Wenhui Hu
Wenhui Hu
Verified email at oracle.com
TitleCited byYear
Cross-layer enhanced source location privacy in sensor networks
M Shao, W Hu, S Zhu, G Cao, S Krishnamurth, T La Porta
2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2009
612009
Duet: library integrity verification for android applications
W Hu, D Octeau, PD McDaniel, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
252014
Compromise-resilient anti-jamming for wireless sensor networks
X Jiang, W Hu, S Zhu, G Cao
International conference on information and communications security, 140-154, 2010
82010
Compromise-resilient anti-jamming communication in wireless sensor networks
X Jiang, W Hu, S Zhu, G Cao
Wireless Networks 17 (6), 1513-1527, 2011
52011
Third-party Library Security Management for Mobile Applications
W Hu
12016
Improvement on OTP authentication and a possession-based authentication framework
S Zhao, W Hu
International Journal of Multimedia Intelligence and Security 3 (2), 187-203, 2018
2018
Fast Solutions for AP-to-AP Handoffs
W Hu, D Forsberg
NordSec 2006, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–7