Yih-Chun Hu
Affiliations: | Electrical and Computer Engineering | University of Illinois, Urbana-Champaign, Urbana-Champaign, IL |
Area:
Computer EngineeringWebsite:
https://ece.illinois.edu/about/directory/faculty/yihchunGoogle:
"Yih-Chun Hu"Parents
Sign in to add mentorDavid Bruce Johnson | grad student | 2003 | Carnegie Mellon (Computer Science Tree) | |
(Enabling secure high -performance wireless ad hoc networking.) |
Children
Sign in to add traineeJason J. Haas | grad student | 2010 | UIUC |
Jerry T. Chiang | grad student | 2011 | UIUC |
Jihyuk Choi | grad student | 2012 | UIUC |
Sang-Yoon Chang | grad student | 2013 | UIUC |
Hao Wu | grad student | 2012-2017 | UIUC |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Chang S, Kumar SLS, Hu Y, et al. (2019) Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks Acm Transactions On Sensor Networks. 15: 1-25 |
Jagadeesh H, Hu Y. (2019) Convolution Attack on Frequency Hopping by Full-Duplex Radios Ieee Transactions On Vehicular Technology. 68: 5642-5656 |
Li Q, Liu J, Hu Y, et al. (2019) BGP with BGPsec: Attacks and Countermeasures Ieee Network. 33: 194-200 |
Liu Z, Jin H, Hu Y, et al. (2018) Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control Ieee Acm Transactions On Networking. 26: 1948-1961 |
Chang S, Hu Y. (2017) SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks Ieee Transactions On Mobile Computing. 16: 3527-3540 |
Ponniah J, Hu Y, Kumar PR. (2017) A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks Ieee Transactions On Control of Network Systems. 4: 37-48 |
Chang SY, Hu YC, Laurenti N. (2016) SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers Ieee/Acm Transactions On Networking. 24: 1095-1108 |
Ponniah J, Hu Y, Kumar PR. (2016) A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking Ieee Transactions On Control of Network Systems. 3: 206-217 |
Hu Y, Kumar PR, Ponniah J. (2012) An Orthogonal Multiple Access Coding Scheme Communications in Information and Systems. 12: 41-76 |
Chiang JT, Haas JJ, Choi J, et al. (2012) Secure location verification using simultaneous multilateration Ieee Transactions On Wireless Communications. 11: 584-591 |