912-2916 - [c145]Andrey Garnaev, Wade Trappe, Narayan B. Mandayam, H. Vincent Poor:
A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game. WIFS 2020: 1-6
2010 – 2019
- 2019
- [j65]Jiayue Cai, Aiping Liu, Taomian Mi, Saurabh Garg, Wade Trappe, Martin J. McKeown, Z. Jane Wang:
Dynamic Graph Theoretical Analysis of Functional Connectivity in Parkinson's Disease: The Importance of Fiedler Value. IEEE J. Biomed. Health Informatics 23(4): 1720-1729 (2019) - [c144]Andrey Garnaev, Wade Trappe:
A Prospect Theoretical Extension of a Communication Game Under Jamming. CISS 2019: 1-6 - [c143]Dragoslav Stojadinovic, Felipe A. P. de Figueiredo, Prasanthi Maddala, Ivan Seskar, Wade Trappe:
SC2 CIL: Evaluating the Spectrum Voxel Announcement Benefits. DySPAN 2019: 1-6 - [c142]Andrey Garnaev, Wade Trappe:
Bandwidth Scanning when the Rivals Are Subjective. GAMENETS 2019: 9-28 - [c141]Andrey Garnaev, Athina P. Petropulu, Wade Trappe, H. Vincent Poor:
A Power Control Game with Uncertainty On the Type of the Jammer. GlobalSIP 2019: 1-5 - [c140]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Combating Jamming in Wireless Networks: A Bayesian Game with Jammer's Channel Uncertainty. ICASSP 2019: 2447-2451 - [c139]Andrey Garnaev, Wade Trappe:
A Connectivity Game with Incomplete Information on Jammer's Location. NEW2AN 2019: 256-268 - [c138]Andrey Garnaev, Wade Trappe:
An Eavesdropping and Jamming Dilemma when the Adversary might be Subjective. WCNC 2019: 1-6 - [c137]Andrey Garnaev, Wade Trappe:
A Power Control Game Involving Jamming and Eavesdropping Defense. WIFS 2019: 1-6 - [c136]Andrey Garnaev, Jing Zhong, Wuyang Zhang, Roy D. Yates, Wade Trappe:
Proportional Fair Information Freshness Under Jamming. WWIC 2019: 91-102 - 2018
- [j64]Xiaoran Fan, Han Ding, Sugang Li, Michael Sanzari, Yanyong Zhang, Wade Trappe, Zhu Han, Richard E. Howard:
Energy-Ball: Wireless Power Transfer for Batteryless Internet of Things through Distributed Beamforming. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2): 65:1-65:22 (2018) - [j63]Wade Trappe, Jeremy Straub:
Cybersecurity: A New Open Access Journal. J. Cybersecur. Priv. 1(1): 1 (2018) - [j62]Wade Trappe, Jeremy Straub:
Journal of Cybersecurity and Privacy: A New Open Access Journal. J. Cybersecur. Priv. 1(1): 1-3 (2018) - [c135]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
A dual radar and communication system facing uncertainty about a jammer's capability. ACSSC 2018: 417-422 - [c134]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Stability of fair trade-off solution between radar and communication objectives on hostile interference. CISS 2018: 1-6 - [c133]Ning Zhang, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe:
ROSTER: Radio Context Attestation in Cognitive Radio Network. CNS 2018: 1-9 - [c132]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Maxmin Strategy for a Dual Radar and Communication OFDM Waveforms System Facing Uncertainty About the Background Noise. CrownCom 2018: 154-164 - [c131]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
To Communicate or to Scan: Prospect Theory Extension of a Stochastic Game. GlobalSIP 2018: 1301-1305 - [c130]Xiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han:
Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmitters. INFOCOM Workshops 2018: 1-2 - [c129]Xiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han:
Demo abstract: A practical secret communication system by perturbing focused phases among distributed transmitters. INFOCOM Workshops 2018: 1-2 - [c128]Xiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han:
Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming. INFOCOM 2018: 1781-1789 - [c127]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
A Prospect Theoretic Look at a Joint Radar and Communication System. NEW2AN 2018: 483-495 - [c126]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Optimal Design of a Dual-Purpose Communication-Radar System in the Presence of a Jammer. SPAWC 2018: 1-5 - [c125]Andrey Garnaev, Wade Trappe:
The rival might be not smart: Revising a CDMA jamming game. WCNC 2018: 1-6 - [c124]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
An Anti-jamming Strategy When it Is Unknown Which Receivers Will Face with Smart Interference. WWIC 2018: 195-206 - 2017
- [j61]Andrey Garnaev, Wade Trappe:
Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies. Entropy 19(7): 363 (2017) - [j60]Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang, Wade Trappe:
A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet 9(3): 27 (2017) - [j59]Sugang Li, Xiaoran Fan, Yanyong Zhang, Wade Trappe, Janne Lindqvist, Richard E. Howard:
Auto++: Detecting Cars Using Embedded Microphones in Real-Time. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 70:1-70:20 (2017) - [j58]Wade Trappe:
Data Treasure Hunters: Science Expanding to New Frontiers [In the Spotlight]. IEEE Signal Process. Mag. 34(1): 116-115 (2017) - [j57]John H. L. Hansen, Kazuya Takeda, Sanjeev M. Naik, Mohan M. Trivedi, Gerhard Uwe Schmidt, Yingying (Jennifer) Chen, Wade Trappe:
Signal Processing for Smart Vehicle Technologies: Part 2 [From the Guest Editors]. IEEE Signal Process. Mag. 34(2): 18-21 (2017) - [j56]Wade Trappe:
No Need for Speed : More Signal Processing Innovation Is Required Before Adopting Automated Vehicles [In the Spotlight]. IEEE Signal Process. Mag. 34(2): 124-122 (2017) - [j55]Andrey Garnaev, Wade Trappe:
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications. IEEE Trans. Inf. Forensics Secur. 12(1): 242-251 (2017) - [j54]Andrey Garnaev, Wade Trappe:
Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities. IEEE Trans. Inf. Forensics Secur. 12(8): 1916-1930 (2017) - [c123]Andrey Garnaev, Wade Trappe:
Fair Scheduling of Two-Hop Transmission with Energy Harvesting. ADHOCNETS 2017: 189-198 - [c122]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Equilibrium strategies for an OFDM network that might be under a jamming attack. CISS 2017: 1-6 - [c121]Andrey Garnaev, Wade Trappe:
An OFDM-based dual radar/communication system facing uncertain jamming power. CNS 2017: 1-9 - [c120]Andrey Garnaev, Wade Trappe, Ratnesh Kumbhkar, Narayan B. Mandayam:
Impact of Uncertainty About a User to be Active on OFDM Transmission Strategies. CrownCom 2017: 211-222 - [c119]Andrey Garnaev, Wade Trappe:
Stability of communication link connectivity against hostile interference. GlobalSIP 2017: 136-140 - [c118]Andrey Garnaev, Wade Trappe, Y. Thomas Hou, Wenjing Lou:
Spectrum attacks aimed at minimizing spectrum opportunities. ICASSP 2017: 2092-2096 - [c117]Andrey Garnaev, Wade Trappe:
A Reinforcement Protection Game in the Internet of Things. InterIoT/SaSeIoT 2017: 85-95 - [c116]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Bargaining in a Dual Radar and Communication System Using Radar-Prioritized OFDM Waveforms. NEW2AN 2017: 382-394 - [c115]Andrey Garnaev, Shweta Sagari, Wade Trappe:
Bargaining over Fair Channel Sharing Between Wi-Fi and LTE-U Networks. WWIC 2017: 3-15 - [i10]Ying Liu, Andrey Garnaev, Wade Trappe:
Connectivity jamming game for physical layer attack in peer to peer networks. CoRR abs/1711.10955 (2017) - 2016
- [j53]Xiruo Liu, Wade Trappe:
Overlay tunneling as a policy tool for defending mobile ad hoc networks. Secur. Commun. Networks 9(17): 4482-4494 (2016) - [j52]Ying Liu, Andrey Garnaev, Wade Trappe:
Connectivity jamming game for physical layer attack in peer to peer networks. Secur. Commun. Networks 9(18): 6080-6093 (2016) - [j51]Z. Jane Wang, Wade Trappe, Shuguang Cui:
A Feature Article Cluster on Brain Signal Analytics: Analytical Approaches to Enhanced Understanding of Brain Function From the Editors. IEEE Signal Process. Mag. 33(3): 12-13 (2016) - [j50]Xu Yuan, Xiaoqi Qin, Feng Tian, Brian Jalaian, Yi Shi, Y. Thomas Hou, Wenjing Lou, Wade Trappe:
An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm. IEEE Trans. Cogn. Commun. Netw. 2(4): 411-426 (2016) - [j49]Andrey Garnaev, Wade Trappe:
A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity. IEEE Trans. Inf. Forensics Secur. 11(4): 837-849 (2016) - [j48]Tingting Sun, Yanyong Zhang, Wade Trappe:
Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing. IEEE Trans. Mob. Comput. 15(5): 1157-1167 (2016) - [j47]Andrey Garnaev, Ying Liu, Wade Trappe:
Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary's Attack Type is Unknown. IEEE Trans. Signal Inf. Process. over Networks 2(1): 49-56 (2016) - [j46]Bo Li, Athina P. Petropulu, Wade Trappe:
Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System. IEEE Trans. Signal Process. 64(17): 4562-4575 (2016) - [c114]Andrey Garnaev, Wade Trappe, Athina P. Petropulu:
Bargaining over fair performing dual radar and communication task. ACSSC 2016: 47-51 - [c113]Wade Trappe, Andrey Garnaev:
