Yao Liu
Yao Liu
Associate Professor of Computer Science, University of South Florida
Verified email at cse.usf.edu - Homepage
Cited by
Cited by
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
Detection of faults and attacks including false data injection attack in smart grid using Kalman filter
K Manandhar, X Cao, F Hu, Y Liu
IEEE transactions on control of network systems 1 (4), 370-379, 2014
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
Y Liu, P Ning, H Dai, A Liu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
Y Liu, P Ning, H Dai
2010 IEEE symposium on security and privacy, 286-301, 2010
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
Z Gao, H Zhu, Y Liu, M Li, Z Cao
2013 Proceedings IEEE INFOCOM, 2751-2759, 2013
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
NSDMiner: Automated discovery of network service dependencies
A Natarajan, P Ning, Y Liu, S Jajodia, SE Hutchinson
2012 Proceedings IEEE INFOCOM, 2507-2515, 2012
Survey on channel reciprocity based key establishment techniques for wireless systems
T Wang, Y Liu, AV Vasilakos
Wireless Networks 21 (6), 1835-1846, 2015
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
A Liu, P Ning, H Dai, Y Liu, C Wang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure
A Liu, P Ning, H Dai, Y Liu
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing
H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen
IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016
Wireless communications under broadband reactive jamming attacks
S Fang, Y Liu, P Ning
IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015
BitTrickle: Defending against broadband and high-power reactive jamming attacks
Y Liu, P Ning
2012 Proceedings IEEE INFOCOM, 909-917, 2012
Enhanced wireless channel authentication using time-synched link signature
Y Liu, P Ning
2012 Proceedings IEEE INFOCOM, 2636-2640, 2012
Combating false data injection attacks in smart grid using kalman filter
K Manandhar, X Cao, F Hu, Y Liu
2014 International Conference on Computing, Networking and Communications …, 2014
Measurement and analysis of an internet streaming service to mobile devices
Y Liu, F Li, L Guo, B Shen, S Chen, Y Lan
IEEE Transactions on Parallel and Distributed Systems 24 (11), 2240-2250, 2012
Zero-effort cross-domain gesture recognition with Wi-Fi
Y Zheng, Y Zhang, K Qian, G Zhang, Y Liu, C Wu, Z Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
Orientation-aware rfid tracking with centimeter-level accuracy
C Jiang, Y He, X Zheng, Y Liu
2018 17th ACM/IEEE International Conference on Information Processing in …, 2018
MindID: Person identification from brain waves through attention-based recurrent neural network
X Zhang, L Yao, SS Kanhere, Y Liu, T Gu, K Chen
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
Where are you from? Confusing location distinction using virtual multipath camouflage
S Fang, Y Liu, W Shen, H Zhu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20