Proximity-proof: Secure and usable mobile two-factor authentication D Han, Y Chen, T Li, R Zhang, Y Zhang, T Hedgpeth Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018 | 50 | 2018 |
IndoorWaze: A crowdsourcing-based context-aware indoor navigation system T Li, D Han, Y Chen, R Zhang, Y Zhang, T Hedgpeth IEEE Transactions on Wireless Communications 19 (8), 5461-5472, 2020 | 35 | 2020 |
Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation LB He, LS Huang, W Yang, R Xu, DQ Han Quantum Information Processing 11, 1359-1369, 2012 | 26 | 2012 |
RF-Rhythm: Secure and usable two-factor RFID authentication J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2194-2203, 2020 | 24 | 2020 |
Deep learning-guided jamming for cross-technology wireless networks: Attack and defense D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021 | 21 | 2021 |
SpecKriging: GNN-based secure cooperative spectrum sensing Y Zhang, A Li, J Li, D Han, T Li, R Zhang, Y Zhang IEEE Transactions on Wireless Communications 21 (11), 9936-9946, 2022 | 17 | 2022 |
DroneKey: a drone-aided group-key generation scheme for large-scale IoT networks D Han, A Li, J Li, Y Zhang, T Li, Y Zhang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 13 | 2021 |
Secure UHF RFID authentication with smart devices A Li, J Li, Y Zhang, D Han, T Li, Y Zhang IEEE Transactions on Wireless Communications 22 (7), 4520-4533, 2022 | 10 | 2022 |
{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks A Li, J Li, D Han, Y Zhang, T Li, T Zhu, Y Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1-18, 2023 | 9 | 2023 |
Rcid: Fingerprinting passive rfid tags via wideband backscatter J Li, A Li, D Han, Y Zhang, T Li, Y Zhang IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 700-709, 2022 | 9 | 2022 |
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021 | 7 | 2021 |
Your home is insecure: Practical attacks on wireless home alarm systems T Li, D Han, J Li, A Li, Y Zhang, R Zhang, Y Zhang IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 6 | 2021 |
WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID A Li, J Li, D Han, Y Zhang, T Li, Y Zhang Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 5 | 2022 |
Rhythmic RFID authentication J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang IEEE/ACM Transactions on Networking 31 (2), 877-890, 2022 | 4 | 2022 |
WristUnlock: Secure and usable smartphone unlocking with wrist wearables L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang 2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019 | 4 | 2019 |
SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets Y Zhang, D Han, A Li, J Li, T Li, Y Zhang IEEE Transactions on Mobile Computing 22 (7), 4266-4278, 2022 | 2 | 2022 |
(In) secure acoustic mobile authentication D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021 | 2 | 2021 |
IoT Security in the Era of Artificial Intelligence D Han Arizona State University, 2022 | 1 | 2022 |
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems D Han, A Li, J Li, Y Zhang, T Li, Y Zhang 2024 IEEE 44th International Conference on Distributed Computing Systems …, 2024 | | 2024 |
Method and apparatus for secure and usable mobile two-factor authentication Y Zhang, D Han US Patent 11,436,311, 2022 | | 2022 |