Yih-Chun Hu
#157,664
Most Influential Person Now
Yih-Chun Hu's AcademicInfluence.com Rankings
Yih-Chun Huengineering Degrees
Engineering
#6655
World Rank
#7991
Historical Rank
Electrical Engineering
#2010
World Rank
#2113
Historical Rank

Yih-Chun Hucomputer-science Degrees
Computer Science
#8786
World Rank
#9237
Historical Rank
Database
#5783
World Rank
#5999
Historical Rank

Download Badge
Engineering Computer Science
Yih-Chun Hu's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Electrical Engineering and Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Yih-Chun Hu Influential?
(Suggest an Edit or Addition)Yih-Chun Hu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A performance comparison of multi-hop wireless ad hoc network routing protocols (1998) (5303)
- Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks (2002) (2774)
- Packet leashes: a defense against wormhole attacks in wireless networks (2003) (1815)
- The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 (2007) (1810)
- SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks (2002) (1730)
- Rushing attacks and defense in wireless ad hoc network routing protocols (2003) (840)
- Wormhole attacks in wireless networks (2006) (812)
- A survey of secure wireless ad hoc routing (2004) (733)
- Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks (2001) (676)
- Caching strategies in on-demand routing protocols for wireless ad hoc networks (2000) (400)
- Portcullis: protecting connection setup from denial-of-capability attacks (2007) (236)
- SPV: secure path vector routing for securing BGP (2004) (230)
- Preserving location privacy in wireless lans (2007) (226)
- A Simple Protocol for Multicast and Broadcast in Mobile Ad Hoc Networks (2001) (190)
- Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture (2003) (187)
- Wormhole Detection in Wireless Ad Hoc Networks (2002) (170)
- Security certificate revocation list distribution for vanet (2008) (167)
- Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks (2007) (159)
- Efficient Security Mechanisms for Routing Protocols (2003) (158)
- Efficient Security Mechanisms for Routing Protocolsa (2003) (144)
- Design and analysis of a lightweight certificate revocation mechanism for VANET (2009) (130)
- Secure and precise location verification using distance bounding and simultaneous multilateration (2009) (120)
- Efficient Constructions for One-Way Hash Chains (2005) (120)
- Efficient Certificate Revocation List Organization and Distribution (2011) (106)
- Dynamic Jamming Mitigation for Wireless Broadcast Networks (2008) (87)
- Implicit source routes for on-demand ad hoc network routing (2001) (84)
- Lightweight source authentication and path validation (2014) (81)
- Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks (2004) (78)
- STRONG VANET SECURITY ON A BUDGET (2006) (77)
- Real-World VANET Security Protocol Performance (2009) (76)
- Design and demonstration of live audio and video over multihop wireless ad hoc networks (2002) (67)
- HyperService: Interoperability and Programmability Across Heterogeneous Blockchains (2019) (57)
- Communication requirements for crash avoidance (2010) (55)
- Ensuring cache freshness in on-demand ad hoc network routing protocols (2002) (52)
- SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks (2008) (50)
- Body Area Network Security: Robust Key Establishment Using Human Body Channel (2012) (49)
- Securing quality-of-service route discovery in on-demand routing for ad hoc networks (2004) (43)
- Secure Location Verification Using Simultaneous Multilateration (2012) (39)
- Flow State in the Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (2001) (37)
- MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet (2016) (37)
- Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting (2004) (36)
- CRAWDAD dataset rice/ad_hoc_city (v.2003-09-11) (2003) (34)
- Lightweight source authentication and path validation (2015) (30)
- Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control (2018) (29)
- Mechanized Network Origin and Path Authenticity Proofs (2014) (25)
- Data Security in Vehicular Communication Networks (2009) (24)
- Mirage: Towards Deployable DDoS Defense for Web Applications (2011) (24)
- Enabling Efficient Source and Path Verification via Probabilistic Packet Marking (2018) (22)
- The impact of key assignment on VANET privacy (2010) (22)
- (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP (2006) (22)
- Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding (2017) (21)
- SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination (2012) (20)
- TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network (2017) (19)
- Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks (2009) (18)
- Enabling secure high-performance wireless ad hoc networking (2003) (18)
- Make Web3.0 Connected (2022) (17)
- Coward attacks in vehicular networks (2010) (17)
- Limits on Revocation in VANETs (2010) (17)
- Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure (2018) (17)
- Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region (2014) (15)
- Optimal physical carrier sense in wireless networks (2011) (15)
- SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks (2017) (14)
- Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing (2012) (14)
- Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks (2017) (13)
- Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots (2011) (13)
- The Case for In-Network Replay Suppression (2017) (13)
- Bankrupting the jammer in WSN (2012) (12)
- Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning (2020) (12)
- DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures (2020) (12)
- A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking (2013) (11)
- Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks (2017) (11)
- Load disaggregation using harmonic analysis and regularized optimization (2012) (10)
- BGP with BGPsec: Attacks and Countermeasures (2019) (10)
- Securing wireless medium access control against insider denial-of-service attackers (2015) (10)
- Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP be Secured with BGPsec? (2014) (10)
- CRAFT: a new secure congestion control architecture (2010) (9)
