2022


MUSTER: Subverting User Selection in MU-MIMO Networks      [ PDF ]     
Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Sagduyu
IEEE Conference on Computer Communications (IEEE INFOCOM'22), Virtual Conference, 2022
 

DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security      [ PDF ]     
Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei
ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec'22), San Antonio, Texas, 2022
 

Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication      [ PDF ]     
Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu
ACM Workshop on Wireless Security and Machine Learning (ACM WiseML'22), San Antonio, Texas, 2022
 

Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks    
Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2022
 

2021


IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification      [ PDF ]     
Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu
IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'21), Virtual Conference, 2021
 

Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation     [ PDF ]     
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 2021
 

2020


Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis    [ PDF ]
Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu
Adaptive Autonomous Secure Cyber Systems, Springer, 2020
 

ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference     [ PDF ]
Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Conference on Computer Communications (IEEE INFOCOM'20), Toronto, Canada, 2020
 

2019


Far Proximity Identification in Wireless Systems     [ PDF ]     
Tao Wang, Jian Weng, Jay Ligatti, and Yao Liu
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2019
 

I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network     [ PDF ]   [ Poster ]
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
Annual Computer Security Applications Conference (ACSA ACSAC'19), Poster Session, San Juan, Puerto Rico, 2019
 

Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems     [ PDF ]   [ Poster ]
Shangqing Zhao, Zhe Qu, Zhuo Lu, and Tao Wang
IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'19), Poster Session, Newark, NJ, 2019
 

Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic     [ PDF ]
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Global Conference on Signal and Information Processing (IEEE GlobalSIP'19), Ottawa, Canada, 2019
Best Paper Award
 

Entrapment for Wireless Eavesdroppers     [ PDF ]
Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu
IEEE Conference on Computer Communications (IEEE INFOCOM'19), Paris, France, 2019
 

Wireless Key Establishment
Tao Wang and Yao Liu
Encyclopedia of Wireless Networks, Springer, 2019
 

Before 2018


Signal Entanglement based Pinpoint Waveforming for Location-restricted Service Access Control     [ PDF ]
Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, and Song Fang
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2018
 

Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks     [ PDF ]
Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, and Tao Wang
IEEE Transactions on Mobile Computing (IEEE TMC), 2017
 

An over-the-air key establishment protocol using keyless cryptography     [ PDF ]
Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen
Future Generation Computer Systems (Elsevier FGCS), 2016
 

Location-restricted Services Access Control Leveraging Pinpoint Waveforming     [ PDF ]   [ Video Demo ]
Tao Wang, Yao Liu, Qingqi Pei, and Tao Hou
Proceedings of 22nd ACM Conference on Computer and Communications Security (ACM CCS'15), Denver, Colorado, 2015
 

Survey on channel reciprocity based key establishment techniques for wireless systems     [ PDF ]
Tao Wang, Yao Liu, and Athanasios V. Vasilakos
Wireless Networks, page 1-12, January, 2015
 

Secure Distance Indicator Leveraging Wireless Link Signatures     [ PDF ]
Tao Wang and Yao Liu
Proceedings of IEEE Military Communications Conference (IEEE MILCOM'14), Baltimore, MD, 2014
 

Fingerprinting Far Proximity From Radio Emissions     [ PDF ]
Tao Wang, Yao Liu, and Jay Ligatti
Proceedings of European Symposium on Research in Computer Security (ESORICS'14), Wroclaw, Poland, 2014
 
Top