Survey on channel reciprocity based key establishment techniques for wireless systems T Wang, Y Liu, AV Vasilakos Wireless Networks 21, 1835-1846, 2015 | 143 | 2015 |
Virtual multipath attack and defense for location distinction in wireless networks S Fang, Y Liu, W Shen, H Zhu, T Wang IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016 | 32 | 2016 |
ProTO: Proactive topology obfuscation against adversarial network topology inference T Hou, Z Qu, T Wang, Z Lu, Y Liu IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1598-1607, 2020 | 28 | 2020 |
Encyclopedia of Wireless Networks: Wireless Key Establishment T Wang, Y Liu Springer International Publishing, 2020 | 27* | 2020 |
IoTGAN: GAN powered camouflage against machine learning based iot device identification T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu 2021 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2021 | 22 | 2021 |
Location-restricted services access control leveraging pinpoint waveforming T Wang, Y Liu, Q Pei, T Hou Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 20 | 2015 |
An over-the-air key establishment protocol using keyless cryptography Y Zhang, Y Xiang, T Wang, W Wu, J Shen Future Generation Computer Systems 79, 284-294, 2018 | 19 | 2018 |
Fingerprinting far proximity from radio emissions T Wang, Y Liu, J Ligatti Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 15 | 2014 |
A comprehensive survey on the security of smart grid: Challenges, mitigations, and future research opportunities A Zibaeirad, F Koleini, S Bi, T Hou, T Wang arXiv preprint arXiv:2407.07966, 2024 | 14 | 2024 |
MUSTER: Subverting user selection in MU-MIMO networks T Hou, S Bi, T Wang, Z Lu, Y Liu, S Misra, Y Sagduyu IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 140-149, 2022 | 14 | 2022 |
Combating adversarial network topology inference by proactive topology obfuscation T Hou, T Wang, Z Lu, Y Liu IEEE/ACM Transactions on Networking 29 (6), 2779-2792, 2021 | 14 | 2021 |
Entrapment for wireless eavesdroppers S Fang, T Wang, Y Liu, S Zhao, Z Lu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019 | 13 | 2019 |
Proactive anti-eavesdropping with trap deployment in wireless networks Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022 | 12 | 2022 |
Signal entanglement based pinpoint waveforming for location-restricted service access control T Wang, Y Liu, T Hou, Q Pei, S Fang IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016 | 12 | 2016 |
Smart spying via deep learning: inferring your activities from encrypted wireless traffic T Hou, T Wang, Z Lu, Y Liu 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2019 | 10 | 2019 |
Autonomous security mechanisms for high-performance computing systems: review and analysis T Hou, T Wang, D Shen, Z Lu, Y Liu Adaptive autonomous secure cyber systems, 109-129, 2020 | 8 | 2020 |
Undermining deep learning based channel estimation via adversarial wireless signal fabrication T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022 | 7 | 2022 |
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection H Alanazi, S Bi, T Wang, T Hou IEEE International Conference on Communications (IEEE ICC'23), 2023 | 6 | 2023 |
Secure distance indicator leveraging wireless link signatures T Wang, Y Liu 2014 IEEE Military Communications Conference, 222-227, 2014 | 6 | 2014 |
DyWCP: Dynamic and lightweight data-channel coupling towards confidentiality in IoT security S Bi, T Hou, T Wang, Y Liu, Z Lu, Q Pei Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 5 | 2022 |