Publications

Conference Publications

2021

  • Yushi Cheng, Xiaoyu Ji*, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu, mID: Tracing Screen Photos via Moiré Patterns, accepted by the 30th USENIX Security Symposium (USENIX Security) 2021. PDF

  • Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", accepted by IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%).

  • Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", accepted by the Network and Distributed System Security Symposium (NDSS) 2021. PDF

2020

  • J Zhang, X Ji, W Xu, YC Chen, Y Tang, G Qu. "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding ", in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 357-366. PDF

  • C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu. "SoK: A Minimalist Approach to Formalizing Analog Sensor Security", in 2020 IEEE Symposium on Security and Privacy (SP), 480-495

2019

  • Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity, in Proceedings of the IEEE INFOCOM 2019.

  • Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu. “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification”, in Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2019.

  • Yushi Cheng, Xiaoyu Ji*, Wenyuan Xu., Yichao Chen, "DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU", in Proceedings of ACM Conference on Computer and Communications Security (CCS), 2019. (acceptance ratio: 16%).

  • Yushi Cheng, Xiaoyu Ji, Wenyuan Xu., Hao Pan, Zhuangdi Zhu, Chuangwen You, Yi-Chao Chen, Lili Qiu "MagAttack: Guessing Application Launching and Operation via Smartphone", in Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS) 2019.

2018

  • Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu, “DeWiCam: Detecting Hidden Wireless Cameras via Smartphones,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea

  • Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, and Wenyuan Xu, “HlcAuth: Key-free and Secure Communications via Home-Limited Channel,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea

  • Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, and Yunhao Liu, “FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea

2017

  • Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, “DolphinAttack: Inaudible Voice Commands,” in Proceedings of the 24th ACM Conference on Computer and Communications Security 2017 (Acceptance ratio: 18.0%) (Best Paper Award) Bibtex PDF

  • Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, and Wenyuan Xu, “Ghost Telephonist Impersonates You: Vulnerability in 4G LTE CS Fallback,” in Proceedings of the IEEE Communications and Network Security (CNS) 2017 Bibtex PDF

  • Xiaopeng Li, Wenyuan Xu, Song Wang, and Xianshan Qu, “Are You Lying: Validating the Time-Location of Outdoor Images,” in Proceedings of International Conference on Applied Cryptography and Network Security (ACNS), pp 103-123, 2017 Bibtex PDF

  • Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu, “WALNUT: Waging doubt on integrity of MEMS AcceLerometers by iNjecting acoUsTics,” in Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris France, April 26-28 2017 (Acceptance ratio: 19.6%) Bibtex PDF

2016

  • Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu, “On Code Execution Tracking via Power Side-Channel,” to appear in Proceedings of the 23nd ACM Conference on Computer and Communications Security (CCS 2016) Bibtex PDF

  • Xiaohui Wang, Yanjing Wu, and Wenyuan Xu, “WindCompass: Determine Wind Direction Using Smartphones,” in Proceedings of the 13th IEEE International Conference on Sensing, Communication and Networking (IEEE SECON), London, UK, June 27-30, 2016 Bibtex

2014

  • Gorkem Kar, Hossen Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, and Tam Vu, “Detection of On-Road Vehicles Emanating GPS Interference,” in Proceedings of the 21th ACM Conference on Computer and Communications Security (ACM CCS), Scottsdale, Arizona, USA, November 3 - 7, 2014 (Acceptance ratio: 19.5%) Bibtex PDF

  • Hossen Mustafa and Wenyuan Xu, “CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots,” in Proceedings of the IEEE Communications and Network Security (CNS) 2014 conference, pp. 238 – 246, San Francisco, CA, October 29-31, 2014 Bibtex PDF

  • Zhigong Li, Weili Han, and Wenyuan Xu, “A Large-Scale Empirical Analysis of Chinese Web Passwords,” in Proceedings of the 23th USENIX Security Symposium, San Diego, CA, August 20-22, 2014 (Acceptance ratio: 19.1%) Bibtex PDF

  • Mustafa, Hossen and Xu, Wenyuan and Sadeghi, Ahmad Reza and Schulz, Steffen, “You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks,” in Proceedings of the 44th Dependable Systems and Networks (DSN), Atlanta, GA, June 23-26, 2014, pp.168 – 179 Bibtex PDF

  • Dey, Sanorita and Roy, Nirupam and Xu, Wenyuan and Choudhury, Romit Roy and Nelakuditi, Srihari, “AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable,” in Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 23-26, 2014 (Acceptance ratio: 18.6%) Bibtex PDF

