A Survey on Adversarial Machine Learning: Attacks, Defenses, Real-World Applications, and Future Research Directions Yan Qiao, Nimitha Bangalore Sathyanarayana, Chaowei Shi, Zefeng He, Tao Wang, and Tao Hou Elsevier Neurocomputing, 2026 |
Towards the Safety of Intelligent Transportation: A Survey on the Security Challenges and Mitigations in Internet of Vehicles (IoV) Rakesh Das, Lang Zhou, Shengping Bi, Tao Wang, and Tao Hou ACM Transactions on Sensor Networks (ACM TOSN), 2025 |
Machine Learning for Cybersecurity: A Survey of Applications, Adversarial Challenges, and Future Research Directions [ PDF ] Zefeng He, Diego Davila, Shengping Bi, Tao Wang, and Tao Hou Electronics, Switzerland, 2025 |
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity [ PDF ] Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, and Tao Wang IEEE Conference on Communications and Network Security (IEEE CNS'23), Orlando, Florida, 2023 |
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies [ PDF ] Sean Chen, Jaelyn McCracken, Kevin Lu, Tao Wang, and Tao Hou National Workshop for REU Research in Networking and Systems (REUNS'23), Washington DC, USA, 2023 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection [ PDF ] Hamidah Alanazi, Shengping Bi, Tao Wang, and Tao Hou IEEE Military Communications Conference (IEEE MILCOM'23), Boston, Massachusetts, 2023 |
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection [ PDF ] Hamidah Alanazi, Shengping Bi, Tao Wang, and Tao Hou IEEE International Conference on Communications (IEEE ICC'23), Rome, Italy, 2023 |
MUSTER: Subverting User Selection in MU-MIMO Networks [ PDF ] Tao Hou*, Shengping Bi*, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Sagduyu (The first two authors are co-first authors) IEEE Conference on Computer Communications (IEEE INFOCOM'22), Virtual Conference, 2022 |
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet [ PDF ] Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, and Yao Liu IEEE Conference on Communications and Network Security (IEEE CNS'22), Austin, Texas, 2022 |
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security [ PDF ] Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec'22), San Antonio, Texas, 2022 |
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu ACM Workshop on Wireless Security and Machine Learning (ACM WiseML'22), San Antonio, Texas, 2022 |
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks [ PDF ] Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2022 |
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'21), Virtual Conference, 2021 |
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 2021 |
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis [ PDF ] Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu Adaptive Autonomous Secure Cyber Systems, Springer, 2020 |
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference [ PDF ] Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu IEEE Conference on Computer Communications (IEEE INFOCOM'20), Toronto, Canada, 2020 |
Far Proximity Identification in Wireless Systems [ PDF ] Tao Wang, Jian Weng, Jay Ligatti, and Yao Liu IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2019 |
I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network [ PDF ] [ Poster ] Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu Annual Computer Security Applications Conference (ACSA ACSAC'19), Poster Session, San Juan, Puerto Rico, 2019 |
Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems [ PDF ] [ Poster ] Shangqing Zhao, Zhe Qu, Zhuo Lu, and Tao Wang IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'19), Poster Session, Newark, NJ, 2019 |
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu IEEE Global Conference on Signal and Information Processing (IEEE GlobalSIP'19), Ottawa, Canada, 2019 Best Paper Award |
Entrapment for Wireless Eavesdroppers [ PDF ] Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu IEEE Conference on Computer Communications (IEEE INFOCOM'19), Paris, France, 2019 |
Wireless Key Establishment Tao Wang and Yao Liu Encyclopedia of Wireless Networks, Springer, 2019 |
Signal Entanglement based Pinpoint Waveforming for Location-restricted Service Access Control [ PDF ] Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, and Song Fang IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2018 |
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks [ PDF ] Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, and Tao Wang IEEE Transactions on Mobile Computing (IEEE TMC), 2017 |
An over-the-air key establishment protocol using keyless cryptography [ PDF ] Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen Future Generation Computer Systems (Elsevier FGCS), 2016 |
Location-restricted Services Access Control Leveraging Pinpoint Waveforming [ PDF ] [ Video Demo ] Tao Wang, Yao Liu, Qingqi Pei, and Tao Hou Proceedings of 22nd ACM Conference on Computer and Communications Security (ACM CCS'15), Denver, Colorado, 2015 |
Survey on channel reciprocity based key establishment techniques for wireless systems [ PDF ] Tao Wang, Yao Liu, and Athanasios V. Vasilakos Wireless Networks, page 1-12, January, 2015 |
Secure Distance Indicator Leveraging Wireless Link Signatures [ PDF ] Tao Wang and Yao Liu Proceedings of IEEE Military Communications Conference (IEEE MILCOM'14), Baltimore, MD, 2014 |
Fingerprinting Far Proximity From Radio Emissions [ PDF ] Tao Wang, Yao Liu, and Jay Ligatti Proceedings of European Symposium on Research in Computer Security (ESORICS'14), Wroclaw, Poland, 2014 |