Bargaining over secrecy and reliability for low SNR OFDM communications. CNS 2016: 596-600 - [c112]Andrey Garnaev, Shweta Sagari, Wade Trappe:
Fair Channel Sharing by Wi-Fi and LTE-U Networks with Equal Priority. CrownCom 2016: 91-103 - [c111]Ying Liu, Andrey Garnaev, Wade Trappe:
Maintaining throughput network connectivity in ad hoc networks. ICASSP 2016: 6380-6384 - [c110]Zhenhua Jia, Musaab Alaziz, Xiang Chi, Richard E. Howard, Yanyong Zhang, Pei Zhang, Wade Trappe, Anand Sivasubramaniam, Ning An:
HB-Phone: A Bed-Mounted Geophone-Based Heartbeat Monitoring System. IPSN 2016: 22:1-22:12 - [c109]Andrey Garnaev, Wade Trappe:
A Secrecy and Security Dilemma in OFDM Communications. MACOM 2016: 111-125 - [c108]Satya Prakash Ponnaluri, Babak Azimi-Sadjadi, Yik-Kiong Hue, Tugba Erpek, Arash Komaee, Wade Trappe:
A practical wireless reciprocity-aware key establishment protocol. MILCOM 2016: 1107-1113 - [c107]Sugang Li, Xiaoran Fan, Yanyong Zhang, Wade Trappe, Janne Lindqvist, Richard E. Howard:
Bo-ear: unsupervised car sound sensing and tracking using microphones on smartphones. S3@MobiCom 2016: 9-11 - [i9]Shweta Sagari, Larry J. Greenstein, Wade Trappe:
Practical Interpolation for Spectrum Cartography through Local Path Loss Modeling. CoRR abs/1611.03725 (2016) - 2015
- [j45]Wade Trappe:
The challenges facing physical layer security. IEEE Commun. Mag. 53(6): 16-20 (2015) - [j44]Wade Trappe, Richard E. Howard, Robert S. Moore:
Low-Energy Security: Limits and Opportunities in the Internet of Things. IEEE Secur. Priv. 13(1): 14-21 (2015) - [j43]Wade Trappe, Lalitha Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun:
Introduction to the Issue on Signal and Information Processing for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1173-1175 (2015) - [j42]Andrey Garnaev, Wade Trappe:
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious. IEEE Trans. Inf. Forensics Secur. 10(5): 1064-1075 (2015) - [c106]Shweta Sagari, Samuel Baysting, Dola Saha, Ivan Seskar, Wade Trappe, Dipankar Raychaudhuri:
Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks. DySPAN 2015: 209-220 - [c105]Ying Liu, Wade Trappe:
Jammer forensics: Localization in peer to peer networks based on Q-learning. ICASSP 2015: 1737-1741 - [c104]Andrey Garnaev, Wade Trappe, Dragoslav Stojadinovic, Ivan Seskar:
Spectrum scanning when the intruder might have knowledge about the scanner's capabilities. ICASSP 2015: 1742-1746 - [c103]Andrey Garnaev, Shweta Sagari, Wade Trappe:
Fair Allocation of Throughput Under Harsh Operational Conditions. MACOM 2015: 108-119 - [c102]Andrey Garnaev, Wade Trappe:
Impact of incomplete knowledge on scanning strategy. WIFS 2015: 1-6 - [i8]Andrey Garnaev, Wade Trappe:
Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics. CoRR abs/1502.04676 (2015) - [i7]Bo Li, Athina P. Petropulu, Wade Trappe:
Optimum Design for Coexistence Between Matrix Completion Based MIMO Radars and a MIMO Communication System. CoRR abs/1507.01982 (2015) - [i6]Shweta Sagari, Samuel Baysting, Dola Saha, Ivan Seskar, Wade Trappe, Dipankar Raychaudhuri:
Coordinated Dynamic Spectrum Management of LTE-U and Wi-Fi Networks. CoRR abs/1507.06881 (2015) - 2014
- [b3]Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng:
Pervasive Wireless Environments: Detecting and Localizing User Spoofing. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-07355-2, pp. 1-72 - [j41]Andrey Garnaev, Wade Trappe:
Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics. EAI Endorsed Trans. Mob. Commun. Appl. 2(5): e6 (2014) - [c101]Shweta Sagari, Larry J. Greenstein, Wade Trappe:
Emulating co-channel interference in wireless networks using equivalent low-tap filters. CISS 2014: 1-6 - [c100]Andrey Garnaev, Wade Trappe:
Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence. CNS 2014: 35-43 - [c99]Andrey Garnaev, Wade Trappe:
Secret Communication When the Eavesdropper Might Be an Active Adversary. MACOM 2014: 121-136 - [c98]Xiruo Liu, Wade Trappe, Janne Lindqvist:
A policy-driven approach to access control in future internet name resolution services. MobiArch 2014: 7-12 - [c97]Andrey Garnaev, Wade Trappe:
Anti-jamming Strategies: A Stochastic Game Approach. MONAMI 2014: 230-243 - [c96]Ying Liu, Xiruo Liu, Wade Trappe, Radhika Roy:
Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks. VTC Fall 2014: 1-5 - [c95]Andrey Garnaev, Wade Trappe:
Fair resource allocation under an unknown jamming attack: a Bayesian game. WIFS 2014: 227-232 - 2013
- [j40]Lalitha Sankar, Wade Trappe, H. Vincent Poor, Mérouane Debbah:
Signal Processing for Cybersecurity and Privacy [From the Guest Editors]. IEEE Signal Process. Mag. 30(5): 14-15 (2013) - [j39]Lalitha Sankar, Wade Trappe, Kannan Ramchandran, H. Vincent Poor, Mérouane Debbah:
The Role of Signal Processing in Meeting Privacy Challenges: An Overview. IEEE Signal Process. Mag. 30(5): 95-106 (2013) - [j38]Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng:
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 24(1): 44-58 (2013) - [c94]Andrey Garnaev, Wade Trappe:
To Eavesdrop or Jam, That is the Question. ADHOCNETS 2013: 146-161 - [c93]Sushil Jajodia, Wenjing Lou, Wade Trappe:
Welcome message. CNS 2013: 1-2 - [c92]Rishabh Dudheria, Wade Trappe, Naftaly H. Minsky:
Law governed peer-to-peer secondary spectrum marketplaces. CrownCom 2013: 141-147 - [c91]Andrey Garnaev, Wade Trappe, Chun-Ta Kung:
Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments. CrownCom 2013: 148-153 - [c90]Andrey Garnaev, Wade Trappe:
The eavesdropping and Jamming Dilemma in multi-channel communications. ICC 2013: 2160-2164 - [c89]Xiruo Liu, Wade Trappe, Yanyong Zhang:
Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet. ICCCN 2013: 1-7 - [c88]Chenren Xu, Bernhard Firner, Robert S. Moore, Yanyong Zhang, Wade Trappe, Richard E. Howard, Feixiong Zhang, Ning An:
SCPL: indoor device-free multi-subject counting and localization using radio signal strength. IPSN 2013: 79-90 - [c87]Andrey Garnaev, Wade Trappe:
Stationary Equilibrium Strategies for Bandwidth Scanning. MACOM 2013: 168-183 - [c86]Christopher Mueller-Smith, Wade Trappe:
Efficient OFDM Denial in the Absence of Channel Information. MILCOM 2013: 89-94 - [c85]Rishabh Dudheria, Wade Trappe, Naftaly H. Minsky:
Resilient Leadership Delegation in Tactical Systems. MILCOM 2013: 1906-1912 - [c84]Shweta Sagari, Wade Trappe, Larry J. Greenstein:
Equivalent Tapped Delay Line Channel Responses with Reduced Taps. VTC Fall 2013: 1-5 - [i5]Andrey Garnaev, Wade Trappe, Chun-Ta Kung:
Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments. CoRR abs/1310.7247 (2013) - 2012
- [j37]Song Liu, Larry J. Greenstein, Wade Trappe, Yingying Chen:
Detecting anomalous spectrum usage in dynamic spectrum access networks. Ad Hoc Networks 10(5): 831-844 (2012) - [j36]Robert D. Miller, Wade Trappe:
On the Vulnerabilities of CSI in MIMO Wireless Communication Systems. IEEE Trans. Mob. Comput. 11(8): 1386-1398 (2012) - [j35]Aliye Özge Kaya, Wade Trappe, Larry J. Greenstein, Dmitry Chizhik:
Predicting MIMO Performance in Urban Microcells Using Ray Tracing to Characterize the Channel. IEEE Trans. Wirel. Commun. 11(7): 2402-2411 (2012) - [c83]Andrey Garnaev, Wade Trappe, Chun-Ta Kung:
Dependence of optimal monitoring strategy on the application to be protected. GLOBECOM 2012: 1054-1059 - [c82]Mete Rodoper, Arati Baliga, Edward Jung, Wade Trappe:
An efficient security framework for mobile WiMAX. SAC 2012: 1494-1501 - [c81]Jie Yang, Yingying Chen, Sanjay Macwan, Cristina Serban, Shu Chen, Wade Trappe:
Securing Mobile Location-based Services through position verification leveraging key distribution. WCNC 2012: 2694-2699 - [c80]Tingting Sun, Yanyong Zhang, Wade Trappe:
Association attacks: Identifying association protocols. WOWMOM 2012: 1-5 - [e1]Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe:
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012. ACM 2012, ISBN 978-1-4503-1265-3 [contents] - 2011
- [j34]Brian Russell, Michael L. Littman, Wade Trappe:
Integrating machine learning in ad hoc routing: A wireless adaptive routing protocol. Int. J. Commun. Syst. 24(7): 950-966 (2011) - [j33]Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, João Barros:
Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems. IEEE Trans. Inf. Forensics Secur. 6(3-1): 521-522 (2011) - [j32]Suhas Mathur, Wade Trappe:
BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams. IEEE Trans. Inf. Forensics Secur. 6(3-1): 752-762 (2011) - [j31]Yu Zhang, Zhibin Wu, Wade Trappe:
Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications. IEEE Trans. Mob. Comput. 10(3): 362-376 (2011) - [c79]Tingting Sun, Yanyong Zhang, Wade Trappe:
Improving Access Point Association Protocols through Channel Utilization and Adaptive Switching. MASS 2011: 155-157 - [c78]Suhas Mathur, Robert D. Miller, Alexander Varshavsky, Wade Trappe, Narayan B. Mandayam:
ProxiMate: proximity-based secure pairing using ambient wireless signals. MobiSys 2011: 211-224 - [c77]Robert D. Miller, Wade Trappe:
Short paper: ACE: authenticating the channel estimation process in wireless communication systems. WISEC 2011: 91-96 - 2010
- [j30]Tingting Sun, Wade Trappe, Yanyong Zhang:
Improved AP association management using machine learning. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(4): 4-6 (2010) - [j29]Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:
Information-theoretically secret key generation for fading wireless channels. IEEE Trans. Inf. Forensics Secur. 5(2): 240-254 (2010) - [j28]Shu Chen, Yingying Chen, Wade Trappe:
Inverting Systems of Embedded Sensors for Position Verification in Location-Aware Applications. IEEE Trans. Parallel Distributed Syst. 21(5): 722-736 (2010) - [j27]Yingying Chen, Jie Yang, Wade Trappe, Richard P. Martin:
Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks. IEEE Trans. Veh. Technol. 59(5): 2418-2434 (2010) - [j26]Zang Li, Roy D. Yates, Wade Trappe:
Achieving Secret Communication for Fast Rayleigh Fading Channels. IEEE Trans. Wirel. Commun. 9(9): 2792-2799 (2010) - [j25]Suhas Mathur, Alex Reznik, Chunxuan Ye, Rajat Mukherjee, Akbar Rahman, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:
Exploiting the physical layer for enhanced security. IEEE Wirel. Commun. 17(5): 63-70 (2010) - [c76]Liang Xiao, Alex Reznik, Wade Trappe, Chunxuan Ye, Yogendra Shah, Larry J. Greenstein, Narayan B. Mandayam:
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks. GLOBECOM 2010: 1-6 - [c75]Robert D. Miller, Wade Trappe:
Physical Layer Techniques for Enhanced Situational Awareness. ICASSP 2010: 2234-2237 - [c74]Aliye Özge Kaya, Wade Trappe, Larry J. Greenstein:
Adapting MIMO transmission mode along paths in urban environments. ICASSP 2010: 3462-3465 - [c73]Michael Loiacono, Jeffrey Johnson, Justinian Rosca, Wade Trappe:
Cross-Layer Link Adaptation for Wireless Video. ICC 2010: 1-6 - [c72]Suhas Mathur, Tong Jin, Nikhil Kasturirangan, Janani Chandrasekaran, Wenzhi Xue, Marco Gruteser, Wade Trappe:
ParkNet: drive-by sensing of road-side parking statistics. MobiSys 2010: 123-136 - [c71]Ishtiaq Rouf, Robert D. Miller, Hossen Asiful Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar:
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. USENIX Security Symposium 2010: 323-338 - [c70]Robert D. Miller, Wade Trappe:
Subverting MIMO wireless systems by jamming the channel estimation procedure. WISEC 2010: 19-24 - [c69]Yu Zhang, Arati Baliga, Wade Trappe:
Reactive on-board regulation of cognitive radios. WOWMOM 2010: 1-6 - [p2]Zang Li, Wade Trappe:
WBE-Based Anti-collusion Fingerprints: Design and Detection. Intelligent Multimedia Analysis for Security Applications 2010: 305-335
2000 – 2009
- 2009
- [b2]Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Securing Emerging Wireless Systems - Lower-layer Approaches. Springer 2009, ISBN 978-0-387-88490-5, pp. I-XVII, 1-361 - [j24]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee:
Secure wireless networking. J. Commun. Networks 11(6): 323-327 (2009) - [j23]Mete Rodoper, Wade Trappe, Edward Jung:
An IBC and certificate based hybrid approach to WiMAX security. J. Commun. Networks 11(6): 615-625 (2009) - [j22]Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Secur. Commun. Networks 2(4): 325-340 (2009) - [j21]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Channel-based detection of Sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 4(3): 492-503 (2009) - [j20]Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin:
A security and robustness performance analysis of localization algorithms to signal strength attacks. ACM Trans. Sens. Networks 5(1): 2:1-2:37 (2009) - [j19]Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Temporal privacy in wireless sensor networks: Theory and practice. ACM Trans. Sens. Networks 5(4): 28:1-28:24 (2009) - [j18]Aliye Özge Kaya, Larry J. Greenstein, Wade Trappe:
Characterizing Indoor Wireless Channels via Ray Tracing Combined with Stochastic Modeling. IEEE Trans. Wirel. Commun. 8(8): 4165-4175 (2009) - [j17]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans. Wirel. Commun. 8(12): 5948-5956 (2009) - [c68]Gayathri Chandrasekaran, John-Austen Francisco, Vinod Ganapathy, Marco Gruteser, Wade Trappe:
