Tao Hou

Orcid: 0000-0003-3775-6170

Affiliations:
  • University of North Texas, Department of Computer Science and Engineering, USA
  • Texas State University, San Marcos, TX, USA
  • University of South Florida, Department of Computer Science and Engineering, Tampa, FL, USA (PhD 2022)


According to our database1, Tao Hou authored at least 20 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities.
CoRR, 2024

2023
A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges.
CoRR, 2023

Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection.
Proceedings of the IEEE Military Communications Conference, 2023

Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection.
Proceedings of the IEEE International Conference on Communications, 2023

SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies.
PhD thesis, 2022

Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

MUSTER: Subverting User Selection in MU-MIMO Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation.
IEEE/ACM Trans. Netw., 2021

Binary Code Similarity Detection through LSTM and Siamese Neural Network.
EAI Endorsed Trans. Security Safety, 2021

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

2020
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

2018
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control.
IEEE Trans. Dependable Secur. Comput., 2018

2015
Location-restricted Services Access Control Leveraging Pinpoint Waveforming.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...