关注
Tao Wang
Tao Wang
Assistant Professor, University of North Texas
在 unt.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Survey on channel reciprocity based key establishment techniques for wireless systems
T Wang, Y Liu, AV Vasilakos
Wireless Networks 21, 1835-1846, 2015
1382015
Virtual multipath attack and defense for location distinction in wireless networks
S Fang, Y Liu, W Shen, H Zhu, T Wang
IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016
292016
ProTO: Proactive topology obfuscation against adversarial network topology inference
T Hou, Z Qu, T Wang, Z Lu, Y Liu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1598-1607, 2020
222020
Encyclopedia of Wireless Networks: Wireless Key Establishment
T Wang, Y Liu
Springer International Publishing, 2020
20*2020
An over-the-air key establishment protocol using keyless cryptography
Y Zhang, Y Xiang, T Wang, W Wu, J Shen
Future Generation Computer Systems 79, 284-294, 2018
192018
Location-restricted services access control leveraging pinpoint waveforming
T Wang, Y Liu, Q Pei, T Hou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
192015
IoTGAN: GAN powered camouflage against machine learning based iot device identification
T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu
2021 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2021
182021
Fingerprinting far proximity from radio emissions
T Wang, Y Liu, J Ligatti
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
162014
Combating adversarial network topology inference by proactive topology obfuscation
T Hou, T Wang, Z Lu, Y Liu
IEEE/ACM Transactions on Networking 29 (6), 2779-2792, 2021
132021
MUSTER: Subverting user selection in MU-MIMO networks
T Hou, S Bi, T Wang, Z Lu, Y Liu, S Misra, Y Sagduyu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 140-149, 2022
122022
Entrapment for wireless eavesdroppers
S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019
122019
Signal entanglement based pinpoint waveforming for location-restricted service access control
T Wang, Y Liu, T Hou, Q Pei, S Fang
IEEE Transactions on Dependable and Secure Computing 15 (5), 853-867, 2016
122016
Smart spying via deep learning: inferring your activities from encrypted wireless traffic
T Hou, T Wang, Z Lu, Y Liu
2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2019
112019
Proactive anti-eavesdropping with trap deployment in wireless networks
Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022
102022
Autonomous security mechanisms for high-performance computing systems: review and analysis
T Hou, T Wang, D Shen, Z Lu, Y Liu
Adaptive autonomous secure cyber systems, 109-129, 2020
82020
Undermining deep learning based channel estimation via adversarial wireless signal fabrication
T Hou, T Wang, Z Lu, Y Liu, Y Sagduyu
Proceedings of the 2022 ACM Workshop on Wireless Security and Machine …, 2022
72022
Secure distance indicator leveraging wireless link signatures
T Wang, Y Liu
2014 IEEE Military Communications Conference, 222-227, 2014
62014
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection
H Alanazi, S Bi, T Wang, T Hou
IEEE International Conference on Communications (IEEE ICC'23), 2023
52023
DyWCP: Dynamic and lightweight data-channel coupling towards confidentiality in IoT security
S Bi, T Hou, T Wang, Y Liu, Z Lu, Q Pei
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022
52022
A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges
M Alvarado, L Gayler, A Seals, T Wang, T Hou
arXiv preprint arXiv:2312.10430, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20