Half-duplex active eavesdropping in fast-fading channels: A block-Markov Wyner secrecy encoding scheme GT Amariucai, S Wei IEEE Transactions on Information Theory 58 (7), 4660-4677, 2012 | 41 | 2012 |
Cybersecurity analytics using smart inverters in power distribution system: Proactive intrusion detection and corrective control framework AY Fard, M Easley, GT Amariucai, MB Shadmand, H Abu-Rub 2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019 | 29 | 2019 |
Secret common randomness from routing metadata in ad hoc networks MR Khalili-Shoja, GT Amariucai, S Wei, J Deng IEEE transactions on information forensics and security 11 (8), 1674-1684, 2016 | 26 | 2016 |
Delegation of computation with verification outsourcing: curious verifiers G Xu, G Amariucai, Y Guan Proceedings of the 2013 ACM symposium on Principles of distributed computing …, 2013 | 20 | 2013 |
An observer based intrusion detection framework for smart inverters at the grid-edge Z Zhang, M Easley, M Hosseinzadehtaher, G Amariucai, MB Shadmand, ... 2020 IEEE Energy Conversion Congress and Exposition (ECCE), 1957-1962, 2020 | 19 | 2020 |
An automatic, time-based, secure pairing protocol for passive RFID GT Amariucai, C Bergman, Y Guan RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 18 | 2012 |
Gaussian jamming in block-fading channels under long term power constraints GT Amariucai, S Wei, R Kannan 2007 IEEE International Symposium on Information Theory, 1001-1005, 2007 | 16 | 2007 |
RUMBA-mouse: Rapid user mouse-behavior authentication using a CNN-RNN approach S Fu, D Qin, D Qiao, GT Amariucai 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 15 | 2020 |
(A Little) ignorance is bliss: The effect of imperfect model information on stealthy attacks in power grids S Harshbarger, M Hosseinzadehtaher, B Natarajan, E Vasserman, ... 2020 IEEE Kansas Power and Energy Conference (KPEC), 1-6, 2020 | 13 | 2020 |
Feedback-based collaborative secrecy encoding over binary symmetric channels GT Amariucai, S Wei IEEE transactions on information theory 58 (8), 5248-5266, 2012 | 13 | 2012 |
Mauspad: Mouse-based authentication using segmentation-based, progress-adjusted dtw D Qin, S Fu, G Amariucai, D Qiao, Y Guan 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 12 | 2020 |
The impact of discharge inversion effect on learning sram power-up statistics Z Liao, GT Amariucai, RKW Wong, Y Guan 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 31-36, 2017 | 12 | 2017 |
Jamming games in fast-fading wireless channels GT Amariucai, S Wei International Journal of Autonomous and Adaptive Communications Systems 1 (4 …, 2008 | 12 | 2008 |
Secrecy rates of binary wiretapper channels using feedback schemes GT Amariucai, S Wei 2008 42nd Annual Conference on Information Sciences and Systems, 624-629, 2008 | 11 | 2008 |
Jamming in fixed-rate wireless systems with power constraints-part II: Parallel slow fading channels GT Amariucai, S Wei, R Kannan arXiv preprint arXiv:0808.3418, 2008 | 10 | 2008 |
Physical security in wireless networks: Intelligent jamming and eavesdropping GT Amariucai Ph. D. dissertation, LSU, 2009 | 9 | 2009 |
Jamming in fixed-rate wireless systems with power constraints-part I: Fast fading channels GT Amariucai, S Wei arXiv preprint arXiv:0808.3431, 2008 | 9 | 2008 |
A practical approach to navigating the tradeoff between privacy and precise utility C Sharma, B Mandal, G Amariucai ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 8 | 2021 |
Verifiable computation with reduced informational costs and computational costs G Xu, GT Amariucai, Y Guan Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 8 | 2014 |
Review of the security of backward-compatible automotive inter-ECU communication C Sharma, S Moylan, EY Vasserman, GT Amariucai IEEE Access 9, 114854-114869, 2021 | 7* | 2021 |