2024
A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities.
CoRR, 2024
2023
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2023
A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges.
CoRR, 2023
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection.
Proceedings of the IEEE Military Communications Conference, 2023
Sum-Rate Maximization for Active RIS-Aided Downlink RSMA System.
Proceedings of the IEEE INFOCOM 2023, 2023
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection.
Proceedings of the IEEE International Conference on Communications, 2023
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
MUSTER: Subverting User Selection in MU-MIMO Networks.
Proceedings of the IEEE INFOCOM 2022, 2022
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation.
IEEE/ACM Trans. Netw., 2021
Far Proximity Identification in Wireless Systems.
IEEE Trans. Dependable Secur. Comput., 2021
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021
2020
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019
Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
2018
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control.
IEEE Trans. Dependable Secur. Comput., 2018
An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018
2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017
2015
Survey on channel reciprocity based key establishment techniques for wireless systems.
Wirel. Networks, 2015
Location-restricted Services Access Control Leveraging Pinpoint Waveforming.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Fingerprinting Far Proximity from Radio Emissions.
Proceedings of the Computer Security - ESORICS 2014, 2014