Works (7)

Updated: July 5th, 2023 15:47

2012 conference paper

BitTrickle: Defending against broadband and high-power reactive jamming attacks

2012 Proceedings IEEE infocom, 909–917.

By: Y. Liu n & P. Ning n

TL;DR: BitTrickle is proposed, an anti-jamming wireless communication scheme that allows communication in the presence of a broadband and high power reactive jammer by exploiting the reaction time of the jammer. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Enhanced wireless channel authentication using time-synched link signature

2012 Proceedings IEEE infocom, 2636–2640.

By: Y. Liu n & P. Ning n

TL;DR: A novel construction for wireless link signature is proposed, called time-synched link signature, by integrating cryptographic protection and time factor into traditional wireless link signatures, to defend against the mimicry attack. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

NSDMiner: Automated discovery of network service dependencies

2012 Proceedings IEEE infocom, 2507–2515.

By: A. Natarajan n, P. Ning n, Y. Liu n, S. Jajodia* & S. Hutchinson*

TL;DR: This paper proposes a suite of novel techniques and develops a new tool named NSDMiner (which stands for Mining for Network Service Dependencies) to automatically discover the dependencies between network services from passively collected network traffic, which outperforms the two best existing solutions significantly. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2011 article

False Data Injection Attacks against State Estimation in Electric Power Grids

Liu, Y., Ning, P., & Reiter, M. K. (2011, May). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 14.

By: Y. Liu n, P. Ning n & M. Reiter*

author keywords: Algorithms; Security; Power grids; state estimation; attack
TL;DR: This article presents and analyzes a new class of attacks, called false data injection attacks, against state estimation in electric power grids, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2010 article

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.

By: Y. Liu n, P. Ning n & H. Dai n

author keywords: cognitive radio networks; primary user detection; link signatures
TL;DR: A novel physical layer authentication technique that enables the helper node to authenticate signals from its associated primary user, and thus does not require any training process is developed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

Randomized differential DSSS: Jamming-resistant wireless broadcast communication

2010 proceedings ieee infocom.

By: Y. Liu n, P. Ning n, H. Dai n & A. Liu n

TL;DR: A Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys that uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

False data injection attacks against state estimation in electric power grids

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.

By: Y. Liu n, P. Ning n & M. Reiter*

TL;DR: A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.