False data injection attacks against state estimation in electric power grids Y Liu, P Ning, MK Reiter ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011 | 3803 | 2011 |
Detection of faults and attacks including false data injection attack in smart grid using Kalman filter K Manandhar, X Cao, F Hu, Y Liu IEEE transactions on control of network systems 1 (4), 370-379, 2014 | 810 | 2014 |
Randomized differential DSSS: Jamming-resistant wireless broadcast communication Y Liu, P Ning, H Dai, A Liu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 262 | 2010 |
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications
, 2016 | 232 | 2016 |
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures Y Liu, P Ning, H Dai 2010 IEEE symposium on security and privacy, 286-301, 2010 | 226 | 2010 |
NSDMiner: Automated discovery of network service dependencies A Natarajan, P Ning, Y Liu, S Jajodia, SE Hutchinson 2012 Proceedings IEEE INFOCOM, 2507-2515, 2012 | 191 | 2012 |
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures Z Gao, H Zhu, Y Liu, M Li, Z Cao 2013 Proceedings IEEE INFOCOM, 2751-2759, 2013 | 142 | 2013 |
Survey on channel reciprocity based key establishment techniques for wireless systems T Wang, Y Liu, AV Vasilakos Wireless Networks 21, 1835-1846, 2015 | 141 | 2015 |
Generalized federated learning via sharpness aware minimization Z Qu, X Li, R Duan, Y Liu, B Tang, Z Lu International conference on machine learning, 18250-18280, 2022 | 130 | 2022 |
Lomar: A local defense against poisoning attack on federated learning X Li, Z Qu, S Zhao, B Tang, Z Lu, Y Liu IEEE Transactions on Dependable and Secure Computing 20 (1), 437-450, 2021 | 99 | 2021 |
Wivo: Enhancing the security of voice control system via wireless signal in iot environment Y Meng, Z Wang, W Zhang, P Wu, H Zhu, X Liang, Y Liu Proceedings of the eighteenth ACM international symposium on mobile ad hoc
, 2018 | 93 | 2018 |
Wireless communications under broadband reactive jamming attacks S Fang, Y Liu, P Ning IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015 | 92 | 2015 |
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016 | 73 | 2016 |
Context-aware online client selection for hierarchical federated learning Z Qu, R Duan, L Chen, J Xu, Z Lu, Y Liu IEEE Transactions on Parallel and Distributed Systems 33 (12), 4353-4367, 2022 | 69 | 2022 |
Secret key establishment via RSS trajectory matching between wearable devices Z Li, Q Pei, I Markwood, Y Liu, H Zhu IEEE Transactions on Information Forensics and security 13 (3), 802-817, 2017 | 68 | 2017 |
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure A Liu, P Ning, H Dai, Y Liu The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems
, 2010 | 60 | 2010 |
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure A Liu, P Ning, H Dai, Y Liu, C Wang Proceedings of the 26th Annual Computer Security Applications Conference
, 2010 | 55 | 2010 |
Combating false data injection attacks in smart grid using kalman filter K Manandhar, X Cao, F Hu, Y Liu 2014 International Conference on Computing, Networking and Communications
, 2014 | 54 | 2014 |
No training hurdles: Fast training-agnostic attacks to infer your typing S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
, 2018 | 47 | 2018 |
Enhanced wireless channel authentication using time-synched link signature Y Liu, P Ning 2012 Proceedings IEEE INFOCOM, 2636-2640, 2012 | 45 | 2012 |