徐文渊
近期热点
资料介绍
个人简历
徐文渊,国家杰出青年基金获得者,教授,博士生导师。1998年获得浙江大学工业自动化专业学士学位;2001年获得浙江大学计算机系硕士学位;2007获得美国罗格斯(Rutgers,The State University of New Jersey)计算机工程博士学位;2007-2013在美国南卡罗莱纳大学(University of South Carolina)任教,获终身教职;2008年获得美国国家自然基金CAREER奖。浙江大学徐文渊教授团队“智能系统安全实验室(USSLAB)”,现招收2021年秋季普博一名。要求:1.计算机、网络安全、电气、电子信息专业或者相关;2.英语六级成绩符合浙江大学普博入学分数线;3.在物联网安全,包括不限于语音安全、AI安全、传感器安全等方面有研究经验;4.发表论文者优先。请有意者发送简历及代表性论文(如果有)邮件,主题为“姓名-硕士毕业院校-2021普博申请”。教学与课程计算机网络与通信全英文课研究领域
物联网安全语音安全智能电网安全""近期论文
2018Wenyuan Xu,Chen Yan,Xiaoyu Ji,and Jianhao Liu,“Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles,'to appear in the IEEE Internet of Things Journal2017Wenyuan Xu,Jing Tian,Yu Chao,and Song Wang,“Challenge-Response Authentication using In-Air Handwriting Style Verification,”IEEE Transactions on Dependable and Secure Computing(TDSC),accepted 2017 BibtexPDF2016Weili Han,Zhigong Li,Minyue Ni,Guofei Gu,and Wenyuan Xu,“Shadow Attacks based on Password Reuses:A Quantitative Empirical Analysis,”IEEE Transactions on Dependable and Secure Computing(TDSC),May 2016 BibtexPDFHossen Mustafa,Wenyuan Xu,Ahmad-Reza Sadeghi,and Steffen Schulz,“End-to-End Detection of Caller ID Spoofing Attacks,”IEEE Transactions on Dependable and Secure Computing(TDSC),June 2016 BibtexPDFMiao Xu,Wenyuan Xu,Tingrui Han,and Zhiyun Lin,“Energy Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation,”ACM Transactions on Sensor Networks(TOSN),Vol.12(2),May 2016 BibtexPDFWweili Han,Zhigong Li,Lang Yuan,Wenyuan Xu,“Regional Patterns and Vulnerability Analysis of Chinese Web Passwords,”IEEE Transactions on Information Forensics and Security(TIFS),Vol.11(2),pp.258–272,October 2015 BibtexPDF2014Ming Xia,Yabo Dong,Wenyuan Xu,Xiangyang Li,and Dongming Lu,'MC2:Multi-Mode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring,'ACM Transactions on Sensor Networks(TOSN),Vol.10(3),pp.52:1--52:30,January 2014 BibtexPDFZhenhua Liu,Hongbo Liu,Wenyuan Xu,and Yingying Chen,'An Error Minimizing Framework for Localizing Jammers in Wireless Networks,'IEEE Transaction on Parallel and Distributed Systems(TPDS),Vol.25(2),pp.508-517,February 2014 BibtexPDF2012Hossen Mustafa,Xin Zhang,Zhenhua Liu,Wenyuan Xu,and Adrian Perrig,'Jamming-Resilient Multipath Routing,'IEEE Transaction on Dependable and Secure Computing(TDSC),Vol.9(6),pp.852-864,December 2012 BibtexPDFJason M O’Kane and Wenyuan Xu,'Energy-Efficient Information Routing in Sensor Networks for Robotic Target Tracking,'Wireless Networks,Vol.18(6),pp.713-733,August 2012 BibtexPDFZhenhua Liu,Hongbo Liu,Wenyuan Xu,and Yingying Chen,'Exploiting Jamming-Caused Neighbor Changes for Jammer Localization,'IEEE Transaction on Parallel and Distributed Systems(TPDS),Vol.23(3),pp.547-555,March 2012 BibtexPDFGuofei Chai,Miao Xu,Wenyuan Xu,and Zhiyun Lin,“Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity,”International Journal of Distributed Sensor Networks,2012 BibtexPDFZhenhua Liu and Wenyuan Xu,'Determining Sink Location through Zeroing-In Attackers in Wireless Sensor Networks,'Wireless Networks,Vol.18(3),pp.335-349,April 2012 BibtexPDF2011Hongbo Liu,Zhenhua Liu,Yingying Chen and Wenyuan Xu,“Determining the Position of a Jammer Using Virtual-Force Iterative Approach,”Wireless Networks,Vol.17(2),pp.531-547,2011 BibtexPDF2010Ming Xia,Yabo Dong,Wenyuan Xu,Dongming Lu and Xiangyang Li,“Multi-mode user-centric design of wireless sensor networks for long-term monitoring,”in ACM SIGMOBILE Mobile Computing and Communications Review,Vol.14(1),pp.25-27,July 2010.BibtexPDF2009Pandurang Kamat,Wenyuan Xu,Wade Trappe,and Yanyong Zhang,“Temporal Privacy in Wireless Sensor Networks:Theory and Practice,”ACM Transactions on Sensor Networks(TOSN),Vol.5(4),November,2009.BibtexPDF2008Wenyuan Xu,Wade Trappe And Yanyong Zhang,“Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation,”ACM Transactions on Sensor Networks(TOSN),Vol.4(4),August.2008.BibtexPDF2006Wenyuan Xu,Wade Trappe And Yanyong Zhang,“Jamming Sensor Networks:Attack and Defense Strategies,”IEEE Networks Special Issue on Sensor Networks,Vol.20(3),pp.41-47,May/June 2006.(Acceptance ratio:10.3%)BibtexPDFPeer-Reviewed Conference Publications&Conference Proceedings2018Yushi Cheng,Xiaoyu Ji,Tianyang Lu,and Wenyuan Xu,“DeWiCam:Detecting Hidden Wireless Cameras via Smartphones,”in Proceedings of ACM Asia Conference on Computer&Communications Security(AsiaCCS)2018,June 4th-8th,Songdo,Incheon,KoreaChaohao Li,Xiaoyu Ji,Xinyan Zhou,Juchuan Zhang,Jing Tian,Yanmiao Zhang,and Wenyuan Xu,“HlcAuth:Key-free and Secure Communications via Home-Limited Channel,”in Proceedings of ACM Asia Conference on Computer&Communications Security(AsiaCCS)2018,June 4th-8th,Songdo,Incheon,KoreaZhou Zhuang,Xiaoyu Ji,Taimin Zhang,Juchuan Zhang,Wenyuan Xu,Zhenhua Li,and Yunhao Liu,“FBSleuth:Fake Base Station Forensics via Radio Frequency Fingerprinting,”in Proceedings of ACM Asia Conference on Computer&Communications Security(AsiaCCS)2018,June 4th-8th,Songdo,Incheon,Korea2017Guoming Zhang,Chen Yan,Xiaoyu Ji,Tianchen Zhang,Taimin Zhang,Wenyuan Xu,“DolphinAttack:Inaudible Voice Commands,”in Proceedings of the 24th ACM Conference on Computer and Communications Security 2017(Acceptance ratio:18.0%)(Best Paper Award)BibtexPDFYuwei Zheng,Lin Huang,Haoqi Shan,Jun Li,Qing Yang,and Wenyuan Xu,“Ghost Telephonist Impersonates You:Vulnerability in 4G LTE CS Fallback,”in Proceedings of the IEEE Communications and Network Security(CNS)2017 Bibtex PDFXiaopeng Li,Wenyuan Xu,Song Wang,and Xianshan Qu,“Are You Lying:Validating the Time-Location of Outdoor Images,”in Proceedings of International Conference on Applied Cryptography and Network Security(ACNS),pp 103-123,2017 BibtexPDFTimothy Trippel,Ofir Weisse,Wenyuan Xu,Peter Honeyman,Kevin Fu,“WALNUT:Waging doubt on integrity of MEMS AcceLerometers by iNjecting acoUsTics,”in Proceedings of the 2nd IEEE European Symposium on Security and Privacy(EuroS&P'17),Paris France,April 26-28 2017(Acceptance ratio:19.6%)BibtexPDF2016Yannan Liu,Lingxiao Wei,Zhe Zhou,Kehuan Zhang,Wenyuan Xu,Qiang Xu,“On Code Execution Tracking via Power Side-Channel,”to appear in Proceedings of the 23nd ACM Conference on Computer and Communications Security(CCS 2016)BibtexPDFXiaohui Wang,Yanjing Wu,and Wenyuan Xu,“WindCompass:Determine Wind Direction Using Smartphones,”in Proceedings of the 13th IEEE International Conference on Sensing,Communication and Networking(IEEE SECON),London,UK,June 27-30,2016 Bibtex2014Gorkem Kar,Hossen Mustafa,Yan Wang,Yingying Chen,Wenyuan Xu,Marco Gruteser,and Tam Vu,“Detection of On-Road Vehicles Emanating GPS Interference,”in Proceedings of the 21th ACM Conference on Computer and Communications Security(ACM CCS),Scottsdale,Arizona,USA,November 3-7,2014(Acceptance ratio:19.5%)BibtexPDFHossen Mustafa and Wenyuan Xu,“CETAD:Detecting Evil Twin Access Point Attacks in Wireless Hotspots,”in Proceedings of the IEEE Communications and Network Security(CNS)2014 conference,pp.238–246,San Francisco,CA,October 29-31,2014 BibtexPDFZhigong Li,Weili Han,and Wenyuan Xu,“A Large-Scale Empirical Analysis of Chinese Web Passwords,”in Proceedings of the 23th USENIX Security Symposium,San Diego,CA,August 20-22,2014(Acceptance ratio:19.1%)BibtexPDFMustafa,Hossen and Xu,Wenyuan and Sadeghi,Ahmad Reza and Schulz,Steffen,“You Can Call but You Can't Hide:Detecting Caller ID Spoofing Attacks,”in Proceedings of the 44th Dependable Systems and Networks(DSN),Atlanta,GA,June 23-26,2014,pp.168–179 BibtexPDFDey,Sanorita and Roy,Nirupam and Xu,Wenyuan and Choudhury,Romit Roy and Nelakuditi,Srihari,“AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable,”in Proceedings of the 21th Annual Network&Distributed System Security Symposium(NDSS),San Diego,February 23-26,2014(Acceptance ratio:18.6%)BibtexPDF2013Xu,Miao and Xu,Wenyuan,“TACO:Time Synchronization in Wireless Sensor Networks through Temperature-Aware Compensation,”in Proceedings of 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems(IEEE MASS),2013 BibtexPDFXu,Miao and Xu,Wenyuan and Walker,Jesse and Moore,Benjamin,“Lightweight secure communication protocols for in-vehicle sensor networks,”in Proceedings of the 2013 ACM workshop on Security,privacy&dependability for cyber vehicles(ACM CyCAR),2013 BibtexPDFClark,Shane S and Ransford,Benjamin and Rahmati,Amir and Guineau,Shane and Sorber,Jacob and Xu,Wenyuan and Fu,Kevin and Rahmati,A and Salajegheh,M and Holcomb,D and others,“WattsUpDoc:Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices,”in Proceedings of USENIX security workshop on Health information Technologies,2013 BibtexPDFClark,Shane S and Mustafa,Hossen and Ransford,Benjamin and Sorber,Jacob and Fu,Kevin and Xu,Wenyuan,“Current Events:Identifying Webpages by Tapping the Electrical Outlet,”in Proceedings of the European Symposium on Research in Computer Security(ESORICS),2013(Acceptance ratio:17.8%)BibtexPDFKune,Denis Foo and Backes,John and Clark,Shane S and Kramer,Daniel and Reynolds,Matthew and Fu,Kevin and Kim,Yongdae and Xu,Wenyuan,“Ghost Talk:Mitigating EMI Signal Injection Attacks against Analog Sensors,”in Proceedings of the IEEE Symposium on Security&Privacy,2013(Acceptance ratio:12.1%)BibtexPDFTian,Jing and Qu,Chengzhang and Xu,Wenyuan and Wang,Song,“KinWrite:Handwriting-Based Authentication Using Kinect,”in Proceedings of the 20th Annual Network&Distributed System Security Symposium(NDSS),San Diego,February 24-27,2013(Acceptance ratio:18.8%)BibtexPDF2012Rouf,Ishtiaq and Mustafa,Hossen and Xu,Miao and Xu,Wenyuan and Miller,Rob and Gruteser,Marco,“Neighborhood Watch:Security and Privacy Analysis of Automatic Meter Reading Systems,”in Proceedings of the 19th ACM Conference on Computer and Communications Security(ACM CCS),Raleigh,NC,October 16-18,2012(Acceptance ratio:19%)BibtexPDFLiu,Zhenhua and Liu,Hongbo and Xu,Wenyuan and Chen,Yingying,“Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise,”in Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Systems(IEEE MASS),2012 BibtexPDFSteffen Schulz,Ahmad-Reza Sadeghi,Maria Zhdanova,Hossen Mustafa,Wenyuan Xu,and Vijay Varadharajan,“Tetherway:A Framework for Tethering Camouflage,”in Proceedings of ACM Conference on Wireless Network Security(WiSec),2012 BibtexPDF2011Xu,Miao and Xu,Wenyuan and O'Kane,Jason,'Content-Aware Data Dissemination for Enhancing Privacy and Availability in Wireless Sensor Networks,'in Proceedings of 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems(IEEE MASS),2011 BibtexPDFMustafa,Hossen A and Zhang,Xin and Liu,Zhenhua and Xu,Wenyuan and Perrig,Adrian,'Short Paper:Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation,”in Proceedings of ACM Conference on Wireless Network Security(WiSec)2011 BibtexPDFLiu,Hongbo and Liu,Zhenhua and Chen,Yingying and Xu,Wenyuan,'Localizing Multiple Jamming Attackers in Wireless Networks,'in Proceedings of Int'l Conference on Distributed Computing Systems(ICDCS),2011(Acceptance ratio:15.4%)BibtexPDF2010Hou,Jian and Lin,Zhiyun and Xu,Wenyuan and Yan,Gangfeng,“Distributed Transmit Beamforming with Autonomous and Self-organizing Mobile Antennas,”in Proceedings of IEEE Global Communications Conference(IEEE Globecom),Miami,FL,2010 BibtexPDFJason M O’Kane and Wenyuan Xu,“Network-assisted target tracking via smart local routing,”in Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS),Taipei,Taiwan,October,2010 BibtexPDFIshtiaq Rouf,Rob Miller,Hossen Mustafa,Travis Taylor,Sangho Ohb,Wenyuan Xu,Marco Gruteser,Wade Trappe,and Ivan Seskar,'Security and Privacy Vulnerabilities of In-Car Wireless Networks:A Tire Pressure Monitoring System Case Study,”in Proceedings of the 19th USENIX Security Symposium,Washington DC,August 11-13,2010.(Acceptance ratio:14.5%)BibtexPDFLiu,Zhenhua and Liu,Hongbo and Xu,Wenyuan and Chen,Yingying,'Wireless Jamming Localization by Exploiting Nodes'Hearing Ranges,'in Proceedings of the International Conference on Distributed Computing in Sensor System(DCOSS),Santa Barbara,CA,June 2010.BibtexPDFIshtiaq Rouf,Rob Miller,Hossen Mustafa,Travis Taylor,Sangho Ohb,Wenyuan Xu,Marco Gruteser,Wade Trappe,and Ivan Seskar,'Security and Privacy Vulnerabilities of In-Car Wireless Networks:A Tire Pressure Monitoring System Case Study,”Poster Session,IEEE Symposium on Security and Privacy,Oakland,CA,May,2010.BibtexPDFZhenhua Liu and Wenyuan Xu'Zeroing-In on Network Metric Minima for Sink Location Determination,'in Proceedings of ACM Conference on Wireless Network Security(WiSec),2010.(Acceptance ratio:21%)BibtexPDFMing Xia,Yabo Dong,Wenyuan Xu,Dongming Lu and Xiangyang Li,“Multi-Mode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring,”Poster Session,the ACM International Conference on Mobile Computing and Networking,2009.BibtexPDFHongbo Liu,Wenyuan Xu,Yingying Chen and Zhenhua Liu,'Localizing Jammers in Wireless Networks,'in Proceedings of IEEE PerCom International Workshop on Pervasive Wireless Networking(IEEE PWN)(Held in conjunction with IEEE PerCom),Texas,March 2009.BibtexPDF2009Jason M.O’Kane and Wenyuan Xu,“Energy efficient target tracking with a sensorless robot and a network of unreliable one-bit proximity sensors,”in Proceedings of IEEE International Conference of Robotics and Automation(ICRA),Kobe,Japan,May 2009.BibtexPDF2008Wenyuan Xu,Wade Trappe and Yanyong Zhang,'Anti-Jamming Timing Channels for Wireless Networks,'in proceedings of 1st ACM Conference on Wireless Security(WiSec2008),pg 203-213,2008.(Acceptance ratio:16.7%)BibtexPDF2007Wenyuan Xu,“On Adjusting Power to Defend Wireless Networks from Jamming,”in proceedings of the First Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems(speucs),2007.BibtexPDFRob Miller,Wenyuan Xu,Pandurang Kamat and Wade Trappe,“Service Discovery and Device Identification in Cognitive Radio Networks,”in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio(SDR)Networks(Held in Conjunction with IEEE SECON),2007.BibtexPDFPandurang Kamat,Wenyuan Xu,Wade Trappe and Yanyong Zhang,“Temporal Privacy in wireless sensor networks,”in Proceedings of the 27th International Conference on Distributed Computing Systems(ICDCS2007),pg.23,2007.(Acceptance ratio:13.5%)BibtexPDFWenyuan Xu,Wade Trappe and Yanyong Zhang,“Channel Surfing:Defending Wireless Sensor Networks from Jamming and Interference,”in Proceedings of the 6th International Conference on Information Processing in Sensor Networks(IPSN07),pg.499-508,2007.(Acceptance ratio:22.3%)BibtexPDFWenyuan Xu,Wade Trappe and Yanyong Zhang,“Poster Abstract:Channel Surfing:Defending Wireless Sensor Networks from Jamming and Interference,”in Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems(SenSys),pg.403-404,2006.BibtexPDF2006Z.Li,Wenyuan Xu,Rob Miller and Wade Trappe,“Securing Wireless Systems via Lower Layer Enforcements,”in Proceedings of the 2006 ACM Workshop on Wireless Security(WiSe),pg.33-42,2006.(Acceptance ratio:19.6%)BibtexPDFWenyuan Xu,Pandurang Kamat and Wade Trappe,“TRIESTE:A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes,”in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio(SDR)Networks(Held in Conjunction with IEEE SECON),2006.BibtexPDF2005Wenyuan Xu,Wade Trappe,Yanyong Zhang and Timothy Wood,“The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,”in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing(Mobihoc),pg.46-57,2005.(Acceptance ratio:14.2%)BibtexPDF2004Wenyuan Xu,Timothy Wood,Wade Trappe,and Yanyong Zhang,“Channel surfing and spatial retreats:defenses against wireless denial of service,”in Proceedings of the 2004 ACM workshop on Wireless security(WiSe),pg.80-89,2004.(Acceptance ratio:20%)BibtexPDFWenyuan Xu,Wade Trappe,and Sanjoy Paul,“Key Management for 3G MBMS Security,”in Proceeding of IEEE Global Telecommunications Conference(GLOBECOM),Vol.4,pg.2276-2280,2004.Associate Editor:TOSN: Transactions on Sensor Networks;TIoT: Transactions on Internet of Things; IEEE Internet of Things Journal; TMC:IEEE Transactions on Mobile Computing国际会议技术委员:(Usenix Security, NDSS, IEEE S&P, CCS, etc); 相关热点
最新收录
- 千奈美(ちなみん) 06-25
- 皆川琉衣(皆川るい) 06-25
- 凪光(凪ひかる) 06-25
- 织本濑里乃(織本せりの 06-25
- 冈本莉里 岡本莉里 (おか 06-25
- 凯蒂·佩里(水果姐) 06-25
- 吉高宁宁(吉高寧々 Nene 06-25
- 水咲优美(水咲優美) 06-25
- 三月光(三月ひかる) 06-21
- 澪川遥(澪川はるか) 06-21