热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
徐文渊
2023-05-18 09:25
  • 徐文渊
  • 徐文渊 - 教授 博士生导师-浙江大学-电气工程学院-个人资料

近期热点

资料介绍

个人简历


徐文渊,国家杰出青年基金获得者,教授,博士生导师。
1998年获得浙江大学工业自动化专业学士学位;
2001年获得浙江大学计算机系硕士学位;
2007获得美国罗格斯(Rutgers,The State University of New Jersey)计算机工程博士学位;
2007-2013在美国南卡罗莱纳大学(University of South Carolina)任教,获终身教职;
2008年获得美国国家自然基金CAREER奖。
浙江大学徐文渊教授团队“智能系统安全实验室(USSLAB)”,现招收2021年秋季普博一名。
要求:
1.计算机、网络安全、电气、电子信息专业或者相关;
2.英语六级成绩符合浙江大学普博入学分数线;
3.在物联网安全,包括不限于语音安全、AI安全、传感器安全等方面有研究经验;
4.发表论文者优先。
请有意者发送简历及代表性论文(如果有)邮件,主题为“姓名-硕士毕业院校-2021普博申请”。
教学与课程
计算机网络与通信全英文课

研究领域


物联网安全
语音安全
智能电网安全""

近期论文


2018
Wenyuan Xu,Chen Yan,Xiaoyu Ji,and Jianhao Liu,“Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles,'to appear in the IEEE Internet of Things Journal
2017
Wenyuan Xu,Jing Tian,Yu Chao,and Song Wang,“Challenge-Response Authentication using In-Air Handwriting Style Verification,”IEEE Transactions on Dependable and Secure Computing(TDSC),accepted 2017 BibtexPDF
2016
Weili Han,Zhigong Li,Minyue Ni,Guofei Gu,and Wenyuan Xu,“Shadow Attacks based on Password Reuses:A Quantitative Empirical Analysis,”IEEE Transactions on Dependable and Secure Computing(TDSC),May 2016 BibtexPDF
Hossen Mustafa,Wenyuan Xu,Ahmad-Reza Sadeghi,and Steffen Schulz,“End-to-End Detection of Caller ID Spoofing Attacks,”IEEE Transactions on Dependable and Secure Computing(TDSC),June 2016 BibtexPDF
Miao Xu,Wenyuan Xu,Tingrui Han,and Zhiyun Lin,“Energy Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation,”ACM Transactions on Sensor Networks(TOSN),Vol.12(2),May 2016 BibtexPDF
Wweili Han,Zhigong Li,Lang Yuan,Wenyuan Xu,“Regional Patterns and Vulnerability Analysis of Chinese Web Passwords,”IEEE Transactions on Information Forensics and Security(TIFS),Vol.11(2),pp.258–272,October 2015 BibtexPDF
2014
Ming Xia,Yabo Dong,Wenyuan Xu,Xiangyang Li,and Dongming Lu,'MC2:Multi-Mode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring,'ACM Transactions on Sensor Networks(TOSN),Vol.10(3),pp.52:1--52:30,January 2014 BibtexPDF
Zhenhua Liu,Hongbo Liu,Wenyuan Xu,and Yingying Chen,'An Error Minimizing Framework for Localizing Jammers in Wireless Networks,'IEEE Transaction on Parallel and Distributed Systems(TPDS),Vol.25(2),pp.508-517,February 2014 BibtexPDF
2012
Hossen Mustafa,Xin Zhang,Zhenhua Liu,Wenyuan Xu,and Adrian Perrig,'Jamming-Resilient Multipath Routing,'IEEE Transaction on Dependable and Secure Computing(TDSC),Vol.9(6),pp.852-864,December 2012 BibtexPDF
Jason M O’Kane and Wenyuan Xu,'Energy-Efficient Information Routing in Sensor Networks for Robotic Target Tracking,'Wireless Networks,Vol.18(6),pp.713-733,August 2012 BibtexPDF
Zhenhua Liu,Hongbo Liu,Wenyuan Xu,and Yingying Chen,'Exploiting Jamming-Caused Neighbor Changes for Jammer Localization,'IEEE Transaction on Parallel and Distributed Systems(TPDS),Vol.23(3),pp.547-555,March 2012 BibtexPDF
Guofei Chai,Miao Xu,Wenyuan Xu,and Zhiyun Lin,“Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity,”International Journal of Distributed Sensor Networks,2012 BibtexPDF
Zhenhua Liu and Wenyuan Xu,'Determining Sink Location through Zeroing-In Attackers in Wireless Sensor Networks,'Wireless Networks,Vol.18(3),pp.335-349,April 2012 BibtexPDF
2011
Hongbo Liu,Zhenhua Liu,Yingying Chen and Wenyuan Xu,“Determining the Position of a Jammer Using Virtual-Force Iterative Approach,”Wireless Networks,Vol.17(2),pp.531-547,2011 BibtexPDF
2010
Ming Xia,Yabo Dong,Wenyuan Xu,Dongming Lu and Xiangyang Li,“Multi-mode user-centric design of wireless sensor networks for long-term monitoring,”in ACM SIGMOBILE Mobile Computing and Communications Review,Vol.14(1),pp.25-27,July 2010.BibtexPDF
2009
Pandurang Kamat,Wenyuan Xu,Wade Trappe,and Yanyong Zhang,“Temporal Privacy in Wireless Sensor Networks:Theory and Practice,”ACM Transactions on Sensor Networks(TOSN),Vol.5(4),November,2009.BibtexPDF
2008
Wenyuan Xu,Wade Trappe And Yanyong Zhang,“Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation,”ACM Transactions on Sensor Networks(TOSN),Vol.4(4),August.2008.BibtexPDF
2006
Wenyuan Xu,Wade Trappe And Yanyong Zhang,“Jamming Sensor Networks:Attack and Defense Strategies,”IEEE Networks Special Issue on Sensor Networks,Vol.20(3),pp.41-47,May/June 2006.(Acceptance ratio:10.3%)BibtexPDF
Peer-Reviewed Conference Publications&Conference Proceedings
2018
Yushi Cheng,Xiaoyu Ji,Tianyang Lu,and Wenyuan Xu,“DeWiCam:Detecting Hidden Wireless Cameras via Smartphones,”in Proceedings of ACM Asia Conference on Computer&Communications Security(AsiaCCS)2018,June 4th-8th,Songdo,Incheon,Korea
Chaohao Li,Xiaoyu Ji,Xinyan Zhou,Juchuan Zhang,Jing Tian,Yanmiao Zhang,and Wenyuan Xu,“HlcAuth:Key-free and Secure Communications via Home-Limited Channel,”in Proceedings of ACM Asia Conference on Computer&Communications Security(AsiaCCS)2018,June 4th-8th,Songdo,Incheon,Korea
Zhou Zhuang,Xiaoyu Ji,Taimin Zhang,Juchuan Zhang,Wenyuan Xu,Zhenhua Li,and Yunhao Liu,“FBSleuth:Fake Base Station Forensics via Radio Frequency Fingerprinting,”in Proceedings of ACM Asia Conference on Computer&Communications Security(AsiaCCS)2018,June 4th-8th,Songdo,Incheon,Korea
2017
Guoming Zhang,Chen Yan,Xiaoyu Ji,Tianchen Zhang,Taimin Zhang,Wenyuan Xu,“DolphinAttack:Inaudible Voice Commands,”in Proceedings of the 24th ACM Conference on Computer and Communications Security 2017(Acceptance ratio:18.0%)(Best Paper Award)BibtexPDF
Yuwei Zheng,Lin Huang,Haoqi Shan,Jun Li,Qing Yang,and Wenyuan Xu,“Ghost Telephonist Impersonates You:Vulnerability in 4G LTE CS Fallback,”in Proceedings of the IEEE Communications and Network Security(CNS)2017 Bibtex PDF
Xiaopeng Li,Wenyuan Xu,Song Wang,and Xianshan Qu,“Are You Lying:Validating the Time-Location of Outdoor Images,”in Proceedings of International Conference on Applied Cryptography and Network Security(ACNS),pp 103-123,2017 BibtexPDF
Timothy Trippel,Ofir Weisse,Wenyuan Xu,Peter Honeyman,Kevin Fu,“WALNUT:Waging doubt on integrity of MEMS AcceLerometers by iNjecting acoUsTics,”in Proceedings of the 2nd IEEE European Symposium on Security and Privacy(EuroS&P'17),Paris France,April 26-28 2017(Acceptance ratio:19.6%)BibtexPDF
2016
Yannan Liu,Lingxiao Wei,Zhe Zhou,Kehuan Zhang,Wenyuan Xu,Qiang Xu,“On Code Execution Tracking via Power Side-Channel,”to appear in Proceedings of the 23nd ACM Conference on Computer and Communications Security(CCS 2016)BibtexPDF
