default search action
Dianqi Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j8]Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, Yanchao Zhang:
MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist Wearables. IEEE Trans. Mob. Comput. 22(1): 311-327 (2023) - [j7]Yan Zhang, Dianqi Han, Ang Li, Jiawei Li, Tao Li, Yanchao Zhang:
SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets. IEEE Trans. Mob. Comput. 22(7): 4266-4278 (2023) - [j6]Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:
Rhythmic RFID Authentication. IEEE/ACM Trans. Netw. 31(2): 877-890 (2023) - [j5]Ang Li, Jiawei Li, Yan Zhang, Dianqi Han, Tao Li, Yanchao Zhang:
Secure UHF RFID Authentication With Smart Devices. IEEE Trans. Wirel. Commun. 22(7): 4520-4533 (2023) - 2022
- [j4]Dianqi Han, Ang Li, Tao Li, Lili Zhang, Yan Zhang, Jiawei Li, Rui Zhang, Yanchao Zhang:
(In)secure Acoustic Mobile Authentication. IEEE Trans. Mob. Comput. 21(9): 3193-3207 (2022) - [j3]Yan Zhang, Ang Li, Jiawei Li, Dianqi Han, Tao Li, Rui Zhang, Yanchao Zhang:
SpecKriging: GNN-Based Secure Cooperative Spectrum Sensing. IEEE Trans. Wirel. Commun. 21(11): 9936-9946 (2022) - 2021
- [j2]Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Ting Zhu, Yanchao Zhang:
Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense. IEEE/ACM Trans. Netw. 29(5): 1922-1932 (2021) - 2020
- [j1]Tao Li, Dianqi Han, Yimin Chen, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
IndoorWaze: A Crowdsourcing-Based Context-Aware Indoor Navigation System. IEEE Trans. Wirel. Commun. 19(8): 5461-5472 (2020)
Conference and Workshop Papers
- 2024
- [c9]Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang:
WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems. ICDCS 2024: 1342-1353 - 2023
- [c8]Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang:
PhyAuth: Physical-Layer Message Authentication for ZigBee Networks. USENIX Security Symposium 2023: 1-18 - 2022
- [c7]Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang:
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID. AsiaCCS 2022: 508-520 - [c6]Jiawei Li, Ang Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang:
RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter. INFOCOM 2022: 700-709 - 2021
- [c5]Dianqi Han, Ang Li, Jiawei Li, Yan Zhang, Tao Li, Yanchao Zhang:
DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks. CCS 2021: 1306-1319 - [c4]Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, Yanchao Zhang:
Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems. INFOCOM 2021: 1-10 - 2020
- [c3]Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:
RF-Rhythm: Secure and Usable Two-Factor RFID Authentication. INFOCOM 2020: 2194-2203 - 2019
- [c2]Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, Yanchao Zhang:
WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables. CNS 2019: 28-36 - 2018
- [c1]Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication. MobiCom 2018: 401-415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint