False data injection attacks against state estimation in electric power grids Y Liu, P Ning, MK Reiter ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011 | 2922 | 2011 |
Detection of faults and attacks including false data injection attack in smart grid using Kalman filter K Manandhar, X Cao, F Hu, Y Liu IEEE transactions on control of network systems 1 (4), 370-379, 2014 | 502 | 2014 |
Randomized differential DSSS: Jamming-resistant wireless broadcast communication Y Liu, P Ning, H Dai, A Liu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 238 | 2010 |
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures Y Liu, P Ning, H Dai 2010 IEEE symposium on security and privacy, 286-301, 2010 | 211 | 2010 |
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 157 | 2016 |
NSDMiner: Automated discovery of network service dependencies A Natarajan, P Ning, Y Liu, S Jajodia, SE Hutchinson 2012 Proceedings IEEE INFOCOM, 2507-2515, 2012 | 152 | 2012 |
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures Z Gao, H Zhu, Y Liu, M Li, Z Cao 2013 Proceedings IEEE INFOCOM, 2751-2759, 2013 | 135 | 2013 |
Survey on channel reciprocity based key establishment techniques for wireless systems T Wang, Y Liu, AV Vasilakos Wireless Networks 21 (6), 1835-1846, 2015 | 99 | 2015 |
Wireless communications under broadband reactive jamming attacks S Fang, Y Liu, P Ning IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015 | 68 | 2015 |
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016 | 56 | 2016 |
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure A Liu, P Ning, H Dai, Y Liu The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010 | 55 | 2010 |
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure A Liu, P Ning, H Dai, Y Liu, C Wang Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 54 | 2010 |
Wivo: Enhancing the security of voice control system via wireless signal in iot environment Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018 | 51 | 2018 |
Combating false data injection attacks in smart grid using kalman filter K Manandhar, X Cao, F Hu, Y Liu 2014 International Conference on Computing, Networking and Communications …, 2014 | 42 | 2014 |
BitTrickle: Defending against broadband and high-power reactive jamming attacks Y Liu, P Ning 2012 Proceedings IEEE INFOCOM, 909-917, 2012 | 42 | 2012 |
Secret key establishment via RSS trajectory matching between wearable devices Z Li, Q Pei, I Markwood, Y Liu, H Zhu IEEE Transactions on Information Forensics and security 13 (3), 802-817, 2017 | 41 | 2017 |
Enhanced wireless channel authentication using time-synched link signature Y Liu, P Ning 2012 Proceedings IEEE INFOCOM, 2636-2640, 2012 | 39 | 2012 |
Measurement and analysis of an internet streaming service to mobile devices Y Liu, F Li, L Guo, B Shen, S Chen, Y Lan IEEE Transactions on Parallel and Distributed Systems 24 (11), 2240-2250, 2012 | 32 | 2012 |
Where are you from? Confusing location distinction using virtual multipath camouflage S Fang, Y Liu, W Shen, H Zhu Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 28 | 2014 |
Mode selection and resource allocation for device-to-device communications in 5G cellular networks F Jiang, B Wang, C Sun, Y Liu, R Wang China Communications 13 (6), 32-47, 2016 | 27 | 2016 |