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. GLOBECOM 2009: 1-6 - [c67]Aliye Özge Kaya, Mung Chiang, Wade Trappe:
P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks. GLOBECOM 2009: 1-8 - [c66]Jie Yang, Yingying Chen, Wade Trappe, Jay Cheng:
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks. INFOCOM 2009: 666-674 - [c65]Song Liu, Yingying Chen, Wade Trappe, Larry J. Greenstein:
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks. INFOCOM 2009: 675-683 - [c64]Bernhard Firner, Prashant Jadhav, Yanyong Zhang, Richard E. Howard, Wade Trappe:
Demo abstract: Towards continuous tracking: Low-power communication and fail-safe presence assurance. IPSN 2009: 417-418 - [c63]Suhas Mathur, Sanjit K. Kaul, Marco Gruteser, Wade Trappe:
ParkNet: a mobile sensor network for harvesting real time vehicular parking information. S³@MobiHoc 2009: 25-28 - [c62]Bernhard Firner, Prashant Jadhav, Yanyong Zhang, Richard E. Howard, Wade Trappe, Eitan Fenson:
Towards Continuous Asset Tracking: Low-Power Communication and Fail-Safe Presence Assurance. SECON 2009: 1-9 - [c61]Jie Yang, Yingying Chen, Wade Trappe:
Detecting Spoofing Attacks in Mobile Wireless Environments. SECON 2009: 1-9 - [c60]Andrey Garnaev, Wade Trappe:
An Eavesdropping Game with SINR as an Objective Function. SecureComm 2009: 142-162 - [i4]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. CoRR abs/0907.4877 (2009) - [i3]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
MIMO-Assisted Channel-Based Authentication in Wireless Networks. CoRR abs/0907.4908 (2009) - [i2]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Using the Physical Layer for Wireless Authentication in Time-Variant Channels. CoRR abs/0907.4919 (2009) - [i1]Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan B. Mandayam:
Information-theoretically Secret Key Generation for Fading Wireless Channels. CoRR abs/0910.5027 (2009) - 2008
- [j16]Pandurang Kamat, Arati Baliga, Wade Trappe:
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Secur. Commun. Networks 1(3): 233-244 (2008) - [j15]Shu Chen, Yingying Chen, Wade Trappe:
Exploiting environmental properties for wireless localization. ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1): 49-51 (2008) - [j14]Yu Zhang, Zang Li, Wade Trappe:
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. IEEE Trans. Inf. Forensics Secur. 3(2): 259-272 (2008) - [j13]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Defending wireless sensor networks from radio interference through channel adaptation. ACM Trans. Sens. Networks 4(4): 18:1-18:34 (2008) - [j12]Ke Ma, Yanyong Zhang, Wade Trappe:
Managing the Mobility of a Mobile Sensor Network Using Network Dynamics. IEEE Trans. Parallel Distributed Syst. 19(1): 106-120 (2008) - [j11]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wirel. Commun. 7(7): 2571-2579 (2008) - [c59]Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. AsiaCCS 2008: 201-204 - [c58]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
MIMO-assisted channel-based authentication in wireless networks. CISS 2008: 642-646 - [c57]Aliye Özge Kaya, Larry J. Greenstein, Wade Trappe:
Characterizing Indoor Wireless Channels via Ray Tracing, and Validation via Measurements. GLOBECOM 2008: 4170-4174 - [c56]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. ICC 2008: 1520-1524 - [c55]Shweta Medhekar, Richard E. Howard, Wade Trappe, Yanyong Zhang, Peter Wolniansky:
Mining joules and bits: towards a long-life pervasive system. IPDPS 2008: 1-8 - [c54]Zang Li, Roy D. Yates, Wade Trappe:
Secrecy capacity region of a class of one-sided interference channel. ISIT 2008: 379-383 - [c53]Robert D. Miller, Shalini Jain, Wade Trappe:
Radio teaming: Establishing communication when communication is not possible. MASS 2008: 365-370 - [c52]Jie Yang, Yingying Chen, Wade Trappe:
Detecting sybil attacks inwireless and sensor networks using cluster analysis. MASS 2008: 834-839 - [c51]Suhas Mathur, Wade Trappe, Narayan B. Mandayam, Chunxuan Ye, Alex Reznik:
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. MobiCom 2008: 128-139 - [c50]Shu Chen, Yingying Chen, Wade Trappe:
Exploiting Environmental Properties for Wireless Localization and Location Aware Applications. PerCom 2008: 90-99 - [c49]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Anti-jamming timing channels for wireless networks. WISEC 2008: 203-213 - 2007
- [j10]Qing Li, Wade Trappe:
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. IEEE Trans. Inf. Forensics Secur. 2(4): 793-808 (2007) - [c48]Zang Li, Wade Trappe, Roy D. Yates:
Secret Communication via Multi-antenna Transmission. CISS 2007: 905-910 - [c47]Yu Zhang, Zang Li, Wade Trappe:
Power-Modulated Challenge-Response Schemes for Verifying Location Claims. GLOBECOM 2007: 39-43 - [c46]Michael Loiacono, Justinian Rosca, Wade Trappe:
The Snowball Effect: DetailingPerformance Anomalies of 802.11 Rate Adaptation. GLOBECOM 2007: 5117-5122 - [c45]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. ICC 2007: 4646-4651 - [c44]Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Temporal Privacy in Wireless Sensor Networks. ICDCS 2007: 23 - [c43]Yingying Chen, Wade Trappe, Richard P. Martin:
Attack Detection in Wireless Localization. INFOCOM 2007: 1964-1972 - [c42]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Channel surfing: defending wireless sensor networks from interference. IPSN 2007: 499-508 - [c41]Zang Li, Roy D. Yates, Wade Trappe:
Secret Communication with a Fading Eavesdropper Channel. ISIT 2007: 1296-1300 - [c40]Yingying Chen, Wade Trappe, Richard P. Martin:
ADLS: Attack Detection for Wireless Localization Using Least Squares. PerCom Workshops 2007: 610-613 - [c39]Masahiro Kuroda, Ritsu Nomura, Wade Trappe:
A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios. SECON 2007: 70-79 - [c38]Yingying Chen, Wade Trappe, Richard P. Martin:
Detecting and Localizing Wireless Spoofing Attacks. SECON 2007: 193-202 - [c37]Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong Zhang, Richard E. Howard:
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing. SECON 2007: 421-430 - [c36]Robert D. Miller, Wenyuan Xu, Pandurang Kamat, Wade Trappe:
Service Discovery and Device Identification in Cognitive Radio Networks. SECON 2007: 670-677 - [p1]Yanyong Zhang, Wade Trappe, Zang Li, Manali Joglekar, Badri Nath:
Robust Wireless Localization: Attacks and Defenses. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 137-160 - 2006
- [j9]Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang:
Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3): 41-47 (2006) - [j8]Qing Li, Wade Trappe:
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. IEEE Trans. Inf. Forensics Secur. 1(2): 190-204 (2006) - [c35]Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin:
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study. DCOSS 2006: 546-563 - [c34]Hyukjoon Lee, Seung Hyong Rhee, Dipankar Raychaudhuri, Wade Trappe:
Interworking of Self-organizing Hierarchical Ad Hoc Networks and the Internet. International Conference on Computational Science (4) 2006: 930-937 - [c33]Qing Li, Wade Trappe:
Light-weight Detection of Spoofing Attacks in Wireless Networks. MASS 2006: 845-851 - [c32]Pandurang Kamat, Arati Baliga, Wade Trappe:
An identity-based security framework For VANETs. Vehicular Ad Hoc Networks 2006: 94-95 - [c31]Shu Chen, Yu Zhang, Wade Trappe:
Inverting sensor networks and actuating the environment for spatio-temporal access control. SASN 2006: 1-12 - [c30]Qing Li, Wade Trappe:
Relationship -based Detection of Spoofing -related Anomalous Traffic in Ad Hoc Networks. SECON 2006: 50-59 - [c29]Yingying Chen, John-Austen Francisco, Wade Trappe, Richard P. Martin:
A Practical Approach to Landmark Deployment for Indoor Localization. SECON 2006: 365-373 - [c28]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Channel surfing: defending wireless sensor networks from jamming and interference. SenSys 2006: 403-404 - [c27]Zang Li, Wenyuan Xu, Robert D. Miller, Wade Trappe:
Securing wireless systems via lower layer enforcements. Workshop on Wireless Security 2006: 33-42 - 2005
- [j7]Z. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu:
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Process. 14(6): 804-821 (2005) - [j6]Wade Trappe, Yuke Wang, K. J. Ray Liu:
Resource-aware conference key establishment for heterogeneous networks. IEEE/ACM Trans. Netw. 13(1): 134-146 (2005) - [c26]Wade Trappe, Yanyong Zhang, Badri Nath:
MIAMI: methods and infrastructure for the assurance of measurement information. DMSN 2005: 11-17 - [c25]Qing Li, Wade Trappe:
Staggered TESLA: a multicast authentication scheme resistant to DoS attacks. GLOBECOM 2005: 6 - [c24]Zang Li, Wade Trappe:
Collusion-resistant fingerprints from WBE sequence sets. ICC 2005: 1336-1340 - [c23]Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Öztürk:
Enhancing Source-Location Privacy in Sensor Network Routing. ICDCS 2005: 599-608 - [c22]Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath:
Robust statistical methods for securing wireless localization in sensor networks. IPSN 2005: 91-98 - [c21]Ke Ma, Yanyong Zhang, Wade Trappe:
Mobile network management and robust spatial retreats via network dynamics. MASS 2005 - [c20]Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood:
The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005: 46-57 - 2004
- [j5]Z. Jane Wang, Min Wu, Wade Trappe, K. J. Ray Liu:
Group-Oriented Fingerprinting for Multimedia Forensics. EURASIP J. Adv. Signal Process. 2004(14): 2153-2173 (2004) - [j4]Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu:
Collusion-resistant fingerprinting for multimedia. IEEE Signal Process. Mag. 21(2): 15-27 (2004) - [j3]Yan Sun, Wade Trappe, K. J. Ray Liu:
A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Trans. Netw. 12(4): 653-666 (2004) - [c19]Wenyuan Xu, Wade Trappe, Sanjoy Paul:
Key management for 3G MBMS security. GLOBECOM 2004: 2276-2280 - [c18]Celal Öztürk, Yanyong Zhang, Wade Trappe:
Source-location privacy in energy-constrained sensor network routing. SASN 2004: 88-93 - [c17]Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu:
Collusion-resistant multimedia fingerprinting: a unified framework. Security, Steganography, and Watermarking of Multimedia Contents 2004: 748-759 - [c16]Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang:
Channel surfing and spatial retreats: defenses against wireless denial of service. Workshop on Wireless Security 2004: 80-89 - [c15]Celal Öztürk, Yanyong Zhang, Wade Trappe, Maximilian Ott:
Source-Location Privacy for Networks of Energy-Constrained Sensors. WSTFEUS 2004: 68-72 - 2003
- [j2]Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu:
Key management and distribution for secure multimedia multicast. IEEE Trans. Multim. 5(4): 544-557 (2003) - [j1]Wade Trappe, Min Wu, Z. Jane Wang, K. J. Ray Liu:
Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process. 51(4): 1069-1087 (2003) - [c14]Yan Sun, Wade Trappe, K. J. Ray Liu:
Topology-aware key management schemes for wireless multicast. GLOBECOM 2003: 1471-1475 - [c13]Z. Jane Wang, Min Wu, Hong Zhao, K. J. Ray Liu, Wade Trappe:
Resistance of orthogonal Gaussian fingerprints to collusion attacks. ICASSP (4) 2003: 724-727 - [c12]Z. Jane Wang, Min Wu, Wade Trappe, K. J. Ray Liu:
Anti-collusion of group-oriented fingerprinting. ICME 2003: 217-220 - [c11]Z. Jane Wang, Min Wu, Hong Zhao, K. J. Ray Liu, Wade Trappe:
Resistance of orthogonal Gaussian fingerprints to collusion attacks. ICME 2003: 617-620 - [c10]Mathias Bohge, Wade Trappe:
An authentication framework for hierarchical ad hoc sensor networks. Workshop on Wireless Security 2003: 79-87 - 2002
- [b1]Wade Trappe:
Multi-User Security: A Signal Processing and Networking Perspective. University of Maryland, College Park, MD, USA, 2002 - [c9]Wade Trappe, Min Wu, K. J. Ray Liu:
Joint coding and embedding for collusion-resistant fingerprinting. EUSIPCO 2002: 1-4 - [c8]Wade Trappe, Min Wu, K. J. Ray Liu:
Collusion-resistant fingerprinting for multimedia. ICASSP 2002: 3309-3312 - [c7]Bin Sun, Wade Trappe, Yan Sun, K. J. Ray Liu:
A time-efficient contributory key agreement scheme for secure group communications. ICC 2002: 1159-1163 - [c6]Yan Sun, Wade Trappe, K. J. Ray Liu:
An efficient key management scheme for secure wireless multicast. ICC 2002: 1236-1240 - [c5]Wade Trappe, Yuke Wang, K. J. Ray Liu:
Establishment of conference keys in heterogeneous networks. ICC 2002: 2201-2205 - [c4]Wade Trappe, Min Wu, K. J. Ray Liu:
Anti-collusion codes: multi-user and multimedia perspectives. ICIP (2) 2002: 149-152 - 2001
- [c3]Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu:
Key distribution for secure multimedia multicasts via data embedding. ICASSP 2001: 1449-1452 - [c2]Jie Song, Radha Poovendran, Wade Trappe, Kuo J. Ray Liu:
Dynamic key distribution scheme using data embedding for secure multimedia multicast. Security and Watermarking of Multimedia Contents 2001: 618-628
1990 – 1999
- 1999
- [c1]Wade Trappe, Haitao Zheng, K. J. Ray Liu:
Adaptive lifting coding scheme for video scene changes. MMSP 1999: 321-326
Coauthor Index
aka: Yingying (Jennifer) Chen
aka: Kuo J. Ray Liu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint