|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 256 occurrences of 187 keywords
|
|
|
Results
Found 897 publication records. Showing 897 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Jung-Chun Kao, Radu Marculescu |
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 56(8), pp. 1009-1023, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wireless ad hoc networks, transmission power control, Wireless network security |
63 | Supachai Tangwongsan, Sathaporn Kassuvan |
A highly effective model for security protection against eavesdropping exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 891-895, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security protection, voice eavesdropping, voice encryption, security model, key exchange |
59 | Markus G. Kuhn |
Security Limits for Compromising Emanations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 265-279, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
emission security, protection standards, side channels, Eavesdropping, Tempest, video displays |
51 | Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, Jacques Reverdy |
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 334-345, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ISO 14443, Tausworthe cell, RFID, smartcard, eavesdropping, RNG |
51 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 489-498, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
51 | Madhukar Anand, Zachary G. Ives, Insup Lee 0001 |
Quantifying eavesdropping vulnerability in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMSN ![In: Proceedings of the 2nd Workshop on Data Management for Sensor Networks, in conjunction with VLDB, DMSN 2005, Trondheim, Norway, August 30, 2005, pp. 3-9, 2005, ACM, 1-59593-206-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wireless sensor networks, data streams, probability distribution, eavesdropping |
48 | Wonjoon Choi, Byeong-Hee Roh |
Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 279-287, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Ben Adida |
Sessionlock: securing web sessions against eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 517-524, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
web security |
40 | Cees J. A. Jansen, Dick E. Boekee |
Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 281-286, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
39 | Matthew K. Franklin, Zvi Galil, Moti Yung |
Eavesdropping Games: A Graph-Theoretic Approach to Privacy in Distributed Systems ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 34th Annual Symposium on Foundations of Computer Science, Palo Alto, California, USA, 3-5 November 1993, pp. 670-679, 1993, IEEE Computer Society, 0-8186-4370-6. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
eavesdropping games, mobile eavesdroppers, secure message transmission, distributed database maintenance, privacy maintenance problems, privacy, distributed systems, computational complexity, protocols, bugs, graph-theoretic approach |
36 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 290-307, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision |
36 | Hoi Fung Chau |
Unconditionally secure key distribution in higher dimensions by depolarization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 51(4), pp. 1451-1468, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Shoichi Hirose, Susumu Yoshida |
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 135-148, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
35 | Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu |
Port and Address Hopping for Active Cyber-Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 295-300, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Port and address hopping, Active cyber-defense, Denial of Service, Eavesdropping |
35 | Marc Donner |
The Impending Debate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 4-5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Total Information Awareness, Terrorist Information Awareness, privacy, government, eavesdropping, wiretap |
35 | Whitfield Diffie |
Chattering about SIGINT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 9, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SIGINT, Patrick Radden Keefe, Chatter: Dispatches from the Secret World of Global Eavesdropping, chatter |
35 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(4), pp. 5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
35 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 95-104, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
31 | Huici Wu, Meng Li 0029, Qiuyue Gao, Zhiqing Wei, Ning Zhang 0007, Xiaofeng Tao |
Eavesdropping and Anti-Eavesdropping Game in UAV Wiretap System: A Differential Game Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 21(11), pp. 9906-9920, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Jihwan Moon, Sang Hyun Lee, Hoon Lee, Inkyu Lee |
Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 18(7), pp. 3726-3738, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Xiaodong Lin 0001, Rongxing Lu, Xuemin Shen, Yoshiaki Nemoto, Nei Kato |
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(4), pp. 365-378, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jack Stockholm, Philippe Pasquier |
Eavesdropping: audience interaction in networked audio performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008, pp. 559-568, 2008, ACM, 978-1-60558-303-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
acoustic ecology, artificial intelligence, reinforcement learning, auditory display, computer music, net art |
28 | Davide Balzarotti, Marco Cova, Giovanni Vigna |
ClearShot: Eavesdropping on Keyboard Input from Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 170-183, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Markus G. Kuhn |
Electromagnetic Eavesdropping Risks of Flat-Panel Displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 88-107, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Markus G. Kuhn |
Optical Time-Domain Eavesdropping Risks of CRT Displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 3-18, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
optical compromising emanations, cathode-ray tubes, phosphor decay, computer security, TEMPEST |
28 | Matthew K. Franklin, Zvi Galil, Moti Yung |
Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 47(2), pp. 225-243, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | S. Roy, G. Kar |
Quantum Cryptography, Eavesdropping, and Unsharp Spin Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QCQC ![In: Quantum Computing and Quantum Communications, First NASA International Conference, QCQC'98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers, pp. 214-217, 1998, Springer, 3-540-65514-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Ryan Vogt, Mario A. Nascimento, Janelle J. Harms |
On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings, pp. 241-254, 2009, Springer, 978-3-642-04382-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Noor-ul-Qayyum, Farooq Ahmad |
Integrity assurance of mobile agents through public-key encryption and watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 575-580, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Philippe Golle, David A. Wagner 0001 |
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 66-70, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yi Ouyang 0001, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon |
Entrapping Adversaries for Source Protection in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 23-34, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Daphna Weinshall |
Cognitive Authentication Schemes Safe Against Spyware (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 295-300, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hoi-Kwong Lo, Hoi Fung Chau, M. Ardehali |
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 18(2), pp. 133-165, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Quantum computing, Key distribution, Quantum cryptography, Quantum information |
24 | Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail |
A Quantum Cipher with Near Optimal Key-Recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 494-510, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key-recycling, private-key encryption, unconditional security, Quantum cryptography |
24 | Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn |
Tapping Alert Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 159-164, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
promiscuous mode, sniffing, tapping alert protocol, cryptography, network security |
23 | Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Alireza Mohammadi-Nodooshan |
Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC/UMC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2010 and IEEE International Workshop on Ubiquitous and Mobile Computing, UMC 2010, 7-9 June 2010, Newport Beach, California, USA, pp. 89-94, 2010, IEEE Computer Society, 978-0-7695-4049-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Overhearing/Eavesdropping, CDMA (Code Division Multiple Access), Sensor Networks, Graph Coloring |
23 | Zhanshan (Sam) Ma, Axel W. Krings, Chih-Cheng Hung |
The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 458-468, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Handicap Principle, Animal Communication Network, Signal Honesty, Extended Evolutionary Game Theory, Pervasive and Resilient Computing, Semantic Web, Social Networking, Trust, Deception, Eavesdropping |
23 | Mostafa M. El-Said, Ira Woodring |
An Empirical Study for Protecting Passive RFID Systems against Cloning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 558-563, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
transponder, RFID reader, tag cloning, security, RFID, RFID tag, EPC, eavesdropping |
23 | Collin Jackson, Adam Barth |
Forcehttps: protecting high-security web sites from network attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 525-534, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HTTPS, same-origin policy, eavesdropping, pharming |
23 | Hidema Tanaka |
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 167-179, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Electromagnetic emanation, EMC, Side-channel attack, Eavesdropping, Tempest |
23 | Li Zhuang, Feng Zhou, J. D. Tygar |
Keyboard acoustic emanations revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 373-382, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
acoustic emanations, cepstrum, electronic eavesdropping, privacy, HMM, hidden Markov models, human factors, computer security, learning theory, keyboards, signal analysis |
16 | Jin Qian, Hui Li 0036, Yan Huo, Xiaoshuang Xing |
Empowering IoT security: an innovative handover-driven node selection approach to tackle conscious mobile eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Sens. Networks ![In: Int. J. Sens. Networks 44(2), pp. 84-98, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Delin Guo, Lan Tang, Xinggan Zhang, Ying-Chang Liang |
Joint Optimization of Trajectory and Jamming Power for Multiple UAV-Aided Proactive Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 23(5), pp. 5770-5785, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Pengfei Hu 0001, Wenhao Li, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Hong Li 0004, Huanle Zhang, Guoming Zhang, Xiuzhen Cheng 0001, Prasant Mohapatra |
Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 23(1), pp. 941-954, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenbo Liu, Peian Li, Xiangzhu Meng, Liangbin Zhao, Yige Qiao, Xiang Gao, Jianjun Ma, Houjun Sun |
Waveguide Eavesdropping Threat for Terahertz Wireless Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 62(2), pp. 80-84, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Fenying Yuan, Shengda Tang, Didi Liu |
AoI-Based Transmission Scheduling for Cyber Physical Systems Over Fading Channel Against Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(3), pp. 5455-5466, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Peishun Yan, Wei Duan 0001, Xiaodong Ji, Guoan Zhang, Bin Li 0022, Yulong Zou, Miaowen Wen, Pin-Han Ho |
EH Cognitive Network With NOMA: Perspective on Impact of Passive and Active Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(3), pp. 5050-5062, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang 0001, Tarik Taleb |
Achieving Covertness and Secrecy: The Interplay Between Detection and Eavesdropping Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(2), pp. 3233-3249, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Quancheng Wang, Ming Tang 0002, Jianming Fu |
EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(3), pp. 3979-3993, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Ya Gao 0002, Yang Zhang 0062, He Geng, Xingwang Li 0001, Daniel Benevides da Costa, Ming Zeng 0002 |
Aerial-IRS-Assisted Securing Communications Against Eavesdropping: Joint Trajectory and Resource Allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(7), pp. 11974-11985, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Laura Crosara, Nicola Laurenti, Leonardo Badia |
Age of information is not just a number: Status updates against an eavesdropping node. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 155, pp. 103388, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | R. C. Veena, S. H. Brahmananda |
An efficient eavesdropping model for detection of advanced persistent threat (APT) in high volume network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(11), pp. 32123-32139, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Chen Gao, Zidong Wang, Lifeng Ma, Hongjian Liu, Xiao He 0001 |
Private Synchronization Control of Complex Networks Against Eavesdropping Attacks: A Differential Privacy Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(3), pp. 3028-3038, May - June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Fei Tao, Dan Ye 0001 |
Secure State Estimation Against Eavesdropping Attacks Based on Time-Varying Coding and Noise-Adding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(1), pp. 174-184, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Hanxiao Liu, Jiaying Zou, Xiaoqiang Ren, Xiaofan Wang 0001 |
A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 71(3), pp. 1221-1225, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Sutanu Ghosh, Santi P. Maity, Chinmay Chakraborty |
On EE Maximization in D2D-CRN With Eavesdropping Using LSTM-Based Channel Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 3906-3913, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Francesco Malandrino, Alessandro Nordio, Carla-Fabiana Chiasserini |
Eavesdropping with Intelligent Reflective Surfaces: Near-Optimal Configuration Cycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.14737, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Peng Huang, Yao Wei, Peng Cheng 0007, Zhongjie Ba, Li Lu 0008, Feng Lin 0004, Yang Wang, Kui Ren 0001 |
Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.15704, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xingquan Fu, Guanghui Wen, Mengfei Niu, Wei Xing Zheng 0001 |
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3483-3494, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Peng Xu 0002, Jun Yang, Gaojie Chen, Zheng Yang 0003, Yong Li 0023, Moe Z. Win |
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 985-1000, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Qianru Liao, Yongzhi Huang 0002, Yandao Huang, Kaishun Wu |
An Eavesdropping System Based on Magnetic Side-Channel Signals Leaked by Speakers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 20(2), pp. 39:1-39:30, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xiaoyan Chang, Lianghong Peng, Suzhen Zhang |
Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(3), pp. 850, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Gangesh Gunjan, Sparsh Shrivastava, Salil Kashyap |
Modeling and Analysis of Physical Layer Security of OTFS Systems Under Transmit Antenna Selection and Passive Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 28(3), pp. 483-487, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Andrey Garnaev, Wade Trappe |
A Fair Anti-Eavesdropping Strategy for Communication with Several Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISS ![In: 58th Annual Conference on Information Sciences and Systems, CISS 2024, Princeton, NJ, USA, March 13-15, 2024, pp. 1-6, 2024, IEEE, 979-8-3503-6929-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic |
UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(11), pp. 14426-14442, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yurui Cao, Sai Xu, Jiajia Liu 0001 |
Proactive Eavesdropping Strategies Using Hybrid Reflecting-Backscatter Intelligent Surface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(4), pp. 5441-5446, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guojie Hu, Zan Li 0001, Jiangbo Si, Kui Xu 0001, Yunlong Cai, Donghui Xu, Naofal Al-Dhahir |
Analysis and Optimization of STAR-RIS-Assisted Proactive Eavesdropping With Statistical CSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(5), pp. 6850-6855, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guojie Hu, Jiangbo Si, Yunlong Cai, Naofal Al-Dhahir |
Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(4), pp. 5384-5389, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hui Han, Yang Cao 0016, Na Deng, Chengwen Xing, Nan Zhao 0001, Yonghui Li 0001, Xianbin Wang 0001 |
Secure Transmission for STAR-RIS Aided NOMA Against Internal Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(11), pp. 15068-15073, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Shengbin Lin, Yitao Xu, Haichao Wang 0001, Jiangchun Gu, Jiteng Liu, Guoru Ding |
Secure Multicast Communications via RIS Against Eavesdropping and Jamming With Imperfect CSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(12), pp. 16805-16810, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yuqing Xing, Baofang Li, Lili Wu, Fengming Yan |
Waveforms Eavesdropping Prevention Framework: The Case of Classification of EPG Waveforms of Aphid Utilizing Wavelet Kernel Extreme Learning Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Artif. Intell. ![In: Appl. Artif. Intell. 37(1), December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guojie Hu, Jiangbo Si, Zan Li 0001 |
Borrowing Arrows With Thatched Boats: Exploiting the Reactive Primary Communications for Boosting Jamming-Assisted Proactive Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 22(9), pp. 5035-5052, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Avik Banerjee, Santi P. Maity |
Jamming in Eavesdropping on Throughput Maximization in Green Cognitive Radio Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 22(1), pp. 299-310, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ding Xu 0001, Hongbo Zhu 0002 |
Proactive Eavesdropping Over Multiple Suspicious Communication Links With Heterogeneous Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 22(5), pp. 3417-3431, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qubeijian Wang, Hao Wang 0003, Wen Sun 0004, Nan Zhao 0001, Hong-Ning Dai, Wei Zhang 0001 |
Aerial Bridge: A Secure Tunnel Against Eavesdropping in Terrestrial-Satellite Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 22(11), pp. 8096-8113, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Cheng Zhang 0004, Xiaolong Miao, Yongming Huang, Luxi Yang, Lan Tang |
Performance of Multi-Antenna Proactive Eavesdropping in 5G Uplink Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 22(9), pp. 6078-6091, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Zheping Wu, Kefeng Guo, Xingwang Li 0001, Yudong Zhang 0001, Mingfu Zhu, Houbing Song, Min Wu |
Proactive Eavesdropping Performance for Integrated Satellite-Terrestrial Relay Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Open J. Commun. Soc. ![In: IEEE Open J. Commun. Soc. 4, pp. 2985-2999, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lizheng Wang 0005, Fanglin Niu, Daxing Qian, Ling Yu |
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 134690-134700, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari, Heejung Yu |
RIS-Aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis With Simultaneous Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 126507-126523, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Young-Jun Yoon, Wanjei Cho, Seongwook Lee, Jong-Ho Lee 0001, Jiho Song, Seong-Cheol Kim |
Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 68682-68698, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari |
On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(9, May 1), pp. 7850-7867, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lingyun Chai, Lin Bai 0001, Tong Bai, Jia Shi 0001, Arumugam Nallanathan |
Secure RIS-Aided MISO-NOMA System Design in the Presence of Active Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(22), pp. 19479-19494, nov15 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yurui Cao, Sai Xu, Jiajia Liu 0001, Nei Kato |
IRS Backscatter Enhancing Against Jamming and Eavesdropping Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(12), pp. 10740-10751, june15 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lei Wang, Meng Chen, Li Lu 0008, Zhongjie Ba, Feng Lin 0004, Kui Ren 0001 |
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. ![In: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1), pp. 32:1-32:22, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yunzhong Chen, Jiadi Yu, Linghe Kong, Hao Kong, Yanmin Zhu, Yi-Chao Chen 0001 |
RF-Mic: Live Voice Eavesdropping via Capturing Subtle Facial Speech Dynamics Leveraging RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. ![In: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2), pp. 49:1-49:25, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wen Wang, Wanli Ni, Hui Tian 0003, Yonina C. Eldar, Dusit Niyato |
UAV-Mounted Multi-Functional RIS for Combating Eavesdropping in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. Lett. ![In: IEEE Wirel. Commun. Lett. 12(10), pp. 1667-1671, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qiang Li 0031, Dongyang Xu, Keivan Navaie, Zhiguo Ding 0001 |
Covert and Secure Communications in NOMA Networks With Internal Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. Lett. ![In: IEEE Wirel. Commun. Lett. 12(12), pp. 2178-2182, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hanadi Salman, Hüseyin Arslan |
PLS-IoT Enhancement Against Eavesdropping via Spatially Distributed Constellation Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. Lett. ![In: IEEE Wirel. Commun. Lett. 12(9), pp. 1508-1512, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Guixian Cheng, Bohan Yang 0010, Weikai Xu, Guofa Cai, Zhou Dai |
An Anti-Eavesdropping Scheme Based on OFDM-IM Using Artificial Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Signal Process. Lett. ![In: IEEE Signal Process. Lett. 30, pp. 1347-1351, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Daxing Xu, Bo Chen 0003, Yuchen Zhang, Li Yu 0001 |
Distributed Anti-Eavesdropping Fusion Estimation Under Energy Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 68(12), pp. 7795-7802, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jun Shang, Tongwen Chen |
Linear Encryption Against Eavesdropping on Remote State Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 68(7), pp. 4413-4419, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Maice Costa, Yalin E. Sagduyu |
Timely and covert communications under deep learning-based eavesdropping and jamming effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. Networks ![In: J. Commun. Networks 25(5), pp. 621-630, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su 0001 |
Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 150, pp. 110860, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xinhao Yan, Bo Chen 0003, Yuchen Zhang, Li Yu 0001 |
Distributed encryption fusion estimation against full eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 153, pp. 111025, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Tianhao Cheng, Buhong Wang, Kunrui Cao, Runze Dong, Danyu Diao |
IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(3), pp. 3670-3681, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ozan Alp Topal, Gunes Karabulut Kurt |
Whispering Lies to the Eavesdropper: Physical Layer Spoofing Against Eavesdropping Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(1), pp. 1581-1590, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xin Song, Jiahui Zhu, Runfeng Zhang, Mingjv Peng, Siyang Xu |
Adaptive secure transmission for two-way energy harvesting relay networks with two-sided eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 34(2), February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Haokun Song, Rui Lin, Andrea Sgambelluri, Filippo Cugini, Yajie Li, Jie Zhang, Paolo Monti 0001 |
Cluster-based Method for Eavesdropping Identification and Localization in Optical Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.14541, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yuhao Chen, Qianqian Yang 0004, Zhiguo Shi 0001, Jiming Chen 0001 |
The Model Inversion Eavesdropping Attack in Semantic Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.04304, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Md. Mijanur Rahman, A. S. M. Badrudduza, Noor Ahmad Sarker, Md. Ibrahim, Imran Shafique Ansari |
RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.04314, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 897 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|