


default search action
Loukas Lazos
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Ziqi Xu, Jingcheng Li, Yanjun Pan, Ming Li, Loukas Lazos:
Harvesting Physical-Layer Randomness in Millimeter Wave Bands. IEEE Trans. Mob. Comput. 24(3): 2285-2300 (2025) - 2024
- [j29]Nirnimesh Ghose
, Kaustubh Gupta, Loukas Lazos
, Ming Li
, Ziqi Xu, Jincheng Li:
ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification. IEEE Trans. Mob. Comput. 23(5): 6318-6333 (2024) - 2023
- [j28]Islam Samy
, Xiao Han
, Loukas Lazos
, Ming Li
, Yong Xiao
, Marwan Krunz
:
Misbehavior Detection in Wi-Fi/LTE Coexistence Over Unlicensed Bands. IEEE Trans. Mob. Comput. 22(8): 4773-4791 (2023) - [c43]Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li:
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. ICNC 2023: 54-60 - [i9]Ziqi Xu, Jingcheng Li, Yanjun Pan, Ming Li, Loukas Lazos:
Secret-Free Device Pairing in the mmWave Band. CoRR abs/2306.17330 (2023) - [i8]Jingcheng Li, Loukas Lazos, Ming Li:
SecBeam: Securing mmWave Beam Alignment against Beam-Stealing Attacks. CoRR abs/2307.00178 (2023) - 2022
- [j27]Nirnimesh Ghose
, Loukas Lazos
, Ming Li
:
In-Band Secret-Free Pairing for COTS Wireless Devices. IEEE Trans. Mob. Comput. 21(2): 612-628 (2022) - [c42]Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose:
PoF: Proof-of-Following for Vehicle Platoons. NDSS 2022 - [i7]Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li:
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. CoRR abs/2209.00080 (2022) - 2021
- [j26]Gokhan Calis
, Swetha Shivaramaiah, Onur Ozan Koyluoglu
, Loukas Lazos
:
Repair Strategies for Mobile Storage Systems. IEEE Trans. Cloud Comput. 9(4): 1575-1591 (2021) - [j25]Islam Samy
, Mohamed Adel Attia, Ravi Tandon
, Loukas Lazos:
Asymmetric Leaky Private Information Retrieval. IEEE Trans. Inf. Theory 67(8): 5352-5369 (2021) - [c41]Islam Samy, Mohamed Adel Attia, Ravi Tandon, Loukas Lazos:
On the Capacity of Latent Variable Private Information Retrieval. ISIT 2021: 1907-1912 - [c40]Yanjun Pan
, Ziqi Xu, Ming Li, Loukas Lazos:
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. MobiHoc 2021: 231-240 - [i6]Islam Samy, Xiao Han, Loukas Lazos, Ming Li, Yong Xiao, Marwan Krunz:
Misbehavior Detection in Wi-Fi/LTE Coexistence over Unlicensed Bands. CoRR abs/2104.02776 (2021) - [i5]Yanjun Pan, Ziqi Xu, Ming Li, Loukas Lazos:
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. CoRR abs/2106.02731 (2021) - [i4]Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose:
PoF: Proof-of-Following for Vehicle Platoons. CoRR abs/2107.09863 (2021) - 2020
- [j24]Yan Zhang, Loukas Lazos
:
Misbehavior in Multi-Channel MAC Protocols. IEEE Trans. Dependable Secur. Comput. 17(4): 760-774 (2020) - [j23]Li Li
, Loukas Lazos
:
Proofs of Physical Reliability for Cloud Storage Systems. IEEE Trans. Parallel Distributed Syst. 31(5): 1048-1065 (2020) - [c39]Xiao Han
, Islam Samy, Loukas Lazos:
Energy-efficient LTE/Wi-Fi Coexistence. ICC 2020: 1-7 - [c38]Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, Marwan Krunz:
Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users. ICC 2020: 1-7 - [c37]Islam Samy, Mohamed Adel Attia, Ravi Tandon, Loukas Lazos:
Latent-variable Private Information Retrieval. ISIT 2020: 1071-1076 - [i3]Islam Samy, Mohamed Adel Attia, Ravi Tandon, Loukas Lazos:
Latent-variable Private Information Retrieval. CoRR abs/2001.05998 (2020) - [i2]Islam Samy, Mohamed Adel Attia, Ravi Tandon, Loukas Lazos:
Asymmetric Leaky Private Information Retrieval. CoRR abs/2006.03048 (2020)
2010 – 2019
- 2019
- [j22]Ahmed M. Salama
, Ming Li
, Loukas Lazos, Yong Xiao, Marwan Krunz:
Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access. IEEE Trans. Cogn. Commun. Netw. 5(3): 611-624 (2019) - [c36]Islam Samy, Loukas Lazos:
Optimum Priority Class Selection Under Wi-Fi/LTE Coexistence. ICC 2019: 1-7 - [c35]Islam Samy, Ravi Tandon, Loukas Lazos:
On the Capacity of Leaky Private Information Retrieval. ISIT 2019: 1262-1266 - [c34]Nirnimesh Ghose, Loukas Lazos, Jerzy W. Rozenblit, Ronald L. Breiger
:
Multimodal Graph Analysis of Cyber Attacks. SpringSim 2019: 1-12 - 2018
- [j21]Nirnimesh Ghose
, Bocan Hu, Yan Zhang, Loukas Lazos:
Secure Physical Layer Voting. IEEE Trans. Mob. Comput. 17(3): 688-702 (2018) - [c33]Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, Marwan Krunz:
On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access. DySPAN 2018: 1-10 - [c32]Nirnimesh Ghose, Loukas Lazos, Ming Li:
SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices. INFOCOM 2018: 1529-1537 - [c31]Nirnimesh Ghose, Loukas Lazos, Ming Li:
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks. IEEE Symposium on Security and Privacy 2018: 819-835 - [c30]Islam Samy, Loukas Lazos, Yong Xiao, Ming Li, Marwan Krunz:
LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard. WISEC 2018: 87-98 - 2017
- [j20]Alejandro Proaño, Loukas Lazos, Marwan Krunz:
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs. IEEE Trans. Mob. Comput. 16(3): 857-871 (2017) - [j19]Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, Swetha Shivaramaiah:
Multi-Channel Medium Access without Control Channels: A Full Duplex MAC Design. IEEE Trans. Mob. Comput. 16(4): 1032-1046 (2017) - [c29]Nirnimesh Ghose, Loukas Lazos, Ming Li:
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation. USENIX Security Symposium 2017: 433-450 - [i1]Gokhan Calis, Swetha Shivaramaiah, Onur Ozan Koyluoglu, Loukas Lazos:
Repair Strategies for Storage on Mobile Clouds. CoRR abs/1703.00428 (2017) - 2016
- [j18]Hanif Rahbari
, Marwan Krunz, Loukas Lazos:
Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems. IEEE Trans. Mob. Comput. 15(5): 1264-1278 (2016) - [j17]Yu Zhang, Loukas Lazos
, William Kozma
:
AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 15(8): 1893-1907 (2016) - [c28]Swetha Shivaramaiah, Gokhan Calis, Onur Ozan Koyluoglu, Loukas Lazos:
Threshold-Based File Maintenance Strategies for Mobile Cloud Storage Systems. GLOBECOM 2016: 1-7 - 2015
- [j16]Sisi Liu, Loukas Lazos, Marwan Krunz:
Time-Delayed Broadcasting for Defeating Inside Jammers. IEEE Trans. Dependable Secur. Comput. 12(3): 351-365 (2015) - [c27]Bocan Hu, Yan Zhang, Loukas Lazos:
PHYVOS: Physical layer voting for secure and fast cooperation. CNS 2015: 245-253 - 2014
- [c26]Thienne M. Johnson, Loukas Lazos:
Network anomaly detection using autonomous system flow aggregates. GLOBECOM 2014: 544-550 - [c25]Qin Zhang, Loukas Lazos:
Collusion-resistant query anonymization for location-based services. ICC 2014: 768-774 - [c24]Hanif Rahbari
, Marwan Krunz, Loukas Lazos:
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. INFOCOM 2014: 1015-1023 - [c23]Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, Swetha Shivaramaiah:
FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver. INFOCOM 2014: 2742-2750 - [c22]J. Joseph Fowler, Thienne M. Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen G. Kobourov
, Loukas Lazos:
IMap: visualizing network activity over internet maps. VizSEC 2014: 80-87 - 2013
- [j15]Yan Zhang, Loukas Lazos:
Vulnerabilities of cognitive radio MAC protocols and countermeasures. IEEE Netw. 27(3): 40-45 (2013) - [c21]Yan Zhang, Loukas Lazos:
Countering selfish misbehavior in multi-channel MAC protocols. INFOCOM 2013: 2787-2795 - [c20]Alejandro Proaño, Loukas Lazos:
Perfect contextual information privacy in WSNs undercolluding eavesdroppers. WISEC 2013: 89-94 - [c19]Guevara Noubir, Krishna Sampigethaya, Levente Buttyán, Loukas Lazos:
Welcome message from the D-SPAN 2013 chairs. WOWMOM 2013: 1 - 2012
- [j14]Milan Bradonjic, Loukas Lazos:
Graph-based criteria for spectrum-aware clustering in cognitive radio networks. Ad Hoc Networks 10(1): 75-94 (2012) - [j13]Alejandro Proaño, Loukas Lazos:
Packet-Hiding Methods for Preventing Selective Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 9(1): 101-114 (2012) - [j12]Sisi Liu, Loukas Lazos, Marwan Krunz:
Thwarting Control-Channel Jamming Attacks from Inside Jammers. IEEE Trans. Mob. Comput. 11(9): 1545-1558 (2012) - [j11]Sisi Liu, Loukas Lazos, Marwan Krunz:
Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks. IEEE Trans. Mob. Comput. 11(10): 1436-1449 (2012) - [c18]Alejandro Proaño, Loukas Lazos:
Hiding contextual information in WSNs. WOWMOM 2012: 1-6 - [e1]Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe:
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012. ACM 2012, ISBN 978-1-4503-1265-3 [contents] - 2011
- [j10]Basel Alomair
, Loukas Lazos, Radha Poovendran
:
Securing low-cost RFID systems: An unconditionally secure approach. J. Comput. Secur. 19(2): 229-257 (2011) - [j9]Loukas Lazos, Marwan Krunz:
Selective jamming/dropping insider attacks in wireless mesh networks. IEEE Netw. 25(1): 30-34 (2011) - [c17]Sisi Liu, Loukas Lazos, Marwan Krunz:
Thwarting inside jamming attacks on wireless broadcast communications. WISEC 2011: 29-40 - 2010
- [c16]Alejandro Proaño, Loukas Lazos:
Selective Jamming Attacks in Wireless Networks. ICC 2010: 1-6
2000 – 2009
- 2009
- [j8]Loukas Lazos, Radha Poovendran
, James A. Ritcey:
Analytic evaluation of target detection in heterogeneous wireless sensor networks. ACM Trans. Sens. Networks 5(2): 18:1-18:38 (2009) - [j7]Loukas Lazos, Radha Poovendran
, James A. Ritcey:
Detection of mobile targets on the plane and in space using heterogeneous sensor networks. Wirel. Networks 15(5): 667-690 (2009) - [c15]Loukas Lazos, Sisi Liu, Marwan Krunz:
Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networks. SECON 2009: 1-9 - [c14]William Kozma
, Loukas Lazos:
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. SecureComm 2009: 207-227 - [c13]William Kozma
, Loukas Lazos:
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. WISEC 2009: 103-110 - [c12]Loukas Lazos, Sisi Liu, Marwan Krunz:
Mitigating control-channel jamming attacks in multi-channel ad hoc networks. WISEC 2009: 169-180 - 2008
- [c11]William Kozma
, Loukas Lazos:
Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits. SECON 2008: 612-614 - 2007
- [j6]Javier Salido, Loukas Lazos, Radha Poovendran:
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. IEEE/ACM Trans. Netw. 15(6): 1527-1540 (2007) - [j5]Radha Poovendran
, Loukas Lazos:
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Networks 13(1): 27-59 (2007) - [j4]Loukas Lazos, Radha Poovendran
:
Power proximity based key management for secure multicast in ad hoc networks. Wirel. Networks 13(1): 127-148 (2007) - [c10]Basel Alomair
, Loukas Lazos, Radha Poovendran
:
Passive Attacks on a Class of Authentication Protocols for RFID. ICISC 2007: 102-115 - [c9]Loukas Lazos, Radha Poovendran
, James A. Ritcey:
Probabilistic detection of mobile targets in heterogeneous sensor networks. IPSN 2007: 519-528 - [c8]Loukas Lazos, Radha Poovendran
, James A. Ritcey:
On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets. WiOpt 2007: 1-10 - [p1]Loukas Lazos, Radha Poovendran:
Secure Localization for Wireless Sensor Networks using Range-Independent Methods. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 185-214 - 2006
- [j3]Loukas Lazos, Radha Poovendran
:
HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2): 233-246 (2006) - [j2]Loukas Lazos, Radha Poovendran
:
Stochastic coverage in heterogeneous sensor networks. ACM Trans. Sens. Networks 2(3): 325-358 (2006) - [c7]Loukas Lazos, Radha Poovendran
:
Coverage in heterogeneous sensor networks. WiOpt 2006: 306-315 - 2005
- [j1]Loukas Lazos, Radha Poovendran
:
SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sens. Networks 1(1): 73-100 (2005) - [c6]Loukas Lazos, Radha Poovendran
, Srdjan Capkun:
Rope: robust position estimation in wireless sensor networks. IPSN 2005: 324-331 - [c5]Loukas Lazos, Radha Poovendran
, Catherine Meadows, Paul F. Syverson, LiWu Chang:
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199 - 2004
- [c4]Loukas Lazos, Radha Poovendran
:
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks. ICC 2004: 3633-3639 - [c3]Loukas Lazos, Javier Salido, Radha Poovendran:
VP3: using vertex path and power proximity for energy efficient key distribution. VTC Fall (2) 2004: 1228-1232 - [c2]Loukas Lazos, Radha Poovendran:
SeRLoc: secure range-independent localization for wireless sensor networks. Workshop on Wireless Security 2004: 21-30 - 2003
- [c1]Loukas Lazos, Radha Poovendran:
Energy-aware secure multicast communication in ad-hoc networks using geographic location information. ICASSP (4) 2003: 201-204
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 19:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint