Æȷοì
Paul L Yu
Paul L Yu
Army Research Office/Army Research Laboratory
army.milÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Physical-layer authentication
PL Yu, JS Baras, BM Sadler
IEEE Transactions on Information Forensics and Security 3 (1), 38-51, 2008
2872008
Wireless physical layer authentication via fingerprint embedding
PL Yu, G Verma, BM Sadler
IEEE Communications Magazine 53 (6), 48-53, 2015
882015
Physical layer authentication via fingerprint embedding using software-defined radios
G Verma, P Yu, BM Sadler
IEEE access 3, 81-88, 2015
722015
MIMO authentication via deliberate fingerprinting at the physical layer
PL Yu, BM Sadler
IEEE Transactions on Information Forensics and Security 6 (3), 606-615, 2011
722011
RSS gradient-assisted frontier exploration and radio source localization
JN Twigg, JR Fink, PL Yu, BM Sadler
2012 IEEE International Conference on Robotics and Automation, 889-895, 2012
702012
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
D Wang, A Neupane, Z Qian, NB Abu-Ghazaleh, SV Krishnamurthy, ...
NDSS, 2019
482019
Short-range low-VHF channel characterization in cluttered environments
FT Dagefu, G Verma, CR Rao, PL Yu, JR Fink, BM Sadler, K Sarabandi
IEEE Transactions on Antennas and Propagation 63 (6), 2719-2727, 2015
472015
Cryptographic side-channel signaling and authentication via fingerprint embedding
JB Perazzone, PL Yu, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 13 (9), 2216-2225, 2018
432018
Multicarrier authentication at the physical layer
PL Yu, JS Baras, BM Sadler
2008 International Symposium on a World of Wireless, Mobile and Multimedia ¡¦, 2008
392008
Artificial noise-aided MIMO physical layer authentication with imperfect CSI
JB Perazzone, LY Paul, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 16, 2173-2185, 2021
332021
Fisher information-based experiment design for network tomography
T He, C Liu, A Swami, D Towsley, T Salonidis, AI Bejan, P Yu
ACM SIGMETRICS Performance Evaluation Review 43 (1), 389-402, 2015
292015
Wireless communication method and system for transmission authentication at the physical layer
JS Baras, PL Yu, BM Sadler
US Patent App. 12/676,689, 2010
262010
Efficient base station connectivity area discovery
JN Twigg, JR Fink, PL Yu, BM Sadler
The International Journal of Robotics Research 32 (12), 1398-1410, 2013
242013
Employing attack graphs for intrusion detection
F Capobianco, R George, K Huang, T Jaeger, S Krishnamurthy, Z Qian, ...
Proceedings of the new security paradigms workshop, 16-30, 2019
202019
Jaal: Towards network intrusion detection at isp scale
A Aqil, K Khalil, AOF Atya, EE Papalexakis, SV Krishnamurthy, T Jaeger, ...
Proceedings of the 13th international conference on emerging networking ¡¦, 2017
202017
Graph filters and the Z-Laplacian
X Yan, BM Sadler, RJ Drost, PL Yu, K Lerman
IEEE Journal of Selected Topics in Signal Processing 11 (6), 774-784, 2017
182017
Principled unearthing of tcp side channel vulnerabilities
Y Cao, Z Wang, Z Qian, C Song, SV Krishnamurthy, P Yu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications ¡¦, 2019
162019
Radio signal strength tracking and control for robotic networks
PL Yu, JN Twigg, BM Sadler
Micro-and Nanotechnology Sensors, Systems, and Applications III 8031, 803116, 2011
162011
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel
Y Zhai, Y Hao, H Zhang, D Wang, C Song, Z Qian, M Lesani, ...
Proceedings of the 28th ACM Joint Meeting on European Software Engineering ¡¦, 2020
152020
Keyless authentication in the presence of a simultaneously transmitting adversary
E Graves, P Yu, P Spasojevic
2016 IEEE Information Theory Workshop (ITW), 201-205, 2016
152016
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20