default search action
Tao Hou 0001
Person information
- affiliation: University of North Texas, Department of Computer Science and Engineering, USA
- affiliation: Texas State University, San Marcos, TX, USA
- affiliation (PhD 2022): University of South Florida, Department of Computer Science and Engineering, Tampa, FL, USA
Other persons with the same name
- Tao Hou — disambiguation page
- Tao Hou 0002 — DePaul University, School of Computing, Chicago, IL, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Tao Hou:
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies. University of South Florida, Tampa, USA, 2022
Journal Articles
- 2021
- [j3]Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu:
Binary Code Similarity Detection through LSTM and Siamese Neural Network. EAI Endorsed Trans. Security Safety 8(29): e1 (2021) - [j2]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. IEEE/ACM Trans. Netw. 29(6): 2779-2792 (2021) - 2018
- [j1]Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. IEEE Trans. Dependable Secur. Comput. 15(5): 853-867 (2018)
Conference and Workshop Papers
- 2023
- [c13]Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, Tao Wang:
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity. CNS 2023: 1-9 - [c12]Hamidah Alanazi, Shengping Bi, Tao Wang, Tao Hou:
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection. ICC 2023: 783-789 - [c11]Hamidah Alanazi, Shengping Bi, Tao Wang, Tao Hou:
Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection. MILCOM 2023: 542-547 - [c10]Sean Chen, Jaelyn McCracken, Kevin Lu, Tao Wang, Tao Hou:
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies. MobiHoc 2023: 474-479 - 2022
- [c9]Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. CNS 2022: 290-298 - [c8]Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, Yalin E. Sagduyu:
MUSTER: Subverting User Selection in MU-MIMO Networks. INFOCOM 2022: 140-149 - [c7]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. WiseML@WiSec 2022: 63-68 - [c6]Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. WISEC 2022: 222-232 - 2021
- [c5]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. DySPAN 2021: 280-287 - 2020
- [c4]Zhengping Luo, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework. INFOCOM Workshops 2020: 550-555 - [c3]Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu:
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference. INFOCOM 2020: 1598-1607 - 2019
- [c2]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic. GlobalSIP 2019: 1-5 - 2015
- [c1]Tao Wang, Yao Liu, Qingqi Pei, Tao Hou:
Location-restricted Services Access Control Leveraging Pinpoint Waveforming. CCS 2015: 292-303
Parts in Books or Collections
- 2020
- [p1]Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu:
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. Adaptive Autonomous Secure Cyber Systems 2020: 109-129
Informal and Other Publications
- 2024
- [i3]Arastoo Zibaeirad, Farnoosh Koleini, Shengping Bi, Tao Hou, Tao Wang:
A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities. CoRR abs/2407.07966 (2024) - 2023
- [i2]Marel Alvarado, Luke Gayler, Alex Seals, Tao Wang, Tao Hou:
A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges. CoRR abs/2312.10430 (2023) - 2022
- [i1]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. CoRR abs/2201.03281 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint