Follow
Dianqi Han
Title
Cited by
Cited by
Year
Proximity-proof: Secure and usable mobile two-factor authentication
D Han, Y Chen, T Li, R Zhang, Y Zhang, T Hedgpeth
Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018
502018
IndoorWaze: A crowdsourcing-based context-aware indoor navigation system
T Li, D Han, Y Chen, R Zhang, Y Zhang, T Hedgpeth
IEEE Transactions on Wireless Communications 19 (8), 5461-5472, 2020
352020
Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation
LB He, LS Huang, W Yang, R Xu, DQ Han
Quantum Information Processing 11, 1359-1369, 2012
262012
RF-Rhythm: Secure and usable two-factor RFID authentication
J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2194-2203, 2020
242020
Deep learning-guided jamming for cross-technology wireless networks: Attack and defense
D Han, A Li, L Zhang, Y Zhang, J Li, T Li, T Zhu, Y Zhang
IEEE/ACM Transactions on Networking 29 (5), 1922-1932, 2021
212021
SpecKriging: GNN-based secure cooperative spectrum sensing
Y Zhang, A Li, J Li, D Han, T Li, R Zhang, Y Zhang
IEEE Transactions on Wireless Communications 21 (11), 9936-9946, 2022
172022
DroneKey: a drone-aided group-key generation scheme for large-scale IoT networks
D Han, A Li, J Li, Y Zhang, T Li, Y Zhang
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
132021
Secure UHF RFID authentication with smart devices
A Li, J Li, Y Zhang, D Han, T Li, Y Zhang
IEEE Transactions on Wireless Communications 22 (7), 4520-4533, 2022
102022
{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks
A Li, J Li, D Han, Y Zhang, T Li, T Zhu, Y Zhang
32nd USENIX Security Symposium (USENIX Security 23), 1-18, 2023
92023
Rcid: Fingerprinting passive rfid tags via wideband backscatter
J Li, A Li, D Han, Y Zhang, T Li, Y Zhang
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 700-709, 2022
92022
Magauth: Secure and usable two-factor authentication with magnetic wrist wearables
Y Zhang, D Han, A Li, L Zhang, T Li, Y Zhang
IEEE Transactions on Mobile Computing 22 (1), 311-327, 2021
72021
Your home is insecure: Practical attacks on wireless home alarm systems
T Li, D Han, J Li, A Li, Y Zhang, R Zhang, Y Zhang
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
62021
WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID
A Li, J Li, D Han, Y Zhang, T Li, Y Zhang
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
52022
Rhythmic RFID authentication
J Li, C Wang, A Li, D Han, Y Zhang, J Zuo, R Zhang, L Xie, Y Zhang
IEEE/ACM Transactions on Networking 31 (2), 877-890, 2022
42022
WristUnlock: Secure and usable smartphone unlocking with wrist wearables
L Zhang, D Han, A Li, T Li, Y Zhang, Y Zhang
2019 IEEE Conference on Communications and Network Security (CNS), 28-36, 2019
42019
SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets
Y Zhang, D Han, A Li, J Li, T Li, Y Zhang
IEEE Transactions on Mobile Computing 22 (7), 4266-4278, 2022
22022
(In) secure acoustic mobile authentication
D Han, A Li, T Li, L Zhang, Y Zhang, J Li, R Zhang, Y Zhang
IEEE Transactions on Mobile Computing 21 (9), 3193-3207, 2021
22021
IoT Security in the Era of Artificial Intelligence
D Han
Arizona State University, 2022
12022
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems
D Han, A Li, J Li, Y Zhang, T Li, Y Zhang
2024 IEEE 44th International Conference on Distributed Computing Systems …, 2024
2024
Method and apparatus for secure and usable mobile two-factor authentication
Y Zhang, D Han
US Patent 11,436,311, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20