You are on page 1of 3

Fall 2013: CS 5813 Principles of Wireless Networks

1. Location Privacy in Wireless Networks. H. -C. Hu and H. J. Wang, SIGCOMM Asia Workshop 2005. 2. Quantifying Location Privacy Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. In IEEE Symposium on Security and Privacy (S&P), Oakland, CA, USA, May 22-25, 2011. 3. Establishing Pairwise Keys in Distributed Sensor Networks. D. Liu and P. Ning, CCS 2003. 4. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. S. Zhu, S. Setia, and S. Jajodia, CCS 2003. 5. Wireless Operators in a Shared Spectrum . M. Felegyhazi and J.-P. Hubaux, INFOCOM 2006. 6. Border Games in Cellular Networks. M. Felegyhazi, M. Cagalj, D. Dufour, and J. P., Hubaux. INFOCOM 2007. 7. Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. S. Zhong, J. Chen, and Y. R. Yang, INFOCOM 2003. 8. A Charging and Rewarding Scheme for Packet Forwarding. N. Ben Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, MOBIHOC 2003. 9. XORs in The Air: Practical Wireless Network Coding, S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, In ACM SIGCOMM 2006, Pisa, Italy, September 11 -15 10. Trading Structure for Randomness in Wireless Opportunistic Routing, S. Chachulski, M. Jennings, S. Katti, and Dina Katabi, ACM SIGCOMM, 2007 11. They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices Shyamnath Gollakota, Haitham Hassanieh; Benjamin Ransford; Dina Katabi; Kevin Fu, ACM SIGCOMM 2011. 12. IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian, Fengyuan Xu et al, INFOCOM 2011 13. Enabling Coexistence of Heterogeneous Wireless Systems: Case for ZigBee and WiFi, Xinyu Zhang, Kang G. Shin, MOBIHOC 2011 14. Broadcasting Delay-Constrained Traffic over Unreliable Wireless Links with Network Coding, I-Hong Hou (CSL and Dept. of CS, University of Illinois), P.R. Kumar, MOBIHOC 2011. 15. Non-cooperative Spectrum Access - The Dedicated vs. Free Spectrum Choice, Krishna Jagannathan, Ishai Menache, Eytan Modiano, Gil Zussman, MOBIHOC 2011 16. Truthful Auction for Cooperative Communications, Dejun Yang, Xi Fang, Guoliang Xue, MOBIHOC 2011 17. On Optimal Energy Efficient Convergecasting in Unreliable Sensor Networks with Applications to Target Tracking, Srikanth Hariharan, Ness B. Shroff, MOBIHOC 2011 18. Turning off Radios to Save Power in Multi-Radio Wireless Mesh Networks, Stefano Avallone, MOBIHOC 2011 19. Energy Efficient Clustering for WSN-based Structural Health Monitoring, Xuefeng Liu et al, INFOCOM 2011 20. Modeling and Characterization of Large-Scale Wi-Fi Traffic in Public Hot-Spots, Amitabha Ghosh et al, INFOCOM 2011 21. Does Wireless Sensor Network Scale? A Measurement Study on GreenOrbs, Yunhao Liu et al, INFOCOM 2011

22. Understanding Traffic Dynamics in Cellular Data Networks, Utpal Paul et al, INFOCOM 2011. 23. Feasibility and Optimization of Delay Guarantees for Non-homogeneous Flows in IEEE 802.11 WLANs Yan Gao et al, INFOCOM 2011 24. Identifying Mobiles Hiding behind Wireless Routers, Yinjie Chen et al, INFOCOM 2011 25. Location Privacy Protection from RSS Localization System Using Antenna Pattern Synthesis Ting Wang et al, INFOCOM 2011 26. FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks, Ming Li et al, INFOCOM 2011 27. On Renewable Sensor Networks with Wireless Energy Transfer, Yi Shi et al. INFOCOM 2011 28. Managing Cost, Performance, and Reliability Tradeoffs for Energy-Aware Server Provisioning Brian Guenter et al. INFOCOM 2011 29. Modeling the Economic Value of the Location Data of Mobile Users, Francois Baccelli et al, INFOCOM 2011 30. Secure Friend Discovery in Mobile Social Networks, Wei Dong et al, INFOCOM 2011 31. WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access, Tao Jin et al, INFOCOM 2011 32. Information Delivery in Large Wireless Networks with Minimum Energy Expense Yi Xu et al, INFOCOM 2011. 33. Identity-Based Attack Detection in Mobile Wireless Networks, Kai Zeng et al, INFOCOM 2011 34. Protection of Query Privacy for Continuous Location Based Services, Aniket Pingley et al, INFOCOM 2011 35. A Dynamic Game Solution to Malware Attack, M. H. R. Khouzani et al, INFOCOM 2011 36. Keep your friends close: Incorporating trust into social network-based Sybil defenses, Abedelaziz Mohaisen et. al. INFOCOM 2011. 37. Pricing-based Spectrum Access Control in Cognitive Radio Networks with Random Access, Lei Yang et al. INFOCOM 2011. 38. To Preempt or Not: Tackling Bid and Time-based Cheating in Online Spectrum Auctions, Lara Deek et al, INFOCOM 2011 39. Human Factors-aware Service Scheduling in Vehicular Cyber-Physical Systems, Xu Li et al, INFOCOM 2011 40. Trajectory Improves Data Delivery in Vehicular Networks, Yuchen Wu et al. INFOCOM 2011 41. Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks Zhenjiang Li et al. INFOCOM 2011 42. Connected Coverage in Wireless Networks with Directional Antennas, Zuoming Yu et al, INFOCOM 2011 43. The Intrusion Detection in Mobile Sensor Network, Gabriel Y. Keung et al, MOBIHOC 2010. 44. Security Versus Capacity Tradeoffs in Large Wireless Networks Using Keyless Secrecy, Sudarshan Vasudevan et al, MOBIHOC 2010. 45. Detecting Intra-Room Mobility with Signal Strength Descriptors, Konstantinos Kleisouris et al, MOBIHOC 2010. 46. Fine-Grained Mobility Characterization: Steady and Transient State Behaviors, Wei Gao et al, MOBIHOC 2010. 47. Privacy Vulnerabilities of Published Anonymous Mobility Traces, Yu Tak Ma et. al, MOBICOM 2010. 48. Cooperation vs. Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay

Networks, Karthikeyan Sundaresan et al, MOBIHOC 2010.

You might also like