2013

  • Xu, Miao and Xu, Wenyuan, “TACO: Time Synchronization in Wireless Sensor Networks through Temperature-Aware Compensation,” in Proceedings of 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS), 2013 Bibtex PDF

  • Xu, Miao and Xu, Wenyuan and Walker, Jesse and Moore, Benjamin, “Lightweight secure communication protocols for in-vehicle sensor networks,” in Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (ACM CyCAR), 2013 Bibtex PDF

  • Clark, Shane S and Ransford, Benjamin and Rahmati, Amir and Guineau, Shane and Sorber, Jacob and Xu, Wenyuan and Fu, Kevin and Rahmati, A and Salajegheh, M and Holcomb, D and others, “WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices,” in Proceedings of USENIX security workshop on Health information Technologies, 2013 Bibtex PDF

  • Clark, Shane S and Mustafa, Hossen and Ransford, Benjamin and Sorber, Jacob and Fu, Kevin and Xu, Wenyuan, “Current Events: Identifying Webpages by Tapping the Electrical Outlet,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2013 (Acceptance ratio: 17.8%) Bibtex PDF

  • Kune, Denis Foo and Backes, John and Clark, Shane S and Kramer, Daniel and Reynolds, Matthew and Fu, Kevin and Kim, Yongdae and Xu, Wenyuan, “Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors,” in Proceedings of the IEEE Symposium on Security & Privacy, 2013 (Acceptance ratio: 12.1%) Bibtex PDF

  • Tian, Jing and Qu, Chengzhang and Xu, Wenyuan and Wang, Song, “KinWrite: Handwriting-Based Authentication Using Kinect,” in Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), San Diego, February 24-27, 2013 (Acceptance ratio: 18.8%) Bibtex PDF

2012

  • Rouf, Ishtiaq and Mustafa, Hossen and Xu, Miao and Xu, Wenyuan and Miller, Rob and Gruteser, Marco, “Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems,” in Proceedings of the 19th ACM Conference on Computer and Communications Security (ACM CCS), Raleigh, NC, October 16-18, 2012 (Acceptance ratio: 19%) Bibtex PDF

  • Liu, Zhenhua and Liu, Hongbo and Xu, Wenyuan and Chen, Yingying, “Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise,” in Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS), 2012 Bibtex PDF

  • Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen Mustafa, Wenyuan Xu, and Vijay Varadharajan, “Tetherway: A Framework for Tethering Camouflage,” in Proceedings of ACM Conference on Wireless Network Security (WiSec), 2012 Bibtex PDF

2011

  • Xu, Miao and Xu, Wenyuan and O'Kane, Jason, "Content-Aware Data Dissemination for Enhancing Privacy and Availability in Wireless Sensor Networks," in Proceedings of 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS), 2011 Bibtex PDF

  • Mustafa, Hossen A and Zhang, Xin and Liu, Zhenhua and Xu, Wenyuan and Perrig, Adrian, "Short Paper: Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation,” in Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011 Bibtex PDF

  • Liu, Hongbo and Liu, Zhenhua and Chen, Yingying and Xu, Wenyuan, "Localizing Multiple Jamming Attackers in Wireless Networks," in Proceedings of Int'l Conference on Distributed Computing Systems (ICDCS), 2011 (Acceptance ratio: 15.4%) Bibtex PDF

2010

  • Hou, Jian and Lin, Zhiyun and Xu, Wenyuan and Yan, Gangfeng, “Distributed Transmit Beamforming with Autonomous and Self-organizing Mobile Antennas,” in Proceedings of IEEE Global Communications Conference (IEEE Globecom), Miami, FL, 2010 Bibtex PDF

  • Jason M O’Kane and Wenyuan Xu, “Network-assisted target tracking via smart local routing,” in Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Taipei, Taiwan, October, 2010 Bibtex PDF

  • Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Ohb, Wenyuan Xu, Marco Gruteser, Wade Trappe, and Ivan Seskar , "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study,” in Proceedings of the 19th USENIX Security Symposium, Washington DC, August 11-13, 2010. (Acceptance ratio: 14.5%) Bibtex PDF

  • Liu, Zhenhua and Liu, Hongbo and Xu, Wenyuan and Chen, Yingying, "Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges," in Proceedings of the International Conference on Distributed Computing in Sensor System(DCOSS), Santa Barbara, CA, June 2010. Bibtex PDF

  • Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Ohb, Wenyuan Xu, Marco Gruteser, Wade Trappe, and Ivan Seskar , "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study,” Poster Session, IEEE Symposium on Security and Privacy, Oakland, CA, May, 2010. Bibtex PDF

