H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 17,581 186 World Ranking 1888 National Ranking 1040
Electronics and Electrical Engineering D-index 50 Citations 12,938 154 World Ranking 1164 National Ranking 533

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Telecommunications
  • Statistics

Wade Trappe spends much of his time researching Computer network, Wireless, Wireless sensor network, Authentication and Computer security. His Computer network research is multidisciplinary, incorporating perspectives in Cryptography, Wireless ad hoc network, Wireless network, Key distribution in wireless sensor networks and Channel surfing. The study incorporates disciplines such as Node, Robust random early detection and Spoofing attack in addition to Wireless network.

His biological study spans a wide range of topics, including Eavesdropping and Communication channel, Fading. Wade Trappe has researched Wireless sensor network in several fields, including Sensor node, Information security and Distributed computing. His work is dedicated to discovering how Computer security, Cloud computing security are connected with Asset and other disciplines.

His most cited work include:

  • The feasibility of launching and detecting jamming attacks in wireless networks (1078 citations)
  • Radio-telepathy: extracting a secret key from an unauthenticated wireless channel (568 citations)
  • Jamming sensor networks: attack and defense strategies (514 citations)

What are the main themes of his work throughout his whole career to date?

Wade Trappe mainly investigates Computer network, Computer security, Wireless, Wireless network and Wireless sensor network. In his study, Rekeying is inextricably linked to Distributed computing, which falls within the broad field of Computer network. His Computer security research integrates issues from Cognitive radio and Cloud computing security.

His Wireless research includes elements of Eavesdropping, Secrecy and Communication channel. His work in the fields of Wireless network, such as Wi-Fi array, overlaps with other areas such as Jamming. His research in Wireless sensor network intersects with topics in Sensor node, Key distribution in wireless sensor networks, Mobile wireless sensor network, Channel surfing and Robustness.

He most often published in these fields:

  • Computer network (44.74%)
  • Computer security (24.67%)
  • Wireless (21.71%)

What were the highlights of his more recent work (between 2016-2021)?

  • Jamming (13.49%)
  • Mathematical optimization (9.54%)
  • Computer network (44.74%)

In recent papers he was focusing on the following fields of study:

Jamming, Mathematical optimization, Computer network, Communications system and Nash equilibrium are his primary areas of study. His Computer network study combines topics from a wide range of disciplines, such as Cognitive radio, Usability and Metric. The study incorporates disciplines such as Radar, Eavesdropping, Transmission and Boundary in addition to Communications system.

His work deals with themes such as Transmitter and Fading, which intersect with Nash equilibrium. His Obfuscation study in the realm of Computer security interacts with subjects such as Resource. To a larger extent, Wade Trappe studies Wireless with the aim of understanding Wireless network.

Between 2016 and 2021, his most popular works were:

  • A Security Framework for the Internet of Things in the Future Internet Architecture (45 citations)
  • Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications (23 citations)
  • Energy-Ball: Wireless Power Transfer for Batteryless Internet of Things through Distributed Beamforming (20 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Telecommunications
  • Statistics

Wade Trappe mostly deals with Jamming, Game theory, Computer network, Mathematical optimization and Bayesian game. Wade Trappe performs multidisciplinary study in Jamming and Wireless network in his work. His Wireless network research is multidisciplinary, incorporating elements of Computer security and Adversary.

His Computer network study combines topics in areas such as Exploit and Secrecy. The various areas that Wade Trappe examines in his Mathematical optimization study include Radar, Stochastic game and Communications system. His Bayesian game research also works with subjects such as

  • Stackelberg competition that intertwine with fields like Fading, Communication channel and Probabilistic logic,
  • Nash equilibrium that intertwine with fields like Latency,
  • Complete information and related Fixed point and Monotonic function.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

The feasibility of launching and detecting jamming attacks in wireless networks

Wenyuan Xu;Wade Trappe;Yanyong Zhang;Timothy Wood.
mobile ad hoc networking and computing (2005)

1483 Citations

Introduction to Cryptography with Coding Theory

Lawrence C. Washington;Wade Trappe.
(2002)

1093 Citations

Radio-telepathy: extracting a secret key from an unauthenticated wireless channel

Suhas Mathur;Wade Trappe;Narayan Mandayam;Chunxuan Ye.
acm/ieee international conference on mobile computing and networking (2008)

742 Citations

Jamming sensor networks: attack and defense strategies

Wenyuan Xu;Ke Ma;W. Trappe;Yanyong Zhang.
IEEE Network (2006)

729 Citations

Enhancing Source-Location Privacy in Sensor Network Routing

P. Kamat;Yanyong Zhang;W. Trappe;C. Ozturk.
international conference on distributed computing systems (2005)

728 Citations

Robust statistical methods for securing wireless localization in sensor networks

Zang Li;Wade Trappe;Yanyong Zhang;Badri Nath.
information processing in sensor networks (2005)

614 Citations

Anti-collusion fingerprinting for multimedia

W. Trappe;Min Wu;Z.J. Wang;K.J.R. Liu.
IEEE Transactions on Signal Processing (2003)

517 Citations

Detecting and Localizing Wireless Spoofing Attacks

Yingying Chen;W. Trappe;R.P. Martin.
sensor mesh and ad hoc communications and networks (2007)

500 Citations

Source-location privacy in energy-constrained sensor network routing

Celal Ozturk;Yanyong Zhang;Wade Trappe.
security of ad hoc and sensor networks (2004)

495 Citations

ParkNet: drive-by sensing of road-side parking statistics

Suhas Mathur;Tong Jin;Nikhil Kasturirangan;Janani Chandrasekaran.
international conference on mobile systems, applications, and services (2010)

487 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Wade Trappe

Irwin Gerszberg

Irwin Gerszberg

AT&T (United States)

Publications: 104

Paul Shala Henry

Paul Shala Henry

AT&T (United States)

Publications: 98

Robert Bennett

Robert Bennett

AT&T (United States)

Publications: 96

Farhad Barzegar

Farhad Barzegar

AT&T (United States)

Publications: 92

H. Vincent Poor

H. Vincent Poor

Princeton University

Publications: 54

Yingying Chen

Yingying Chen

Rutgers, The State University of New Jersey

Publications: 44

Zhu Han

Zhu Han

University of Houston

Publications: 40

Neal Patwari

Neal Patwari

Washington University in St. Louis

Publications: 37

Liang Xiao

Liang Xiao

Xiamen University

Publications: 34

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 33

K.J.R. Liu

K.J.R. Liu

University of Maryland, College Park

Publications: 33

Jie Yang

Jie Yang

Florida State University

Publications: 32

Min Wu

Min Wu

University of Maryland, College Park

Publications: 30

Peng Ning

Peng Ning

Google (United States)

Publications: 29

Yanyong Zhang

Yanyong Zhang

University of Science and Technology of China

Publications: 28

Athina P. Petropulu

Athina P. Petropulu

Rutgers, The State University of New Jersey

Publications: 27

Something went wrong. Please try again later.