ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference T Hou, Z Qu, T Wang, Z Lu, Y Liu IEEE Conference on Computer Communications (IEEE INFOCOM'20), 2020 | 28 | 2020 |
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE …, 2021 | 21 | 2021 |
Location-restricted services access control leveraging pinpoint waveforming T Wang, Y Liu, Q Pei, T Hou Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 19 | 2015 |
MUSTER: Subverting User Selection in MU-MIMO Networks T Hou, S Bi, T Wang, Z Lu, Y Liu, S Misra, Y Sagduyu IEEE Conference on Computer Communications (IEEE INFOCOM'22), 2022 | 14 | 2022 |
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation T Hou, T Wang, Z Lu, Y Liu IEEE/ACM Transactions on Networking (IEEE/ACM ToN), 2021 | 14 | 2021 |
Signal entanglement based pinpoint waveforming for location-restricted service access control T Wang, Y Liu, T Hou, Q Pei, S Fang IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016 | 12 | 2016 |
A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities A Zibaeirad, F Koleini, S Bi, T Hou, T Wang arXiv preprint arXiv:2407.07966, 2024 | 11 | 2024 |
Smart spying via deep learning: inferring your activities from encrypted wireless traffic T Hou, T Wang, Z Lu, Y Liu IEEE Global Conference on Signal and Information Processing (IEEE GlobalSIP'19), 2019 | 11 | 2019 |
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis T Hou, T Wang, D Shen, Z Lu, Y Liu Adaptive Autonomous Secure Cyber Systems, 109-129, 2020 | 9 | 2020 |
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022 | 7 | 2022 |
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework Z Luo, T Hou, TT Nguyen, H Zeng, Z Lu IEEE Conference on Computer Communications (INFOCOM) DDINS Workshop, 2020 | 7 | 2020 |
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection H Alanazi, S Bi, T Wang, T Hou IEEE International Conference on Communications (IEEE ICC'23), 2023 | 5 | 2023 |
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security S Bi, T Hou, T Wang, Y Liu, Z Lu, Q Pei ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM …, 2022 | 5 | 2022 |
Binary Code Similarity Detection through LSTM and Siamese Neural Network Z Luo, T Hou, X Zhou, H Zeng, Z Lu EAI Endorsed Transactions on Security and Safety, 2021 | 5 | 2021 |
A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges M Alvarado, L Gayler, A Seals, T Wang, T Hou arXiv, 2024 | 4 | 2024 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection H Alanazi, S Bi, T Wang, T Hou IEEE Military Communications Conference (IEEE MILCOM'23), 2023 | 3 | 2023 |
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet T Hou, S Bi, W Mingkui, T Wang, Z Lu, Y Liu IEEE Conference on Communications and Network Security (IEEE CNS'22), 2022 | 2 | 2022 |
I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network T Hou, T Wang, Z Lu, Y Liu Annual Computer Security Applications Conference (ACSAC), Poster Session, 2019 | 1 | 2019 |
The Evolution of Keylogger Technologies: A Survey from Historical Origins to Emerging Opportunities M Salas-Nino, G Ritter, D Hamdan, T Wang, T Hou arXiv, 2024 | | 2024 |
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity D Shen, T Hou, Z Lu, Y Liu, T Wang IEEE Conference on Communications and Network Security (IEEE CNS'23), 2023 | | 2023 |