- A Study on False Channel Condition Reporting Attacks in Wireless Networks (2014) (9)
- Demo: bankrupting the jammer (2011) (8)
- A Clean Slate Approach to Secure Wireless Networking (2015) (8)
- SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers (2016) (8)
- Power-Positive Networking (2019) (8)
- Power control for fair dynamic channel reservation in VANETs (2012) (8)
- Protecting vehicular networks privacy in the presence of a single adversarial authority (2017) (8)
- Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN (2009) (8)
- Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems (2015) (7)
- SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection (2019) (7)
- Location Privacy with Randomness Consistency (2016) (7)
- Detection of Anomaly in Train Speed for Intelligent Railway Systems (2018) (6)
- Anycast, Multicast and Beyond: the Role of Manycast in DTN Communication (2011) (6)
- LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems (2022) (6)
- Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming (2013) (6)
- A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks (2017) (6)
- Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications (2016) (6)
- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks (2010) (6)
- The jamming game in an OFDM setting (2011) (6)
- Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum (2018) (5)
- Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging (2017) (5)
- JIM-beam: using spatial randomness to build jamming-resilient wireless flooding networks (2012) (5)
- Securing balise-based train control systems using cryptographic random fountains (2017) (5)
- Secure topology discovery through network-wide clock synchronization (2010) (5)
- Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking (2008) (5)
- Secure cooperative spectrum sensing based on Sybil-resilient clustering (2013) (5)
- Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks (2022) (4)
- Deadline-Aware Multipath Communication: An Optimization Problem (2017) (4)
- Secure Unified Cellular Ad Hoc Network Routing (2009) (4)
- Detection and Prevention Techniques for Wormhole Attacks (2014) (4)
- BlindSignedID: Mitigating Denial-of-Service Attacks on Digital Contact Tracing (2020) (4)
- HASA-Net: A Non-Intrusive Hearing-Aid Speech Assessment Network (2021) (4)
- Convolution Attack on Frequency Hopping by Full-Duplex Radios (2019) (4)
- An orthogonal multiple access coding scheme (2012) (3)
- Secure network-wide clock synchronization in wireless sensor networks (2010) (3)
- TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems (2017) (3)
- Bankrupting the jammer (2011) (3)
- Performance of Cognitive Wireless Charger for Near-Field Wireless Charging (2017) (3)
- A Lightweight Deterministic MAC Protocol Using Low Cross-Correlation Sequences (2011) (3)
- Secure Channel Reservation for Wireless Networks (2010) (3)
- FlowTele: remotely shaping traffic on internet-scale networks (2022) (3)
- TODV: Performance Analysis of a Time on Demand Distance Vector Protocol for MANETS (2011) (3)
- A clean slate design for secure wireless ad-hoc networks — Part 2: Open unsynchronized networks (2015) (2)
- Understanding and Developing a Dynamic Manycast Solution for DTNs (2011) (2)
- Noah: Keyed Noise Flooding for Wireless Confidentiality (2015) (2)
- INTELLIGENT FRAMEWORK FOR QOS OPTIMIZATION IN MANET USING SOFT COMPUTING MODELS (2016) (2)
- Towards Deployable DDoS Defense for Web Applications (2011) (2)
- MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation (2017) (2)
- Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems (2022) (2)
- Low-cost mitigation of privacy loss due to radiometric identification (2011) (2)
- Short paper: a practical view of "mixing" identities in vehicular networks (2011) (1)
- JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial Randomness (2013) (1)
- Cyber-Physical Testbed: Case Study to Evaluate Anti-Reconnaissance Approaches on Power Grids’ Cyber-Physical Infrastructures (2020) (1)
- A clean slate design for secure wireless ad-hoc networks — Part 1: Closed synchronized networks (2015) (1)
- Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems (2022) (1)
- CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report) (2018) (1)
- Did you also hear that? Spectrum sensing using Hermitian inner product (2013) (1)
- Secure and Ultra-Reliable Provenance Recovery in Sparse Networks: Strategies and Performance Bounds (2022) (0)
- VANET'08 - Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking: Forward (2008) (0)
- Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey (2017) (0)
- MobiHoc'12 program chairs' welcome (2012) (0)
- FlowTele (2022) (0)
- Mobicom 2011 Demo Submission: The Feasibility of Physiological-Value-Based Same-Body Detection for Body Area Network (2011) (0)
- Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption (2013) (0)
- Demo: Free Data Communication Using Wireless Charging (2016) (0)
- Selfish Aware Context based Reactive Queue Scheduling Mechanism for MANETs (2016) (0)
- TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack (2022) (0)
- Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008 (2008) (0)
- HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale (2022) (0)
- A Study on the Behavior of MANET Routing Protocols With Varying Densities and Dynamic Mobility Patterns (2019) (0)
- 2 Information-Leakage Location Attacks (2016) (0)
- Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks (2020) (0)
- Comparison of DSDV , DSR and ZRP Routing Protocols in MANETs (2014) (0)
- A Review of Energy Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (2020) (0)
- Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks (2007) (0)
- Rendering Wormhole Attacks Trivial using the Scalability Features of a Geocasting Protocol (2016) (0)
- Key Generation with Ambient Audio (2022) (0)
- Mitigating denial-of-service attacks on digital contact tracing: poster abstract (2020) (0)
- Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, VANET 2007, Montréal, Québec, Canada, September 10, 2007 (2007) (0)
- CRAFT (2010) (0)
- Session details: Applications (2009) (0)
- Efficient Constructions for One-way Hash Chains 1 (2006) (0)
- ARP Attacks in Wireless Ad Hoc Networks (0)
This paper list is powered by the following services: