Follow
Yao Liu
Yao Liu
Associate Professor of Computer Science, University of South Florida
Verified email at cse.usf.edu - Homepage
Title
Cited by
Cited by
Year
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
31002011
Detection of faults and attacks including false data injection attack in smart grid using Kalman filter
K Manandhar, X Cao, F Hu, Y Liu
IEEE transactions on control of network systems 1 (4), 370-379, 2014
5652014
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
Y Liu, P Ning, H Dai, A Liu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
2432010
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
Y Liu, P Ning, H Dai
2010 IEEE symposium on security and privacy, 286-301, 2010
2122010
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1702016
NSDMiner: Automated discovery of network service dependencies
A Natarajan, P Ning, Y Liu, S Jajodia, SE Hutchinson
2012 Proceedings IEEE INFOCOM, 2507-2515, 2012
1532012
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
Z Gao, H Zhu, Y Liu, M Li, Z Cao
2013 Proceedings IEEE INFOCOM, 2751-2759, 2013
1382013
Survey on channel reciprocity based key establishment techniques for wireless systems
T Wang, Y Liu, AV Vasilakos
Wireless Networks 21 (6), 1835-1846, 2015
1042015
Wireless communications under broadband reactive jamming attacks
S Fang, Y Liu, P Ning
IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015
722015
Wivo: Enhancing the security of voice control system via wireless signal in iot environment
Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu
Proceedings of the eighteenth ACM international symposium on mobile ad hoc …, 2018
602018
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing
H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen
IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016
592016
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure
A Liu, P Ning, H Dai, Y Liu
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010
552010
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
A Liu, P Ning, H Dai, Y Liu, C Wang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
542010
Secret key establishment via RSS trajectory matching between wearable devices
Z Li, Q Pei, I Markwood, Y Liu, H Zhu
IEEE Transactions on Information Forensics and security 13 (3), 802-817, 2017
462017
Combating false data injection attacks in smart grid using kalman filter
K Manandhar, X Cao, F Hu, Y Liu
2014 International Conference on Computing, Networking and Communications …, 2014
442014
BitTrickle: Defending against broadband and high-power reactive jamming attacks
Y Liu, P Ning
2012 Proceedings IEEE INFOCOM, 909-917, 2012
432012
Enhanced wireless channel authentication using time-synched link signature
Y Liu, P Ning
2012 Proceedings IEEE INFOCOM, 2636-2640, 2012
392012
Measurement and analysis of an internet streaming service to mobile devices
Y Liu, F Li, L Guo, B Shen, S Chen, Y Lan
IEEE Transactions on Parallel and Distributed Systems 24 (11), 2240-2250, 2012
332012
Where are you from? Confusing location distinction using virtual multipath camouflage
S Fang, Y Liu, W Shen, H Zhu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
292014
A relay-aided device-to-device-based load balancing scheme for multitier heterogeneous networks
F Jiang, Y Liu, B Wang, X Wang
IEEE Internet of Things Journal 4 (5), 1537-1551, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20