Yao Liu
Orcid: 0009-0001-6406-8421Affiliations:
- University of South Florida, Department of Computer Science and Engineering, Tampa, FL, USA
- North Carolina State University, Department of Computer Science, Raleigh, NC, USA (PhD 2012)
According to our database1,
Yao Liu
authored at least 85 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
2023
IEEE Trans. Mob. Comput., November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Information-Theoretic Limits of Integrated Sensing and Communication With Correlated Sensing and Channel States for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Computers, 2022
Generalized Modeling and Fundamental Limits for Multiple-Access Integrated Sensing and Communication Systems.
CoRR, 2022
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE/ACM Trans. Netw., 2021
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Information-Theoretic Limits of Integrated Sensing and Communication with Correlated Sensing and Channel States.
CoRR, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEEE Trans. Mob. Comput., 2020
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
IEEE Trans. Mob. Comput., 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019
2018
World Wide Web, 2018
Resource allocation and dynamic power control for D2D communication underlaying uplink multi-cell networks.
Wirel. Networks, 2018
IEEE Trans. Veh. Technol., 2018
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control.
IEEE Trans. Dependable Secur. Comput., 2018
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Mob. Comput., 2017
Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective.
Mob. Inf. Syst., 2017
A Relay-Aided Device-to-Device-Based Load Balancing Scheme for Multitier Heterogeneous Networks.
IEEE Internet Things J., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Dependable Secur. Comput., 2016
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016
Int. J. Distributed Sens. Networks, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Survey on channel reciprocity based key establishment techniques for wireless systems.
Wirel. Networks, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Agent-based Channel Selection scheme against location inference attack in cognitive radio networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter.
IEEE Trans. Control. Netw. Syst., 2014
Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010