


default search action
Tao Wang 0026
- > Home > Persons > Tao Wang 0026
Publications
- 2023
[j7]Qiuye He
, Song Fang
, Tao Wang
, Yao Liu
, Shangqing Zhao
, Zhuo Lu
:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 20(1): 637-649 (2023)
[c15]Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, Tao Wang:
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity. CNS 2023: 1-9- 2022
[c11]Tao Hou, Shengping Bi
, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. CNS 2022: 290-298
[c10]Tao Hou, Shengping Bi
, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, Yalin E. Sagduyu:
MUSTER: Subverting User Selection in MU-MIMO Networks. INFOCOM 2022: 140-149
[c9]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. WiseML@WiSec 2022: 63-68
[c8]Shengping Bi
, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. WISEC 2022: 222-232
[i1]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. CoRR abs/2201.03281 (2022)- 2021
[j6]Tao Wang
, Jian Weng
, Jay Ligatti, Yao Liu
:
Far Proximity Identification in Wireless Systems. IEEE Trans. Dependable Secur. Comput. 18(5): 2403-2418 (2021)
[j5]Tao Hou
, Tao Wang
, Zhuo Lu
, Yao Liu
:
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. IEEE/ACM Trans. Netw. 29(6): 2779-2792 (2021)
[c7]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. DySPAN 2021: 280-287- 2020
[c6]Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu:
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference. INFOCOM 2020: 1598-1607
[p1]Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu:
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. Adaptive Autonomous Secure Cyber Systems 2020: 109-129- 2019
[c4]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic. GlobalSIP 2019: 1-5
[c3]Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Entrapment for Wireless Eavesdroppers. INFOCOM 2019: 2530-2538- 2018
[j3]Tao Wang
, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. IEEE Trans. Dependable Secur. Comput. 15(5): 853-867 (2018)- 2017
[j2]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu
, Tao Wang:
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks. IEEE Trans. Mob. Comput. 16(2): 566-580 (2017)- 2015
[j1]Tao Wang, Yao Liu, Athanasios V. Vasilakos
:
Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Networks 21(6): 1835-1846 (2015)
[c2]Tao Wang, Yao Liu, Qingqi Pei, Tao Hou:
Location-restricted Services Access Control Leveraging Pinpoint Waveforming. CCS 2015: 292-303- 2014
[c1]Tao Wang, Yao Liu, Jay Ligatti:
Fingerprinting Far Proximity from Radio Emissions. ESORICS (1) 2014: 508-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-09 23:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