  • Zhenhua Liu and Wenyuan Xu "Zeroing-In on Network Metric Minima for Sink Location Determination," in Proceedings of ACM Conference on Wireless Network Security (WiSec), 2010. (Acceptance ratio: 21%) Bibtex PDF

  • Ming Xia, Yabo Dong, Wenyuan Xu, Dongming Lu and Xiangyang Li, “Multi-Mode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring,” Poster Session, the ACM International Conference on Mobile Computing and Networking, 2009. Bibtex PDF

  • Hongbo Liu, Wenyuan Xu, Yingying Chen and Zhenhua Liu, "Localizing Jammers in Wireless Networks," in Proceedings of IEEE PerCom International Workshop on Pervasive Wireless Networking (IEEE PWN) (Held in conjunction with IEEE PerCom), Texas, March 2009. Bibtex PDF

2009

  • Jason M. O’Kane and Wenyuan Xu, “Energy efficient target tracking with a sensorless robot and a network of unreliable one-bit proximity sensors,” in Proceedings of IEEE International Conference of Robotics and Automation (ICRA), Kobe, Japan, May 2009. Bibtex PDF

2008

  • Wenyuan Xu, Wade Trappe and Yanyong Zhang, "Anti-Jamming Timing Channels for Wireless Networks," in proceedings of 1st ACM Conference on Wireless Security (WiSec2008), pg 203-213, 2008. (Acceptance ratio: 16.7%) Bibtex PDF

2007

  • Wenyuan Xu, “On Adjusting Power to Defend Wireless Networks from Jamming,” in proceedings of the First Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems (speucs), 2007. Bibtex PDF

  • Rob Miller, Wenyuan Xu, Pandurang Kamat and Wade Trappe, “Service Discovery and Device Identification in Cognitive Radio Networks,” in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio (SDR) Networks (Held in Conjunction with IEEE SECON), 2007. Bibtex PDF

  • Pandurang Kamat, Wenyuan Xu, Wade Trappe and Yanyong Zhang, “Temporal Privacy in wireless sensor networks,” in Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS2007), pg. 23, 2007. (Acceptance ratio: 13.5%) Bibtex PDF

  • Wenyuan Xu, Wade Trappe and Yanyong Zhang, “Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference,” in Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN07), pg. 499-508, 2007. (Acceptance ratio: 22.3%) Bibtex PDF

  • Wenyuan Xu, Wade Trappe and Yanyong Zhang, “Poster Abstract: Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference,” in Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys), pg. 403-404, 2006. Bibtex PDF

2006

  • Z. Li, Wenyuan Xu, Rob Miller and Wade Trappe, “Securing Wireless Systems via Lower Layer Enforcements,” in Proceedings of the 2006 ACM Workshop on Wireless Security (WiSe), pg. 33-42, 2006. (Acceptance ratio: 19.6%) Bibtex PDF

  • Wenyuan Xu, Pandurang Kamat and Wade Trappe, “TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes,” in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio (SDR) Networks (Held in Conjunction with IEEE SECON), 2006. Bibtex PDF

2005

  • Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), pg. 46-57, 2005. (Acceptance ratio: 14.2%) Bibtex PDF

2004

  • Wenyuan Xu, Timothy Wood, Wade Trappe, and Yanyong Zhang, “Channel surfing and spatial retreats: defenses against wireless denial of service,” in Proceedings of the 2004 ACM workshop on Wireless security (WiSe), pg. 80-89, 2004. (Acceptance ratio: 20%) Bibtex PDF

  • Wenyuan Xu, Wade Trappe, and Sanjoy Paul, “Key Management for 3G MBMS Security,” in Proceeding of IEEE Global Telecommunications Conference (GLOBECOM), Vol. 4, pg. 2276-2280, 2004. Bibtex PDF

Journal Publications

2020

  • Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu "Authenticating Smart Home Devices via Home Limited Channels", in ACM Transactions on Internet of Things 1 (4), 1-24 PDF

  • Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf Malebary, Xianshan Qu, Wenyaun Xu "Identifying child users via touchscreen interactions ", in ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25 PDF

  • Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong. "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration ", in ACM Transactions on Sensor Networks (TOSN) 16 (2), 1-28 PDF

2019

  • Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. “The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants”, in IEEE Transactions on Dependable and Secure Computing (TDSC). PDF

  • Chen Yan, Kevin Fu, Wenyuan Xu “On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion.” Computers in Biology and Medicine 104 (2019): 250-266. PDF

