Tao Wang

Orcid: 0000-0001-9744-107X

Affiliations:
  • University of South Florida, Department of Computer Science and Engineering, Tampa, FL, USA


According to our database1, Tao Wang authored at least 32 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reversible gender privacy enhancement via adversarial perturbations.
Neural Networks, 2024

A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities.
CoRR, 2024

Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
RAPP: Reversible Privacy Preservation for Various Face Attributes.
IEEE Trans. Inf. Forensics Secur., 2023

Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Identifiable Face Privacy Protection via Virtual Identity Transformation.
IEEE Signal Process. Lett., 2023

A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges.
CoRR, 2023

Security and Privacy on Generative Data in AIGC: A Survey.
CoRR, 2023

Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection.
CoRR, 2023

Visual Content Privacy Protection: A Survey.
CoRR, 2023

Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection.
Proceedings of the IEEE Military Communications Conference, 2023

Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection.
Proceedings of the IEEE International Conference on Communications, 2023

SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

MUSTER: Subverting User Selection in MU-MIMO Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation.
IEEE/ACM Trans. Netw., 2021

Far Proximity Identification in Wireless Systems.
IEEE Trans. Dependable Secur. Comput., 2021

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

2020
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

2018
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control.
IEEE Trans. Dependable Secur. Comput., 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018

2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

2015
Survey on channel reciprocity based key establishment techniques for wireless systems.
Wirel. Networks, 2015

Location-restricted Services Access Control Leveraging Pinpoint Waveforming.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Fingerprinting Far Proximity from Radio Emissions.
Proceedings of the Computer Security - ESORICS 2014, 2014


  Loading...