Publications

2017

Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. DolphinAttack: Inaudible Voice Commands. In Proceedings of the ACM Conference on Computer and Communications Security, 2017.Bibtex  

Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu. SADO: State-Associated and Delay-Oriented Data Collection for Intertidal WSNs, 9th WCSP, 2017.Bibtex  

Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu. A Robust Backup Routing Protocol for Neighbor Area Network in the Smart Grid, 9th WCSP, 2017.Bibtex  

Yujun Xiao, Wenyuan Xu, Zhenhua Jia, Zhuoran Ma, Donglian Qi. NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers. Frontiers of Information Technology & Electronic Engineering, 2017, 18(4): 519-534.Bibtex  PDF

@article{Xiao2017NIPAD, title={NIPAD:a non-invasive power-based anomaly detection scheme for programmable logic controllers}, author={Xiao, Yu Jun and Wen-Yuan, X. U. and Jia, Zhen Hua and Zhuo-Ran, M. A. and Dong-Lian, Q. I.}, journal={信息与电子工程前沿 (英文)}, volume={18}, number={4}, pages={519-534}, year={2017}, }

2016

Chen Yan, Wenyuan Xu, Jianhao Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles." DEF CON 24, 2016. Bibtex  PDF

@article{yan2016can, title={Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle}, author={Yan, Chen and Wenyuan, X and Liu, Jianhao}, journal={DEF CON}, year={2016} }

Yanjing Wu, Zhuoran Ma, Wenyuan Xu. Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors. Electronic Technology, 2016.Bibtex  PDF

@article{Wu2016Research, title={Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors}, author={Wu, Yanjing and Ma, Zhuoran and Xu, Wenyuan}, journal={Electronic Technology}, year={2016}, }

Yinan Wang, Zhiyun Lin, Xiao Liang, Wenyuan Xu, Qiang Yang, Gangfeng Yan. On Modeling of Electrical Cyber Physical Systems Considering Cyber Security. Frontiers of Information Technology & Electronic Engineering, 2016, 17(5): 465-478.Bibtex  PDF

@article{Wang2016On, title={On modeling of electrical cyber-physical systems considering cyber security}, author={Wang, Yi Nan and Lin, Zhi Yun and Liang, Xiao and Xu, Wen Yuan and Yang, Qiang and Yan, Gang Feng}, journal={信息与电子工程前沿 (英文)}, volume={17}, number={5}, pages={465-478}, year={2016}, }

Yinan Wang, Zhiyun Lin, Sicheng Zeng, Wenyuan Xu, Qiang Yang, Gangfeng Yan. A New Framework of Electrical Cyber Physical Systems. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.Bibtex  PDF

@inproceedings{Wang2016A, title={A new framework of electrical cyber physical systems}, author={Wang, Yinan and Zeng, Sicheng and Yang, Qiang and Lin, Zhiyun and Xu, Wenyuan and Yan, Gangfeng}, booktitle={IEEE Conference on Industrial Electronics and Applications}, pages={1334-1339}, year={2016}, }

Ting Zhao, Qiang Yang, Wenyuan Xu, Zhiyun Lin. Assessing Electric Cyber-Physical System using Integrated Co-simulation Platform. Chinese Control Conference(CCC), 2016.Bibtex  PDF

@inproceedings{Zhao2016Assessing, title={Assessing electric cyber-physical system using integrated co-simulation platform}, author={Zhao, Ting and Yang, Qiang and Xu, Wenyuan and Lin, Zhiyun}, booktitle={Control Conference}, pages={9842-9847}, year={2016}, }

Ting Zhao, Yun Xu, Yinan Wang, Zhiyun Lin, Wenyuan Xu and Qiang Yang. On identifying vulnerable nodes for power system in the presence of undetectable cyber attacks. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.Bibtex  PDF

@inproceedings{Zhao2016On, title={On identifying vulnerable nodes for power systems in the presence of undetectable cyber-attacks}, author={Zhao, Ting and Xu, Yun and Wang, Yinan and Lin, Zhiyun and Xu, Wenyuan and Yang, Qiang}, booktitle={Industrial Electronics and Applications}, pages={1062-1067}, year={2016}, }

2013

Denis Foo Kune, John Backes, Shane Clark, Dan Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. In Proceedings of the IEEE Symposium on Security & Privacy, 2013.Bibtex  PDF

@inproceedings{Kune2013Ghost, title={Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors}, author={Kune, Denis Foo and Backes, John and Clark, Shane S. and Kramer, Daniel and Reynolds, Matthew and Fu, Kevin and Kim, Yongdae and Xu, Wenyuan}, booktitle={IEEE Symposium on Security and Privacy}, pages={145-159}, year={2013}, }

Miao Xu, Wenyuan Xu. Taco: Temperature-aware compensation for time synchronization in wireless sensor networks. Mobile Ad-Hoc and Sensor Systems (MASS), 2013.Bibtex  PDF

@inproceedings{Xu2013TACO, title={TACO: Temperature-Aware Compensation for Time Synchronization in Wireless Sensor Networks}, author={Xu, Miao and Xu, Wenyuan}, booktitle={IEEE International Conference on Mobile Ad-Hoc and Sensor Systems}, pages={122-130}, year={2013}, }

2010

Ishtiaq Roufa, Rob Miller, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010.Bibtex  PDF

@inproceedings{Rouf2010Security, title={Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study}, author={Rouf, Ishtiaq and Miller, Rob and Mustafa, Hossen and Taylor, Travis and Oh, Sangho and Xu, Wenyuan and Gruteser, Marco and Trappe, Wade and Seskar, Ivan}, booktitle={Usenix Security Symposium, Washington, Dc, Usa, August 11-13, 2010, Proceedings}, pages={323-338}, year={2010}, }