|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 256 occurrences of 187 keywords
|
|
|
Results
Found 897 publication records. Showing 897 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Jung-Chun Kao, Radu Marculescu |
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
wireless ad hoc networks, transmission power control, Wireless network security |
63 | Supachai Tangwongsan, Sathaporn Kassuvan |
A highly effective model for security protection against eavesdropping exploits. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
security protection, voice eavesdropping, voice encryption, security model, key exchange |
59 | Markus G. Kuhn |
Security Limits for Compromising Emanations. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
emission security, protection standards, side channels, Eavesdropping, Tempest, video displays |
51 | Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, Jacques Reverdy |
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? |
CHES |
2007 |
DBLP DOI BibTeX RDF |
ISO 14443, Tausworthe cell, RFID, smartcard, eavesdropping, RNG |
51 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
51 | Madhukar Anand, Zachary G. Ives, Insup Lee 0001 |
Quantifying eavesdropping vulnerability in sensor networks. |
DMSN |
2005 |
DBLP DOI BibTeX RDF |
wireless sensor networks, data streams, probability distribution, eavesdropping |
48 | Wonjoon Choi, Byeong-Hee Roh |
Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Ben Adida |
Sessionlock: securing web sessions against eavesdropping. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
web security |
40 | Cees J. A. Jansen, Dick E. Boekee |
Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
39 | Matthew K. Franklin, Zvi Galil, Moti Yung |
Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems |
FOCS |
1993 |
DBLP DOI BibTeX RDF |
eavesdropping games, mobile eavesdroppers, secure message transmission, distributed database maintenance, privacy maintenance problems, privacy, distributed systems, computational complexity, protocols, bugs, graph-theoretic approach |
36 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision |
36 | Hoi Fung Chau |
Unconditionally secure key distribution in higher dimensions by depolarization. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Shoichi Hirose, Susumu Yoshida |
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
35 | Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu |
Port and Address Hopping for Active Cyber-Defense. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping |
35 | Marc Donner |
The Impending Debate. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
Total Information Awareness, Terrorist Information Awareness, privacy, government, eavesdropping, wiretap |
35 | Whitfield Diffie |
Chattering about SIGINT. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
SIGINT, Patrick Radden Keefe, Chatter: Dispatches from the Secret World of Global Eavesdropping, chatter |
35 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
35 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
31 | Huici Wu, Meng Li 0029, Qiuyue Gao, Zhiqing Wei, Ning Zhang 0007, Xiaofeng Tao |
Eavesdropping and Anti-Eavesdropping Game in UAV Wiretap System: A Differential Game Approach. |
IEEE Trans. Wirel. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Jihwan Moon, Sang Hyun Lee, Hoon Lee, Inkyu Lee |
Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection. |
IEEE Trans. Wirel. Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Xiaodong Lin 0001, Rongxing Lu, Xuemin Shen, Yoshiaki Nemoto, Nei Kato |
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jack Stockholm, Philippe Pasquier |
Eavesdropping: audience interaction in networked audio performance. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
acoustic ecology, artificial intelligence, reinforcement learning, auditory display, computer music, net art |
28 | Davide Balzarotti, Marco Cova, Giovanni Vigna |
ClearShot: Eavesdropping on Keyboard Input from Video. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Markus G. Kuhn |
Electromagnetic Eavesdropping Risks of Flat-Panel Displays. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Markus G. Kuhn |
Optical Time-Domain Eavesdropping Risks of CRT Displays. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
optical compromising emanations, cathode-ray tubes, phosphor decay, computer security, TEMPEST |
28 | Matthew K. Franklin, Zvi Galil, Moti Yung |
Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. |
J. ACM |
2000 |
DBLP DOI BibTeX RDF |
|
28 | S. Roy, G. Kar |
Quantum Cryptography, Eavesdropping, and Unsharp Spin Measurement. |
QCQC |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Ryan Vogt, Mario A. Nascimento, Janelle J. Harms |
On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks. |
ADHOC-NOW |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Noor-ul-Qayyum, Farooq Ahmad |
Integrity assurance of mobile agents through public-key encryption and watermarking. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Philippe Golle, David A. Wagner 0001 |
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yi Ouyang 0001, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon |
Entrapping Adversaries for Source Protection in Sensor Networks. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Daphna Weinshall |
Cognitive Authentication Schemes Safe Against Spyware (Short Paper). |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hoi-Kwong Lo, Hoi Fung Chau, M. Ardehali |
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Quantum computing, Key distribution, Quantum cryptography, Quantum information |
24 | Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail |
A Quantum Cipher with Near Optimal Key-Recycling. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
key-recycling, private-key encryption, unconditional security, Quantum cryptography |
24 | Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn |
Tapping Alert Protocol. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
promiscuous mode, sniffing, tapping alert protocol, cryptography, network security |
23 | Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Alireza Mohammadi-Nodooshan |
Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. |
SUTC/UMC |
2010 |
DBLP DOI BibTeX RDF |
Overhearing/Eavesdropping, CDMA (Code Division Multiple Access), Sensor Networks, Graph Coloring |
23 | Zhanshan (Sam) Ma, Axel W. Krings, Chih-Cheng Hung |
The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
Handicap Principle, Animal Communication Network, Signal Honesty, Extended Evolutionary Game Theory, Pervasive and Resilient Computing, Semantic Web, Social Networking, Trust, Deception, Eavesdropping |
23 | Mostafa M. El-Said, Ira Woodring |
An Empirical Study for Protecting Passive RFID Systems against Cloning. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
transponder, RFID reader, tag cloning, security, RFID, RFID tag, EPC, eavesdropping |
23 | Collin Jackson, Adam Barth |
Forcehttps: protecting high-security web sites from network attacks. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
HTTPS, same-origin policy, eavesdropping, pharming |
23 | Hidema Tanaka |
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Electromagnetic emanation, EMC, Side-channel attack, Eavesdropping, Tempest |
23 | Li Zhuang, Feng Zhou, J. D. Tygar |
Keyboard acoustic emanations revisited. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
acoustic emanations, cepstrum, electronic eavesdropping, privacy, HMM, hidden Markov models, human factors, computer security, learning theory, keyboards, signal analysis |
16 | Jin Qian, Hui Li 0036, Yan Huo, Xiaoshuang Xing |
Empowering IoT security: an innovative handover-driven node selection approach to tackle conscious mobile eavesdropping. |
Int. J. Sens. Networks |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Delin Guo, Lan Tang, Xinggan Zhang, Ying-Chang Liang |
Joint Optimization of Trajectory and Jamming Power for Multiple UAV-Aided Proactive Eavesdropping. |
IEEE Trans. Mob. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Pengfei Hu 0001, Wenhao Li, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Hong Li 0004, Huanle Zhang, Guoming Zhang, Xiuzhen Cheng 0001, Prasant Mohapatra |
Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN. |
IEEE Trans. Mob. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenbo Liu, Peian Li, Xiangzhu Meng, Liangbin Zhao, Yige Qiao, Xiang Gao, Jianjun Ma, Houjun Sun |
Waveguide Eavesdropping Threat for Terahertz Wireless Communications. |
IEEE Commun. Mag. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Fenying Yuan, Shengda Tang, Didi Liu |
AoI-Based Transmission Scheduling for Cyber Physical Systems Over Fading Channel Against Eavesdropping. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Peishun Yan, Wei Duan 0001, Xiaodong Ji, Guoan Zhang, Bin Li 0022, Yulong Zou, Miaowen Wen, Pin-Han Ho |
EH Cognitive Network With NOMA: Perspective on Impact of Passive and Active Eavesdropping. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang 0001, Tarik Taleb |
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Quancheng Wang, Ming Tang 0002, Jianming Fu |
EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Ya Gao 0002, Yang Zhang 0062, He Geng, Xingwang Li 0001, Daniel Benevides da Costa, Ming Zeng 0002 |
Aerial-IRS-Assisted Securing Communications Against Eavesdropping: Joint Trajectory and Resource Allocation. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Laura Crosara, Nicola Laurenti, Leonardo Badia |
Age of information is not just a number: Status updates against an eavesdropping node. |
Ad Hoc Networks |
2024 |
DBLP DOI BibTeX RDF |
|
16 | R. C. Veena, S. H. Brahmananda |
An efficient eavesdropping model for detection of advanced persistent threat (APT) in high volume network traffic. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Chen Gao, Zidong Wang, Lifeng Ma, Hongjian Liu, Xiao He 0001 |
Private Synchronization Control of Complex Networks Against Eavesdropping Attacks: A Differential Privacy Scheme. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Fei Tao, Dan Ye 0001 |
Secure State Estimation Against Eavesdropping Attacks Based on Time-Varying Coding and Noise-Adding. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Hanxiao Liu, Jiaying Zou, Xiaoqiang Ren, Xiaofan Wang 0001 |
A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems. |
IEEE Trans. Circuits Syst. II Express Briefs |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Sutanu Ghosh, Santi P. Maity, Chinmay Chakraborty |
On EE Maximization in D2D-CRN With Eavesdropping Using LSTM-Based Channel Estimation. |
IEEE Trans. Consumer Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Francesco Malandrino, Alessandro Nordio, Carla-Fabiana Chiasserini |
Eavesdropping with Intelligent Reflective Surfaces: Near-Optimal Configuration Cycling. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Peng Huang, Yao Wei, Peng Cheng 0007, Zhongjie Ba, Li Lu 0008, Feng Lin 0004, Yang Wang, Kui Ren 0001 |
Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xingquan Fu, Guanghui Wen, Mengfei Niu, Wei Xing Zheng 0001 |
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Peng Xu 0002, Jun Yang, Gaojie Chen, Zheng Yang 0003, Yong Li 0023, Moe Z. Win |
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Qianru Liao, Yongzhi Huang 0002, Yandao Huang, Kaishun Wu |
An Eavesdropping System Based on Magnetic Side-Channel Signals Leaked by Speakers. |
ACM Trans. Sens. Networks |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xiaoyan Chang, Lianghong Peng, Suzhen Zhang |
Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Gangesh Gunjan, Sparsh Shrivastava, Salil Kashyap |
Modeling and Analysis of Physical Layer Security of OTFS Systems Under Transmit Antenna Selection and Passive Eavesdropping. |
IEEE Commun. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Andrey Garnaev, Wade Trappe |
A Fair Anti-Eavesdropping Strategy for Communication with Several Receivers. |
CISS |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic |
UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yurui Cao, Sai Xu, Jiajia Liu 0001 |
Proactive Eavesdropping Strategies Using Hybrid Reflecting-Backscatter Intelligent Surface. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guojie Hu, Zan Li 0001, Jiangbo Si, Kui Xu 0001, Yunlong Cai, Donghui Xu, Naofal Al-Dhahir |
Analysis and Optimization of STAR-RIS-Assisted Proactive Eavesdropping With Statistical CSI. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guojie Hu, Jiangbo Si, Yunlong Cai, Naofal Al-Dhahir |
Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hui Han, Yang Cao 0016, Na Deng, Chengwen Xing, Nan Zhao 0001, Yonghui Li 0001, Xianbin Wang 0001 |
Secure Transmission for STAR-RIS Aided NOMA Against Internal Eavesdropping. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Shengbin Lin, Yitao Xu, Haichao Wang 0001, Jiangchun Gu, Jiteng Liu, Guoru Ding |
Secure Multicast Communications via RIS Against Eavesdropping and Jamming With Imperfect CSI. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yuqing Xing, Baofang Li, Lili Wu, Fengming Yan |
Waveforms Eavesdropping Prevention Framework: The Case of Classification of EPG Waveforms of Aphid Utilizing Wavelet Kernel Extreme Learning Machine. |
Appl. Artif. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guojie Hu, Jiangbo Si, Zan Li 0001 |
Borrowing Arrows With Thatched Boats: Exploiting the Reactive Primary Communications for Boosting Jamming-Assisted Proactive Eavesdropping. |
IEEE Trans. Mob. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Avik Banerjee, Santi P. Maity |
Jamming in Eavesdropping on Throughput Maximization in Green Cognitive Radio Networks. |
IEEE Trans. Mob. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ding Xu 0001, Hongbo Zhu 0002 |
Proactive Eavesdropping Over Multiple Suspicious Communication Links With Heterogeneous Services. |
IEEE Trans. Wirel. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qubeijian Wang, Hao Wang 0003, Wen Sun 0004, Nan Zhao 0001, Hong-Ning Dai, Wei Zhang 0001 |
Aerial Bridge: A Secure Tunnel Against Eavesdropping in Terrestrial-Satellite Networks. |
IEEE Trans. Wirel. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Cheng Zhang 0004, Xiaolong Miao, Yongming Huang, Luxi Yang, Lan Tang |
Performance of Multi-Antenna Proactive Eavesdropping in 5G Uplink Systems. |
IEEE Trans. Wirel. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Zheping Wu, Kefeng Guo, Xingwang Li 0001, Yudong Zhang 0001, Mingfu Zhu, Houbing Song, Min Wu |
Proactive Eavesdropping Performance for Integrated Satellite-Terrestrial Relay Networks. |
IEEE Open J. Commun. Soc. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lizheng Wang 0005, Fanglin Niu, Daxing Qian, Ling Yu |
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari, Heejung Yu |
RIS-Aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis With Simultaneous Eavesdropping. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Young-Jun Yoon, Wanjei Cho, Seongwook Lee, Jong-Ho Lee 0001, Jiho Song, Seong-Cheol Kim |
Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari |
On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lingyun Chai, Lin Bai 0001, Tong Bai, Jia Shi 0001, Arumugam Nallanathan |
Secure RIS-Aided MISO-NOMA System Design in the Presence of Active Eavesdropping. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yurui Cao, Sai Xu, Jiajia Liu 0001, Nei Kato |
IRS Backscatter Enhancing Against Jamming and Eavesdropping Attacks. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lei Wang, Meng Chen, Li Lu 0008, Zhongjie Ba, Feng Lin 0004, Kui Ren 0001 |
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yunzhong Chen, Jiadi Yu, Linghe Kong, Hao Kong, Yanmin Zhu, Yi-Chao Chen 0001 |
RF-Mic: Live Voice Eavesdropping via Capturing Subtle Facial Speech Dynamics Leveraging RFID. |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wen Wang, Wanli Ni, Hui Tian 0003, Yonina C. Eldar, Dusit Niyato |
UAV-Mounted Multi-Functional RIS for Combating Eavesdropping in Wireless Networks. |
IEEE Wirel. Commun. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qiang Li 0031, Dongyang Xu, Keivan Navaie, Zhiguo Ding 0001 |
Covert and Secure Communications in NOMA Networks With Internal Eavesdropping. |
IEEE Wirel. Commun. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hanadi Salman, Hüseyin Arslan |
PLS-IoT Enhancement Against Eavesdropping via Spatially Distributed Constellation Obfuscation. |
IEEE Wirel. Commun. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guixian Cheng, Bohan Yang 0010, Weikai Xu, Guofa Cai, Zhou Dai |
An Anti-Eavesdropping Scheme Based on OFDM-IM Using Artificial Noise. |
IEEE Signal Process. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Daxing Xu, Bo Chen 0003, Yuchen Zhang, Li Yu 0001 |
Distributed Anti-Eavesdropping Fusion Estimation Under Energy Constraints. |
IEEE Trans. Autom. Control. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jun Shang, Tongwen Chen |
Linear Encryption Against Eavesdropping on Remote State Estimation. |
IEEE Trans. Autom. Control. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Maice Costa, Yalin E. Sagduyu |
Timely and covert communications under deep learning-based eavesdropping and jamming effects. |
J. Commun. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 |
Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xinhao Yan, Bo Chen 0003, Yuchen Zhang, Li Yu 0001 |
Distributed encryption fusion estimation against full eavesdropping. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, Danyu Diao |
IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ozan Alp Topal, Gunes Karabulut Kurt |
Whispering Lies to the Eavesdropper: Physical Layer Spoofing Against Eavesdropping Attacks. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xin Song, Jiahui Zhu, Runfeng Zhang, Mingjv Peng, Siyang Xu |
Adaptive secure transmission for two-way energy harvesting relay networks with two-sided eavesdropping. |
Trans. Emerg. Telecommun. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Haokun Song, Rui Lin, Andrea Sgambelluri, Filippo Cugini, Yajie Li, Jie Zhang, Paolo Monti 0001 |
Cluster-based Method for Eavesdropping Identification and Localization in Optical Links. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yuhao Chen, Qianqian Yang 0004, Zhiguo Shi 0001, Jiming Chen 0001 |
The Model Inversion Eavesdropping Attack in Semantic Communication Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari |
RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdropping. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 897 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|