


default search action
Yih-Chun Hu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c92]Seyedali Tabaeiaghdaei, Filippo Costa, Jonghoon Kwon, Patrick Bamert, Yih-Chun Hu, Adrian Perrig:
Debuglet: Programmable and Verifiable Inter-Domain Network Telemetry. ICDCS 2024: 255-265 - [c91]Bo-Rong Chen
, Jiayu Zhu
, Yanxin Jiang
, Yih-Chun Hu
:
vRetention: A User Viewing Dataset for Popular Video Streaming Services. MMSys 2024: 313-318 - 2023
- [c90]Jinhui Song, Bo-Rong Chen, Bowen Song, Anyu Ying, Yih-Chun Hu:
FlowBot: A Learning-Based Co-bottleneck Flow Detector for Video Servers. ICNP 2023: 1-12 - [i18]Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen, Yih-Chun Hu:
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems. CoRR abs/2308.04034 (2023) - 2022
- [j28]Suraj Sajeev
, Manish Bansal
, Sriraam S. V, Harshan Jagadeesh
, Huzur Saran, Yih-Chun Hu:
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds. Ad Hoc Networks 131: 102860 (2022) - [j27]Harshan Jagadeesh
, Amogh Vithalkar, Naman Jhunjhunwala
, Manthan Kabra
, Prafull Manav
, Yih-Chun Hu
:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1194-1211 (2022) - [j26]Zhuotao Liu
, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Qi Li
, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [j25]Ertem Esiner
, Utku Tefek
, Hasan S. M. Erol, Daisuke Mashima
, Binbin Chen
, Yih-Chun Hu
, Zbigniew Kalbarczyk, David M. Nicol
:
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems. IEEE Trans. Smart Grid 13(4): 3214-3226 (2022) - [c89]Bo-Rong Chen
, Zhuotao Liu, Jinhui Song
, Fanhui Zeng
, Zhoushi Zhu, Siva Phani Keshav Bachu, Yih-Chun Hu:
FlowTele: remotely shaping traffic on internet-scale networks. CoNEXT 2022: 349-368 - [c88]Bo-Rong Chen
, Hsin-Tien Chiang, Heng-Cheng Kuo, Yu Tsao, Yih-Chun Hu:
Key Generation with Ambient Audio. GLOBECOM 2022: 5510-5515 - [c87]Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen
, Yih-Chun Hu:
Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems. INFOCOM 2022: 1039-1048 - [c86]Hsun Lee, Yuming Hsu, Jing-Jie Wang, Hao-Cheng Yang, Yu-Heng Chen, Yih-Chun Hu, Hsu-Chun Hsiao:
HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale. NDSS 2022 - [c85]Utku Tefek, Ertem Esiner, Lin Wei, Yih-Chun Hu:
TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack. RSSRail 2022: 221-237 - [c84]Utku Tefek, Ertem Esiner, Daisuke Mashima, Yih-Chun Hu:
Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems. SmartGridComm 2022: 224-230 - [i17]Suraj Sajeev, Manish Bansal, Sriraam S. V, Jagadeesh Harshan, Huzur Saran, Yih-Chun Hu:
Secure and Ultra-Reliable Provenance Recovery in Sparse Networks: Strategies and Performance Bounds. CoRR abs/2204.00159 (2022) - 2021
- [c83]Hsin-Tien Chiang, Yi-Chiao Wu, Cheng Yu, Tomoki Toda, Hsin-Min Wang, Yih-Chun Hu, Yu Tsao:
HASA-Net: A Non-Intrusive Hearing-Aid Speech Assessment Network. ASRU 2021: 907-913 - [i16]Hsin-Tien Chiang, Yi-Chiao Wu, Cheng Yu, Tomoki Toda, Hsin-Min Wang, Yih-Chun Hu, Yu Tsao:
HASA-net: A non-intrusive hearing-aid speech assessment network. CoRR abs/2111.05691 (2021) - 2020
- [j24]Taehyoung Kim, Im Young Jung
, Yih-Chun Hu:
Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning. Hum. centric Comput. Inf. Sci. 10: 36 (2020) - [c82]Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou:
DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures. NDSS 2020 - [c81]Bo-Rong Chen
, Yih-Chun Hu:
Mitigating denial-of-service attacks on digital contact tracing: poster abstract. SenSys 2020: 770-771 - [c80]Jagadeesh Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu:
Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks. WCNC 2020: 1-7 - [i15]Bo-Rong Chen, Yih-Chun Hu:
BlindSignedID: Mitigating Denial-of-Service Attacks on Digital Contact Tracing. CoRR abs/2008.09351 (2020) - [i14]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j23]Qi Li, Jiajia Liu
, Yih-Chun Hu, Mingwei Xu, Jianping Wu:
BGP with BGPsec: Attacks and Countermeasures. IEEE Netw. 33(4): 194-200 (2019) - [j22]Sang-Yoon Chang
, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu, Younghee Park
:
Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks. ACM Trans. Sens. Networks 15(3): 27:1-27:25 (2019) - [j21]Harshan Jagadeesh
, Yih-Chun Hu:
Convolution Attack on Frequency Hopping by Full-Duplex Radios. IEEE Trans. Veh. Technol. 68(6): 5642-5656 (2019) - [c79]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c78]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [i13]Jagadeesh Harshan, Yih-Chun Hu:
Convolution Attack on Frequency-Hopping by Full-Duplex Radios. CoRR abs/1903.11261 (2019) - [i12]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - 2018
- [j20]Zhuotao Liu
, Hao Jin, Yih-Chun Hu
, Michael D. Bailey:
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control. IEEE/ACM Trans. Netw. 26(4): 1948-1961 (2018) - [c77]Hao Wu
, Hsu-Chun Hsiao
, Daniele Enrico Asoni
, Simon Scherrer
, Adrian Perrig
, Yih-Chun Hu
:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. CANS 2018: 89-108 - [c76]Seungmin Kang, Sristi Lakshmi Sravana Kumar, Jabir Shabbir Karachiwala, Yih-Chun Hu:
Detection of Anomaly in Train Speed for Intelligent Railway Systems. ICCAD 2018: 1-6 - [c75]Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding. INFOCOM 2018: 1-9 - [c74]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c73]Jagadeesh Harshan, Yih-Chun Hu:
Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum. WCNC 2018: 1-6 - [c72]Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. WISEC 2018: 160-171 - [i11]Jagadeesh Harshan, Yih-Chun Hu:
Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum. CoRR abs/1804.00907 (2018) - [i10]Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report). CoRR abs/1807.05652 (2018) - [i9]Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. CoRR abs/1808.01723 (2018) - 2017
- [j19]Jonathan Ponniah
, Yih-Chun Hu, P. R. Kumar:
A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks. IEEE Trans. Control. Netw. Syst. 4(1): 37-48 (2017) - [j18]Sang-Yoon Chang
, Yih-Chun Hu:
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks. IEEE Trans. Mob. Comput. 16(12): 3527-3540 (2017) - [c71]Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:
The Case for In-Network Replay Suppression. AsiaCCS 2017: 862-873 - [c70]Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:
Protecting vehicular networks privacy in the presence of a single adversarial authority. CNS 2017: 1-9 - [c69]Jagadeesh Harshan, Sang-Yoon Chang, Seungmin Kang, Yih-Chun Hu:
Securing balise-based train control systems using cryptographic random fountains. CNS 2017: 405-410 - [c68]Laurent Chuat, Adrian Perrig
, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. DSN 2017: 487-498 - [c67]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. ICDCS 2017: 2302-2307 - [c66]Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging. ICDCS 2017: 2555-2556 - [c65]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. ICNP 2017: 1-10 - [c64]Jagadeesh Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. WCNC 2017: 1-6 - [c63]Sang-Yoon Chang
, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu:
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. WISEC 2017: 52-57 - [i8]Jagadeesh Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. CoRR abs/1701.03568 (2017) - [i7]Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. CoRR abs/1706.05867 (2017) - [i6]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems. CoRR abs/1708.08162 (2017) - [i5]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation. CoRR abs/1709.05710 (2017) - [i4]Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:
Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding. CoRR abs/1712.06766 (2017) - 2016
- [j17]Hao Wu, Yih-Chun Hu:
Location Privacy with Randomness Consistency. Proc. Priv. Enhancing Technol. 2016(4): 62-82 (2016) - [j16]Jonathan Ponniah
, Yih-Chun Hu, P. R. Kumar:
A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking. IEEE Trans. Control. Netw. Syst. 3(2): 206-217 (2016) - [j15]Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers. IEEE/ACM Trans. Netw. 24(2): 1095-1108 (2016) - [c62]Zhuotao Liu
, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. CCS 2016: 1268-1279 - [c61]Sristi Lakshmi Sravana Kumar, Sang-Yoon Chang, Sreejaya Viswanathan, Yih-Chun Hu:
Demo: Free Data Communication Using Wireless Charging. MobiSys (Companion Volume) 2016: 121 - [c60]Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu:
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. SecureComm 2016: 125-143 - 2015
- [j14]Jonathan Ponniah
, Yih-Chun Hu, P. R. Kumar:
A Clean Slate Approach to Secure Wireless Networking. Found. Trends Netw. 9(1): 1-105 (2015) - [c59]Sang-Yoon Chang, Yih-Chun Hu, Zhuotao Liu:
Securing wireless medium access control against insider denial-of-service attackers. CNS 2015: 370-378 - [c58]Sang-Yoon Chang, Bao Anh N. Tran, Yih-Chun Hu, Douglas L. Jones:
Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems. ICPADS 2015: 37-43 - [c57]Sang-Yoon Chang, Jemin Lee, Yih-Chun Hu:
Noah: Keyed Noise Flooding for Wireless Confidentiality. Q2SWinet@MSWiM 2015: 141-148 - [c56]Jonathan Ponniah
, Yih-Chun Hu, P. R. Kumar:
A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks. WiOpt 2015: 175-182 - [c55]Jonathan Ponniah
, Yih-Chun Hu, P. R. Kumar:
A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks. WiOpt 2015: 183-190 - 2014
- [j13]Dongho Kim, Yih-Chun Hu:
A Study on False Channel Condition Reporting Attacks in Wireless Networks. IEEE Trans. Mob. Comput. 13(5): 935-947 (2014) - [c54]Fuyuan Zhang, Limin Jia
, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig
:
Mechanized Network Origin and Path Authenticity Proofs. CCS 2014: 346-357 - [c53]Hao Wu, Hsu-Chun Hsiao
, Yih-Chun Hu:
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. Internet Measurement Conference 2014: 209-222 - [c52]Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia
, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig
:
Lightweight source authentication and path validation. SIGCOMM 2014: 271-282 - 2013
- [c51]Jerry T. Chiang, Yih-Chun Hu, Pulkit Yadav:
Secure cooperative spectrum sensing based on Sybil-resilient clustering. GLOBECOM 2013: 1075-1081 - [c50]Jerry T. Chiang, Yih-Chun Hu:
Did you also hear that? Spectrum sensing using Hermitian inner product. INFOCOM 2013: 2229-2237 - [c49]Jerry T. Chiang, Yih-Chun Hu:
JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness. MILCOM 2013: 464-469 - [c48]Jerry T. Chiang, Yih-Chun Hu:
Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption. MILCOM 2013: 470-475 - [c47]Sang-Yoon Chang, Yih-Chun Hu, Jerry T. Chiang, Soo-Young Chang:
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming. MOBIWAC 2013: 51-58 - [i3]Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar:
A System-Theoretic Clean Slate Approach to Provably Secure Ad Hoc Wireless Networking. CoRR abs/1309.2904 (2013) - 2012
- [j12]Yih-Chun Hu, P. R. Kumar, Jonathan Ponniah
:
An orthogonal multiple access coding scheme. Commun. Inf. Syst. 12(1): 41-76 (2012) - [j11]Jerry T. Chiang, Jason J. Haas, Jihyuk Choi, Yih-Chun Hu:
Secure Location Verification Using Simultaneous Multilateration. IEEE Trans. Wirel. Commun. 11(2): 584-591 (2012) - [c46]Jerry T. Chiang, Tianzhu Zhang, Binbin Chen, Yih-Chun Hu:
Load disaggregation using harmonic analysis and regularized optimization. APSIPA 2012: 1-4 - [c45]Farhana Ashraf, Yih-Chun Hu, Robin Hillary Kravets
:
Bankrupting the jammer in WSN. MASS 2012: 317-325 - [c44]Sang-Yoon Chang
, Yih-Chun Hu, Nicola Laurenti
:
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination. MobiCom 2012: 77-88 - [c43]Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:
JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks. MobiHoc 2012: 255-256 - [c42]Parisa Haghani, Yih-Chun Hu:
Power control for fair dynamic channel reservation in VANETs. SECON 2012: 659-667 - [c41]Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Y. L. Huang:
Body Area Network Security: Robust Key Establishment Using Human Body Channel. HealthSec 2012 - [e3]Asis Nasipuri, Yih-Chun Hu, Sanjay Shakkottai:
The Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '12, Hilton Head, SC, USA, June 11-14, 2012. ACM 2012, ISBN 978-1-4503-1281-3 [contents] - 2011
- [j10]Kyung-Joon Park
, Jihyuk Choi, Jennifer C. Hou, Yih-Chun Hu, Hyuk Lim
:
Optimal physical carrier sense in wireless networks. Ad Hoc Networks 9(1): 16-27 (2011) - [j9]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Efficient Certificate Revocation List Organization and Distribution. IEEE J. Sel. Areas Commun. 29(3): 595-604 (2011) - [j8]Jerry T. Chiang, Yih-Chun Hu:
Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1): 286-298 (2011) - [c40]Dongho Kim, Danesh J. Esteki, Yih-Chun Hu, P. R. Kumar:
A Lightweight Deterministic MAC Protocol Using Low Cross-Correlation Sequences. GLOBECOM 2011: 1-6 - [c39]Jihyuk Choi, Sang-Yoon Chang, Diko Ko, Yih-Chun Hu:
Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. ICC 2011: 1-5 - [c38]Jason J. Haas, Yih-Chun Hu, Nicola Laurenti
:
Low-cost mitigation of privacy loss due to radiometric identification. Vehicular Ad Hoc Networks 2011: 31-40 - [c37]Farhana Ashraf, Yih-Chun Hu, Robin Kravets:
Demo: bankrupting the jammer. MobiSys 2011: 379-380 - [c36]Farhana Ashraf, Yih-Chun Hu, Robin Kravets
:
Bankrupting the jammer. SECON 2011: 149-151 - [c35]Francesco Renna, Nicola Laurenti, Yih-Chun Hu:
The jamming game in an OFDM setting. VALUETOOLS 2011: 496-505 - [c34]Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Short paper: a practical view of "mixing" identities in vehicular networks. WISEC 2011: 157-162 - [i2]Prateek Mittal, Dongho Kim, Yih-Chun Hu, Matthew Caesar:
Towards Deployable DDoS Defense for Web Applications. CoRR abs/1110.1060 (2011) - 2010
- [j7]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
The impact of key assignment on VANET privacy. Secur. Commun. Networks 3(2-3): 233-249 (2010) - [j6]Bisheng Liu, Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Coward attacks in vehicular networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 34-36 (2010) - [c33]Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar:
CRAFT: a new secure congestion control architecture. CCS 2010: 705-707 - [c32]Roberto Solis-Robles, Jason J. Haas, Jerry T. Chiang, Yih-Chun Hu, P. R. Kumar:
Secure network-wide clock synchronization in wireless sensor networks. CDC 2010: 5616-5621 - [c31]Jason J. Haas, Yih-Chun Hu:
Communication requirements for crash avoidance. Vehicular Ad Hoc Networks 2010: 1-10 - [c30]Dongho Kim, Yih-Chun Hu:
A Study on False Channel Condition Reporting Attacks in Wireless Networks. SecureComm 2010: 107-124 - [c29]Jihyuk Choi, Jerry T. Chiang, Dongho Kim, Yih-Chun Hu:
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks. SecureComm 2010: 235-252 - [p1]André Weimerskirch, Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Data Security in Vehicular Communication Networks. VANET 2010: 299-363
2000 – 2009
- 2009
- [j5]Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Secur. Commun. Networks 2(4): 325-340 (2009) - [c28]Jason J. Haas, Yih-Chun Hu:
Secure Unified Cellular Ad Hoc Network Routing. GLOBECOM 2009: 1-8 - [c27]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Real-World VANET Security Protocol Performance. GLOBECOM 2009: 1-7 - [c26]Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, Jihyuk Choi:
Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks. INFOCOM 2009: 1962-1970 - [c25]Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
Design and analysis of a lightweight certificate revocation mechanism for VANET. Vehicular Ad Hoc Networks 2009: 89-98 - [c24]Kyung-Joon Park
, Jihyuk Choi, Kyungtae Kang, Yih-Chun Hu:
Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. QSHINE 2009: 351-362 - [c23]Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu:
Secure and precise location verification using distance bounding and simultaneous multilateration. WISEC 2009: 181-192 - 2008
- [c22]Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. AsiaCCS 2008: 201-204 - [c21]Jerry T. Chiang, Yih-Chun Hu:
Dynamic Jamming Mitigation for Wireless Broadcast Networks. INFOCOM 2008: 1211-1219 - [c20]Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu:
Security certificate revocation list distribution for vanet. Vehicular Ad Hoc Networks 2008: 88-89 - [e2]Varsha K. Sadekar, Paolo Santi, Yih-Chun Hu, Martin Mauve:
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008. ACM 2008, ISBN 978-1-60558-191-0 [contents] - 2007
- [c19]Jerry T. Chiang, Yih-Chun Hu:
Cross-layer jamming detection and mitigation in wireless broadcast networks. MobiCom 2007: 346-349 - [c18]Tao Jiang, Helen J. Wang, Yih-Chun Hu:
Preserving location privacy in wireless lans. MobiSys 2007: 246-257 - [c17]Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300 - [e1]Wieland Holfelder, Paolo Santi, Yih-Chun Hu, Jean-Pierre Hubaux:
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, VANET 2007, Montréal, Québec, Canada, September 10, 2007. ACM 2007, ISBN 978-1-59593-739-1 [contents] - [i1]David B. Johnson, Yih-Chun Hu, David A. Maltz:
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. RFC 4728: 1-107 (2007) - 2006
- [j4]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2): 370-380 (2006) - [c16]Yih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt:
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. HotNets 2006 - 2005
- [j3]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wirel. Networks 11(1-2): 21-38 (2005) - [c15]Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:
Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441 - 2004
- [j2]Yih-Chun Hu, Adrian Perrig:
A Survey of Secure Wireless Ad Hoc Routing. IEEE Secur. Priv. 2(3): 28-39 (2004) - [c14]Yih-Chun Hu, David B. Johnson:
Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks. ICDCS 2004: 301-310 - [c13]Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang:
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194 - [c12]Yih-Chun Hu, David B. Johnson:
Securing quality-of-service route discovery in on-demand routing for ad hoc networks. SASN 2004: 106-117 - [c11]Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
:
SPV: secure path vector routing for securing BGP. SIGCOMM 2004: 179-192 - 2003
- [j1]Yih-Chun Hu, David B. Johnson, Adrian Perrig:
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1(1): 175-192 (2003) - [c10]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. INFOCOM 2003: 1976-1986 - [c9]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Efficient Security Mechanisms for Routing Protocolsa. NDSS 2003 - [c8]Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalChaudhuri, Amit Kumar Saha, David B. Johnson:
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. WMCSA 2003: 32-43 - [c7]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Rushing attacks and defense in wireless ad hoc network routing protocols. Workshop on Wireless Security 2003: 30-40 - 2002
- [c6]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom 2002: 12-23 - [c5]Yih-Chun Hu, David B. Johnson:
Ensuring cache freshness in on-demand ad hoc network routing protocols. POMC 2002: 25-30 - [c4]Yih-Chun Hu, David B. Johnson, Adrian Perrig:
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13 - 2001
- [c3]Yih-Chun Hu, David B. Johnson:
Implicit source routes for on-demand ad hoc network routing. MobiHoc 2001: 1-10 - 2000
- [c2]Yih-Chun Hu, David B. Johnson:
Caching strategies in on-demand routing protocols for wireless ad hoc networks. MobiCom 2000: 231-242
1990 – 1999
- 1998
- [c1]Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta G. Jetcheva:
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. MobiCom 1998: 85-97
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint