Paul L Yu
Paul L Yu
Verified email at mail.mil
Title
Cited by
Cited by
Year
Physical-layer authentication
PL Yu, JS Baras, BM Sadler
IEEE Transactions on Information Forensics and Security 3 (1), 38-51, 2008
2282008
RSS gradient-assisted frontier exploration and radio source localization
JN Twigg, JR Fink, PL Yu, BM Sadler
2012 IEEE International Conference on Robotics and Automation, 889-895, 2012
582012
Wireless physical layer authentication via fingerprint embedding
PL Yu, G Verma, BM Sadler
IEEE Communications Magazine 53 (6), 48-53, 2015
522015
Physical layer authentication via fingerprint embedding using software-defined radios
G Verma, P Yu, BM Sadler
IEEE Access 3, 81-88, 2015
512015
MIMO authentication via deliberate fingerprinting at the physical layer
PL Yu, BM Sadler
IEEE Transactions on Information Forensics and Security 6 (3), 606-615, 2011
452011
Short-range low-VHF channel characterization in cluttered environments
FT Dagefu, G Verma, CR Rao, PL Yu, JR Fink, BM Sadler, K Sarabandi
IEEE Transactions on Antennas and Propagation 63 (6), 2719-2727, 2015
392015
Multicarrier authentication at the physical layer
PL Yu, JS Baras, BM Sadler
2008 International Symposium on a World of Wireless, Mobile and Multimedia …, 2008
342008
Efficient base station connectivity area discovery
JN Twigg, JR Fink, PL Yu, BM Sadler
The International Journal of Robotics Research 32 (12), 1398-1410, 2013
222013
Cryptographic side-channel signaling and authentication via fingerprint embedding
JB Perazzone, PL Yu, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 13 (9), 2216-2225, 2018
202018
Wireless communication method and system for transmission authentication at the physical layer
JS Baras, PL Yu, BM Sadler
US Patent App. 12/676,689, 2010
202010
Fisher information-based experiment design for network tomography
T He, C Liu, A Swami, D Towsley, T Salonidis, AI Bejan, P Yu
ACM SIGMETRICS Performance Evaluation Review 43 (1), 389-402, 2015
182015
Securing the communication of medical information using local biometric authentication and commercial wireless links
VI Ivanov, PL Yu, JS Baras
Health informatics journal 16 (3), 211-223, 2010
152010
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
D Wang, A Neupane, Z Qian, NB Abu-Ghazaleh, SV Krishnamurthy, ...
NDSS, 2019
142019
Radio signal strength tracking and control for robotic networks
PL Yu, JN Twigg, BM Sadler
Micro-and Nanotechnology Sensors, Systems, and Applications III 8031, 803116, 2011
142011
Jaal: Towards network intrusion detection at isp scale
A Aqil, K Khalil, AOF Atya, EE Papalexakis, SV Krishnamurthy, T Jaeger, ...
Proceedings of the 13th international conference on emerging networking …, 2017
112017
Graph filters and the Z-Laplacian
X Yan, BM Sadler, RJ Drost, PL Yu, K Lerman
IEEE Journal of Selected Topics in Signal Processing 11 (6), 774-784, 2017
112017
Inner bound for the capacity region of noisy channels with an authentication requirement
J Perazzone, E Graves, P Yu, R Blum
2018 IEEE International Symposium on Information Theory (ISIT), 126-130, 2018
102018
Power allocation tradeoffs in multicarrier authentication systems
PL Yu, JS Baras, BM Sadler
2009 IEEE Sarnoff Symposium, 1-5, 2009
102009
Keyless authentication in the presence of a simultaneously transmitting adversary
E Graves, P Yu, P Spasojevic
2016 IEEE Information Theory Workshop (ITW), 201-205, 2016
92016
Received signal strength gradient estimation for mobile networks
PL Yu, BM Sadler
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 519-523, 2010
92010
The system can't perform the operation now. Try again later.
Articles 1–20