1. MagAuth: secure and usable two-factor authentication with magnetic wrist wearables. Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, and Yanchao Zhang. IEEE Transactions on Mobile Computing, 2021.
2. SpecKriging: GNN-based secure cooperative spectrum sensing. Yan Zhang, Ang Li, Jiawei Li, Dianqi Han, Tao Li, Rui Zhang, and Yanchao Zhang. IEEE Transactions on Wireless Communications, 2022.
3. SmartMagnet: proximity-based access control for IoT devices with smartphones and magnets. Yan Zhang, Dianqi Han, Ang Li, Jiawei Li, Tao Li, and Yanchao Zhang. IEEE Transactions on Mobile Computing, 2022.
4. WearRF-CLA: continuous location authentication with wrist wearables and UHF RFID. Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang. ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2022.
5. RCID: fingerprinting passive RFID tags via wideband backscatter. Jiawei Li, Ang Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang. IEEE International Conference on Computer Communications (INFOCOM), 2022.
6. DroneKey: a drone-aided group-key generation scheme for large-scale IoT networks. Dianqi Han, Ang Li, Yan Zhang, Jiawei Li, Tao Li, and Yanchao Zhang. ACM Conference on Computer and Communications Security (CCS), 2021.
7. Deep learning-guided jamming for cross-technology wireless networks: attack and fefense. Dianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Ting Zhu, and Yanchao Zhang.IEEE/ACM Transactions on Networking, 2021.
8. (In)secure acoustic mobile authentication. Dianqi Han, Ang Li, Tao Li, Lili Zhang, Yan Zhang, Jiawei Li, Rui Zhang, and Yanchao Zhang. IEEE Transactions on Mobile Computing, 2021.
9. Your home is insecure: practical attacks on wireless home alarm systems. Tao Li, Dianqi Han, Jiawei Li, Ang Li, Yan Zhang, Rui Zhang, and Yanchao Zhang. IEEE International Conference on Computer Communications (INFOCOM), 2021.
10. RF-Rhythm: secure and usable two-factor RFID authentication. Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang. IEEE International Conference on Computer Communications (INFOCOM), 2020.
11. WristUnlock: secure and usable smartphone unlocking with wrist wearables. Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, and Yanchao Zhang. IEEE International Conference on Communications and Network Security (CNS), 2019.
12. SocialDistance: how far are you from verified users in online social media. Ang Li, Tao Li, Yan Zhang, Lili Zhang, and Yanchao Zhang. IEEE/ACM International Symposium on Quality of Service (IWQoS), 2019.
13. QoS-aware proportional fair energy-efficient resource allocation with imperfect CSI in downlink OFDMA systems. Jing Wang, Yan Zhang, Hui Hui, and Ningbo Zhang. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2015.
14. Outage performance of MIMO cooperative networks with selective OFDMA relaying. Jing Wang, and Yan Zhang. Electronics Letters, 2016.
15. PhyAuth: Physical-Layer Message Authentication for ZigBee Networks. Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, and Yanchao Zhang. USENIX security symposium, 2023.
16. Secure UHF RFID Authentication with Smart Devices. Ang Li, Jiawei Li, Yan Zhang, Dianqi Han, Tao Li, Yanchao Zhang. IEEE Transactions on Wireless Communications, 2022.
17. Rhythmic RFID Authentication. Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang. IEEE/ACM Transactions on Networking, 2022.