What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Paul L. Yu
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Yizhuo Zhai
Zhiyun Qian
Chengyu Song
Manu Sridharan
Trent Jaeger
Paul L. Yu
Srikanth V. Krishnamurthy
2024
conf/eurosp
DNS Exfiltration Guided by Generative Adversarial Networks.
Abdulrahman Fahim
Shitong Zhu
Zhiyun Qian
Chengyu Song
Evangelos E. Papalexakis
Supriyo Chakraborty
Kevin S. Chan
Paul L. Yu
Trent Jaeger
Srikanth V. Krishnamurthy
2022
conf/ndss
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Yizhuo Zhai
Yu Hao
Zheng Zhang
Weiteng Chen
Guoren Li
Zhiyun Qian
Chengyu Song
Manu Sridharan
Srikanth V. Krishnamurthy
Trent Jaeger
Paul L. Yu
2021
journals/tifs
Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI.
Jake Bailey Perazzone
Paul L. Yu
Brian M. Sadler
Rick S. Blum
2020
conf/cns
Authentication and Partial Message Correction over Adversarial Multiple-Access Channels.
Allison Beemer
Eric Graves
Jörg Kliewer
Oliver Kosut
Paul L. Yu
2019
conf/ccs
Principled Unearthing of TCP Side Channel Vulnerabilities.
Yue Cao
Zhongjie Wang
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Paul L. Yu
2019
conf/nspw
Employing attack graphs for intrusion detection.
Frank Capobianco
Rahul George
Kaiming Huang
Trent Jaeger
Srikanth V. Krishnamurthy
Zhiyun Qian
Mathias Payer
Paul L. Yu
2019
conf/cns
Authentication Against a Myopic Adversary.
Allison Beemer
Oliver Kosut
Jörg Kliewer
Eric Graves
Paul L. Yu
2019
conf/cns
Fingerprint Embedding Authentication with Artificial Noise: MISO Regime.
Jake Bailey Perazzone
Paul L. Yu
Brian M. Sadler
Rick S. Blum
2019
conf/ndss
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Daimeng Wang
Ajaya Neupane
Zhiyun Qian
Nael B. Abu-Ghazaleh
Srikanth V. Krishnamurthy
Edward J. M. Colbert
Paul L. Yu
2018
journals/tifs
Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding.
Jake B. Perazzone
Paul L. Yu
Brian M. Sadler
Rick S. Blum
2016
conf/cns
Authenticated side channel via physical layer fingerprinting.
Paul L. Yu
Jake B. Perazzone
Brian M. Sadler
Rick S. Blum
2016
conf/cns
Automated cross layer feature selection for effective intrusion detection in networked systems.
Azeem Aqil
Ahmed Osama Fathy Atya
Srikanth V. Krishnamurthy
Paul L. Yu
Ananthram Swami
Jeff Rowe
Karl N. Levitt
Alexander Poylisher
Constantin Serban
Ritu Chadha
2011
journals/tifs
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer.
Paul L. Yu
Brian M. Sadler
2008
journals/tifs
Physical-Layer Authentication.
Paul L. Yu
John S. Baras
Brian M. Sadler
Coauthors
Abdulrahman Fahim
(1)
Ahmed Osama Fathy Atya
(1)
Ajaya Neupane
(1)
Alexander Poylisher
(1)
Allison Beemer
(2)
Ananthram Swami
(1)
Azeem Aqil
(1)
Brian M. Sadler
(6)
Chengyu Song
(4)
Constantin Serban
(1)
Daimeng Wang
(1)
Edward J. M. Colbert
(1)
Eric Graves
(2)
Evangelos E. Papalexakis
(1)
Frank Capobianco
(1)
Guoren Li
(1)
Jake B. Perazzone
(2)
Jake Bailey Perazzone
(2)
Jeff Rowe
(1)
John S. Baras
(1)
Jörg Kliewer
(2)
Kaiming Huang
(1)
Karl N. Levitt
(1)
Kevin S. Chan
(1)
Manu Sridharan
(2)
Mathias Payer
(1)
Nael B. Abu-Ghazaleh
(1)
Oliver Kosut
(2)
Paul L. Yu
(15)
Rahul George
(1)
Rick S. Blum
(4)
Ritu Chadha
(1)
Shitong Zhu
(1)
Srikanth V. Krishnamurthy
(7)
Supriyo Chakraborty
(1)
Trent Jaeger
(4)
Weiteng Chen
(1)
Yizhuo Zhai
(2)
Yu Hao
(1)
Yue Cao
(1)
Zheng Zhang
(1)
Zhiyun Qian
(6)
Zhongjie Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to