The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for eavesdropping with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1995 (15) 1996-2000 (16) 2001-2002 (23) 2003-2004 (24) 2005 (31) 2006 (31) 2007 (30) 2008 (44) 2009 (27) 2010 (16) 2011-2012 (24) 2013 (20) 2014-2015 (45) 2016 (46) 2017 (51) 2018 (51) 2019 (65) 2020 (73) 2021 (64) 2022 (87) 2023 (91) 2024 (23)
Publication types (Num. hits)
article(436) data(1) incollection(4) inproceedings(454) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 256 occurrences of 187 keywords

Results
Found 897 publication records. Showing 897 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
87Jung-Chun Kao, Radu Marculescu Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless ad hoc networks, transmission power control, Wireless network security
63Supachai Tangwongsan, Sathaporn Kassuvan A highly effective model for security protection against eavesdropping exploits. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security protection, voice eavesdropping, voice encryption, security model, key exchange
59Markus G. Kuhn Security Limits for Compromising Emanations. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF emission security, protection standards, side channels, Eavesdropping, Tempest, video displays
51Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, Jacques Reverdy RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ISO 14443, Tausworthe cell, RFID, smartcard, eavesdropping, RNG
51Xia Brustoloni, José Carlos Brustoloni Hardening Web browsers against man-in-the-middle and eavesdropping attacks. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack
51Madhukar Anand, Zachary G. Ives, Insup Lee 0001 Quantifying eavesdropping vulnerability in sensor networks. Search on Bibsonomy DMSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless sensor networks, data streams, probability distribution, eavesdropping
48Wonjoon Choi, Byeong-Hee Roh Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Ben Adida Sessionlock: securing web sessions against eavesdropping. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web security
40Cees J. A. Jansen, Dick E. Boekee Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
39Matthew K. Franklin, Zvi Galil, Moti Yung Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems Search on Bibsonomy FOCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF eavesdropping games, mobile eavesdroppers, secure message transmission, distributed database maintenance, privacy maintenance problems, privacy, distributed systems, computational complexity, protocols, bugs, graph-theoretic approach
36Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
36Hoi Fung Chau Unconditionally secure key distribution in higher dimensions by depolarization. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Shoichi Hirose, Susumu Yoshida An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
35Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu Port and Address Hopping for Active Cyber-Defense. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping
35Marc Donner The Impending Debate. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Total Information Awareness, Terrorist Information Awareness, privacy, government, eavesdropping, wiretap
35Whitfield Diffie Chattering about SIGINT. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SIGINT, Patrick Radden Keefe, Chatter: Dispatches from the Secret World of Global Eavesdropping, chatter
35José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
35Michael G. Reed, Paul F. Syverson, David M. Goldschlag Proxies For Anonymous Routing. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity
31Huici Wu, Meng Li 0029, Qiuyue Gao, Zhiqing Wei, Ning Zhang 0007, Xiaofeng Tao Eavesdropping and Anti-Eavesdropping Game in UAV Wiretap System: A Differential Game Approach. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Jihwan Moon, Sang Hyun Lee, Hoon Lee, Inkyu Lee Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Xiaodong Lin 0001, Rongxing Lu, Xuemin Shen, Yoshiaki Nemoto, Nei Kato Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jack Stockholm, Philippe Pasquier Eavesdropping: audience interaction in networked audio performance. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF acoustic ecology, artificial intelligence, reinforcement learning, auditory display, computer music, net art
