Follow
Wade Trappe
Wade Trappe
Professor, Electrical and Computer Engineering, WINLAB, Rutgers University
Verified email at winlab.rutgers.edu
Title
Cited by
Cited by
Year
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
17122005
Introduction to cryptography with coding theory
W Trappe
Pearson Education India, 2006
12112006
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
9032008
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
8302006
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS …, 2005
7802005
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
6432005
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
6082010
Parknet: drive-by sensing of road-side parking statistics
S Mathur, T Jin, N Kasturirangan, J Chandrasekaran, W Xue, M Gruteser, ...
Proceedings of the 8th international conference on Mobile systems …, 2010
5912010
Anti-collusion fingerprinting for multimedia
W Trappe, M Wu, ZJ Wang, KJR Liu
IEEE transactions on signal processing 51 (4), 1069-1087, 2003
5752003
Detecting and localizing wireless spoofing attacks
Y Chen, W Trappe, RP Martin
2007 4th Annual IEEE Communications Society Conference on sensor, mesh and …, 2007
5572007
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor …, 2004
5382004
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
4942010
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
4892004
Using the physical layer for wireless authentication in time-variant channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008
4382008
Optimum co-design for spectrum sharing between matrix completion based MIMO radars and a MIMO communication system
B Li, AP Petropulu, W Trappe
IEEE Transactions on Signal Processing 64 (17), 4562-4575, 2016
3482016
Securing wireless communications at the physical layer
R Liu
Springer, 2010
3262010
Low-energy security: Limits and opportunities in the internet of things
W Trappe, R Howard, RS Moore
IEEE Security & Privacy 13 (1), 14-21, 2015
3172015
Fingerprints in the ether: Using the physical layer for wireless authentication
L Xiao, L Greenstein, N Mandayam, W Trappe
2007 IEEE International conference on communications, 4646-4651, 2007
3102007
Collusion-resistant fingerprinting for multimedia
M Wu, W Trappe, ZJ Wang, KJR Liu
IEEE Signal Processing Magazine 21 (2), 15-27, 2004
3102004
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing …, 2013
2992013
The system can't perform the operation now. Try again later.
Articles 1–20