2017 - ACM Senior Member
Wenyuan Xu spends much of his time researching Computer security, Computer network, Wireless, Wireless network and Speech recognition. The various areas that Wenyuan Xu examines in his Computer network study include Key distribution in wireless sensor networks and Communication channel, Channel surfing. He has included themes like Wireless sensor network, Shared medium and Mobile wireless sensor network in his Channel surfing study.
In Wireless, he works on issues like Spoofing attack, which are connected to Electricity, Smart meter, Automatic meter reading, Tire-pressure monitoring system and Identifier. His Wireless network study focuses on Wi-Fi array in particular. His Speech recognition study incorporates themes from S Voice, Exploit and Microphone.
Wenyuan Xu focuses on Computer network, Wireless sensor network, Computer security, Wireless and Jamming. His Computer network research is multidisciplinary, incorporating perspectives in Wireless network, Smart grid and Cryptography. His Wireless sensor network research is multidisciplinary, relying on both Distributed computing, Sensor node, Key distribution in wireless sensor networks, Channel surfing and Efficient energy use.
His Channel surfing research includes elements of Denial-of-service attack and Shared medium. His Computer security research is multidisciplinary, incorporating elements of Android and Internet privacy. He has researched Wireless in several fields, including Process, Real-time computing and Network packet.
Wenyuan Xu mainly investigates Computer network, Real-time computing, Wireless sensor network, Smart grid and Anomaly detection. His study on Scheduling is often connected to Jamming as part of broader study in Computer network. Wenyuan Xu interconnects Network security and Feature in the investigation of issues within Real-time computing.
The Wireless sensor network study combines topics in areas such as Wireless, Network packet, Identification, User Friendly and SwIPe. The study incorporates disciplines such as Backup, Routing protocol, Node, IPv6 and Packet loss in addition to Smart grid. His research integrates issues of Industrial control system, Code, Testbed, Side channel attack and Condition monitoring in his study of Anomaly detection.
Real-time computing, Android, Human–computer interaction, Adversarial machine learning and Poltergeist are his primary areas of study. His studies in Real-time computing integrate themes in fields like Testbed, Anomaly detection, Smart grid and Condition monitoring. His work carried out in the field of Android brings together such families of science as Airfield traffic pattern, Wireless sensor network, Encryption and Network packet.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The feasibility of launching and detecting jamming attacks in wireless networks
Wenyuan Xu;Wade Trappe;Yanyong Zhang;Timothy Wood.
mobile ad hoc networking and computing (2005)
The feasibility of launching and detecting jamming attacks in wireless networks
Wenyuan Xu;Wade Trappe;Yanyong Zhang;Timothy Wood.
mobile ad hoc networking and computing (2005)
Jamming sensor networks: attack and defense strategies
Wenyuan Xu;Ke Ma;W. Trappe;Yanyong Zhang.
IEEE Network (2006)
Jamming sensor networks: attack and defense strategies
Wenyuan Xu;Ke Ma;W. Trappe;Yanyong Zhang.
IEEE Network (2006)
Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study
Ishtiaq Rouf;Rob Miller;Hossen Mustafa;Travis Taylor.
usenix security symposium (2010)
Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study
Ishtiaq Rouf;Rob Miller;Hossen Mustafa;Travis Taylor.
usenix security symposium (2010)
Channel surfing and spatial retreats: defenses against wireless denial of service
Wenyuan Xu;Timothy Wood;Wade Trappe;Yanyong Zhang.
workshop on wireless security (2004)
Channel surfing and spatial retreats: defenses against wireless denial of service
Wenyuan Xu;Timothy Wood;Wade Trappe;Yanyong Zhang.
workshop on wireless security (2004)
DolphinAttack: Inaudible Voice Commands
Guoming Zhang;Chen Yan;Xiaoyu Ji;Tianchen Zhang.
computer and communications security (2017)
DolphinAttack: Inaudible Voice Commands
Guoming Zhang;Chen Yan;Xiaoyu Ji;Tianchen Zhang.
computer and communications security (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Rutgers, The State University of New Jersey
University of Science and Technology of China
Rutgers, The State University of New Jersey
University of Rochester
University of Michigan–Ann Arbor
University of South Carolina
Technical University of Darmstadt
University of Maryland, College Park
Hong Kong University of Science and Technology
University of Science and Technology of China
Imperial College London
Google (United States)
XCOM Labs
Technical University of Munich
Central Mechanical Engineering Research Institute
Los Alamos National Laboratory
University of North Carolina at Chapel Hill
Ghent University
University of Rochester
University of Virginia
University of California, San Francisco
University of Saskatchewan
University of Wisconsin–Madison
Boston Children's Hospital
Max Planck Society
Rowan University