ติดตาม
Tao Wang
Tao Wang
Assistant Professor, University of North Texas
ยืนยันอีเมลแล้วที่ unt.edu - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Survey on channel reciprocity based key establishment techniques for wireless systems
T Wang, Y Liu, AV Vasilakos
Wireless Networks 21, 1835-1846, 2015
1432015
Virtual multipath attack and defense for location distinction in wireless networks
S Fang, Y Liu, W Shen, H Zhu, T Wang
IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016
322016
ProTO: Proactive topology obfuscation against adversarial network topology inference
T Hou, Z Qu, T Wang, Z Lu, Y Liu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1598-1607, 2020
282020
Encyclopedia of Wireless Networks: Wireless Key Establishment
T Wang, Y Liu
Springer International Publishing, 2020
27*2020
IoTGAN: GAN powered camouflage against machine learning based iot device identification
T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu
2021 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2021
222021
Location-restricted services access control leveraging pinpoint waveforming
T Wang, Y Liu, Q Pei, T Hou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
202015
An over-the-air key establishment protocol using keyless cryptography
Y Zhang, Y Xiang, T Wang, W Wu, J Shen
Future Generation Computer Systems 79, 284-294, 2018
192018
Fingerprinting far proximity from radio emissions
T Wang, Y Liu, J Ligatti
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
152014
A comprehensive survey on the security of smart grid: Challenges, mitigations, and future research opportunities
A Zibaeirad, F Koleini, S Bi, T Hou, T Wang
arXiv preprint arXiv:2407.07966, 2024
142024
MUSTER: Subverting user selection in MU-MIMO networks
T Hou, S Bi, T Wang, Z Lu, Y Liu, S Misra, Y Sagduyu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 140-149, 2022
142022
Combating adversarial network topology inference by proactive topology obfuscation
T Hou, T Wang, Z Lu, Y Liu
IEEE/ACM Transactions on Networking 29 (6), 2779-2792, 2021
142021
Entrapment for wireless eavesdroppers
S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019
132019
Proactive anti-eavesdropping with trap deployment in wireless networks
Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022
122022
Signal entanglement based pinpoint waveforming for location-restricted service access control
T Wang, Y Liu, T Hou, Q Pei, S Fang
IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016
122016
Smart spying via deep learning: inferring your activities from encrypted wireless traffic
T Hou, T Wang, Z Lu, Y Liu
2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2019
102019
Autonomous security mechanisms for high-performance computing systems: review and analysis
T Hou, T Wang, D Shen, Z Lu, Y Liu
Adaptive autonomous secure cyber systems, 109-129, 2020
82020
Undermining deep learning based channel estimation via adversarial wireless signal fabrication
T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu
Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022
72022
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection
H Alanazi, S Bi, T Wang, T Hou
IEEE International Conference on Communications (IEEE ICC'23), 2023
62023
Secure distance indicator leveraging wireless link signatures
T Wang, Y Liu
2014 IEEE Military Communications Conference, 222-227, 2014
62014
DyWCP: Dynamic and lightweight data-channel coupling towards confidentiality in IoT security
S Bi, T Hou, T Wang, Y Liu, Z Lu, Q Pei
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022
52022
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20