Mr. HU Qiao (胡橋)

Research Output

  1. 2022
  2. Published

    Revisiting Error-Correction in Precommitment Distance-Bounding Protocols

    Zhang, J., Yang, A., Hu, Q., Hancke, G. P. & Liu, Z., Oct 2022, In: IEEE Transactions on Industrial Informatics. 18, 10, p. 7097-7106

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 1
    Check@CityULib
  3. Published

    Half-duplex mode-based secure key generation method for resource-constrained IoT devices

    Hu, Q., Zhang, J., Hancke, G. P., Hu, Y., Li, W., Jiang, H. & Qin, Z., 15 Jan 2022, In: IEEE Internet of Things Journal. 9, 2, p. 1326-1338

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 2
    Check@CityULib
  4. 2021
  5. Published

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G. P., Luo, X., Weng, J., Mayes, K., & 1 othersMarkantonakis, K., 15 Jul 2021, In: IEEE Internet of Things Journal. 8, 14, p. 11607-11620

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 13
    Check@CityULib
  6. Published

    Preventing Overshadowing Attacks in Self-Jamming Audio Channels

    Hu, Q., Liu, Y., Yang, A. & Hancke, G. P., Jan 2021, In: IEEE Transactions on Dependable and Secure Computing. 18, 1, p. 45-57 13 p.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 5
    Check@CityULib
  7. 2020
  8. Published

    A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement

    Hu, Q., Du, B., Markantonakis, K. & Hancke, G. P., Jan 2020, In: IEEE Transactions on Industrial Informatics. 16, 1, p. 691-702 8741092.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 18
    Check@CityULib
  9. 2019
  10. Published

    Correlation-based search against friendly jamming data exchange schemes

    ZHANG, J., HU, Q. & HANCKE, G. P., Nov 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC) - Proceedings. IEEE, 8937560. (IEEE Conference on Dependable and Secure Computing, DSC - Proceedings).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Check@CityULib
  11. 2018
  12. Published

    Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

    Hu, Q., Zhang, J., Mitrokotsa, A. & Hancke, G., Sept 2018, In: Computers and Security. 78, p. 281-300

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 15
    Check@CityULib
  13. Published

    HB+DB: Distance bounding meets human based authentication

    Pagnin, E., Yang, A., Hu, Q., Hancke, G. & Mitrokotsa, A., Mar 2018, In: Future Generation Computer Systems. 80, p. 627-639

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 11
    Check@CityULib
  14. 2017
  15. Published

    Self-jamming audio channels: Investigating the feasibility of perceiving overshadowing attacks

    Hu, Q. & Hancke, G., 20 Jul 2017, Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Revised Selected Papers. Hancke, G. P. & Markantonakis, K. (eds.). Springer, Cham, Vol. 10155 LNCS. p. 188-203 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10155 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 3
    Check@CityULib
  16. Published

    Power analysis attack on jamming assisted key agreement

    Hu, Q. & Hancke, G., 26 Jun 2017, International Workshop on Computer Science and Engineering (WCSE 2017). International Workshop on Computer Science and Engineering (WCSE)

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Check@CityULib
  17. Published

    A Session Hijacking Attack on Physical Layer Key Generation Agreement

    HU, Q. & HANCKE, G. P., May 2017, 2017 IEEE International Conference on Industrial Technology (ICIT). IEEE, p. 1418-1423 (IEEE International Conference on Industrial Technology (ICIT)).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 9
    Check@CityULib
  18. 2016
  19. Published

    Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization

    Hu, Q., Dinca, L. M., Yang, A. & Hancke, G., 4 Aug 2016, In: Computer Networks. 105, p. 224-236

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 9
    Check@CityULib
  20. 2015
  21. Published

    Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

    Hu, Q., Dinca, L. M. & Hancke, G., Aug 2015, Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Proceedings. Akram, R. N. & Jajodia, S. (eds.). Springer Verlag, p. 219-234 (Lecture Notes in Computer Science; vol. 9311).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 4
    Check@CityULib