Follow
Tao Wang
Title
Cited by
Cited by
Year
Survey on channel reciprocity based key establishment techniques for wireless systems
T Wang, Y Liu, AV Vasilakos
Wireless Networks 21, 1835-1846, 2015
1302015
Virtual multipath attack and defense for location distinction in wireless networks
S Fang, Y Liu, W Shen, H Zhu, T Wang
IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016
262016
ProTO: Proactive topology obfuscation against adversarial network topology inference
T Hou, Z Qu, T Wang, Z Lu, Y Liu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1598-1607, 2020
212020
An over-the-air key establishment protocol using keyless cryptography
Y Zhang, Y Xiang, T Wang, W Wu, J Shen
Future Generation Computer Systems 79, 284-294, 2018
192018
Location-restricted services access control leveraging pinpoint waveforming
T Wang, Y Liu, Q Pei, T Hou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
192015
IoTGAN: GAN powered camouflage against machine learning based iot device identification
T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu
2021 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2021
182021
Encyclopedia of Wireless Networks: Wireless Key Establishment
T Wang, Y Liu
Springer International Publishing, 2020
16*2020
Fingerprinting far proximity from radio emissions
T Wang, Y Liu, J Ligatti
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
162014
Combating adversarial network topology inference by proactive topology obfuscation
T Hou, T Wang, Z Lu, Y Liu
IEEE/ACM Transactions on Networking 29 (6), 2779-2792, 2021
122021
Smart spying via deep learning: inferring your activities from encrypted wireless traffic
T Hou, T Wang, Z Lu, Y Liu
2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2019
112019
Signal entanglement based pinpoint waveforming for location-restricted service access control
T Wang, Y Liu, T Hou, Q Pei, S Fang
IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016
102016
MUSTER: Subverting user selection in MU-MIMO networks
T Hou, S Bi, T Wang, Z Lu, Y Liu, S Misra, Y Sagduyu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 140-149, 2022
92022
Entrapment for wireless eavesdroppers
S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019
92019
Autonomous security mechanisms for high-performance computing systems: review and analysis
T Hou, T Wang, D Shen, Z Lu, Y Liu
Adaptive autonomous secure cyber systems, 109-129, 2020
72020
Undermining deep learning based channel estimation via adversarial wireless signal fabrication
T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu
Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022
62022
Secure distance indicator leveraging wireless link signatures
T Wang, Y Liu
2014 IEEE Military Communications Conference, 222-227, 2014
62014
Proactive anti-eavesdropping with trap deployment in wireless networks
Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022
52022
DyWCP: Dynamic and lightweight data-channel coupling towards confidentiality in IoT security
S Bi, T Hou, T Wang, Y Liu, Z Lu, Q Pei
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022
42022
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection
H Alanazi, S Bi, T Wang, T Hou
IEEE International Conference on Communications (IEEE ICC'23), 2023
32023
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet
T Hou, S Bi, M Wei, T Wang, Z Lu, Y Liu
2022 IEEE Conference on Communications and Network Security (CNS), 290-298, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20