var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fangli19.github.io%2Fmy_bib.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fangli19.github.io%2Fmy_bib.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fangli19.github.io%2Fmy_bib.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n PhyAuth: Physical-Layer Message Authentication for ZigBee Networks.\n \n \n \n \n\n\n \n Li, A.; Li, J.; Zhang, Y.; Han, D.; Li, T.; Zhu, T.; and Zhang, Y.\n\n\n \n\n\n\n In USENIX Security, Anaheim, CA, August 2023. \n \n\n\n\n
\n\n\n\n \n \n \"PhyAuth:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 20 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiPhy23,\n  author     = {Ang Li and Jiawei Li and Yan Zhang and Dianqi Han and Tao Li and Ting Zhu and Yanchao Zhang},\n  title      = {{PhyAuth: Physical-Layer Message Authentication for ZigBee Networks}},\n  booktitle  = {USENIX Security},\n  url        = {https://www.usenix.org/system/files/sec23summer_387-li_ang-prepub_1.pdf},\n  year       = {2023},\n  address    = {Anaheim, CA},\n  month      = {August}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure UHF RFID Authentication with Smart Devices.\n \n \n \n \n\n\n \n Li, A.; Li, J.; Han, D.; Zhang, Y.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n IEEE Transactions on Wireless Communications. December 2022.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{LiSec22,\n  title        = {{Secure UHF RFID Authentication with Smart Devices}},\n  author       = {Ang Li and Jiawei Li and Dianqi Han and Yan Zhang and Tao Li and Yanchao Zhang},\n  journal      = {IEEE Transactions on Wireless Communications},\n  year         = {2022},\n  %volume      = {21},\n  %number      = {11},\n  %pages       = {9936--9946},\n  url          = {https://ieeexplore.ieee.org/document/9982689},\n  doi          = {10.1109/TWC.2022.3226753},\n  month        = {December}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Rhythmic RFID Authentication.\n \n \n \n \n\n\n \n Li, J.; Wang, C.; Li, A.; Han, D.; Zhang, Y.; Zuo, J.; Zhang, R.; Lei Xie, undefined; and Zhang, Y.\n\n\n \n\n\n\n IEEE Transactions on Wireless Communications. September 2022.\n \n\n\n\n
\n\n\n\n \n \n \"RhythmicPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{LiRhy22,\n  title        = {{Rhythmic RFID Authentication}},\n  author       = {Jiawei Li and Chuyu Wang and Ang Li and Dianqi Han and Yan Zhang and Jinhang Zuo and Rui Zhang and Lei Xie, and Yanchao Zhang},\n  journal      = {IEEE Transactions on Wireless Communications},\n  year         = {2022},\n  %volume      = {21},\n  %number      = {11},\n  %pages       = {9936--9946},\n  url          = {https://ieeexplore.ieee.org/document/9893050},\n  doi          = {10.1109/TNET.2022.3204204},\n  month        = {September}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID.\n \n \n \n \n\n\n \n Li, A.; Li, J.; Han, D.; Zhang, Y.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n In ACM AsiaCCS, Nagasaki, Japan, June 2022. \n \n\n\n\n
\n\n\n\n \n \n \"WearRF-CLA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiWea23,\n  author     = {Ang Li and Jiawei Li and Dianqi Han and Yan Zhang  and Tao Li and Yanchao Zhang},\n  title      = {{WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID}},\n  booktitle  = {ACM AsiaCCS},\n  url        = {https://doi.org/10.1145/3488932.3517426},\n  doi        = {10.1145/3488932.3517426},\n  year       = {2022},\n  address    = {Nagasaki, Japan},\n  month      = {June}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SpecKriging: GNN-based Secure Cooperative Spectrum Sensing.\n \n \n \n \n\n\n \n Zhang, Y.; Li, A.; Li, J.; Han, D.; Li, T.; Zhang, R.; and Zhang, Y.\n\n\n \n\n\n\n IEEE Transactions on Wireless Communications, 21(11): 9936–9946. June 2022.\n \n\n\n\n
