Wenyuan Xu
Wenyuan Xu
Professor, IEEE Fellow, Zhejiang University, College of EE
Verified email at
Cited by
Cited by
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
Dolphinattack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Jamming sensor networks: attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE network 20 (3), 41-47, 2006
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle
C Yan, W Xu, J Liu
Def Con 24 (8), 109, 2016
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi
NDSS 14, 23-26, 2014
WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks
T Trippel, O Weisse, W Xu, P Honeyman, K Fu
2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017
Channel surfing: defending wireless sensor networks from interference
W Xu, W Trappe, Y Zhang
Proceedings of the 6th international conference on Information processing in …, 2007
Securing wireless systems via lower layer enforcements
Z Li, W Xu, R Miller, W Trappe
Proceedings of the 5th ACM workshop on Wireless security, 33-42, 2006
{WattsUpDoc}: Power side channels to nonintrusively discover untargeted malware on embedded medical devices
SS Clark, B Ransford, A Rahmati, S Guineau, J Sorber, W Xu, K Fu
2013 USENIX Workshop on Health Information Technologies (HealthTech 13), 2013
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
Anti-jamming timing channels for wireless networks
W Xu, W Trappe, Y Zhang
Proceedings of the first ACM conference on Wireless network security, 203-213, 2008
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
A {Large-Scale} Empirical Analysis of Chinese Web Passwords
Z Li, W Han, W Xu
23rd USENIX Security Symposium (USENIX Security 14), 559-574, 2014
KinWrite: Handwriting-Based Authentication Using Kinect.
J Tian, C Qu, W Xu, S Wang
NDSS 93, 94, 2013
Temporal privacy in wireless sensor networks
P Kamat, W Xu, W Trappe, Y Zhang
27th International Conference on Distributed Computing Systems (ICDCS'07), 23-23, 2007
Localizing jammers in wireless networks
H Liu, X Wenyuan, Y Chen, Z Liu
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
Risks of trusting the physics of sensors
K Fu, W Xu
Communications of the ACM 61 (2), 20-23, 2018
The system can't perform the operation now. Try again later.
Articles 1–20