28Davide Balzarotti, Marco Cova, Giovanni Vigna ClearShot: Eavesdropping on Keyboard Input from Video. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Markus G. Kuhn Electromagnetic Eavesdropping Risks of Flat-Panel Displays. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Markus G. Kuhn Optical Time-Domain Eavesdropping Risks of CRT Displays. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF optical compromising emanations, cathode-ray tubes, phosphor decay, computer security, TEMPEST
28Matthew K. Franklin, Zvi Galil, Moti Yung Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. Search on Bibsonomy J. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28S. Roy, G. Kar Quantum Cryptography, Eavesdropping, and Unsharp Spin Measurement. Search on Bibsonomy QCQC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Ryan Vogt, Mario A. Nascimento, Janelle J. Harms On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Noor-ul-Qayyum, Farooq Ahmad Integrity assurance of mobile agents through public-key encryption and watermarking. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Philippe Golle, David A. Wagner 0001 Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yi Ouyang 0001, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon Entrapping Adversaries for Source Protection in Sensor Networks. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Daphna Weinshall Cognitive Authentication Schemes Safe Against Spyware (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Hoi-Kwong Lo, Hoi Fung Chau, M. Ardehali Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quantum computing, Key distribution, Quantum cryptography, Quantum information
24Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail A Quantum Cipher with Near Optimal Key-Recycling. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key-recycling, private-key encryption, unconditional security, Quantum cryptography
24Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn Tapping Alert Protocol. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF promiscuous mode, sniffing, tapping alert protocol, cryptography, network security
23Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Alireza Mohammadi-Nodooshan Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. Search on Bibsonomy SUTC/UMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Overhearing/Eavesdropping, CDMA (Code Division Multiple Access), Sensor Networks, Graph Coloring
23Zhanshan (Sam) Ma, Axel W. Krings, Chih-Cheng Hung The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Handicap Principle, Animal Communication Network, Signal Honesty, Extended Evolutionary Game Theory, Pervasive and Resilient Computing, Semantic Web, Social Networking, Trust, Deception, Eavesdropping
23Mostafa M. El-Said, Ira Woodring An Empirical Study for Protecting Passive RFID Systems against Cloning. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF transponder, RFID reader, tag cloning, security, RFID, RFID tag, EPC, eavesdropping
23Collin Jackson, Adam Barth Forcehttps: protecting high-security web sites from network attacks. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HTTPS, same-origin policy, eavesdropping, pharming
23Hidema Tanaka Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electromagnetic emanation, EMC, Side-channel attack, Eavesdropping, Tempest
23Li Zhuang, Feng Zhou, J. D. Tygar Keyboard acoustic emanations revisited. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF acoustic emanations, cepstrum, electronic eavesdropping, privacy, HMM, hidden Markov models, human factors, computer security, learning theory, keyboards, signal analysis
16Jin Qian, Hui Li 0036, Yan Huo, Xiaoshuang Xing Empowering IoT security: an innovative handover-driven node selection approach to tackle conscious mobile eavesdropping. Search on Bibsonomy Int. J. Sens. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Delin Guo, Lan Tang, Xinggan Zhang, Ying-Chang Liang Joint Optimization of Trajectory and Jamming Power for Multiple UAV-Aided Proactive Eavesdropping. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Pengfei Hu 0001, Wenhao Li, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Hong Li 0004, Huanle Zhang, Guoming Zhang, Xiuzhen Cheng 0001, Prasant Mohapatra Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Wenbo Liu, Peian Li, Xiangzhu Meng, Liangbin Zhao, Yige Qiao, Xiang Gao, Jianjun Ma, Houjun Sun Waveguide Eavesdropping Threat for Terahertz Wireless Communications. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Fenying Yuan, Shengda Tang, Didi Liu AoI-Based Transmission Scheduling for Cyber Physical Systems Over Fading Channel Against Eavesdropping. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Peishun Yan, Wei Duan 0001, Xiaodong Ji, Guoan Zhang, Bin Li 0022, Yulong Zou, Miaowen Wen, Pin-Han Ho EH Cognitive Network With NOMA: Perspective on Impact of Passive and Active Eavesdropping. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang 0001, Tarik Taleb Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Quancheng Wang, Ming Tang 0002, Jianming Fu EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Ya Gao 0002, Yang Zhang 0062, He Geng, Xingwang Li 0001, Daniel Benevides da Costa, Ming Zeng 0002 Aerial-IRS-Assisted Securing Communications Against Eavesdropping: Joint Trajectory and Resource Allocation. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Laura Crosara, Nicola Laurenti, Leonardo Badia Age of information is not just a number: Status updates against an eavesdropping node. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16R. C. Veena, S. H. Brahmananda An efficient eavesdropping model for detection of advanced persistent threat (APT) in high volume network traffic. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Chen Gao, Zidong Wang, Lifeng Ma, Hongjian Liu, Xiao He 0001 Private Synchronization Control of Complex Networks Against Eavesdropping Attacks: A Differential Privacy Scheme. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Fei Tao, Dan Ye 0001 Secure State Estimation Against Eavesdropping Attacks Based on Time-Varying Coding and Noise-Adding. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Hanxiao Liu, Jiaying Zou, Xiaoqiang Ren, Xiaofan Wang 0001 A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Sutanu Ghosh, Santi P. Maity, Chinmay Chakraborty On EE Maximization in D2D-CRN With Eavesdropping Using LSTM-Based Channel Estimation. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Francesco Malandrino, Alessandro Nordio, Carla-Fabiana Chiasserini Eavesdropping with Intelligent Reflective Surfaces: Near-Optimal Configuration Cycling. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Peng Huang, Yao Wei, Peng Cheng 0007, Zhongjie Ba, Li Lu 0008, Feng Lin 0004, Yang Wang, Kui Ren 0001 Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Xingquan Fu, Guanghui Wen, Mengfei Niu, Wei Xing Zheng 0001 Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Peng Xu 0002, Jun Yang, Gaojie Chen, Zheng Yang 0003, Yong Li 0023, Moe Z. Win Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Qianru Liao, Yongzhi Huang 0002, Yandao Huang, Kaishun Wu An Eavesdropping System Based on Magnetic Side-Channel Signals Leaked by Speakers. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Xiaoyan Chang, Lianghong Peng, Suzhen Zhang Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Gangesh Gunjan, Sparsh Shrivastava, Salil Kashyap Modeling and Analysis of Physical Layer Security of OTFS Systems Under Transmit Antenna Selection and Passive Eavesdropping. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Andrey Garnaev, Wade Trappe A Fair Anti-Eavesdropping Strategy for Communication with Several Receivers. Search on Bibsonomy CISS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yurui Cao, Sai Xu, Jiajia Liu 0001 Proactive Eavesdropping Strategies Using Hybrid Reflecting-Backscatter Intelligent Surface. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Guojie Hu, Zan Li 0001, Jiangbo Si, Kui Xu 0001, Yunlong Cai, Donghui Xu, Naofal Al-Dhahir Analysis and Optimization of STAR-RIS-Assisted Proactive Eavesdropping With Statistical CSI. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Guojie Hu, Jiangbo Si, Yunlong Cai, Naofal Al-Dhahir Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hui Han, Yang Cao 0016, Na Deng, Chengwen Xing, Nan Zhao 0001, Yonghui Li 0001, Xianbin Wang 0001 Secure Transmission for STAR-RIS Aided NOMA Against Internal Eavesdropping. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Shengbin Lin, Yitao Xu, Haichao Wang 0001, Jiangchun Gu, Jiteng Liu, Guoru Ding Secure Multicast Communications via RIS Against Eavesdropping and Jamming With Imperfect CSI. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yuqing Xing, Baofang Li, Lili Wu, Fengming Yan Waveforms Eavesdropping Prevention Framework: The Case of Classification of EPG Waveforms of Aphid Utilizing Wavelet Kernel Extreme Learning Machine. Search on Bibsonomy Appl. Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Guojie Hu, Jiangbo Si, Zan Li 0001 Borrowing Arrows With Thatched Boats: Exploiting the Reactive Primary Communications for Boosting Jamming-Assisted Proactive Eavesdropping. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Avik Banerjee, Santi P. Maity Jamming in Eavesdropping on Throughput Maximization in Green Cognitive Radio Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Ding Xu 0001, Hongbo Zhu 0002 Proactive Eavesdropping Over Multiple Suspicious Communication Links With Heterogeneous Services. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Qubeijian Wang, Hao Wang 0003, Wen Sun 0004, Nan Zhao 0001, Hong-Ning Dai, Wei Zhang 0001 Aerial Bridge: A Secure Tunnel Against Eavesdropping in Terrestrial-Satellite Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Cheng Zhang 0004, Xiaolong Miao, Yongming Huang, Luxi Yang, Lan Tang Performance of Multi-Antenna Proactive Eavesdropping in 5G Uplink Systems. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Zheping Wu, Kefeng Guo, Xingwang Li 0001, Yudong Zhang 0001, Mingfu Zhu, Houbing Song, Min Wu Proactive Eavesdropping Performance for Integrated Satellite-Terrestrial Relay Networks. Search on Bibsonomy IEEE Open J. Commun. Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Lizheng Wang 0005, Fanglin Niu, Daxing Qian, Ling Yu Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari, Heejung Yu RIS-Aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis With Simultaneous Eavesdropping. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Young-Jun Yoon, Wanjei Cho, Seongwook Lee, Jong-Ho Lee 0001, Jiho Song, Seong-Cheol Kim Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Lingyun Chai, Lin Bai 0001, Tong Bai, Jia Shi 0001, Arumugam Nallanathan Secure RIS-Aided MISO-NOMA System Design in the Presence of Active Eavesdropping. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yurui Cao, Sai Xu, Jiajia Liu 0001, Nei Kato IRS Backscatter Enhancing Against Jamming and Eavesdropping Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Lei Wang, Meng Chen, Li Lu 0008, Zhongjie Ba, Feng Lin 0004, Kui Ren 0001 VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Search on Bibsonomy Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yunzhong Chen, Jiadi Yu, Linghe Kong, Hao Kong, Yanmin Zhu, Yi-Chao Chen 0001 RF-Mic: Live Voice Eavesdropping via Capturing Subtle Facial Speech Dynamics Leveraging RFID. Search on Bibsonomy Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Wen Wang, Wanli Ni, Hui Tian 0003, Yonina C. Eldar, Dusit Niyato UAV-Mounted Multi-Functional RIS for Combating Eavesdropping in Wireless Networks. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Qiang Li 0031, Dongyang Xu, Keivan Navaie, Zhiguo Ding 0001 Covert and Secure Communications in NOMA Networks With Internal Eavesdropping. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hanadi Salman, Hüseyin Arslan PLS-IoT Enhancement Against Eavesdropping via Spatially Distributed Constellation Obfuscation. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Guixian Cheng, Bohan Yang 0010, Weikai Xu, Guofa Cai, Zhou Dai An Anti-Eavesdropping Scheme Based on OFDM-IM Using Artificial Noise. Search on Bibsonomy IEEE Signal Process. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Daxing Xu, Bo Chen 0003, Yuchen Zhang, Li Yu 0001 Distributed Anti-Eavesdropping Fusion Estimation Under Energy Constraints. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jun Shang, Tongwen Chen Linear Encryption Against Eavesdropping on Remote State Estimation. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Maice Costa, Yalin E. Sagduyu Timely and covert communications under deep learning-based eavesdropping and jamming effects. Search on Bibsonomy J. Commun. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xinhao Yan, Bo Chen 0003, Yuchen Zhang, Li Yu 0001 Distributed encryption fusion estimation against full eavesdropping. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, Danyu Diao IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Ozan Alp Topal, Gunes Karabulut Kurt Whispering Lies to the Eavesdropper: Physical Layer Spoofing Against Eavesdropping Attacks. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xin Song, Jiahui Zhu, Runfeng Zhang, Mingjv Peng, Siyang Xu Adaptive secure transmission for two-way energy harvesting relay networks with two-sided eavesdropping. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Haokun Song, Rui Lin, Andrea Sgambelluri, Filippo Cugini, Yajie Li, Jie Zhang, Paolo Monti 0001 Cluster-based Method for Eavesdropping Identification and Localization in Optical Links. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yuhao Chen, Qianqian Yang 0004, Zhiguo Shi 0001, Jiming Chen 0001 The Model Inversion Eavesdropping Attack in Semantic Communication Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdropping. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 897 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license