Follow
Paul L Yu
Paul L Yu
Army Research Office/Army Research Laboratory
Verified email at army.mil - Homepage
Title
Cited by
Cited by
Year
Physical-layer authentication
PL Yu, JS Baras, BM Sadler
IEEE Transactions on Information Forensics and Security 3 (1), 38-51, 2008
3052008
Wireless physical layer authentication via fingerprint embedding
PL Yu, G Verma, BM Sadler
IEEE Communications Magazine 53 (6), 48-53, 2015
952015
RSS gradient-assisted frontier exploration and radio source localization
JN Twigg, JR Fink, PL Yu, BM Sadler
2012 IEEE International Conference on Robotics and Automation, 889-895, 2012
772012
MIMO authentication via deliberate fingerprinting at the physical layer
PL Yu, BM Sadler
IEEE Transactions on Information Forensics and Security 6 (3), 606-615, 2011
772011
Physical layer authentication via fingerprint embedding using software-defined radios
G Verma, P Yu, BM Sadler
IEEE access 3, 81-88, 2015
752015
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
D Wang, A Neupane, Z Qian, NB Abu-Ghazaleh, SV Krishnamurthy, ...
NDSS, 2019
572019
Short-range low-VHF channel characterization in cluttered environments
FT Dagefu, G Verma, CR Rao, PL Yu, JR Fink, BM Sadler, K Sarabandi
IEEE Transactions on Antennas and Propagation 63 (6), 2719-2727, 2015
492015
Cryptographic side-channel signaling and authentication via fingerprint embedding
JB Perazzone, PL Yu, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 13 (9), 2216-2225, 2018
482018
Artificial noise-aided MIMO physical layer authentication with imperfect CSI
JB Perazzone, LY Paul, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 16, 2173-2185, 2021
402021
Multicarrier authentication at the physical layer
PL Yu, JS Baras, BM Sadler
2008 International Symposium on a World of Wireless, Mobile and Multimedia …, 2008
402008
Fisher information-based experiment design for network tomography
T He, C Liu, A Swami, D Towsley, T Salonidis, AI Bejan, P Yu
ACM SIGMETRICS Performance Evaluation Review 43 (1), 389-402, 2015
302015
Efficient base station connectivity area discovery
JN Twigg, JR Fink, PL Yu, BM Sadler
The International Journal of Robotics Research 32 (12), 1398-1410, 2013
262013
Wireless communication method and system for transmission authentication at the physical layer
JS Baras, PL Yu, BM Sadler
US Patent App. 12/676,689, 2010
262010
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel
Y Zhai, Y Hao, H Zhang, D Wang, C Song, Z Qian, M Lesani, ...
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
232020
Employing attack graphs for intrusion detection
F Capobianco, R George, K Huang, T Jaeger, S Krishnamurthy, Z Qian, ...
Proceedings of the new security paradigms workshop, 16-30, 2019
232019
Principled unearthing of tcp side channel vulnerabilities
Y Cao, Z Wang, Z Qian, C Song, SV Krishnamurthy, P Yu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
222019
Jaal: Towards network intrusion detection at isp scale
A Aqil, K Khalil, AOF Atya, EE Papalexakis, SV Krishnamurthy, T Jaeger, ...
Proceedings of the 13th international conference on emerging networking …, 2017
212017
Graph filters and the Z-Laplacian
X Yan, BM Sadler, RJ Drost, PL Yu, K Lerman
IEEE Journal of Selected Topics in Signal Processing 11 (6), 774-784, 2017
202017
Radio signal strength tracking and control for robotic networks
PL Yu, JN Twigg, BM Sadler
Micro-and Nanotechnology Sensors, Systems, and Applications III 8031, 803116, 2011
162011
Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis: Invited Presentation
JB Perazzone, PL Yu, BM Sadler, RS Blum
2019 53rd Annual Conference on Information Sciences and Systems (CISS), 1-6, 2019
152019
The system can't perform the operation now. Try again later.
Articles 1–20