2018

  • Wenyuan Xu, Chen Yan, Xiaoyu Ji, and Jianhao Liu, “Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles," to appear in the IEEE Internet of Things Journal PDF

2017

  • Wenyuan Xu, Jing Tian, Yu Chao, and Song Wang, “Challenge-Response Authentication using In-Air Handwriting Style Verification,” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted 2017 Bibtex PDF

2016

  • Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, and Wenyuan Xu, “Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis,” IEEE Transactions on Dependable and Secure Computing (TDSC), May 2016 Bibtex PDF

  • Hossen Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, and Steffen Schulz, “End-to-End Detection of Caller ID Spoofing Attacks,” IEEE Transactions on Dependable and Secure Computing (TDSC), June 2016 Bibtex PDF

  • Miao Xu, Wenyuan Xu, Tingrui Han, and Zhiyun Lin, “Energy Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation,” ACM Transactions on Sensor Networks (TOSN), Vol. 12(2), May 2016 Bibtex PDF

  • Wweili Han, Zhigong Li, Lang Yuan, Wenyuan Xu, “Regional Patterns and Vulnerability Analysis of Chinese Web Passwords,” IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11(2), pp. 258 – 272, October 2015 Bibtex PDF

2014

  • Ming Xia, Yabo Dong, Wenyuan Xu, Xiangyang Li, and Dongming Lu, "MC2: Multi-Mode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring, " ACM Transactions on Sensor Networks (TOSN), Vol. 10(3), pp.52:1--52:30, January 2014 Bibtex PDF

  • Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen, "An Error Minimizing Framework for Localizing Jammers in Wireless Networks," IEEE Transaction on Parallel and Distributed Systems (TPDS), Vol. 25(2), pp. 508-517, February 2014 Bibtex PDF

2012

  • Hossen Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, and Adrian Perrig, "Jamming-Resilient Multipath Routing," IEEE Transaction on Dependable and Secure Computing (TDSC), Vol. 9(6), pp. 852-864, December 2012 Bibtex PDF

  • Jason M O’Kane and Wenyuan Xu, "Energy-Efficient Information Routing in Sensor Networks for Robotic Target Tracking," Wireless Networks, Vol. 18 (6), pp. 713-733, August 2012 Bibtex PDF

  • Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen, "Exploiting Jamming-Caused Neighbor Changes for Jammer Localization," IEEE Transaction on Parallel and Distributed Systems (TPDS), Vol. 23 (3), pp. 547-555, March 2012 Bibtex PDF

  • Guofei Chai, Miao Xu, Wenyuan Xu, and Zhiyun Lin, “Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity,” International Journal of Distributed Sensor Networks, 2012 Bibtex PDF

  • Zhenhua Liu and Wenyuan Xu, "Determining Sink Location through Zeroing-In Attackers in Wireless Sensor Networks," Wireless Networks, Vol. 18 (3), pp. 335-349, April 2012 Bibtex PDF

2011

  • Hongbo Liu, Zhenhua Liu, Yingying Chen and Wenyuan Xu, “Determining the Position of a Jammer Using Virtual-Force Iterative Approach,” Wireless Networks, Vol. 17 (2), pp. 531-547, 2011 Bibtex PDF

2010

  • Ming Xia, Yabo Dong, Wenyuan Xu, Dongming Lu and Xiangyang Li, “Multi-mode user-centric design of wireless sensor networks for long-term monitoring,” in ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 14 (1), pp. 25-27, July 2010. Bibtex PDF

2009

  • Pandurang Kamat, Wenyuan Xu, Wade Trappe, and Yanyong Zhang, “Temporal Privacy in Wireless Sensor Networks: Theory and Practice,” ACM Transactions on Sensor Networks (TOSN), Vol. 5(4), November, 2009. Bibtex PDF

2008

  • Wenyuan Xu, Wade Trappe And Yanyong Zhang, “Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation,” ACM Transactions on Sensor Networks (TOSN), Vol. 4(4), August. 2008. Bibtex PDF

2006

  • Wenyuan Xu, Wade Trappe And Yanyong Zhang, “Jamming Sensor Networks: Attack and Defense Strategies,” IEEE Networks Special Issue on Sensor Networks, Vol. 20 (3), pp. 41-47, May/June 2006. (Acceptance ratio: 10.3%) Bibtex PDF

Book and Book Chapter Publications

Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, “Securing Emerging Wireless Systems: Lower-layer Approaches,” ISBN: 978-0-387-88490-5, Springer, 2009. Bibtex PDF