Xiaohui Wang,Yanjing Wu,and Wenyuan Xu,“WindCompass:Determine Wind Direction Using Smartphones,”in Proceedings of the 13th IEEE International Conference on Sensing,Communication and Networking(IEEE SECON),London,UK,June 27-30,2016 Bibtex
2014
Gorkem Kar,Hossen Mustafa,Yan Wang,Yingying Chen,Wenyuan Xu,Marco Gruteser,and Tam Vu,“Detection of On-Road Vehicles Emanating GPS Interference,”in Proceedings of the 21th ACM Conference on Computer and Communications Security(ACM CCS),Scottsdale,Arizona,USA,November 3-7,2014(Acceptance ratio:19.5%)BibtexPDF
Hossen Mustafa and Wenyuan Xu,“CETAD:Detecting Evil Twin Access Point Attacks in Wireless Hotspots,”in Proceedings of the IEEE Communications and Network Security(CNS)2014 conference,pp.238–246,San Francisco,CA,October 29-31,2014 BibtexPDF
Zhigong Li,Weili Han,and Wenyuan Xu,“A Large-Scale Empirical Analysis of Chinese Web Passwords,”in Proceedings of the 23th USENIX Security Symposium,San Diego,CA,August 20-22,2014(Acceptance ratio:19.1%)BibtexPDF
Mustafa,Hossen and Xu,Wenyuan and Sadeghi,Ahmad Reza and Schulz,Steffen,“You Can Call but You Can't Hide:Detecting Caller ID Spoofing Attacks,”in Proceedings of the 44th Dependable Systems and Networks(DSN),Atlanta,GA,June 23-26,2014,pp.168–179 BibtexPDF
Dey,Sanorita and Roy,Nirupam and Xu,Wenyuan and Choudhury,Romit Roy and Nelakuditi,Srihari,“AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable,”in Proceedings of the 21th Annual Network&Distributed System Security Symposium(NDSS),San Diego,February 23-26,2014(Acceptance ratio:18.6%)BibtexPDF
2013
Xu,Miao and Xu,Wenyuan,“TACO:Time Synchronization in Wireless Sensor Networks through Temperature-Aware Compensation,”in Proceedings of 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems(IEEE MASS),2013 BibtexPDF
Xu,Miao and Xu,Wenyuan and Walker,Jesse and Moore,Benjamin,“Lightweight secure communication protocols for in-vehicle sensor networks,”in Proceedings of the 2013 ACM workshop on Security,privacy&dependability for cyber vehicles(ACM CyCAR),2013 BibtexPDF
Clark,Shane S and Ransford,Benjamin and Rahmati,Amir and Guineau,Shane and Sorber,Jacob and Xu,Wenyuan and Fu,Kevin and Rahmati,A and Salajegheh,M and Holcomb,D and others,“WattsUpDoc:Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices,”in Proceedings of USENIX security workshop on Health information Technologies,2013 BibtexPDF
Clark,Shane S and Mustafa,Hossen and Ransford,Benjamin and Sorber,Jacob and Fu,Kevin and Xu,Wenyuan,“Current Events:Identifying Webpages by Tapping the Electrical Outlet,”in Proceedings of the European Symposium on Research in Computer Security(ESORICS),2013(Acceptance ratio:17.8%)BibtexPDF
Kune,Denis Foo and Backes,John and Clark,Shane S and Kramer,Daniel and Reynolds,Matthew and Fu,Kevin and Kim,Yongdae and Xu,Wenyuan,“Ghost Talk:Mitigating EMI Signal Injection Attacks against Analog Sensors,”in Proceedings of the IEEE Symposium on Security&Privacy,2013(Acceptance ratio:12.1%)BibtexPDF
Tian,Jing and Qu,Chengzhang and Xu,Wenyuan and Wang,Song,“KinWrite:Handwriting-Based Authentication Using Kinect,”in Proceedings of the 20th Annual Network&Distributed System Security Symposium(NDSS),San Diego,February 24-27,2013(Acceptance ratio:18.8%)BibtexPDF
2012
Rouf,Ishtiaq and Mustafa,Hossen and Xu,Miao and Xu,Wenyuan and Miller,Rob and Gruteser,Marco,“Neighborhood Watch:Security and Privacy Analysis of Automatic Meter Reading Systems,”in Proceedings of the 19th ACM Conference on Computer and Communications Security(ACM CCS),Raleigh,NC,October 16-18,2012(Acceptance ratio:19%)BibtexPDF
Liu,Zhenhua and Liu,Hongbo and Xu,Wenyuan and Chen,Yingying,“Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise,”in Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Systems(IEEE MASS),2012 BibtexPDF
Steffen Schulz,Ahmad-Reza Sadeghi,Maria Zhdanova,Hossen Mustafa,Wenyuan Xu,and Vijay Varadharajan,“Tetherway:A Framework for Tethering Camouflage,”in Proceedings of ACM Conference on Wireless Network Security(WiSec),2012 BibtexPDF
2011
Xu,Miao and Xu,Wenyuan and O'Kane,Jason,'Content-Aware Data Dissemination for Enhancing Privacy and Availability in Wireless Sensor Networks,'in Proceedings of 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems(IEEE MASS),2011 BibtexPDF
Mustafa,Hossen A and Zhang,Xin and Liu,Zhenhua and Xu,Wenyuan and Perrig,Adrian,'Short Paper:Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation,”in Proceedings of ACM Conference on Wireless Network Security(WiSec)2011 BibtexPDF
Liu,Hongbo and Liu,Zhenhua and Chen,Yingying and Xu,Wenyuan,'Localizing Multiple Jamming Attackers in Wireless Networks,'in Proceedings of Int'l Conference on Distributed Computing Systems(ICDCS),2011(Acceptance ratio:15.4%)BibtexPDF
2010
Hou,Jian and Lin,Zhiyun and Xu,Wenyuan and Yan,Gangfeng,“Distributed Transmit Beamforming with Autonomous and Self-organizing Mobile Antennas,”in Proceedings of IEEE Global Communications Conference(IEEE Globecom),Miami,FL,2010 BibtexPDF
Jason M O’Kane and Wenyuan Xu,“Network-assisted target tracking via smart local routing,”in Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS),Taipei,Taiwan,October,2010 BibtexPDF
Ishtiaq Rouf,Rob Miller,Hossen Mustafa,Travis Taylor,Sangho Ohb,Wenyuan Xu,Marco Gruteser,Wade Trappe,and Ivan Seskar,'Security and Privacy Vulnerabilities of In-Car Wireless Networks:A Tire Pressure Monitoring System Case Study,”in Proceedings of the 19th USENIX Security Symposium,Washington DC,August 11-13,2010.(Acceptance ratio:14.5%)BibtexPDF
Liu,Zhenhua and Liu,Hongbo and Xu,Wenyuan and Chen,Yingying,'Wireless Jamming Localization by Exploiting Nodes'Hearing Ranges,'in Proceedings of the International Conference on Distributed Computing in Sensor System(DCOSS),Santa Barbara,CA,June 2010.BibtexPDF
Ishtiaq Rouf,Rob Miller,Hossen Mustafa,Travis Taylor,Sangho Ohb,Wenyuan Xu,Marco Gruteser,Wade Trappe,and Ivan Seskar,'Security and Privacy Vulnerabilities of In-Car Wireless Networks:A Tire Pressure Monitoring System Case Study,”Poster Session,IEEE Symposium on Security and Privacy,Oakland,CA,May,2010.BibtexPDF
Zhenhua Liu and Wenyuan Xu'Zeroing-In on Network Metric Minima for Sink Location Determination,'in Proceedings of ACM Conference on Wireless Network Security(WiSec),2010.(Acceptance ratio:21%)BibtexPDF
Ming Xia,Yabo Dong,Wenyuan Xu,Dongming Lu and Xiangyang Li,“Multi-Mode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring,”Poster Session,the ACM International Conference on Mobile Computing and Networking,2009.BibtexPDF
Hongbo Liu,Wenyuan Xu,Yingying Chen and Zhenhua Liu,'Localizing Jammers in Wireless Networks,'in Proceedings of IEEE PerCom International Workshop on Pervasive Wireless Networking(IEEE PWN)(Held in conjunction with IEEE PerCom),Texas,March 2009.BibtexPDF
2009
Jason M.O’Kane and Wenyuan Xu,“Energy efficient target tracking with a sensorless robot and a network of unreliable one-bit proximity sensors,”in Proceedings of IEEE International Conference of Robotics and Automation(ICRA),Kobe,Japan,May 2009.BibtexPDF
2008
Wenyuan Xu,Wade Trappe and Yanyong Zhang,'Anti-Jamming Timing Channels for Wireless Networks,'in proceedings of 1st ACM Conference on Wireless Security(WiSec2008),pg 203-213,2008.(Acceptance ratio:16.7%)BibtexPDF
2007
Wenyuan Xu,“On Adjusting Power to Defend Wireless Networks from Jamming,”in proceedings of the First Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems(speucs),2007.BibtexPDF
Rob Miller,Wenyuan Xu,Pandurang Kamat and Wade Trappe,“Service Discovery and Device Identification in Cognitive Radio Networks,”in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio(SDR)Networks(Held in Conjunction with IEEE SECON),2007.BibtexPDF
Pandurang Kamat,Wenyuan Xu,Wade Trappe and Yanyong Zhang,“Temporal Privacy in wireless sensor networks,”in Proceedings of the 27th International Conference on Distributed Computing Systems(ICDCS2007),pg.23,2007.(Acceptance ratio:13.5%)BibtexPDF
Wenyuan Xu,Wade Trappe and Yanyong Zhang,“Channel Surfing:Defending Wireless Sensor Networks from Jamming and Interference,”in Proceedings of the 6th International Conference on Information Processing in Sensor Networks(IPSN07),pg.499-508,2007.(Acceptance ratio:22.3%)BibtexPDF
Wenyuan Xu,Wade Trappe and Yanyong Zhang,“Poster Abstract:Channel Surfing:Defending Wireless Sensor Networks from Jamming and Interference,”in Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems(SenSys),pg.403-404,2006.BibtexPDF
2006
Z.Li,Wenyuan Xu,Rob Miller and Wade Trappe,“Securing Wireless Systems via Lower Layer Enforcements,”in Proceedings of the 2006 ACM Workshop on Wireless Security(WiSe),pg.33-42,2006.(Acceptance ratio:19.6%)BibtexPDF
Wenyuan Xu,Pandurang Kamat and Wade Trappe,“TRIESTE:A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes,”in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio(SDR)Networks(Held in Conjunction with IEEE SECON),2006.BibtexPDF
2005
Wenyuan Xu,Wade Trappe,Yanyong Zhang and Timothy Wood,“The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,”in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing(Mobihoc),pg.46-57,2005.(Acceptance ratio:14.2%)BibtexPDF
2004
Wenyuan Xu,Timothy Wood,Wade Trappe,and Yanyong Zhang,“Channel surfing and spatial retreats:defenses against wireless denial of service,”in Proceedings of the 2004 ACM workshop on Wireless security(WiSe),pg.80-89,2004.(Acceptance ratio:20%)BibtexPDF
Wenyuan Xu,Wade Trappe,and Sanjoy Paul,“Key Management for 3G MBMS Security,”in Proceeding of IEEE Global Telecommunications Conference(GLOBECOM),Vol.4,pg.2276-2280,2004.
Associate Editor:
TOSN: Transactions on Sensor Networks;
TIoT: Transactions on Internet of Things;
IEEE Internet of Things Journal;
TMC:IEEE Transactions on Mobile Computing
国际会议技术委员:(Usenix Security, NDSS, IEEE S&P, CCS, etc);

相关热点

扫码添加好友