Web phishing detection using a deep learning framework P Yi, Y Guan, F Zou, Y Yao, W Wang, T Zhu Wireless Communications and Mobile Computing 2018, 2018 | 128 | 2018 |
Leveraging ambient lte traffic for ubiquitous passive communication Z Chi, X Liu, W Wang, Y Yao, T Zhu Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 81 | 2020 |
{VMscatter}: A versatile {MIMO} backscatter X Liu, Z Chi, W Wang, Y Yao, T Zhu 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020 | 62 | 2020 |
Ect: Exploiting cross-technology concurrent transmission for reducing packet delivery delay in iot networks W Wang, T Xie, X Liu, T Zhu IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 369-377, 2018 | 48 | 2018 |
Crf: Coexistent routing and flooding using wifi packets in heterogeneous iot networks W Wang, X Liu, Y Yao, Y Pan, Z Chi, T Zhu IEEE INFOCOM 2019-IEEE conference on computer communications, 19-27, 2019 | 46 | 2019 |
Verification and redesign of {OFDM} backscatter X Liu, Z Chi, W Wang, Y Yao, P Hao, T Zhu 18th USENIX symposium on networked systems design and implementation (NSDI …, 2021 | 44 | 2021 |
GENPass: A multi-source deep learning model for password guessing Z Xia, P Yi, Y Liu, B Jiang, W Wang, T Zhu IEEE Transactions on Multimedia 22 (5), 1323-1332, 2019 | 43 | 2019 |
GENPass: A general deep learning model for password guessing with PCFG rules and adversarial generation Y Liu, Z Xia, P Yi, Y Yao, T Xie, W Wang, T Zhu 2018 IEEE International Conference on Communications (ICC), 1-6, 2018 | 43 | 2018 |
I can see the light: Attacks on autonomous vehicles using invisible lights W Wang, Y Yao, X Liu, X Li, P Hao, T Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 40 | 2021 |
EAR: Exploiting uncontrollable ambient RF signals in heterogeneous networks for gesture recognition Z Chi, Y Yao, T Xie, X Liu, Z Huang, W Wang, T Zhu Proceedings of the 16th ACM conference on embedded networked sensor systems …, 2018 | 40 | 2018 |
Aegis: An interference-negligible RF sensing shield Y Yao, Y Li, X Liu, Z Chi, W Wang, T Xie, T Zhu IEEE INFOCOM 2018-IEEE conference on computer communications, 1718-1726, 2018 | 29 | 2018 |
Detecting Adversarial Examples in Deep Neural Networks using Normalizing Filters. S Gu, P Yi, T Zhu, Y Yao, W Wang ICAART (2), 164-173, 2019 | 26 | 2019 |
Countering cross-technology jamming attack Z Chi, Y Li, X Liu, W Wang, Y Yao, T Zhu, Y Zhang Proceedings of the 13th ACM conference on security and privacy in wireless …, 2020 | 22 | 2020 |
Charge station placement in electric vehicle energy distribution network J Xu, P Yi, T Xie, W Wang, X Liu, T Zhu 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 14 | 2017 |
CCID: Cross-Correlation identity distinction method for detecting shrew DDoS C Huang, P Yi, F Zou, Y Yao, W Wang, T Zhu Wireless Communications and Mobile Computing 2019, 2019 | 13 | 2019 |
Exploiting WiFi AP for Simultaneous Data Dissemination among WiFi and ZigBee Devices W Wang, X Liu, Y Yao, T Zhu The 29th IEEE International Conference on Network Protocols, 2021 | 11 | 2021 |
Machine learning and artificial intelligence in next-generation wireless network W Iqbal, W Wang, T Zhu arXiv preprint arXiv:2202.01690, 2021 | 10 | 2021 |
A power storage station placement algorithm for power distribution based on electric vehicle J Xu, P Yi, W Wang, T Zhu International Journal of Distributed Sensor Networks 13 (2), 1550147717694169, 2017 | 10 | 2017 |
ECT: Exploiting cross-technology transmission for reducing packet delivery delay in IoT networks W Wang, T Xie, X Liu, Y Yao, T Zhu ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-28, 2019 | 9 | 2019 |
Optimization for charge station placement in electric vehicles energy network Y Sui, P Yi, X Liu, W Wang, T Zhu Proceedings of the Workshop on Smart Internet of Things, 1-6, 2017 | 9 | 2017 |