-
1
-
-
78751606216
-
-
Sensing and Processing Across Networks (SPAN) Lab Website 2010
-
Sensing and Processing Across Networks (SPAN) Lab Website http://span.ece.utah.edu 2010.
-
-
-
-
2
-
-
84939024947
-
A nonparametric estimation of the entropy for absolutely continuous distributions
-
May
-
I.A. Ahmad and P.E. Lin, "A Nonparametric Estimation of the Entropy for Absolutely Continuous Distributions," IEEE Trans. Information Theory, vol. 22, no. 3, pp. 372-375, May 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.3
, pp. 372-375
-
-
Ahmad, I.A.1
Lin, P.E.2
-
5
-
-
67650679773
-
Decode: Detecting co-moving wireless devices
-
G. Chandrasekaran, M. Ergin, M. Gruteser, R. Martin, J. Yang, and Y. Chen, "DECODE: Detecting Co-Moving Wireless Devices," Proc. Fifth IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '08), pp. 315-320, 2008.
-
(2008)
Proc. Fifth IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '08)
, pp. 315-320
-
-
Chandrasekaran, G.1
Ergin, M.2
Gruteser, M.3
Martin, R.4
Yang, J.5
Chen, Y.6
-
6
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
Y. Chen, W. Trappe, and R.P. Martin, "Detecting and Localizing Wireless Spoofing Attacks," Proc. IEEE Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks (SECON '07), pp. 193-202, 2007.
-
(2007)
Proc. IEEE Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks (SECON '07)
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.P.3
-
8
-
-
3543131272
-
Geodesic entropic graphs for dimension and entropy estimation in manifold learning
-
Aug.
-
J.A. Costa and A.O. Hero III, "Geodesic Entropic Graphs for Dimension and Entropy Estimation in Manifold Learning," IEEE Trans. Signal Processing, vol. 52, no. 8, pp. 2210-2221, Aug. 2004.
-
(2004)
IEEE Trans. Signal Processing
, vol.52
, Issue.8
, pp. 2210-2221
-
-
Costa, J.A.1
Hero Iii, A.O.2
-
10
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
Feb.
-
D.E. Denning and P.F. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Computer Fraud and Security, pp. 12-16, Feb. 1996.
-
(1996)
Computer Fraud and Security
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
13
-
-
34247324807
-
Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints
-
Sept.
-
D.B. Faria and D.R. Cheriton, "Radio-Layer Security: Detecting Identity-Based Attacks in Wireless Networks Using Signalprints," Proc. Workshop Wireless Security (WiSe '06), pp. 43-52, Sept. 2006.
-
(2006)
Proc. Workshop Wireless Security (WiSe '06)
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
14
-
-
57349141867
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, "Improving Wireless Privacy with an Identifier-Free Link Layer Protocol," Proc. ACM MobiSys, pp. 40-53, 2008.
-
(2008)
Proc. ACM MobiSys
, pp. 40-53
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
15
-
-
23944520444
-
Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald, "Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005.
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
16
-
-
37749028708
-
-
US Patent 5,844,482,Dec.
-
W.E. Guthrie, J. Joseph, and F. Pappadia, "Tagging System Using Motion Detector," US Patent 5 844 482, Dec. 1998.
-
(1998)
Tagging System Using Motion Detector
-
-
Guthrie, W.E.1
Joseph, J.2
Pappadia, F.3
-
17
-
-
0027627694
-
The indoor radio propagation channel
-
July.
-
H. Hashemi, "The Indoor Radio Propagation Channel," Proc. IEEE, vol. 81, no. 7, pp. 943-968, July. 1993.
-
(1993)
Proc. IEEE
, vol.81
, Issue.7
, pp. 943-968
-
-
Hashemi, H.1
-
19
-
-
0000466122
-
Survey on independent component analysis
-
A. Hyvärinen, "Survey on Independent Component Analysis," Neural Computing Surveys, vol. 2, pp. 94-128, 1999.
-
(1999)
Neural Computing Surveys
, vol.2
, pp. 94-128
-
-
Hyvärinen, A.1
-
21
-
-
27544460278
-
Remote physical device fingerprinting
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
T. Kohno, A. Broido, and K.C. Claffy, "Remote Physical Device Fingerprinting," Proc. IEEE Symp. Security and Privacy, pp. 211-225, 2005. (Pubitemid 41543657)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
22
-
-
0023325560
-
Sample estimate of the entropy of a random vector
-
L. Kozachenko and N.N. Leonenko, "Sample Estimate of the Entropy of a Random Vector," Problems of Information Transmission, vol. 23, no. 2, pp. 95-101, 1987.
-
(1987)
Problems of Information Transmission
, vol.23
, Issue.2
, pp. 95-101
-
-
Kozachenko, L.1
Leonenko, N.N.2
-
23
-
-
0035415421
-
Joint symbol timing and channel estimation for OFDM based WLANs
-
DOI 10.1109/4234.940980, PII S1089779801076670
-
E.G. Larsson, G. Liu, J. Li, and G.B. Giannakis, "Joint Symbol Timing and Channel Estimation for OFDM Based WLANs," IEEE Comm. Letters, vol. 5, no. 8, pp. 325-327, Aug. 2001. (Pubitemid 32949940)
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.8
, pp. 325-327
-
-
Larsson, E.G.1
Liu, G.2
Li, J.3
Giannakis, G.B.4
-
25
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Sept.
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing Wireless Systems via Lower Layer Enforcements," Proc. ACM Workshop Wireless Security (WiSe '06), pp. 33-42, Sept. 2006.
-
(2006)
Proc. ACM Workshop Wireless Security (WiSe '06)
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
26
-
-
0028424962
-
Motion tracking with an active camera
-
May
-
D. Murray and A. Basu, "Motion Tracking with an Active Camera," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 16, no. 5, pp. 449-459, May 1994.
-
(1994)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.16
, Issue.5
, pp. 449-459
-
-
Murray, D.1
Basu, A.2
-
28
-
-
0042665374
-
Relative location estimation in wireless sensor networks
-
Aug.
-
N. Patwari, A.O. Hero III, M. Perkins, N. Correal, and R.J. O'Dea, "Relative Location Estimation in Wireless Sensor Networks," IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2137-2148, Aug. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.8
, pp. 2137-2148
-
-
Patwari, N.1
Hero Iii, A.O.2
Perkins, M.3
Correal, N.4
O'Dea, R.J.5
-
29
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
Sept.
-
N. Patwari and S.K. Kasera, "Robust Location Distinction Using Temporal Link Signatures," Proc. ACM MobiCom, Sept. 2007.
-
(2007)
Proc. ACM MobiCom
-
-
Patwari, N.1
Kasera, S.K.2
-
31
-
-
33646726919
-
New 802.11h mechanisms can reduce power consumption
-
Mar./Apr.
-
D. Qiao and S. Choi, "New 802.11h Mechanisms Can Reduce Power Consumption," IEEE IT Professional, vol. 8, no. 2. pp. 43-48, Mar./Apr. 2006.
-
(2006)
IEEE IT Professional
, vol.8
, Issue.2
, pp. 43-48
-
-
Qiao, D.1
Choi, S.2
-
32
-
-
0034229951
-
Picoradio supports Ad Hoc ultra-low power wireless networking
-
July
-
J.M. Rabaey, M.J. Ammer, J.L. da Silva Jr., D. Patel, and S. Roundy, "Picoradio Supports Ad Hoc Ultra-Low Power Wireless Networking," IEEE Computer, vol. 33, no. 7, pp. 42-48, July 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.7
, pp. 42-48
-
-
Rabaey, J.M.1
Ammer, M.J.2
Da Silva Jr., J.L.3
Patel, D.4
Roundy, S.5
-
34
-
-
25444493656
-
Rfid-based techniques for human-activity detection
-
J.R. Smith, K.P. Fishkin, B. Jiang, A. Mamishev, M. Philipose, A.D. Rea, S. Roy, and K. Sundara-Rajan, "RFID-Based Techniques for Human-Activity Detection," Comm. ACM, vol. 48, no. 9, pp. 39-44, 2005.
-
(2005)
Comm. ACM
, vol.48
, Issue.9
, pp. 39-44
-
-
Smith, J.R.1
Fishkin, K.P.2
Jiang, B.3
Mamishev, A.4
Philipose, M.5
Rea, A.D.6
Roy, S.7
Sundara-Rajan, K.8
-
36
-
-
0030818931
-
Blind multiuser channel estimation in asynchronous cdma systems
-
Jan.
-
M. Torlak and G. Xu, "Blind Multiuser Channel Estimation in Asynchronous CDMA Systems," IEEE Trans. Signal Processing, vol. 45, no. 1, pp. 137-147, Jan. 1997.
-
(1997)
IEEE Trans. Signal Processing
, vol.45
, Issue.1
, pp. 137-147
-
-
Torlak, M.1
Xu, G.2
-
37
-
-
22944483445
-
Edgeworth approximation of multivariate differential entropy
-
M.M. Van Hulle, "Edgeworth Approximation of Multivariate Differential Entropy," Neural Computation, vol. 17, no. 9, pp. 1903-1910, 2005.
-
(2005)
Neural Computation
, vol.17
, Issue.9
, pp. 1903-1910
-
-
Van Hulle, M.M.1
-
39
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
June
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication," Proc. IEEE Int'l Conf. Comm. (ICC '07), pp. 4646-4651, June 2007.
-
(2007)
Proc. IEEE Int'l Conf. Comm. (ICC '07)
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
40
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
May
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," Proc. IEEE Int'l Conf. Comm. (ICC '08), pp. 1520-1524, May 2008.
-
(2008)
Proc. IEEE Int'l Conf. Comm. (ICC '08)
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
41
-
-
51849152971
-
Mimo-assisted channel-based authentication in wireless networks
-
Mar.
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "MIMO-Assisted Channel-Based Authentication in Wireless Networks," Proc. Conf. Information Sciences and Systems (CISS '08), pp. 642-646, Mar. 2008.
-
(2008)
Proc. Conf. Information Sciences and Systems (CISS '08)
, pp. 642-646
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
42
-
-
48149115694
-
Using the physical layer for wireless authentication in stime-variant channels
-
July
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in sTime-Variant Channels," IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Comm.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
|