default search action
Paul L. Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]William Shiao, Benjamin A. Miller, Kevin Chan, Paul L. Yu, Tina Eliassi-Rad, Evangelos E. Papalexakis:
TenGAN: adversarially generating multiplex tensor graphs. Data Min. Knowl. Discov. 38(1): 1-21 (2024) - [c34]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [c33]Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul L. Yu, Srikanth V. Krishnamurthy:
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks. USENIX Security Symposium 2024 - 2023
- [j12]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. IEEE Trans. Inf. Theory 69(1): 496-519 (2023) - 2022
- [j11]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication. IEEE Trans. Inf. Theory 68(10): 6802-6825 (2022) - [j10]Eric Graves, Jake B. Perazzone, Paul L. Yu, Rick S. Blum:
Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication. IEEE Trans. Inf. Theory 68(11): 6981-7004 (2022) - [c32]John Corcoran, Eric Graves, Bryan Dawson, Matthew Dwyer, Paul L. Yu, Kevin Chan:
Adaptive Monitoring for Analytics Placement in Tactical Networks. MILCOM 2022: 926-931 - [c31]Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu:
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel. NDSS 2022 - 2021
- [j9]Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI. IEEE Trans. Inf. Forensics Secur. 16: 2173-2185 (2021) - [c30]Nitish K. Panigrahy, Jian Li, Faheem Zafari, Don Towsley, Paul L. Yu:
A TTL-based Approach for Content Placement in Edge Networks. VALUETOOLS 2021: 1-21 - [i8]Eric Graves, Allison Beemer, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Keyless Authentication for AWGN Channels. CoRR abs/2111.06386 (2021) - 2020
- [c29]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. CNS 2020: 1-6 - [c28]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication with Mildly Myopic Adversaries. ISIT 2020: 984-989 - [c27]Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul L. Yu:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. ESEC/SIGSOFT FSE 2020: 221-232 - [i7]Eric Graves, Jake B. Perazzone, Paul L. Yu, Rick S. Blum:
Secret key authentication capacity region, Part II: typical authentication rate. CoRR abs/2001.01667 (2020) - [i6]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Secret key authentication capacity region, Part I: average authentication rate. CoRR abs/2001.01668 (2020) - [i5]Allison Beemer, Eric Graves, Jörg Kliewer, Oliver Kosut, Paul L. Yu:
Authentication Against a Myopic Adversary. CoRR abs/2001.03593 (2020)
2010 – 2019
- 2019
- [c26]Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. CCS 2019: 211-224 - [c25]Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation. CISS 2019: 1-6 - [c24]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. CNS 2019: 1-5 - [c23]Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Fingerprint Embedding Authentication with Artificial Noise: MISO Regime. CNS 2019: 1-5 - [c22]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Paul L. Yu:
Figment: Fine-grained Permission Management for Mobile Apps. INFOCOM 2019: 1405-1413 - [c21]Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Structured Coding for Authentication in the Presence of a Malicious Adversary. ISIT 2019: 617-621 - [c20]Joshua Marker, John M. Shea, Tan F. Wong, Eric Graves, Paul L. Yu:
Identifying Bottleneck Nodes using Packet Delay Statistics. MILCOM 2019: 447-452 - [c19]Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu:
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. NDSS 2019 - [c18]Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth V. Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul L. Yu:
Employing attack graphs for intrusion detection. NSPW 2019: 16-30 - [c17]Nitish K. Panigrahy, Jian Li, Faheem Zafari, Don Towsley, Paul L. Yu:
Jointly Compressing and Caching Data in Wireless Sensor Networks. SMARTCOMP 2019: 57-62 - [c16]Geng Li, Akrit Mudvari, Kerim Gokarslan, Patrick Baker, Sastry Kompella, Franck Le, Kelvin M. Marcus, Jeremy Tucker, Yang Richard Yang, Paul L. Yu:
Magnalium: Highly Reliable SDC Networks with Multiple Control Plane Composition. SMARTCOMP 2019: 93-98 - 2018
- [j8]Jake B. Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding. IEEE Trans. Inf. Forensics Secur. 13(9): 2216-2225 (2018) - [c15]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement. ISIT 2018: 126-130 - [c14]Kelvin Marcus, Kevin S. Chan, Rommie L. Hardy, Paul L. Yu:
An Environment for Tactical SDN Experimentation. MILCOM 2018: 1-9 - [i4]Jake B. Perazzone, Eric Graves, Paul L. Yu, Rick S. Blum:
Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement. CoRR abs/1801.03920 (2018) - 2017
- [j7]Xiaoran Yan, Brian M. Sadler, Robert J. Drost, Paul L. Yu, Kristina Lerman:
Graph Filters and the Z-Laplacian. IEEE J. Sel. Top. Signal Process. 11(6): 774-784 (2017) - [c13]Eric Graves, Brian Kirby, Paul L. Yu:
Messages per secret bit when authentication and a min-entropy secrecy criterion are required. CISS 2017: 1-6 - [c12]Azeem Aqil, Karim Khalil, Ahmed Osama Fathy Atya, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Trent Jaeger, K. K. Ramakrishnan, Paul L. Yu, Ananthram Swami:
Jaal: Towards Network Intrusion Detection at ISP Scale. CoNEXT 2017: 134-146 - [c11]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - [i3]Xiaoran Yan, Brian M. Sadler, Robert J. Drost, Paul L. Yu, Kristina Lerman:
Graph Filters and the Z-Laplacian. CoRR abs/1707.05851 (2017) - [i2]Nitish K. Panigrahy, Jian Li, Faheem Zafari, Don Towsley, Paul L. Yu:
What, When and Where to Cache: A Unified Optimization Approach. CoRR abs/1711.03941 (2017) - 2016
- [c10]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. CNS 2016: 270-278 - [c9]Paul L. Yu, Jake B. Perazzone, Brian M. Sadler, Rick S. Blum:
Authenticated side channel via physical layer fingerprinting. CNS 2016: 631-635 - [c8]Karim Khalil, Zhiyun Qian, Paul L. Yu, Srikanth V. Krishnamurthy, Ananthram Swami:
Optimal Monitor Placement for Detection of Persistent Threats. GLOBECOM 2016: 1-6 - [c7]Eric Graves, Paul L. Yu, Predrag Spasojevic:
Keyless authentication in the presence of a simultaneously transmitting adversary. ITW 2016: 201-205 - [p1]Paul L. Yu, Brian M. Sadler, Gunjan Verma, John S. Baras:
Fingerprinting by Design: Embedding and Authentication. Digital Fingerprinting 2016: 69-88 - [i1]Eric Graves, Paul L. Yu, Predrag Spasojevic:
Keyless authentication in the presence of a simultaneously transmitting adversary. CoRR abs/1609.09454 (2016) - 2015
- [j6]Gunjan Verma, Paul L. Yu, Brian M. Sadler:
Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios. IEEE Access 3: 81-88 (2015) - [j5]Paul L. Yu, Gunjan Verma, Brian M. Sadler:
Wireless physical layer authentication via fingerprint embedding. IEEE Commun. Mag. 53(6): 48-53 (2015) - [c6]Chang Liu, Ting He, Ananthram Swami, Don Towsley, Theodoros Salonidis, Andrei Iu. Bejan, Paul L. Yu:
Multicast vs. unicast for loss tomography on tree topologies. MILCOM 2015: 312-317 - [c5]Ting He, Chang Liu, Ananthram Swami, Don Towsley, Theodoros Salonidis, Andrei Iu. Bejan, Paul L. Yu:
Fisher Information-based Experiment Design for Network Tomography. SIGMETRICS 2015: 389-402 - [c4]Fikadu T. Dagefu, Gunjan Verma, Chirag Rao, Paul L. Yu, Brian M. Sadler, Kamal Sarabandi:
Measurement and characterization of the short-range low-VHF channel. WCNC 2015: 177-182 - 2013
- [j4]Jeffrey N. Twigg, Jonathan R. Fink, Paul L. Yu, Brian M. Sadler:
Efficient base station connectivity area discovery. Int. J. Robotics Res. 32(12): 1398-1410 (2013) - [c3]Jonathan R. Fink, Jeffrey N. Twigg, Paul L. Yu, Brian M. Sadler:
A parsimonious model for wireless connectivity in robotic networks. GlobalSIP 2013: 855-858 - 2012
- [c2]Jeffrey N. Twigg, Jonathan R. Fink, Paul L. Yu, Brian M. Sadler:
RSS gradient-assisted frontier exploration and radio source localization. ICRA 2012: 889-895 - 2011
- [j3]Paul L. Yu, Brian M. Sadler:
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer. IEEE Trans. Inf. Forensics Secur. 6(3-1): 606-615 (2011) - 2010
- [j2]Vladimir I. Ivanov, Paul L. Yu, John S. Baras:
Securing the communication of medical information using local biometric authentication and commercial wireless links. Health Informatics J. 16(3): 211-223 (2010)
2000 – 2009
- 2008
- [j1]Paul L. Yu, John S. Baras, Brian M. Sadler:
Physical-Layer Authentication. IEEE Trans. Inf. Forensics Secur. 3(1): 38-51 (2008) - [c1]Paul L. Yu, John S. Baras, Brian M. Sadler:
Multicarrier authentication at the physical layer. WOWMOM 2008: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint