Wade Trappe, Ph.D. - Publications

Affiliations: 
2002 University of Maryland, College Park, College Park, MD 

75 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Fan X, Ding H, Zhang Y, Trappe W, Han Z, Howard R. Distributed beamforming based wireless power transfer: Analysis and realization Tsinghua Science and Technology. 25: 758-775. DOI: 10.26599/Tst.2020.9010008  0.447
2020 Garnaev A, Trappe W, Petropulu A. A Dilemma in the Communication of a UAV with its Controller International Game Theory Review. 22: 2040003. DOI: 10.1142/S0219198920400034  0.312
2020 Garnaev A, Petropulu AP, Trappe W, Vincent Poor H. A Jamming Game With Rival-Type Uncertainty Ieee Transactions On Wireless Communications. 19: 5359-5372. DOI: 10.1109/Twc.2020.2992665  0.324
2020 Garnaev A, Petropulu A, Trappe W, Poor HV. A Multi-Jammer Game With Latency as the User’s Communication Utility Ieee Communications Letters. 24: 1899-1903. DOI: 10.1109/Lcomm.2020.2995661  0.347
2017 Liu X, Zhao M, Li S, Zhang F, Trappe W. A Security Framework for the Internet of Things in the Future Internet Architecture Future Internet. 9: 27. DOI: 10.3390/Fi9030027  0.382
2017 Garnaev A, Trappe W. Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies Entropy. 19: 363. DOI: 10.3390/E19070363  0.371
2017 Garnaev A, Trappe W. Bandwidth Scanning When Facing Interference Attacks Aimed at Reducing Spectrum Opportunities Ieee Transactions On Information Forensics and Security. 12: 1916-1930. DOI: 10.1109/Tifs.2017.2694766  0.349
2016 Li B, Petropulu AP, Trappe W. Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System Ieee Transactions On Signal Processing. 64: 4562-4575. DOI: 10.1109/Tsp.2016.2569479  0.366
2016 Sun T, Zhang Y, Trappe W. Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing Ieee Transactions On Mobile Computing. 15: 1157-1167. DOI: 10.1109/Tmc.2015.2442254  0.388
2016 Garnaev A, Trappe W. A bandwidth monitoring strategy under uncertainty of the adversary's activity Ieee Transactions On Information Forensics and Security. 11: 837-849. DOI: 10.1109/Tifs.2015.2510959  0.361
2016 Yuan X, Qin X, Tian F, Jalaian B, Shi Y, Hou YT, Lou W, Trappe W. An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm Ieee Transactions On Cognitive Communications and Networking. 2: 411-426. DOI: 10.1109/Tccn.2016.2615943  0.358
2016 Liu Y, Garnarv A, Trappe W. Connectivity jamming game for physical layer attack in peer to peer networks Security and Communication Networks. 9: 6080-6093. DOI: 10.1002/Sec.1758  0.409
2016 Liu X, Trappe W. Overlay tunneling as a policy tool for defending mobile ad hoc networks Security and Communication Networks. 9: 4482-4494. DOI: 10.1002/Sec.1640  0.399
2015 Liu Y, Trappe W. Topology adaptation for robust ad hoc cyberphysical networks under puncture-style attacks Tsinghua Science and Technology. 20: 364-375. DOI: 10.1109/Tst.2015.7173452  0.407
2015 Garnaev A, Trappe W. One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious Ieee Transactions On Information Forensics and Security. 10: 1064-1075. DOI: 10.1109/Tifs.2015.2398360  0.377
2015 Trappe W. The challenges facing physical layer security Ieee Communications Magazine. 53: 16-20. DOI: 10.1109/Mcom.2015.7120011  0.337
2015 Sagari S, Baysting S, Saha D, Seskar I, Trappe W, Raychaudhuri D. Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks 2015 Ieee International Symposium On Dynamic Spectrum Access Networks, Dyspan 2015. 209-220. DOI: 10.1109/DySPAN.2015.7343904  0.303
2014 Garnaev A, Trappe W. Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary’s Characteristics Icst Transactions On Mobile Communications and Applications. 2: e6. DOI: 10.4108/Mca.2.5.E6  0.361
2013 Kravtsov K, Wang Z, Trappe W, Prucnal PR. Physical layer secret key generation for fiber-optical networks. Optics Express. 21: 23756-71. PMID 24104288 DOI: 10.1364/Oe.21.023756  0.354
