Yao Liu

Orcid: 0009-0001-6406-8421

Affiliations:
  • University of South Florida, Department of Computer Science and Engineering, Tampa, FL, USA
  • North Carolina State University, Department of Computer Science, Raleigh, NC, USA (PhD 2012)


According to our database1, Yao Liu authored at least 85 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Eyes See Hazy while Algorithms Recognize Who You Are.
ACM Trans. Priv. Secur., 2024

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics.
CoRR, 2024

2023
On the Convergence of Multi-Server Federated Learning With Overlapping Area.
IEEE Trans. Mob. Comput., November, 2023

LoMar: A Local Defense Against Poisoning Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Information-Theoretic Limits of Integrated Sensing and Communication With Correlated Sensing and Channel States for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022

Context-Aware Online Client Selection for Hierarchical Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Wireless Training-Free Keystroke Inference Attack and Defense.
IEEE/ACM Trans. Netw., 2022

CFHider: Protecting Control Flow Confidentiality With Intel SGX.
IEEE Trans. Computers, 2022

Generalized Modeling and Fundamental Limits for Multiple-Access Integrated Sensing and Communication Systems.
CoRR, 2022

Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

MUSTER: Subverting User Selection in MU-MIMO Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation.
IEEE/ACM Trans. Netw., 2021

Wireless-Assisted Key Establishment Leveraging Channel Manipulation.
IEEE Trans. Mob. Comput., 2021

How to Test the Randomness From the Wireless Channel for Security?
IEEE Trans. Inf. Forensics Secur., 2021

Far Proximity Identification in Wireless Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2021

Information-Theoretic Limits of Integrated Sensing and Communication with Correlated Sensing and Channel States.
CoRR, 2021

Smartphone Location Spoofing Attack in Wireless Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

MotionCompass: pinpointing wireless camera via motion-activated traffic.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020

Comb Decoding towards Collision-Free WiFi.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices.
IEEE Trans. Mob. Comput., 2019

Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CFHider: Control Flow Obfuscation with Intel SGX.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

2018
Spoofing attacks and countermeasures in fm indoor localization system.
World Wide Web, 2018

Resource allocation and dynamic power control for D2D communication underlaying uplink multi-cell networks.
Wirel. Networks, 2018

Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking.
IEEE Trans. Veh. Technol., 2018

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018

Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
IEEE Trans. Inf. Forensics Secur., 2018

Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
IEEE Trans. Inf. Forensics Secur., 2018

Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control.
IEEE Trans. Dependable Secur. Comput., 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective.
Mob. Inf. Syst., 2017

A Relay-Aided Device-to-Device-Based Load Balancing Scheme for Multitier Heterogeneous Networks.
IEEE Internet Things J., 2017

Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE Multim., 2017

PDF Mirage: Content Masking Attack Against Information-Based Online Services.
Proceedings of the 26th USENIX Security Symposium, 2017

Stateful Inter-Packet Signal Processing for Wireless Networking.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Electric grid power flow model camouflage against topology leaking attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

Manipulatable wireless key establishment.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature.
IEEE Trans. Inf. Forensics Secur., 2016

Wireless Communications under Broadband Reactive Jamming Attacks.
IEEE Trans. Dependable Secur. Comput., 2016

You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016

Cognitive Networking for Next-G Wireless Communications.
Int. J. Distributed Sens. Networks, 2016

Spoofing Attacks against FM Indoor Localization.
Proceedings of the International Conference on Networking and Network Applications, 2016

Virtual Safe: Unauthorized movement detection for mobile devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Survey on channel reciprocity based key establishment techniques for wireless systems.
Wirel. Networks, 2015

No time to demodulate - fast physical layer verification of friendly jamming.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Agent-based Channel Selection scheme against location inference attack in cognitive radio networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Location-restricted Services Access Control Leveraging Pinpoint Waveforming.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter.
IEEE Trans. Control. Netw. Syst., 2014

Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Fingerprinting Far Proximity from Radio Emissions.
Proceedings of the Computer Security - ESORICS 2014, 2014

MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
NSDMiner: Automated discovery of Network Service Dependencies.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Enhanced wireless channel authentication using time-synched link signature.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

BitTrickle: Defending against broadband and high-power reactive jamming attacks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
False data injection attacks against state estimation in electric power grids.
ACM Trans. Inf. Syst. Secur., 2011

Poster: mimicry attacks against wireless link signature.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010


  Loading...