Physical Layer Security
C. Ye, S. Mathur, A. Reznik, W. Trappe and N. Mandayam, "Information-theoretically Secret Key Generation for Fading Wireless Channels," in IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pg. 240-254, June 2010.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, “Using the Physical Layer for Wireless Authentication in Time-variant Channels,” in IEEE Transactions on Wireless Communications, vol. 7, pg. 2571 – 2579, July 2008.
Z. Li, R. Yates, W. Trappe, “Achieving Secret Communication for Fast Rayleigh Fading Channels,” in IEEE Trans. on Wireless Communications, vol. 9, pg. 2792-2799, 2010.
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, N. Mandayam, “ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals,” in Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys), pg. 211-224, 2011.
S. Mathur , W. Trappe, N. Mandayam, C. Ye and A. Reznik, “Radio-telepathy: Extracting a Cryptographic Key from an Un-authenticated Wireless Channel,” in the Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, (ACM MobiCom 2008) (Acceptance Rate: 11.7%).
Privacy in Communications
L. Sankar, W. Trappe, K. Ramchandran, H. V. Poor, M. Debbah, “The Role of Signal Processing in Meeting Privacy Challenges: An Overview,” in IEEE Signal Processing Magazine, pg. 95-106, 2013.
S. Mathur, W. Trappe, “BIT-TRAPS: Building Information-Theoretic Traffic Privacy into Packet Streams,” in IEEE Trans. on Information Forensics and Security, vol. 6, pg. 752-762, 2011.
P. Kamat, Y. Zhang, W. Trappe and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing,” Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems (ICDCS05), pg. 599-608, 2005. (Acceptance Rate: 13%)
P. Kamat, W. Xu, W. Trappe, Y. Zhang, “Temporal Privacy in Wireless Sensor Networks,” in the Proceedings of the 27th IEEE Int. Conference on Distributed Computing Systems (ICDCS07), pg. 23-31, 2007. (Acceptance Rate: 13%)
Defending Wireless Systems from Interference
A. Garnaev, W. Trappe, “One-time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious,” in IEEE Trans. on Information Forensics and Security, vol. 10, no. 5, pg. 1064-1075, 2015.
R. Miller, W. Trappe, “On the Vulnerabilities of CSI in MIMO Wireless Communication Systems,” in IEEE Trans. on Mobile Computing, vol. 8, pg. 1386-1398, 2012.
W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc05), pg. 46-57, 2005. (Acceptance Rate: 14%)
W. Xu, W. Trappe, Y. Zhang, “Anti-Jamming Timing Channels for Wireless Networks,” in Proceedings of the 1st ACM Conference on Wireless Security (WiSec), pg. 203-213, 2008. (Acceptance Rate: 16.7%)
W. Xu, W. Trappe, Y. Zhang, “Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference,” in the Proceedings of the IEEE/ACM International Conference on Information Processing in Sensor Networks (IPSN), 2007. (Acceptance Rate: 22%)
Big Bandwidth—Finding, Using and Protecting our Spectrum
A. Garnaev, W. Trappe, “Bandwidth Scanning when Facing Interference Attacks Aimed at Reducing Spectrum Opportunities,” IEEE Trans. on Information Forensics and Security, vol. 12, no. 8, pg.1916 - 1930, 2017.
A. Garnaev, W. Trappe, “Optimum Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary’s Characteristics,” in ICST Trans. on Mobile Communications, 2014.
A. Garnaev, W. Trappe, “A Bandwidth Monitoring Strategy under Uncertainty of the Adversary’s Activity,” IEEE Trans. on Information Forensics and Security, vol. 11, pg. 837-849, 2016.
B. Li, A. Petropulu, W. Trappe, “Optimum Co-design for Spectrum Sharing between Matrix Completion-based MIMO Radars and MIMO Communication System,” IEEE Trans. on Signal Processing, vol. 64, pg. 4562-4575, 2016.
S. Sagari, S. Baysting, D. Saha, I. Seskar, W. Trappe, D. Raychaudhuri, “Coordinated Dynamic Spectrum Management of LTE-U and Wi-Fi Networks,” in Proceedings of the 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN 2015).
Designing and Securing the Future Internet:
X. Liu, M. Zhao, S. Li, F. Zhang, W. Trappe, “A Security Framework for the Internet of Things in the Future Internet Architecture,” MDPI Future Internet Journal, vol. 9, no. 3, 2017.
A.O. Kaya, M. Chiang, W. Trappe, "P2P-ISP Cooperation: Risks and Mitigation," in Proceedings of the IEEE Global Communications Conference (Globecom), Honolulu, Hawaii, December 2009. (Best Paper Award)
X. Liu, W. Trappe, J. Lindqvist, “A Policy-driven Approach to Access Control in Future Internet Name Resolution Services,” in Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture, pg. 7-12, 2014.
X. Liu, W. Trappe, Y. Zhang, “Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet,” in Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN), pg.1-7, 2013.
For those looking for additional publications, please see my Google Scholar Page.