Paul L Yu
Paul L Yu
Verified email at mail.mil
Title
Cited by
Cited by
Year
Physical-layer authentication
PL Yu, JS Baras, BM Sadler
IEEE Transactions on Information Forensics and Security 3 (1), 38-51, 2008
2292008
RSS gradient-assisted frontier exploration and radio source localization
JN Twigg, JR Fink, PL Yu, BM Sadler
2012 IEEE International Conference on Robotics and Automation, 889-895, 2012
622012
Wireless physical layer authentication via fingerprint embedding
PL Yu, G Verma, BM Sadler
IEEE Communications Magazine 53 (6), 48-53, 2015
552015
Physical layer authentication via fingerprint embedding using software-defined radios
G Verma, P Yu, BM Sadler
IEEE Access 3, 81-88, 2015
532015
MIMO authentication via deliberate fingerprinting at the physical layer
PL Yu, BM Sadler
IEEE Transactions on Information Forensics and Security 6 (3), 606-615, 2011
472011
Short-range low-VHF channel characterization in cluttered environments
FT Dagefu, G Verma, CR Rao, PL Yu, JR Fink, BM Sadler, K Sarabandi
IEEE Transactions on Antennas and Propagation 63 (6), 2719-2727, 2015
402015
Multicarrier authentication at the physical layer
PL Yu, JS Baras, BM Sadler
2008 International Symposium on a World of Wireless, Mobile and Multimedia …, 2008
352008
Efficient base station connectivity area discovery
JN Twigg, JR Fink, PL Yu, BM Sadler
The International Journal of Robotics Research 32 (12), 1398-1410, 2013
232013
Cryptographic side-channel signaling and authentication via fingerprint embedding
JB Perazzone, PL Yu, BM Sadler, RS Blum
IEEE Transactions on Information Forensics and Security 13 (9), 2216-2225, 2018
212018
Wireless communication method and system for transmission authentication at the physical layer
JS Baras, PL Yu, BM Sadler
US Patent App. 12/676,689, 2010
202010
Fisher information-based experiment design for network tomography
T He, C Liu, A Swami, D Towsley, T Salonidis, AI Bejan, P Yu
ACM SIGMETRICS Performance Evaluation Review 43 (1), 389-402, 2015
192015
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
D Wang, A Neupane, Z Qian, NB Abu-Ghazaleh, SV Krishnamurthy, ...
NDSS, 2019
182019
Securing the communication of medical information using local biometric authentication and commercial wireless links
VI Ivanov, PL Yu, JS Baras
Health informatics journal 16 (3), 211-223, 2010
162010
Radio signal strength tracking and control for robotic networks
PL Yu, JN Twigg, BM Sadler
Micro-and Nanotechnology Sensors, Systems, and Applications III 8031, 803116, 2011
152011
Jaal: Towards network intrusion detection at isp scale
A Aqil, K Khalil, AOF Atya, EE Papalexakis, SV Krishnamurthy, T Jaeger, ...
Proceedings of the 13th international conference on emerging networking …, 2017
122017
Graph filters and the Z-Laplacian
X Yan, BM Sadler, RJ Drost, PL Yu, K Lerman
IEEE Journal of Selected Topics in Signal Processing 11 (6), 774-784, 2017
122017
Inner bound for the capacity region of noisy channels with an authentication requirement
J Perazzone, E Graves, P Yu, R Blum
2018 IEEE International Symposium on Information Theory (ISIT), 126-130, 2018
102018
Keyless authentication in the presence of a simultaneously transmitting adversary
E Graves, P Yu, P Spasojevic
2016 IEEE Information Theory Workshop (ITW), 201-205, 2016
102016
Power allocation tradeoffs in multicarrier authentication systems
PL Yu, JS Baras, BM Sadler
2009 IEEE Sarnoff Symposium, 1-5, 2009
102009
Multicast vs. unicast for loss tomography on tree topologies
C Liu, T He, A Swami, D Towsley, T Salonidis, AI Bejan, P Yu
MILCOM 2015-2015 IEEE Military Communications Conference, 312-317, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20