SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity [ PDF ] Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, and Tao Wang IEEE Conference on Communications and Network Security (IEEE CNS'23), Orlando, Florida, 2023 |
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies [ PDF ] Sean Chen, Jaelyn McCracken, Kevin Lu, Tao Wang, and Tao Hou National Workshop for REU Research in Networking and Systems (REUNS'23), Washington DC, USA, 2023 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection [ PDF ] Hamidah Alanazi, Shengping Bi, Tao Wang, and Tao Hou IEEE Military Communications Conference (IEEE MILCOM'23), Boston, Massachusetts, 2023 |
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection [ PDF ] Hamidah Alanazi, Shengping Bi, Tao Wang, and Tao Hou IEEE International Conference on Communications (IEEE ICC'23), Rome, Italy, 2023 |
MUSTER: Subverting User Selection in MU-MIMO Networks [ PDF ] Tao Hou*, Shengping Bi*, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Sagduyu (The first two authors are co-first authors) IEEE Conference on Computer Communications (IEEE INFOCOM'22), Virtual Conference, 2022 |
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet [ PDF ] Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, and Yao Liu IEEE Conference on Communications and Network Security (IEEE CNS'22), Austin, Texas, 2022 |
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security [ PDF ] Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec'22), San Antonio, Texas, 2022 |
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu ACM Workshop on Wireless Security and Machine Learning (ACM WiseML'22), San Antonio, Texas, 2022 |
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks [ PDF ] Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2022 |
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'21), Virtual Conference, 2021 |
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 2021 |
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis [ PDF ] Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu Adaptive Autonomous Secure Cyber Systems, Springer, 2020 |
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference [ PDF ] Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu IEEE Conference on Computer Communications (IEEE INFOCOM'20), Toronto, Canada, 2020 |
Far Proximity Identification in Wireless Systems [ PDF ] Tao Wang, Jian Weng, Jay Ligatti, and Yao Liu IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2019 |
I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network [ PDF ] [ Poster ] Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu Annual Computer Security Applications Conference (ACSA ACSAC'19), Poster Session, San Juan, Puerto Rico, 2019 |
Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems [ PDF ] [ Poster ] Shangqing Zhao, Zhe Qu, Zhuo Lu, and Tao Wang IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'19), Poster Session, Newark, NJ, 2019 |
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic [ PDF ] Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu IEEE Global Conference on Signal and Information Processing (IEEE GlobalSIP'19), Ottawa, Canada, 2019 Best Paper Award |
Entrapment for Wireless Eavesdroppers [ PDF ] Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu IEEE Conference on Computer Communications (IEEE INFOCOM'19), Paris, France, 2019 |
Wireless Key Establishment Tao Wang and Yao Liu Encyclopedia of Wireless Networks, Springer, 2019 |
Signal Entanglement based Pinpoint Waveforming for Location-restricted Service Access Control [ PDF ] Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, and Song Fang IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2018 |
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks [ PDF ] Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, and Tao Wang IEEE Transactions on Mobile Computing (IEEE TMC), 2017 |
An over-the-air key establishment protocol using keyless cryptography [ PDF ] Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu, Jian Shen Future Generation Computer Systems (Elsevier FGCS), 2016 |
Location-restricted Services Access Control Leveraging Pinpoint Waveforming [ PDF ] [ Video Demo ] Tao Wang, Yao Liu, Qingqi Pei, and Tao Hou Proceedings of 22nd ACM Conference on Computer and Communications Security (ACM CCS'15), Denver, Colorado, 2015 |
Survey on channel reciprocity based key establishment techniques for wireless systems [ PDF ] Tao Wang, Yao Liu, and Athanasios V. Vasilakos Wireless Networks, page 1-12, January, 2015 |
Secure Distance Indicator Leveraging Wireless Link Signatures [ PDF ] Tao Wang and Yao Liu Proceedings of IEEE Military Communications Conference (IEEE MILCOM'14), Baltimore, MD, 2014 |
Fingerprinting Far Proximity From Radio Emissions [ PDF ] Tao Wang, Yao Liu, and Jay Ligatti Proceedings of European Symposium on Research in Computer Security (ESORICS'14), Wroclaw, Poland, 2014 |