Cited By
View all- Luo ZWang WHuang QJiang TZhang Q(2022)Securing IoT Devices by Exploiting Backscatter Propagation SignaturesIEEE Transactions on Mobile Computing10.1109/TMC.2021.308475421:12(4595-4608)Online publication date: 1-Dec-2022
- Balarezo JWang SChavez KAl-Hourani AKandeepan S(2022)A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networksEngineering Science and Technology, an International Journal10.1016/j.jestch.2021.09.01131(101065)Online publication date: Jul-2022
- Huang YWang WWang HJiang TZhang Q(2020)Authenticating On-Body IoT Devices: An Adversarial Learning ApproachIEEE Transactions on Wireless Communications10.1109/TWC.2020.299111119:8(5234-5245)Online publication date: Aug-2020
- Show More Cited By