Follow
Song Fang
Title
Cited by
Cited by
Year
Wireless communications under broadband reactive jamming attacks
S Fang, Y Liu, P Ning
IEEE Transactions on Dependable and Secure Computing 13 (3), 394-408, 2015
822015
No training hurdles: Fast training-agnostic attacks to infer your typing
S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
422018
Where are you from? Confusing location distinction using virtual multipath camouflage
S Fang, Y Liu, W Shen, H Zhu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
362014
Mimicry attacks against wireless link signature and new defense using time-synched link signature
S Fang, Y Liu, P Ning
IEEE Transactions on Information Forensics and Security 11 (7), 1515-1527, 2016
312016
Virtual multipath attack and defense for location distinction in wireless networks
S Fang, Y Liu, W Shen, H Zhu, T Wang
IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016
252016
Motioncompass: pinpointing wireless camera via motion-activated traffic
Y He, Q He, S Fang, Y Liu
Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021
142021
Wireless-assisted key establishment leveraging channel manipulation
S Fang, I Markwood, Y Liu
IEEE Transactions on Mobile Computing 20 (1), 263-275, 2019
102019
Manipulatable wireless key establishment
S Fang, I Markwood, Y Liu
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
102017
Signal entanglement based pinpoint waveforming for location-restricted service access control
T Wang, Y Liu, T Hou, Q Pei, S Fang
IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016
102016
Entrapment for wireless eavesdroppers
S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019
92019
Wireless training-free keystroke inference attack and defense
E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022
82022
Commandergabble: A universal attack against asr systems leveraging fast speech
Z Zhang, E Yang, S Fang
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
72021
A novel two-timer-based broadcast routing algorithm for vehicular ad-hoc networks
S Fang, T Luo
2013 IEEE International Conference on Green Computing and Communications and …, 2013
72013
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis
E Yang, Q He, S Fang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
62022
Proactive anti-eavesdropping with trap deployment in wireless networks
Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022
52022
A forwarding acknowledgement based multi-hop broadcast algorithm in vehicular ad hoc networks
R Liu, T Luo, L Zhang, J Li, S Fang
Proceedings of 2012 2nd International Conference on Computer Science and …, 2012
32012
DASK: Driving-assisted secret key establishment
E Yang, S Fang, D Shen
2022 IEEE Conference on Communications and Network Security (CNS), 73-81, 2022
22022
GPSKey: GPS-based secret key establishment for intra-vehicle environment
E Yang, S Fang
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022, 2022
22022
Virtual Step PIN Pad: Towards Foot-input Authentication Using Geophones
Y He, H Zhang, E Yang, S Fang
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
22020
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription
Y He, Q He, S Fang, Y Liu
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20