Eyetell: Video-assisted touchscreen keystroke inference from eye movements Y Chen, T Li, R Zhang, Y Zhang, T Hedgpeth 2018 IEEE Symposium on Security and Privacy (SP), 144-160, 2018 | 65 | 2018 |
DPSense: Differentially private crowdsourced spectrum sensing X Jin, R Zhang, Y Chen, T Li, Y Zhang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 58 | 2016 |
Proximity-proof: Secure and usable mobile two-factor authentication D Han, Y Chen, T Li, R Zhang, Y Zhang, T Hedgpeth Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018 | 53 | 2018 |
Your face your heart: Secure mobile face authentication with photoplethysmograms Y Chen, J Sun, X Jin, T Li, R Zhang, Y Zhang IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 48 | 2017 |
Secure crowdsourced indoor positioning systems T Li, Y Chen, R Zhang, Y Zhang, T Hedgpeth IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1034-1042, 2018 | 41 | 2018 |
IndoorWaze: A crowdsourcing-based context-aware indoor navigation system T Li, D Han, Y Chen, R Zhang, Y Zhang, T Hedgpeth IEEE Transactions on Wireless Communications 19 (8), 5461-5472, 2020 | 35 | 2020 |
iLock: Immediate and automatic locking of mobile devices against data theft T Li, Y Chen, J Sun, X Jin, Y Zhang Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 31 | 2016 |
Deep learning-guided jamming for cross-technology wireless networks: Attack and defense D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021 | 26 | 2021 |
SpecKriging: GNN-based secure cooperative spectrum sensing Y Zhang, A Li, J Li, D Han, T Li, R Zhang, Y Zhang IEEE Transactions on Wireless Communications 21 (11), 9936-9946, 2022 | 19 | 2022 |
PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control T Li, R Zhang, Y Zhang 2016 IEEE Conference on Communications and Network Security (CNS), 333-341, 2016 | 15 | 2016 |
{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks A Li, J Li, D Han, Y Zhang, T Li, T Zhu, Y Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1-18, 2023 | 13 | 2023 |
DroneKey: a drone-aided group-key generation scheme for large-scale IoT networks D Han, A Li, J Li, Y Zhang, T Li, Y Zhang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 13 | 2021 |
Packet re-management-based C-NOMA for URLLC: From the perspective of power consumption C Yin, R Zhang, Y Li, Y Ruan, T Li, T Tao, D Li IEEE Communications Letters 26 (3), 682-686, 2021 | 12 | 2021 |
Secure UHF RFID authentication with smart devices A Li, J Li, Y Zhang, D Han, T Li, Y Zhang IEEE Transactions on Wireless Communications 22 (7), 4520-4533, 2022 | 11 | 2022 |
Source number estimation via machine learning based on eigenvalue preprocessing S Zhou, T Li, Y Li, R Zhang, Y Ruan IEEE Communications Letters 26 (10), 2360-2364, 2022 | 10 | 2022 |
Rcid: Fingerprinting passive rfid tags via wideband backscatter J Li, A Li, D Han, Y Zhang, T Li, Y Zhang IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 700-709, 2022 | 10 | 2022 |
Outage analysis of partial relay selection based on shadowing side information in hybrid satellite‐terrestrial relay networks Y Ruan, Y Wang, Y Li, R Zhang, T Li Transactions on Emerging Telecommunications Technologies 31 (6), e3826, 2020 | 10 | 2020 |
Anchor-Free Multi-UAV Detection and Classification Using Spectrogram R Zhao, T Li, Y Li, Y Ruan, R Zhang IEEE Internet of Things Journal, 2023 | 9 | 2023 |
Recursive feature elimination based feature selection in modulation classification for mimo systems S Zhou, T Li, Y Li Chinese Journal of Electronics 32 (4), 785-792, 2023 | 9 | 2023 |
Photonic-assisted reconfigurable LO harmonic downconverter with RF self-interference cancellation and image-rejection D Yang, F Wu, F Yang, J Yin, D Wang, Y Wang, T Li, T Zhou Journal of Lightwave Technology 41 (1), 149-158, 2022 | 9 | 2022 |