Tengyao Li

Orcid: 0000-0001-6921-6174

According to our database1, Tengyao Li authored at least 19 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
WF3A: A N-shot website fingerprinting with effective fusion feature attention.
Comput. Secur., 2024

HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Comput. Secur., 2024

HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch.
Comput. Networks, 2024

2022
HeteroTiC: A robust network flow watermarking based on heterogeneous time channels.
Comput. Networks, 2022

2021
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems.
IEEE Internet Things J., 2021

ADS-B anomaly data detection model based on VAE-SVDD.
Comput. Secur., 2021

2020
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection.
IEEE Wirel. Commun. Lett., 2020

Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users.
IEEE Trans. Veh. Technol., 2020

Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping.
IEEE Trans. Inf. Forensics Secur., 2020

Threat model and construction strategy on ADS-B attack data.
IET Inf. Secur., 2020

Dynamic temporal ADS-B data attack detection based on sHDP-HMM.
Comput. Secur., 2020

Adaptive Fault Isolation and System Reconfiguration Method for GNSS/INS Integration.
IEEE Access, 2020

CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems.
IEEE Access, 2020

2019
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems.
Secur. Commun. Networks, 2019

Sequential collaborative detection strategy on ADS-B data attack.
Int. J. Crit. Infrastructure Prot., 2019

Online sequential attack detection for ADS-B data based on hierarchical temporal memory.
Comput. Secur., 2019

Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Stealthy and Sparse False Data Injection Attacks Based on Machine Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

ADS-B Data Attack Detection Based on Generative Adversarial Networks.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019


  Loading...