Wenyuan Xu
Wenyuan Xu
Professor, Zhejiang University, College of EE
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
13912005
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
6832006
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
I Rouf, RD Miller, HA Mustafa, T Taylor, S Oh, W Xu, M Gruteser, ...
USENIX Security Symposium 10, 2010
4402010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
4342004
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
3432013
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3182017
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
2007 6th International Symposium on Information Processing in Sensor …, 2007
2452007
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi
NDSS, 2014
2392014
Securing wireless systems via lower layer enforcements
Z Li, W Xu, R Miller, W Trappe
Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006
2282006
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks
T Trippel, O Weisse, W Xu, P Honeyman, K Fu
2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017
1342017
Anti-jamming timing channels for wireless networks
W Xu, W Trappe, Y Zhang
Proceedings of the first ACM conference on Wireless network security, 203-213, 2008
1302008
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
DEF CON 24 (8), 109, 2016
1262016
Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13), 2013
1252013
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1192012
Temporal privacy in wireless sensor networks
P Kamat, W Xu, W Trappe, Y Zhang
27th International Conference on Distributed Computing Systems (ICDCS'07), 23-23, 2007
992007
A large-scale empirical analysis of chinese web passwords
Z Li, W Han, W Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 559-574, 2014
892014
KinWrite: Handwriting-Based Authentication Using Kinect.
J Tian, C Qu, W Xu, S Wang
NDSS 93, 94, 2013
852013
Localizing jammers in wireless networks
H Liu, X Wenyuan, Y Chen, Z Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
832009
Exploiting jamming-caused neighbor changes for jammer localization
Z Liu, H Liu, W Xu, Y Chen
IEEE Transactions on Parallel and Distributed Systems 23 (3), 547-555, 2011
742011
Defending wireless sensor networks from radio interference through channel adaptation
W Xu, W Trappe, Y Zhang
ACM Transactions on Sensor Networks (TOSN) 4 (4), 1-34, 2008
642008
The system can't perform the operation now. Try again later.
Articles 1–20