Cited By
View all- Zhao XRoy ABanerjee ASrinivasan KKim YKim JKoushanfar FRasmussen K(2024)Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO SystemsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656136(162-173)Online publication date: 27-May-2024
- Dong SLi YChen LZhang X(2024)Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State EstimationInternational Journal of Control, Automation and Systems10.1007/s12555-023-0702-222:9(2723-2733)Online publication date: 2-Sep-2024
- Cui ZCui BSu LDu HXu JFu J(2024)A formal security analysis of the fast authentication procedure based on the security context in 5G networksSoft Computing10.1007/s00500-023-09486-x28:3(1865-1881)Online publication date: 10-Jan-2024
- Show More Cited By