Works (5)

Updated: July 5th, 2023 15:43

2017 journal article

Virtual multipath attack and defense for location distinction in wireless networks

IEEE Transactions on Mobile Computing, 16(2), 566–580.

By: S. Fang, Y. Liu, W. Shen, H. Zhu & T. Wang

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Toward Proper Guard Zones for Link Signature

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.

By: X. He n, H. Dai n, W. Shen n, P. Ning n & R. Dutta n

author keywords: Link signature; channel correlation model; guard zone; physical-layer security
TL;DR: Various well-established channel correlation models are investigated and a set of important physical factors that have significant influence on LS security are identified, and with the obtained insights, extensive simulations are conducted to explore suitable guard zone sizes for LS in several typical indoor and outdoor environments. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen n, Y. Liu*, X. He n, H. Dai n & P. Ning n

TL;DR: Fast friendly jamming is proposed, which eliminates the need for demodulation and enables the friendly jammer to verify the received signals directly on the physical layer and achieve the accurate distinction between allies' and enemies' transmissions. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

An Open Source Web-Mapping System for Tourism Planning and Marketing

Journal of Travel & Tourism Marketing, 31(7), 835–853.

By: S. Supak*, H. Devine*, G. Brothers*, S. Rozier Rich & W. Shen*

author keywords: Tourism marketing; Geographic Information System (GIS); open source; web delivery
TL;DR: This study develops a decision support tool for tourism planning and marketing that is customized and easy to use, employs open source software to reduce expense, and allows for broad accessibility via web delivery. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, Crossref
Added: August 6, 2018

2013 article

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.

By: W. Shen*, P. Ning*, X. He* & H. Dai*

author keywords: Wireless; friendly jamming; interference cancellation
TL;DR: Both the analytical and experimental results indicate that the proposed techniques can effectively disable enemy wireless communication and at the same time maintain wireless communication between authorized devices. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.