\n \n \n
\n
\n\n \n \n \n \n \n \n Secure UHF RFID Authentication with Smart Devices.\n \n \n \n \n\n\n \n Li, A.; Li, J.; Han, D.; Zhang, Y.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n
IEEE Transactions on Wireless Communications. December 2022.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@ARTICLE{LiSec22,\n title = {{Secure UHF RFID Authentication with Smart Devices}},\n author = {Ang Li and Jiawei Li and Dianqi Han and Yan Zhang and Tao Li and Yanchao Zhang},\n journal = {IEEE Transactions on Wireless Communications},\n year = {2022},\n %volume = {21},\n %number = {11},\n %pages = {9936--9946},\n url = {https://ieeexplore.ieee.org/document/9982689},\n doi = {10.1109/TWC.2022.3226753},\n month = {December}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Rhythmic RFID Authentication.\n \n \n \n \n\n\n \n Li, J.; Wang, C.; Li, A.; Han, D.; Zhang, Y.; Zuo, J.; Zhang, R.; Lei Xie, undefined; and Zhang, Y.\n\n\n \n\n\n\n
IEEE Transactions on Wireless Communications. September 2022.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@ARTICLE{LiRhy22,\n title = {{Rhythmic RFID Authentication}},\n author = {Jiawei Li and Chuyu Wang and Ang Li and Dianqi Han and Yan Zhang and Jinhang Zuo and Rui Zhang and Lei Xie, and Yanchao Zhang},\n journal = {IEEE Transactions on Wireless Communications},\n year = {2022},\n %volume = {21},\n %number = {11},\n %pages = {9936--9946},\n url = {https://ieeexplore.ieee.org/document/9893050},\n doi = {10.1109/TNET.2022.3204204},\n month = {September}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID.\n \n \n \n \n\n\n \n Li, A.; Li, J.; Han, D.; Zhang, Y.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n In
ACM AsiaCCS, Nagasaki, Japan, June 2022. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{LiWea23,\n author = {Ang Li and Jiawei Li and Dianqi Han and Yan Zhang and Tao Li and Yanchao Zhang},\n title = {{WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID}},\n booktitle = {ACM AsiaCCS},\n url = {https://doi.org/10.1145/3488932.3517426},\n doi = {10.1145/3488932.3517426},\n year = {2022},\n address = {Nagasaki, Japan},\n month = {June}\n}\n\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SpecKriging: GNN-based Secure Cooperative Spectrum Sensing.\n \n \n \n \n\n\n \n Zhang, Y.; Li, A.; Li, J.; Han, D.; Li, T.; Zhang, R.; and Zhang, Y.\n\n\n \n\n\n\n
IEEE Transactions on Wireless Communications, 21(11): 9936–9946. June 2022.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@ARTICLE{ZhangSpe22,\n title = {{SpecKriging: GNN-based Secure Cooperative Spectrum Sensing}},\n author = {Yan Zhang and Ang Li and Jiawei Li and Dianqi Han and Tao Li and Rui Zhang and Yanchao Zhang},\n journal = {IEEE Transactions on Wireless Communications},\n url = {https://ieeexplore.ieee.org/document/9796037},\n doi = {10.1109/TWC.2022.3181064},\n volume = {21},\n number = {11},\n pages = {9936--9946},\n year = {2022},\n month = {June}\n}\n\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SmartMagnet: Proximity-Based Access Control for IoT Devices with Smartphones and Magnets.\n \n \n \n \n\n\n \n Zhang, Y.; Han, D.; Li, A.; Li, J.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n
IEEE Transcations on Mobile Computing. February 2022.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@ARTICLE{LiRhy22,\n title = {{SmartMagnet: Proximity-Based Access Control for IoT Devices with Smartphones and Magnets}},\n author = {Yan Zhang and Dianqi Han and Ang Li and Jiawei Li and Tao Li and Yanchao Zhang},\n journal = {IEEE Transcations on Mobile Computing},\n url = {https://ieeexplore.ieee.org/document/9707637},\n doi = {10.1109/TMC.2022.3149746},\n %volume = {21},\n %number = {11},\n %pages = {9936--9946},\n year = {2022},\n month = {February}\n}\n\n\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks.\n \n \n \n \n\n\n \n Han, D.; Li, A.; Li, J.; Zhang, Y.; Li, T.; and Zhang, Y.\n\n\n \n\n\n\n In
ACM CCS, Virtual, November 2022. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{HanDro22,\n author = {Dianqi Han and Ang Li and Jiawei Li and Yan Zhang and Tao Li and Yanchao Zhang},\n title = {{DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks}},\n booktitle = {ACM CCS},\n url = {https://dl.acm.org/doi/10.1145/3460120.3484789},\n doi = {10.1145/3460120.3484789},\n year = {2022},\n address = {Virtual},\n month = {November}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n RF-Rhythm: Secure and Usable Two-Factor RFID Authentication.\n \n \n \n \n\n\n \n Li, J.; Wang, C.; Li, A.; Han, D.; Zhang, Y.; Zuo, J.; Zhang, R.; Xie, L.; and Zhang, Y.\n\n\n \n\n\n\n In
IEEE INFOCOM, Virtual, May 2022. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{LiRfr20,\n author = {Jiawei Li and Chuyu Wang and Ang Li and Dianqi Han and Yan Zhang and Jinhang Zuo and Rui Zhang and Lei Xie and Yanchao Zhang},\n title = {{RF-Rhythm: Secure and Usable Two-Factor RFID Authentication}},\n booktitle = {IEEE INFOCOM},\n url = {https://ieeexplore.ieee.org/document/9155427},\n doi = {10.1109/INFOCOM41043.2020.9155427},\n year = {2022},\n address = {Virtual},\n month = {May}\n}\n\n\n\n
\n\n\n\n
\n\n\n\n\n\n