Æȷοì
Wade Trappe
Wade Trappe
Professor, Electrical and Computer Engineering, WINLAB, Rutgers University
winlab.rutgers.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc ¡¦, 2005
17122005
Introduction to cryptography with coding theory
W Trappe
Pearson Education India, 2006
12112006
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and ¡¦, 2008
9032008
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
8302006
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS ¡¦, 2005
7802005
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
IPSN 2005. Fourth International Symposium on Information Processing in ¡¦, 2005
6432005
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
6082010
Parknet: drive-by sensing of road-side parking statistics
S Mathur, T Jin, N Kasturirangan, J Chandrasekaran, W Xue, M Gruteser, ...
Proceedings of the 8th international conference on Mobile systems ¡¦, 2010
5912010
Anti-collusion fingerprinting for multimedia
W Trappe, M Wu, ZJ Wang, KJR Liu
IEEE transactions on signal processing 51 (4), 1069-1087, 2003
5752003
Detecting and localizing wireless spoofing attacks
Y Chen, W Trappe, RP Martin
2007 4th Annual IEEE Communications Society Conference on sensor, mesh and ¡¦, 2007
5572007
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor ¡¦, 2004
5382004
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
4942010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
4892004
Using the physical layer for wireless authentication in time-variant channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008
4382008
Optimum co-design for spectrum sharing between matrix completion based MIMO radars and a MIMO communication system
B Li, AP Petropulu, W Trappe
IEEE Transactions on Signal Processing 64 (17), 4562-4575, 2016
3482016
Securing wireless communications at the physical layer
R Liu
Springer, 2010
3262010
Low-energy security: Limits and opportunities in the internet of things
W Trappe, R Howard, RS Moore
IEEE Security & Privacy 13 (1), 14-21, 2015
3172015
Fingerprints in the ether: Using the physical layer for wireless authentication
L Xiao, L Greenstein, N Mandayam, W Trappe
2007 IEEE International conference on communications, 4646-4651, 2007
3102007
Collusion-resistant fingerprinting for multimedia
M Wu, W Trappe, ZJ Wang, KJR Liu
IEEE Signal Processing Magazine 21 (2), 15-27, 2004
3102004
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing ¡¦, 2013
2992013
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20