Wade Trappe
Wade Trappe
Professor, Electrical and Computer Engineering, WINLAB, Rutgers University
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
Introduction to cryptography with coding theory
W Trappe
Pearson Education India, 2006
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS …, 2005
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
Parknet: drive-by sensing of road-side parking statistics
S Mathur, T Jin, N Kasturirangan, J Chandrasekaran, W Xue, M Gruteser, ...
Proceedings of the 8th international conference on Mobile systems …, 2010
Anti-collusion fingerprinting for multimedia
W Trappe, M Wu, ZJ Wang, KJR Liu
IEEE transactions on signal processing 51 (4), 1069-1087, 2003
Detecting and localizing wireless spoofing attacks
Y Chen, W Trappe, RP Martin
2007 4th Annual IEEE Communications Society Conference on sensor, mesh and …, 2007
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor …, 2004
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
Using the physical layer for wireless authentication in time-variant channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008
Optimum co-design for spectrum sharing between matrix completion based MIMO radars and a MIMO communication system
B Li, AP Petropulu, W Trappe
IEEE Transactions on Signal Processing 64 (17), 4562-4575, 2016
Securing wireless communications at the physical layer
R Liu
Springer, 2010
Low-energy security: Limits and opportunities in the internet of things
W Trappe, R Howard, RS Moore
IEEE Security & Privacy 13 (1), 14-21, 2015
Fingerprints in the ether: Using the physical layer for wireless authentication
L Xiao, L Greenstein, N Mandayam, W Trappe
2007 IEEE International conference on communications, 4646-4651, 2007
Collusion-resistant fingerprinting for multimedia
M Wu, W Trappe, ZJ Wang, KJR Liu
IEEE Signal Processing Magazine 21 (2), 15-27, 2004
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing …, 2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20