Wireless communications under broadband reactive jamming attacks S Fang, Y Liu, P Ning IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015 | 89 | 2015 |
No training hurdles: Fast training-agnostic attacks to infer your typing S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 46 | 2018 |
Where are you from? Confusing location distinction using virtual multipath camouflage S Fang, Y Liu, W Shen, H Zhu Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 38 | 2014 |
Mimicry attacks against wireless link signature and new defense using time-synched link signature S Fang, Y Liu, P Ning IEEE Transactions on Information Forensics and Security 11 (7), 1515-1527, 2016 | 35 | 2016 |
Virtual multipath attack and defense for location distinction in wireless networks S Fang, Y Liu, W Shen, H Zhu, T Wang IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016 | 28 | 2016 |
Motioncompass: pinpointing wireless camera via motion-activated traffic Y He, Q He, S Fang, Y Liu Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021 | 19 | 2021 |
Manipulatable wireless key establishment S Fang, I Markwood, Y Liu 2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017 | 13 | 2017 |
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis E Yang, Q He, S Fang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 12 | 2022 |
Wireless-assisted key establishment leveraging channel manipulation S Fang, I Markwood, Y Liu IEEE Transactions on Mobile Computing 20 (1), 263-275, 2019 | 12 | 2019 |
Entrapment for wireless eavesdroppers S Fang, T Wang, Y Liu, S Zhao, Z Lu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019 | 12 | 2019 |
Signal entanglement based pinpoint waveforming for location-restricted service access control T Wang, Y Liu, T Hou, Q Pei, S Fang IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016 | 12 | 2016 |
Wireless training-free keystroke inference attack and defense E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022 | 11 | 2022 |
Proactive anti-eavesdropping with trap deployment in wireless networks Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022 | 10 | 2022 |
Commandergabble: A universal attack against asr systems leveraging fast speech Z Zhang, E Yang, S Fang Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 9 | 2021 |
A novel two-timer-based broadcast routing algorithm for vehicular ad-hoc networks S Fang, T Luo 2013 IEEE International Conference on Green Computing and Communications and …, 2013 | 7 | 2013 |
GPSKey: GPS-based secret key establishment for intra-vehicle environment E Yang, S Fang Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022, 2022 | 6 | 2022 |
Virtual Step PIN Pad: Towards Foot-input Authentication Using Geophones Y He, H Zhang, E Yang, S Fang 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020 | 5 | 2020 |
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription Y He, Q He, S Fang, Y Liu Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 4 | 2023 |
Precise Wireless Camera Localization Leveraging Traffic-aided Spatial Analysis Y He, Q He, S Fang, Y Liu IEEE Transactions on Mobile Computing, 2023 | 4 | 2023 |
DASK: Driving-assisted secret key establishment E Yang, S Fang, D Shen 2022 IEEE Conference on Communications and Network Security (CNS), 73-81, 2022 | 4 | 2022 |