Follow
Wenyuan Xu
Title
Cited by
Cited by
Year
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
15742005
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
7602006
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
5462017
Security and Privacy Vulnerabilities of {In-Car} Wireless Networks: A Tire Pressure Monitoring System Case Study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
5162010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
4672004
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
4172013
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi
NDSS 14, 23-26, 2014
3102014
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
Def Con 24 (8), 109, 2016
2662016
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
2007 6th International Symposium on Information Processing in Sensor …, 2007
2632007
Securing wireless systems via lower layer enforcements
Z Li, W Xu, R Miller, W Trappe
Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006
2392006
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks
T Trippel, O Weisse, W Xu, P Honeyman, K Fu
2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017
2202017
{WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
2013 USENIX Workshop on Health Information Technologies (HealthTech 13), 2013
1562013
Anti-jamming timing channels for wireless networks
W Xu, W Trappe, Y Zhang
Proceedings of the first ACM conference on Wireless network security, 203-213, 2008
1482008
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1362012
A {Large-Scale} Empirical Analysis of Chinese Web Passwords
Z Li, W Han, W Xu
23rd USENIX Security Symposium (USENIX Security 14), 559-574, 2014
1152014
KinWrite: Handwriting-Based Authentication Using Kinect.
J Tian, C Qu, W Xu, S Wang
NDSS 93, 94, 2013
1092013
Temporal privacy in wireless sensor networks
P Kamat, W Xu, W Trappe, Y Zhang
27th International Conference on Distributed Computing Systems (ICDCS'07), 23-23, 2007
1072007
Localizing jammers in wireless networks
H Liu, X Wenyuan, Y Chen, Z Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
952009
Exploiting jamming-caused neighbor changes for jammer localization
Z Liu, H Liu, W Xu, Y Chen
IEEE Transactions on Parallel and Distributed Systems 23 (3), 547-555, 2011
842011
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
792018
The system can't perform the operation now. Try again later.
Articles 1–20