2013 Yang J, Chen YJ, Trappe W, Cheng J. Detection and localization of multiple spoofing attackers in wireless networks Ieee Transactions On Parallel and Distributed Systems. 24: 44-58. DOI: 10.1109/Tpds.2012.104  0.438
2013 Sankar L, Trappe W, Poor HV, Debbah M. Signal processing for cybersecurity and privacy [from the guest editors] Ieee Signal Processing Magazine. 30: 14-15. DOI: 10.1109/Msp.2013.2264854  0.388
2013 Sankar L, Trappe W, Ramchandran K, Poor HV, Debbah M. The role of signal processing in meeting privacy challenges: An overview Ieee Signal Processing Magazine. 30: 95-106. DOI: 10.1109/Msp.2013.2264541  0.325
2012 Kaya AO, Trappe W, Greenstein LJ, Chizhik D. Predicting MIMO performance in Urban microcells using ray tracing to characterize the channel Ieee Transactions On Wireless Communications. 11: 2402-2411. DOI: 10.1109/Twc.2012.041612.102335  0.328
2012 Miller R, Trappe W. On the vulnerabilities of CSI in MIMO wireless communication systems Ieee Transactions On Mobile Computing. 11: 1386-1398. DOI: 10.1109/Tmc.2011.156  0.41
2011 Sun T, Trappe W, Zhang Y. Improved AP association management using machine learning Acm Sigmobile Mobile Computing and Communications Review. 14: 4. DOI: 10.1145/1942268.1942271  0.376
2011 Zhang Y, Wu Z, Trappe W. Adaptive location-oriented content delivery in delay-sensitive pervasive applications Ieee Transactions On Mobile Computing. 10: 362-376. DOI: 10.1109/Tmc.2010.167  0.365
2011 Trappe W, Poor V, Iwai H, Yener A, Prucnal P, Barros J. Guest Editorial special issue on using the physical layer for securing the next generation of communication systems Ieee Transactions On Information Forensics and Security. 6: 521-522. DOI: 10.1109/Tifs.2011.2160572  0.32
2011 Mathur S, Trappe W. BIT-TRAPS: Building information-theoretic traffic privacy into packet streams Ieee Transactions On Information Forensics and Security. 6: 752-762. DOI: 10.1109/Tifs.2011.2138696  0.394
2011 Trappe W, Baliga A, Poovendran R. Opening up the last frontiers for securing the future wireless internet Emerging Wireless Technologies and the Future Mobile Internet. 242-282. DOI: 10.1017/CBO9780511921117.010  0.312
2011 Russell B, Littman ML, Trappe W. Integrating machine learning in ad hoc routing: A wireless adaptive routing protocol International Journal of Communication Systems. 24: 950-966. DOI: 10.1002/Dac.1202  0.39
2010 Li Z, Yates R, Trappe W. Achieving secret communication for fast Rayleigh fading channels Ieee Transactions On Wireless Communications. 9: 2792-2799. DOI: 10.1109/Twc.2010.080210.090948  0.327
2010 Chen Y, Yang J, Trappe W, Martin RP. Detecting and localizing identity-based attacks in wireless and sensor networks Ieee Transactions On Vehicular Technology. 59: 2418-2434. DOI: 10.1109/Tvt.2010.2044904  0.44
2010 Chen S, Chen Y, Trappe W. Inverting systems of embedded sensors for position verification in location-aware applications Ieee Transactions On Parallel and Distributed Systems. 21: 722-736. DOI: 10.1109/Tpds.2009.110  0.336
2010 Ye C, Mathur S, Reznik A, Shah Y, Trappe W, Mandayam NB. Information-Theoretically secret key generation for fading wireless channels Ieee Transactions On Information Forensics and Security. 5: 240-254. DOI: 10.1109/Tifs.2010.2043187  0.411
2010 Mathur S, Reznik A, Ye C, Mukherjee R, Rahman A, Shah Y, Trappe W, Mandayam N. Exploiting the physical layer for enhanced security Ieee Wireless Communications. 17: 63-70. DOI: 10.1109/Mwc.2010.5601960  0.415
2010 Li Z, Yates R, Trappe W. Secrecy capacity of independent parallel channels Securing Wireless Communications At the Physical Layer. 1-18. DOI: 10.1007/978-1-4419-1385-2_1  0.346
2009 Kamat P, Xu W, Trappe W, Zhang Y. Temporal privacy in wireless sensor networks: Theory and practice Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1614379.1614380  0.399
2009 Chen Y, Kleisouris K, Li X, Trappe W, Martin RP. A security and robustness performance analysis of localization algorithms to signal strength attacks Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1464420.1464422  0.347
2009 Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based spoofing detection in frequency-selective Rayleigh channels Ieee Transactions On Wireless Communications. 8: 5948-5956. DOI: 10.1109/Twc.2009.12.081544  0.366
2009 Kaya AO, Greenstein LJ, Trappe W. Characterizing indoor wireless channels via ray tracing combined with stochastic modeling Ieee Transactions On Wireless Communications. 8: 4165-4175. DOI: 10.1109/Twc.2009.080785  0.316
2009 Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based detection of sybil attacks in wireless networks Ieee Transactions On Information Forensics and Security. 4: 492-503. DOI: 10.1109/Tifs.2009.2026454  0.459
2009 Yang J, Chen Y, Trappe W. Detecting spoofing attacks in mobile wireless environments 2009 6th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2009. DOI: 10.1109/SAHCN.2009.5168926  0.318
2009 Rodoper M, Trappe W, Jung E. An IBC and certificate based hybrid approach to WiMAX security Journal of Communications and Networks. 11: 615-625. DOI: 10.1109/Jcn.2009.6388415  0.38
2009 Perrig A, Trappe W, Gligor V, Poovendran R, Lee H. Secure wireless networking Journal of Communications and Networks. 11: 533-537. DOI: 10.1109/Jcn.2009.6388406  0.376
2009 Yang J, Chen Y, Trappe W, Cheng J. Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks Proceedings - Ieee Infocom. 666-674. DOI: 10.1109/INFCOM.2009.5061974  0.324
2009 Chen Y, Xu W, Trappe W, Zhang Y. Securing emerging wireless systems: Lower-layer approaches Securing Emerging Wireless Systems: Lower-Layer Approaches. 1-361. DOI: 10.1007/978-0-387-88491-2  0.346
2009 Li Q, Zhao M, Walker J, Hu YC, Perrig A, Trappe W. SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks Security and Communication Networks. 2: 325-340. DOI: 10.1002/Sec.60  0.397
2008 Xu W, Trappe W, Zhang Y. Defending wireless sensor networks from radio interference through channel adaptation Acm Transactions On Sensor Networks. 4. DOI: 10.1145/1387663.1387664  0.392
2008 Chen S, Chen Y, Trappe W. Exploiting environmental properties for wireless localization Acm Sigmobile Mobile Computing and Communications Review. 12: 49. DOI: 10.1145/1374512.1374528  0.369
2008 Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Using the physical layer for wireless authentication in time-variant channels Ieee Transactions On Wireless Communications. 7: 2571-2579. DOI: 10.1109/Twc.2008.070194  0.382
2008 Ma K, Zhang Y, Trappe W. Managing the mobility of a mobile sensor network using network dynamics Ieee Transactions On Parallel and Distributed Systems. 19: 106-120. DOI: 10.1109/Tpds.2007.1113  0.352
2008 Zhang Y, Li Z, Trappe W. Evaluation of localization attacks on power-modulated challenge-response systems Ieee Transactions On Information Forensics and Security. 3: 259-272. DOI: 10.1109/Tifs.2008.919121  0.401
2008 Yang J, Chen Y, Trappe W. Detecting sybil attacks in wireless and sensor networks using cluster analysis 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 834-839. DOI: 10.1109/MAHSS.2008.4660139  0.322
2008 Xiao L, Greenstein L, Mandayam N, Trappe W. A physical-layer technique to enhance authentication for mobile terminals Ieee International Conference On Communications. 1520-1524. DOI: 10.1109/ICC.2008.294  0.306
2008 Kamat P, Baliga A, Trappe W. Secure, pseudonymous, and auditable communication in vehicularad hocnetworks Security and Communication Networks. 1: 233-244. DOI: 10.1002/Sec.27  0.428
2007 Li Q, Trappe W. Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships Ieee Transactions On Information Forensics and Security. 2: 793-808. DOI: 10.1109/Tifs.2007.910236  0.394
2007 Chen Y, Trappe W, Martin RP. Detecting and localizing wireless spoofing attacks 2007 4th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 193-202. DOI: 10.1109/SAHCN.2007.4292831  0.304
2007 Kuroda M, Nomurcr R, Trappe W. A radio-independent authentication protocol (EAP-CRP) for networks of cognitive radios 2007 4th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon. 70-79. DOI: 10.1109/SAHCN.2007.4292819  0.327
2007 Li Q, Trappe W. Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks 2006 3rd Annual Ieee Communications Society On Sensor and Adhoc Communications and Networks, Secon 2006. 1: 50-59. DOI: 10.1109/SAHCN.2006.288408  0.304
2007 Chen Y, Trappe W, Martin RP. Attack detection in wireless localization Proceedings - Ieee Infocom. 1964-1972. DOI: 10.1109/INFCOM.2007.228  0.312
2006 Zang L, Wenyuan X, Miller R, Trappe W. Securing wireless systems via lower layer enforcements Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 33-42. DOI: 10.1145/1161289.1161297  0.337
2006 Li Q, Trappe W. Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security Ieee Transactions On Information Forensics and Security. 1: 190-204. DOI: 10.1109/Tifs.2006.873599  0.427
2006 Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: Attack and defense strategies Ieee Network. 20: 41-47. DOI: 10.1109/Mnet.2006.1637931  0.45
2005 Wang ZJ, Wu M, Zhao HV, Trappe W, Liu KJ. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 14: 804-21. PMID 15971779 DOI: 10.1109/Tip.2005.847284  0.477
2005 Trappe W, Wang Y, Liu KJR. Resource-aware conference key establishment for heterogeneous networks Ieee/Acm Transactions On Networking. 13: 134-146. DOI: 10.1109/Tnet.2004.842236  0.39
2005 Li Q, Trappe W. Staggered TESLA: A multicast authentication scheme resistant to DoS attacks Globecom - Ieee Global Telecommunications Conference. 3: 1670-1675. DOI: 10.1109/GLOCOM.2005.1577934  0.304
2005 Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 46-57.  0.359
2004 Wang ZJ, Wu M, Trappe W, Liu KJR. Group-oriented fingerprinting for multimedia forensics Eurasip Journal On Applied Signal Processing. 2004: 2153-2173. DOI: 10.1155/S1110865704312151  0.374
2004 Sun Y, Trappe W, Liu KJR. A scalable multicast key management scheme for heterogeneous wireless networks Ieee/Acm Transactions On Networking. 12: 653-666. DOI: 10.1109/Tnet.2004.833129  0.483
2004 Xu W, Wood T, Trappe W, Zhang Y. Channel surfing and spatial retreats: Defenses against wireless denial of service Proceedings of the 2004 Acm Workshop On Wireless Security, Wise. 80-89.  0.324
2004 Xu W, Trappe W, Paul S. Key management for 3G MBMS security Globecom - Ieee Global Telecommunications Conference. 4: 2276-2280.  0.32
2003 Trappe W, Wu M, Wang ZJ, Liu KJR. Anti-collusion fingerprinting for multimedia Ieee Transactions On Signal Processing. 51: 1069-1087. DOI: 10.1109/Tsp.2003.809378  0.343
2003 Trappe W, Song J, Poovendran R, Liu KJR. Key Management and Distribution for Secure Multimedia Multicast Ieee Transactions On Multimedia. 5: 544-557. DOI: 10.1109/Tmm.2003.813279  0.531
2003 Sun Y, Trappe W, Ray Liu KJ. Topology-aware Key Management Schemes for Wireless Multicast Globecom - Ieee Global Telecommunications Conference. 3: 1471-1475.  0.328
2001 Song J, Poovendran R, Trappe W, Liu KJR. A dynamic key distribution scheme using data embedding for secure multimedia multicast Proceedings of Spie - the International Society For Optical Engineering. 4314: 618-628. DOI: 10.1117/12.435446  0.421
Show low-probability matches.