Search Results - "Trappe, Wade"

Refine Results
  1. 1

    A jamming power control game with unknown user’s communication metric by Garnaev, Andrey, Trappe, Wade

    Published in EAI endorsed transactions on energy web (06-05-2024)
    “…We consider a jamming problem in which a jammer aims to degrade a user’s communication in which the user might differ in applied applications or communication…”
    Get full text
    Journal Article
  2. 2

    Drug Combinations: Mathematical Modeling and Networking Methods by Vakil, Vahideh, Trappe, Wade

    Published in Pharmaceutics (02-05-2019)
    “…Treatments consisting of mixtures of pharmacological agents have been shown to have superior effects to treatments involving single compounds. Given the vast…”
    Get full text
    Journal Article
  3. 3

    A multiple access channel game with users implementing throughput and latency metrics by Garnaev, Andrey, Trappe, Wade

    Published in ICT express (01-10-2023)
    “…We consider a multiple access channel (MAC) problem where several users communicate with a base station and in which the users may have different applications…”
    Get full text
    Journal Article
  4. 4

    An eavesdropping and jamming dilemma with sophisticated players by Garnaev, Andrey, Trappe, Wade

    Published in ICT express (01-08-2023)
    “…Wireless networks are susceptible to malicious attacks, especially those involving eavesdropping and jamming. In this paper, we consider a communication…”
    Get full text
    Journal Article
  5. 5

    Information-Theoretically Secret Key Generation for Fading Wireless Channels by Chunxuan Ye, Mathur, Suhas, Reznik, Alex, Shah, Yogendra, Trappe, Wade, Mandayam, Narayan B

    “…The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying,…”
    Get full text
    Journal Article
  6. 6

    Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks by Yingying Chen, Jie Yang, Trappe, Wade, Martin, Richard P

    Published in IEEE transactions on vehicular technology (01-06-2010)
    “…Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil attacks, which allows for many other forms of attacks on the networks…”
    Get full text
    Journal Article
  7. 7

    Dosage strategies for delaying resistance emergence in heterogeneous tumors by Vakil, Vahideh, Trappe, Wade

    Published in FEBS open bio (01-05-2021)
    “…Drug resistance in cancer treatments is a frequent problem that, when it arises, leads to failure in therapeutic efforts. Tumor heterogeneity is the primary…”
    Get full text
    Journal Article
  8. 8

    Using the physical layer for wireless authentication in time-variant channels by Liang Xiao, Greenstein, L., Mandayam, N., Trappe, W.

    “…The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose…”
    Get full text
    Journal Article
  9. 9

    Competitive Sharing of Spectrum: Reservation Obfuscation and Verification Strategies by Garnaev, Andrey, Trappe, Wade

    Published in Entropy (Basel, Switzerland) (15-07-2017)
    “…Sharing of radio spectrum between different types of wireless systems (e.g., different service providers) is the foundation for making more efficient usage of…”
    Get full text
    Journal Article
  10. 10

    Channel-based spoofing detection in frequency-selective rayleigh channels by Liang Xiao, Greenstein, L.J., Mandayam, N.B., Trappe, W.

    “…The radio channel response decorrelates rapidly as the transmitter changes location in an environment with rich scatterers and reflectors. Based on this fact,…”
    Get full text
    Journal Article
  11. 11

    Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary’s Characteristics by Garnaev, Andrey, Trappe, Wade

    “…In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an intelligent Invader who wants to utilize spectrum undetected…”
    Get full text
    Journal Article
  12. 12

    Projecting the Pandemic Trajectory through Modeling the Transmission Dynamics of COVID-19 by Vakil, Vahideh, Trappe, Wade

    “…The course of the COVID-19 pandemic has given rise to many disease trends at various population scales, ranging from local to global. Understanding these…”
    Get full text
    Journal Article
  13. 13

    Secure, pseudonymous, and auditable communication in vehicular ad hoc networks by Kamat, Pandurang, Baliga, Arati, Trappe, Wade

    Published in Security and communication networks (01-05-2008)
    “…Vehicular ad hoc networks (VANETs) represent a promising new communication technology that can facilitate many new forms of automotive applications. Many of…”
    Get full text
    Journal Article
  14. 14

    Drug-Resistant Cancer Treatment Strategies Based on the Dynamics of Clonal Evolution and PKPD Modeling of Drug Combinations by Vakil, Vahideh, Trappe, Wade

    “…A method for determining a dosage strategy is proposed to combat drug resistance in tumor progression. The method is based on a dynamic model for the clonal…”
    Get full text
    Journal Article
  15. 15

    A Sophisticated Anti-Eavesdropping Strategy by Garnaev, Andrey, Trappe, Wade

    Published in IEEE wireless communications letters (01-07-2022)
    “…Wireless networks are susceptible to malicious attacks, especially those involving eavesdropping. In this paper, we consider a new type of anti-eavesdropping…”
    Get full text
    Journal Article
  16. 16

    A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary's Activity by Garnaev, Andrey, Trappe, Wade

    “…When an adversary illicitly uses spectrum that it is not authorized for, it does so with a purpose in mind, such as to download a file or perhaps engage in a…”
    Get full text
    Journal Article
  17. 17

    Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications by Garnaev, Andrey, Trappe, Wade

    “…The problem of ensuring the secrecy of a communication while simultaneously maintaining sufficient throughput is a fundamental challenge facing secret…”
    Get full text
    Journal Article
  18. 18

    Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System by Bo Li, Petropulu, Athina P., Trappe, Wade

    Published in IEEE transactions on signal processing (01-09-2016)
    “…Spectrum sharing enables radar and communication systems to share the spectrum efficiently by minimizing mutual interference. Recently proposed multiple-input…”
    Get full text
    Journal Article
  19. 19

    Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks by Mathur, Suhas, Reznik, Alex, Ye, Chunxuan, Mukherjee, Rajat, Rahman, Akbar, Shah, Yogendra, Trappe, Wade, Mandayam, Narayan

    Published in IEEE wireless communications (01-10-2010)
    “…While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the…”
    Get full text
    Journal Article
  20. 20

    Collusion-resistant fingerprinting for multimedia by Trappe, Wade, Wu, Min, Liu, K.J. Ray

    “…Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints…”
    Get full text
    Conference Proceeding