default search action
Patrick Tague
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c70]Brian Ricks, Patrick Tague, Bhavani Thuraisingham, Sriraam Natarajan:
Utilizing Threat Partitioning for More Practical Network Anomaly Detection. SACMAT 2024 - 2022
- [c69]Anindya Maiti, Ahmad-Reza Sadeghi, Gabriela Felicia Ciocarlie, Patrick Tague:
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World. WISEC 2022: 4-5 - [c68]Dimitrios-Georgios Akestoridis, Vyas Sekar, Patrick Tague:
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices. WISEC 2022: 233-244 - 2021
- [c67]Sara Beatriz Schwarz, Dimitrios-Georgios Akestoridis, Patrick Tague, Hanan Hibshi:
Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy. CNS 2021: 74-82 - [c66]Dimitrios-Georgios Akestoridis, Patrick Tague:
HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks. CNS 2021: 209-217 - [c65]Madhumitha Harishankar, Jinhang Zuo, Sriram Venkateswaran Iyer, Patrick Tague, Carlee Joe-Wong:
Datanet: Enabling Seamless, Metered and Trusted Internet Connectivity without Subscriptions. ICC Workshops 2021: 1-6 - [c64]Brian Ricks, Patrick Tague, Bhavani Thuraisingham:
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection. TPS-ISA 2021: 217-224 - 2020
- [c63]Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, Patrick Tague:
Zigator: analyzing the security of zigbee-enabled smart homes. WISEC 2020: 77-88 - [i4]Madhumitha Harishankar, Dimitrios-Georgios Akestoridis, Sriram V. Iyer, Aron Laszka, Carlee Joe-Wong, Patrick Tague:
Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces. CoRR abs/2003.06197 (2020) - [i3]Madhumitha Harishankar, Jun Han, Sai Vineeth Kalluru Srinivas, Faisal Alqarni, Shi Su, Shijia Pan, Hae Young Noh, Pei Zhang, Marco Gruteser, Patrick Tague:
LaNet: Real-time Lane Identification by Learning Road SurfaceCharacteristics from Accelerometer Data. CoRR abs/2004.02822 (2020)
2010 – 2019
- 2019
- [j12]Madhumitha Harishankar, Sireesha Pilaka, Pragya Sharma, Nagarjun Srinivasan, Carlee Joe-Wong, Patrick Tague:
Procuring Spontaneous Session-Level Resource Guarantees for Real-Time Applications: An Auction Approach. IEEE J. Sel. Areas Commun. 37(7): 1534-1548 (2019) - [c62]Brian Ricks, Bhavani Thuraisingham, Patrick Tague:
Mimicking Human Behavior in Shared-Resource Computer Networks. IRI 2019: 356-363 - [c61]Christopher Hensler, Patrick Tague:
Using bluetooth low energy spoofing to dispute device details: demo. WiSec 2019: 340-342 - 2018
- [j11]Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, Patrick Tague:
Smart Home Occupant Identification via Sensor Fusion Across On-Object Devices. ACM Trans. Sens. Networks 14(3-4): 23:1-23:22 (2018) - [c60]Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Yiming Liu, Haodong Liu, Jiasen Chen, Swee Sim, Vibha Iyengar, Patrick Tague, Yuan Tian:
Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks. SEC 2018: 378-380 - [c59]Madhumitha Harishankar, Nagarjun Srinivasan, Carlee Joe-Wong, Patrick Tague:
To Accept or Not to Accept: The Question of Supplemental Discount Offers in Mobile Data Plans. INFOCOM 2018: 2609-2617 - [c58]Brian Ricks, Patrick Tague, Bhavani Thuraisingham:
Large-Scale Realistic Network Data Generation on a Budget. IRI 2018: 23-30 - [c57]Brian Ricks, Bhavani Thuraisingham, Patrick Tague:
Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack. ISI 2018: 130-135 - [c56]Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, Patrick Tague:
Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. IEEE Symposium on Security and Privacy 2018: 836-852 - [c55]Bruce DeBruhl, Patrick Tague:
Optimizing a MisInformation and MisBehavior (MIB) Attack Targeting Vehicle Platoons. VTC Fall 2018: 1-5 - [c54]Shijia Pan, Carlos Ruiz Dominguez, Jun Han, Adeola Bannis, Patrick Tague, Hae Young Noh, Pei Zhang:
UniverSense: IoT Device Pairing through Heterogeneous Sensing Signals. HotMobile 2018: 55-60 - [i2]Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Patrick Tague, Yuan Tian:
Privacy Partitioning: Protecting User Data During the Deep Learning Inference Phase. CoRR abs/1812.02863 (2018) - 2017
- [j10]Xiao Wang, Tong Yu, Ming Zeng, Patrick Tague:
XRec: Behavior-Based User Recognition Across Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3): 111:1-111:26 (2017) - [j9]Xinlei Chen, Aveek Purohit, Shijia Pan, Carlos Ruiz Dominguez, Jun Han, Zheng Sun, Frank Mokaya, Patrick Tague, Pei Zhang:
Design Experiences in Minimalistic Flying Sensor Node Platform through SensorFly. ACM Trans. Sens. Networks 13(4): 33:1-33:37 (2017) - [c53]Jun Han, Albert Jin Chung, Patrick Tague:
Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion. IPSN 2017: 181-192 - [c52]Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, Patrick Tague:
Sensetribute: smart home occupant identification via fusion across on-object sensing devices. BuildSys@SenSys 2017: 2:1-2:10 - [c51]Paul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis:
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks. IEEE Symposium on Security and Privacy 2017: 1094-1109 - [c50]Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague:
SmartAuth: User-Centered Authorization for the Internet of Things. USENIX Security Symposium 2017: 361-378 - [c49]Xiao Wang, Tong Yu, Ole J. Mengshoel, Patrick Tague:
Towards continuous and passive authentication across mobile devices: an empirical study. WISEC 2017: 35-45 - [c48]Jun Han, Madhumitha Harishankar, Xiao Wang, Albert Jin Chung, Patrick Tague:
Convoy: Physical Context Verification for Vehicle Platoon Admission. HotMobile 2017: 73-78 - [i1]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - 2016
- [c47]Yuan Tian, Eric Yawei Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague:
Swords and shields: a study of mobile game hacks and existing defenses. ACSAC 2016: 386-397 - 2015
- [j8]Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim:
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control. Wirel. Networks 21(8): 2631-2647 (2015) - [c46]Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick Tague, Lorrie Faith Cranor:
Supporting Privacy-Conscious App Update Decisions with User Reviews. SPSM@CCS 2015: 51-61 - [c45]Le T. Nguyen, Ming Zeng, Patrick Tague, Joy Zhang:
I did not smoke 100 cigarettes today!: avoiding false positives in real-world activity recognition. UbiComp 2015: 1053-1063 - [c44]Le T. Nguyen, Patrick Tague, Ming Zeng, Joy Zhang:
SuperAD: supervised activity discovery. UbiComp/ISWC Adjunct 2015: 1463-1472 - [c43]Le T. Nguyen, Ming Zeng, Patrick Tague, Joy Zhang:
Recognizing new activities with limited training data. ISWC 2015: 67-74 - [c42]Brian Ricks, Patrick Tague:
Isolation of Multiple Anonymous Attackers in Mobile Networks. NSS 2015: 32-45 - [c41]Bruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, Patrick Tague:
Is your commute driving you crazy?: a study of misbehavior in vehicular platoons. WISEC 2015: 22:1-22:11 - 2014
- [j7]Bruce DeBruhl, Patrick Tague:
Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents. Pervasive Mob. Comput. 12: 244-257 (2014) - [c40]Arjun P. Athreya, Harry Chan-Maestas, Edward Katz, Patrick Tague, Bob Iannucci:
Energy-governed resilient networked systems. CCNC 2014: 56-61 - [c39]Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin, Patrick Tague:
A5: Automated Analysis of Adversarial Android Applications. SPSM@CCS 2014: 39-50 - [c38]Xiao Wang, Patrick Tague:
Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy Measurement. AISec@CCS 2014: 113-124 - [c37]Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague:
OAuth Demystified for Mobile Application Developers. CCS 2014: 892-903 - [c36]Yu Seung Kim, Bruce DeBruhl, Patrick Tague:
JADE: Jamming-averse routing on cognitive radio mesh networks. CNS 2014: 21-28 - [c35]Yu Seung Kim, Yuan Tian, Le T. Nguyen, Patrick Tague:
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks. CNS 2014: 427-435 - [c34]Le T. Nguyen, Yu Seung Kim, Patrick Tague, Joy Zhang:
IdentityLink: user-device linking through visual and RF-signal cues. UbiComp 2014: 529-539 - [c33]Yu Seung Kim, Patrick Tague:
Proximity-based wireless access control through considerate jamming. SPME@MobiCom 2014: 19-24 - [c32]Yuan Tian, Ying Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson:
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API. IEEE Symposium on Security and Privacy 2014: 34-48 - [c31]Su Mon Kywe, Christopher Landis, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague:
PrivateDroid: Private Browsing Mode for Android. TrustCom 2014: 27-36 - [c30]Bruce DeBruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm, Patrick Tague:
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. WISEC 2014: 117-128 - 2013
- [c29]Arjun P. Athreya, Bruce DeBruhl, Patrick Tague:
Designing for self-configuration and self-adaptation in the Internet of Things. CollaborateCom 2013: 585-592 - [c28]Yu Seung Kim, Bruce DeBruhl, Patrick Tague:
Stochastic optimization of flow-jamming attacks in multichannel wireless networks. ICC 2013: 2165-2170 - [c27]Arjun P. Athreya, Patrick Tague:
Self-organization of a mesh hierarchy for smart grid monitoring in outage scenarios. ISGT 2013: 1-6 - [c26]Yu Seung Kim, Patrick Tague:
Wireless Mesh Network Simulator for Studying Cross-Layer Jamming Effects. MASS 2013: 437-438 - [c25]Yu Seung Kim, Bruce DeBruhl, Patrick Tague:
MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks. MASS 2013: 560-564 - [c24]Le T. Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, S. Parab, Yu Seung Kim, Patrick Tague, Joy Zhang:
UnLocIn: Unauthorized location inference on smartphones without being caught. PRISMS 2013: 1-8 - [c23]Arjun P. Athreya, Patrick Tague:
Network self-organization in the Internet of Things. SECON 2013: 25-33 - [c22]Bruce DeBruhl, Patrick Tague:
How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming. SECON 2013: 496-504 - [c21]Xiao Wang, Patrick Tague:
ASIA: Accelerated secure in-network aggregation in vehicular sensing networks. SECON 2013: 514-522 - [c20]Arjun P. Athreya, Xiao Wang, Yu Seung Kim, Yuan Tian, Patrick Tague:
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection. WISA 2013: 174-188 - [c19]Shrikant Adhikarla, Min Suk Kang, Patrick Tague:
Selfish manipulation of cooperative cellular communications via channel fabrication. WISEC 2013: 49-54 - 2012
- [c18]Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim:
Carving secure wi-fi zones with defensive jamming. AsiaCCS 2012: 53-54 - [c17]Yu Seung Kim, Frank Mokaya, Eric Yawei Chen, Patrick Tague:
All your jammers belong to us - Localization of wireless sensors under jamming attack. ICC 2012: 949-954 - [c16]Arjun P. Athreya, Patrick Tague:
Survivable smart grid communication: Smart-meters meshes to the rescue. ICNC 2012: 104-110 - [c15]Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague:
STIR-ing the wireless medium with self-tuned, inference-based, real-time jamming. MASS 2012: 326-334 - [c14]Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague:
ShortMAC: Efficient Data-Plane Fault Localization. NDSS 2012 - [c13]Bruce DeBruhl, Patrick Tague:
Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection. PECCS 2012: 431-439 - [c12]Bruce DeBruhl, Patrick Tague:
Living with boisterous neighbors: Studying the interaction of adaptive jamming and anti-jamming. WOWMOM 2012: 1-6 - [c11]Jason Wu, Lin Qi, Ram Shankar Siva Kumar, Nishant Kumar, Patrick Tague:
S-SPAN: Secure smart posters in Android using NFC. WOWMOM 2012: 1-3 - 2011
- [j6]Patrick Tague, Sidharth Nabar, James A. Ritcey, Radha Poovendran:
Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Netw. 19(1): 184-194 (2011) - [c10]Bruce DeBruhl, Patrick Tague:
Digital Filter Design for Jamming Mitigation in 802.15.4 Communication. ICCCN 2011: 1-6 - [c9]Arjun P. Athreya, Patrick Tague:
Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy. SECON 2011: 146-148 - 2010
- [c8]Patrick Tague:
Improving anti-jamming capability and increasing jamming impact with mobility control. MASS 2010: 501-506
2000 – 2009
- 2009
- [j5]David Slater, Radha Poovendran, Patrick Tague, Brian J. Matt:
Tradeoffs between jamming resilience and communication efficiency in key establishment. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(1): 14-25 (2009) - [j4]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. IEEE Trans. Dependable Secur. Comput. 6(2): 111-123 (2009) - [j3]Patrick Tague, Mingyan Li, Radha Poovendran:
Mitigation of Control Channel Jamming under Node Capture Attacks. IEEE Trans. Mob. Comput. 8(9): 1221-1234 (2009) - [c7]David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels. WISEC 2009: 151-160 - 2008
- [c6]Patrick Tague, Radha Poovendran:
Modeling node capture attacks in wireless sensor networks. Allerton 2008: 1221-1224 - [c5]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. INFOCOM 2008: 161-165 - [c4]Patrick Tague, Sidharth Nabar, James A. Ritcey, David Slater, Radha Poovendran:
Throughput optimization for multipath unicast routing under probabilistic jamming. PIMRC 2008: 1-5 - [c3]Patrick Tague, David Slater, Radha Poovendran, Guevara Noubir:
Linear programming models for jamming attacks on network traffic flows. WiOpt 2008: 207-216 - 2007
- [j2]Patrick Tague, Radha Poovendran:
Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks 5(6): 801-814 (2007) - [j1]Patrick Tague, Radha Poovendran:
A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Trans. Sens. Networks 3(4): 19 (2007) - [c2]Patrick Tague, Mingyan Li, Radha Poovendran:
Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution. PIMRC 2007: 1-5 - 2006
- [c1]Patrick Tague, Radha Poovendran:
A general probabilistic model for improving key assignment in wireless networks. WiOpt 2006: 251-259
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint