Seguir
Song Fang
Título
Citado por
Citado por
Año
Wireless communications under broadband reactive jamming attacks
S Fang, Y Liu, P Ning
IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015
822015
No training hurdles: Fast training-agnostic attacks to infer your typing
S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
422018
Where are you from? Confusing location distinction using virtual multipath camouflage
S Fang, Y Liu, W Shen, H Zhu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
362014
Mimicry attacks against wireless link signature and new defense using time-synched link signature
S Fang, Y Liu, P Ning
IEEE Transactions on Information Forensics and Security 11 (7), 1515-1527, 2016
312016
Virtual multipath attack and defense for location distinction in wireless networks
S Fang, Y Liu, W Shen, H Zhu, T Wang
IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016
262016
Motioncompass: pinpointing wireless camera via motion-activated traffic
Y He, Q He, S Fang, Y Liu
Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021
152021
Wireless-assisted key establishment leveraging channel manipulation
S Fang, I Markwood, Y Liu
IEEE Transactions on Mobile Computing 20 (1), 263-275, 2019
102019
Manipulatable wireless key establishment
S Fang, I Markwood, Y Liu
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
102017
Signal entanglement based pinpoint waveforming for location-restricted service access control
T Wang, Y Liu, T Hou, Q Pei, S Fang
IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016
102016
Entrapment for wireless eavesdroppers
S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019
92019
Wireless training-free keystroke inference attack and defense
E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022
82022
Commandergabble: A universal attack against asr systems leveraging fast speech
Z Zhang, E Yang, S Fang
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
72021
A novel two-timer-based broadcast routing algorithm for vehicular ad-hoc networks
S Fang, T Luo
2013 IEEE International Conference on Green Computing and Communications and …, 2013
72013
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis
E Yang, Q He, S Fang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
62022
Proactive anti-eavesdropping with trap deployment in wireless networks
Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022
52022
Virtual Step PIN Pad: Towards Foot-input Authentication Using Geophones
Y He, H Zhang, E Yang, S Fang
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
32020
A forwarding acknowledgement based multi-hop broadcast algorithm in vehicular ad hoc networks
R Liu, T Luo, L Zhang, J Li, S Fang
Proceedings of 2012 2nd International Conference on Computer Science and …, 2012
32012
DASK: Driving-assisted secret key establishment
E Yang, S Fang, D Shen
2022 IEEE Conference on Communications and Network Security (CNS), 73-81, 2022
22022
GPSKey: GPS-based secret key establishment for intra-vehicle environment
E Yang, S Fang
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022, 2022
22022
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription
Y He, Q He, S Fang, Y Liu
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20