\n\n\n\n \n \n \"SpecKriging:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{ZhangSpe22,\n  title        = {{SpecKriging: GNN-based Secure Cooperative Spectrum Sensing}},\n  author       = {Yan Zhang and Ang Li and Jiawei Li and Dianqi Han and Tao Li and Rui Zhang and Yanchao Zhang},\n  journal      = {IEEE Transactions on Wireless Communications},\n  url          = {https://ieeexplore.ieee.org/document/9796037},\n  doi          = {10.1109/TWC.2022.3181064},\n  volume       = {21},\n  number       = {11},\n  pages        = {9936--9946},\n  year         = {2022},\n  month        = {June}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SmartMagnet: Proximity-Based Access Control for IoT Devices with Smartphones and Magnets.\n \n \n \n \n\n\n \n Zhang, Y.; Han, D.; Li, A.; Li, J.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n IEEE Transcations on Mobile Computing. February 2022.\n \n\n\n\n
\n\n\n\n \n \n \"SmartMagnet:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{LiRhy22,\n  title        = {{SmartMagnet: Proximity-Based Access Control for IoT Devices with Smartphones and Magnets}},\n  author       = {Yan Zhang and Dianqi Han  and Ang Li and Jiawei Li and Tao Li and Yanchao Zhang},\n  journal      = {IEEE Transcations on Mobile Computing},\n  url          = {https://ieeexplore.ieee.org/document/9707637},\n  doi          = {10.1109/TMC.2022.3149746},\n  %volume      = {21},\n  %number      = {11},\n  %pages       = {9936--9946},\n  year         = {2022},\n  month       =  {February}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter.\n \n \n \n \n\n\n \n Li, J.; Li, A.; Han, D.; Li, T.; Zhang, Y.; and Zhang, Y.\n\n\n \n\n\n\n In IEEE INFOCOM, Virtual, May 2022. \n \n\n\n\n
\n\n\n\n \n \n \"RCID:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiRci23,\n  author        = {Jiawei Li and Ang Li and Dianqi Han and Tao Li and Yan Zhang and Yanchao Zhang},\n  title         = {{RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter}},\n  booktitle     = {IEEE INFOCOM},\n  url           = {https://ieeexplore.ieee.org/document/9796663},\n  doi           = {10.1109/INFOCOM48880.2022.9796663},\n  year          = {2022},\n  address       = {Virtual},\n  month         = {May}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks.\n \n \n \n \n\n\n \n Han, D.; Li, A.; Li, J.; Zhang, Y.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n In ACM CCS, Virtual, November 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DroneKey:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{HanDro22,\n  author     = {Dianqi Han and Ang Li  and Jiawei Li and Yan Zhang and Tao Li and Yanchao Zhang},\n  title      = {{DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks}},\n  booktitle  = {ACM CCS},\n  url        = {https://dl.acm.org/doi/10.1145/3460120.3484789},\n  doi        = {10.1145/3460120.3484789},\n  year       = {2022},\n  address    = {Virtual},\n  month      = {November}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RF-Rhythm: Secure and Usable Two-Factor RFID Authentication.\n \n \n \n \n\n\n \n Li, J.; Wang, C.; Li, A.; Han, D.; Zhang, Y.; Zuo, J.; Zhang, R.; Xie, L.; and Zhang, Y.\n\n\n \n\n\n\n In IEEE INFOCOM, Virtual, May 2022. \n \n\n\n\n
\n\n\n\n \n \n \"RF-Rhythm:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiRfr20,\n  author     = {Jiawei Li and Chuyu Wang and Ang Li and Dianqi Han and Yan Zhang and Jinhang Zuo and Rui Zhang and Lei Xie and Yanchao Zhang},\n  title      = {{RF-Rhythm: Secure and Usable Two-Factor RFID Authentication}},\n  booktitle  = {IEEE INFOCOM},\n  url        = {https://ieeexplore.ieee.org/document/9155427},\n  doi        = {10.1109/INFOCOM41043.2020.9155427},\n  year       = {2022},\n  address    = {Virtual},\n  month      = {May}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense.\n \n \n \n \n\n\n \n Han, D.; ang Lili Zhang, A. L.; Zhang, Y.; Li, J.; Li, T.; Zhu, T.; and Zhang, Y.\n\n\n \n\n\n\n IEEE/ACM Transactions on Networking, 29(5): 1922–1932. May 2021.\n \n\n\n\n
\n\n\n\n \n \n \"DeepPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{HanDee21,\n  title        = {{Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense}},\n  author       = {Dianqi Han and Ang Li  ang Lili Zhang and Yan Zhang and Jiawei Li and Tao Li and Ting Zhu and Yanchao Zhang},\n  journal      = {IEEE/ACM Transactions on Networking},\n  url          = {https://ieeexplore.ieee.org/document/9444204},\n  doi          = {10.1109/TNET.2021.3082839},\n  volume       = {29},\n  number       = {5},\n  pages        = {1922--1932},\n  year         = {2021},\n  month        = {May}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n (In)secure Acoustic Mobile Authentication.\n \n \n \n \n\n\n \n Han, D.; Li, A.; ang Lili Zhang, T. L.; Zhang, Y.; Li, J.; Zhang, R.; and Zhang, Y.\n\n\n \n\n\n\n IEEE Transactions on Mobile Computing, 21(9): 3193–3207. January 2021.\n \n\n\n\n
\n\n\n\n \n \n \"(In)securePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{HanIns21,\n  title     = {{(In)secure Acoustic Mobile Authentication}},\n  author    = {Dianqi Han and Ang Li  and Tao Li ang Lili Zhang and Yan Zhang and Jiawei Li and Rui Zhang and Yanchao Zhang},\n  journal   = {IEEE Transactions on Mobile Computing},\n  url       = {https://ieeexplore.ieee.org/document/9330780},\n  doi       = {10.1109/TMC.2021.3053282},\n  volume    = {21},\n  number    = {9},\n  pages     = {3193--3207},\n  year      = {2021},\n  month     = {January}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MagAuth: Secure and Usable Two-Factor Authentication with Magnetic Wrist Wearables.\n \n \n \n \n\n\n \n Zhang, Y.; Han, D.; Li, A.; Zhang, L.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n IEEE Transactions on Wireless Communications, 22(1): 311–327. April 2021.\n \n\n\n\n
\n\n\n\n \n \n \"MagAuth:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{ZhangMag21,\n  title     = {{MagAuth: Secure and Usable Two-Factor Authentication with Magnetic Wrist Wearables}},\n  author    = {Yan Zhang and Dianqi Han and Ang Li and Lili Zhang and Tao Li and Yanchao Zhang},\n  journal   = {IEEE Transactions on Wireless Communications},\n  url       = {https://ieeexplore.ieee.org/document/9400761},\n  doi       = {10.1109/TMC.2021.3072598},\n  volume    = {22},\n  number    = {1},\n  pages     = {311--327},\n  year      = {2021},\n  month     = {April}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems.\n \n \n \n \n\n\n \n Li, T.; Han, D.; Li, J.; Li, A.; Zhang, Y.; Zhang, R.; and Zhang, Y.\n\n\n \n\n\n\n In IEEE INFOCOM, Virtual, May 2021. \n \n\n\n\n
\n\n\n\n \n \n \"YourPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiYoui21,\n  author     = {Tao Li and Dianqi Han and Jiawei Li and Ang Li and Yan Zhang and Rui Zhang and Yanchao Zhang},\n  title      = {{Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems}},\n  booktitle  = {IEEE INFOCOM},\n  url        = {https://ieeexplore.ieee.org/document/9488873},\n  doi        = {10.1109/INFOCOM42981.2021.9488873},\n  year       = {2021},\n  address    = {Virtual},\n  month      = {May}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables.\n \n \n \n \n\n\n \n Zhang, L.; Han, D.; Li, A.; Li, T.; Zhang, Y.; and Zhang, Y.\n\n\n \n\n\n\n In IEEE CNS, Washington, DC, August 2019. \n \n\n\n\n
\n\n\n\n \n \n \"WristUnlock:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiRfr20,\n  author     = {Lili Zhang and Dianqi Han and Ang Li and Tao Li and Yan Zhang and Yanchao Zhang},\n  title      = {{WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables}},\n  booktitle  = {IEEE CNS},\n  url        = {https://ieeexplore.ieee.org/document/8802715},\n  doi        = {10.1109/CNS.2019.8802715},\n  year       = {2019},\n  address    = {Washington, DC},\n  month      = {August}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SocialDistance: How Far Are You from Verified Users in Online Social Media?.\n \n \n \n \n\n\n \n Li, A.; Li, T.; Zhang, Y.; Zhang, L.; and Zhang, Y.\n\n\n \n\n\n\n In IEEE/ACM IWQoS, Phoenix, AZ, June 2019. \n \n\n\n\n
\n\n\n\n \n \n \"SocialDistance:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LiRfr20,\n  author     = {Ang Li and Tao Li and Yan Zhang and Lili Zhang and Yanchao Zhang},\n  title      = {{SocialDistance: How Far Are You from Verified Users in Online Social Media?}},\n  booktitle  = {IEEE/ACM IWQoS},\n  url        = {https://dl.acm.org/doi/10.1145/3326285.3329075},\n  doi        = {10.1145/3326285.3329075},\n  year       = {2019},\n  address    = {Phoenix, AZ},\n  month      = {June}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);