Search Results - "Trappe, Wade"
-
1
A jamming power control game with unknown user’s communication metric
Published in EAI endorsed transactions on energy web (06-05-2024)“…We consider a jamming problem in which a jammer aims to degrade a user’s communication in which the user might differ in applied applications or communication…”
Get full text
Journal Article -
2
Drug Combinations: Mathematical Modeling and Networking Methods
Published in Pharmaceutics (02-05-2019)“…Treatments consisting of mixtures of pharmacological agents have been shown to have superior effects to treatments involving single compounds. Given the vast…”
Get full text
Journal Article -
3
A multiple access channel game with users implementing throughput and latency metrics
Published in ICT express (01-10-2023)“…We consider a multiple access channel (MAC) problem where several users communicate with a base station and in which the users may have different applications…”
Get full text
Journal Article -
4
An eavesdropping and jamming dilemma with sophisticated players
Published in ICT express (01-08-2023)“…Wireless networks are susceptible to malicious attacks, especially those involving eavesdropping and jamming. In this paper, we consider a communication…”
Get full text
Journal Article -
5
Information-Theoretically Secret Key Generation for Fading Wireless Channels
Published in IEEE transactions on information forensics and security (01-06-2010)“…The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying,…”
Get full text
Journal Article -
6
Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
Published in IEEE transactions on vehicular technology (01-06-2010)“…Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil attacks, which allows for many other forms of attacks on the networks…”
Get full text
Journal Article -
7
Dosage strategies for delaying resistance emergence in heterogeneous tumors
Published in FEBS open bio (01-05-2021)“…Drug resistance in cancer treatments is a frequent problem that, when it arises, leads to failure in therapeutic efforts. Tumor heterogeneity is the primary…”
Get full text
Journal Article -
8
Using the physical layer for wireless authentication in time-variant channels
Published in IEEE transactions on wireless communications (01-07-2008)“…The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose…”
Get full text
Journal Article -
9
Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies
Published in Entropy (Basel, Switzerland) (15-07-2017)“…Sharing of radio spectrum between different types of wireless systems (e.g., different service providers) is the foundation for making more efficient usage of…”
Get full text
Journal Article -
10
Channel-based spoofing detection in frequency-selective rayleigh channels
Published in IEEE transactions on wireless communications (01-12-2009)“…The radio channel response decorrelates rapidly as the transmitter changes location in an environment with rich scatterers and reflectors. Based on this fact,…”
Get full text
Journal Article -
11
Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary’s Characteristics
Published in ICST Transactions on Mobile Communications and Applications (01-12-2014)“…In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected…”
Get full text
Journal Article -
12
Projecting the Pandemic Trajectory through Modeling the Transmission Dynamics of COVID-19
Published in International journal of environmental research and public health (09-04-2022)“…The course of the COVID-19 pandemic has given rise to many disease trends at various population scales, ranging from local to global. Understanding these…”
Get full text
Journal Article -
13
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks
Published in Security and communication networks (01-05-2008)“…Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of…”
Get full text
Journal Article -
14
Drug-Resistant Cancer Treatment Strategies Based on the Dynamics of Clonal Evolution and PKPD Modeling of Drug Combinations
Published in IEEE/ACM transactions on computational biology and bioinformatics (01-05-2022)“…A method for determining a dosage strategy is proposed to combat drug resistance in tumor progression. The method is based on a dynamic model for the clonal…”
Get full text
Journal Article -
15
A Sophisticated Anti-Eavesdropping Strategy
Published in IEEE wireless communications letters (01-07-2022)“…Wireless networks are susceptible to malicious attacks, especially those involving eavesdropping. In this paper, we consider a new type of anti-eavesdropping…”
Get full text
Journal Article -
16
A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity
Published in IEEE transactions on information forensics and security (01-04-2016)“…When an adversary illicitly uses spectrum that it is not authorized for, it does so with a purpose in mind, such as to download a file or perhaps engage in a…”
Get full text
Journal Article -
17
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications
Published in IEEE transactions on information forensics and security (01-01-2017)“…The problem of ensuring the secrecy of a communication while simultaneously maintaining sufficient throughput is a fundamental challenge facing secret…”
Get full text
Journal Article -
18
Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System
Published in IEEE transactions on signal processing (01-09-2016)“…Spectrum sharing enables radar and communication systems to share the spectrum efficiently by minimizing mutual interference. Recently proposed multiple-input…”
Get full text
Journal Article -
19
Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks
Published in IEEE wireless communications (01-10-2010)“…While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the…”
Get full text
Journal Article -
20
Collusion-resistant fingerprinting for multimedia
Published in 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (01-05-2002)“…Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints…”
Get full text
Conference Proceeding