default search action
Yao Liu 0007
Person information
- affiliation: University of South Florida, Department of Computer Science and Engineering, Tampa, FL, USA
- affiliation (PhD 2012): North Carolina State University, Department of Computer Science, Raleigh, NC, USA
Other persons with the same name
- Yao Liu — disambiguation page
- Yao Liu 0001 — Rutgers University, New Brunswick, USA (and 2 more)
- Yao Liu 0002 — National University of Singapore
- Yao Liu 0003 — Delft University of Technology, Biomedical Electronics Group, The Netherlands
- Yao Liu 0004 — Wuhan University, School of Remote Sensing Information Engineering, China
- Yao Liu 0005 — Central South University, School of Information Science and Engineering, Changsha, China (and 2 more)
- Yao Liu 0006 — City University of Hong Kong, Department of Electronic Engineering, Hong Kong
- Yao Liu 0008 — University of California, San Diego, USA
- Yao Liu 0009 — Stanford University, CA, USA (and 1 more)
- Yao Liu 0010 — Xidian University, Xi'an, China
- Yao Liu 0011 — Nanjing University, Nanjing, China
- Yao Liu 0012 — China Aero Geophysical Survey and Remote Sensing Center for Land and Resources, Beijing, China
- Yao Liu 0013 — University of Pavia, Italy
- Yao Liu 0014 — Alibaba Group, Hangzhou, China (and 1 more)
- Yao Liu 0015 — Texas A&M University, College Station, TX, USA
- Yao Liu 0016 — Southwest University, Chong Qing, China
- Yao Liu 0017 — East China Normal University, Faculty of Information, College of Computer Science and Software Engineering, Shanghai Key Laboratory of Multidimensional Information Processing, Shanghai, China (and 1 more)
- Yao Liu 0018 — University of Science and Technology of China, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. IEEE Trans. Dependable Secur. Comput. 21(1): 403-418 (2024) - [j37]Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, Yao Liu:
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense. IEEE Trans. Dependable Secur. Comput. 21(5): 4343-4359 (2024) - [j36]Yong Zeng, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma, Yao Liu:
Eyes See Hazy while Algorithms Recognize Who You Are. ACM Trans. Priv. Secur. 27(1): 7:1-7:23 (2024) - [j35]Yan He, Qiuye He, Song Fang, Yao Liu:
Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial Analysis. IEEE Trans. Mob. Comput. 23(6): 7256-7269 (2024) - [j34]Jiahao Xue, Zhe Qu, Jie Xu, Yao Liu, Zhuo Lu:
Bandwidth Allocation for Federated Learning With Wireless Providers and Cost Constraints. IEEE Trans. Mob. Comput. 23(6): 7470-7482 (2024) - [c57]Yao Liu, Min Li, Yanze Han, Lawrence Ong:
Information- Theoretic Limits of Integrated Sensing and Communication over Interference Channels. ICC 2024: 3561-3566 - [c56]Yao Liu, Min Li, Lawrence Ong, Aylin Yener:
Bistatic Integrated Sensing and Communication over Memoryless Relay Channels. ISIT 2024: 2592-2597 - [c55]Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu:
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. NDSS 2024 - [c54]Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu:
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information. SP 2024: 2740-2758 - [i13]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. CoRR abs/2401.17606 (2024) - [i12]Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu:
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics. CoRR abs/2402.08986 (2024) - 2023
- [j33]Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, Yao Liu:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 437-450 (2023) - [j32]Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 20(1): 637-649 (2023) - [j31]Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, Yao Liu:
On the Convergence of Multi-Server Federated Learning With Overlapping Area. IEEE Trans. Mob. Comput. 22(11): 6647-6662 (2023) - [j30]Weicao Deng, Yao Liu, Min Li, Ming Lei:
GNN-Aided User Association and Beam Selection for mmWave-Integrated Heterogeneous Networks. IEEE Wirel. Commun. Lett. 12(11): 1836-1840 (2023) - [c53]Yan He, Qiuye He, Song Fang, Yao Liu:
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. CCS 2023: 651-665 - [c52]Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, Tao Wang:
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity. CNS 2023: 1-9 - [c51]Yao Liu, Min Li, An Liu, Lawrence Ong:
Improved Information-Theoretic Bound for Multiple-Access Integrated Sensing and Communication Systems. GLOBECOM 2023: 7369-7374 - [c50]Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu:
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security. ICCCN 2023: 1-10 - [i11]Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu:
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security. CoRR abs/2306.06178 (2023) - [i10]Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu:
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. CoRR abs/2311.07780 (2023) - 2022
- [j29]Yongzhi Wang, Yu Zou, Yulong Shen, Yao Liu:
CFHider: Protecting Control Flow Confidentiality With Intel SGX. IEEE Trans. Computers 71(9): 2128-2141 (2022) - [j28]Edwin Yang, Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Trans. Netw. 30(4): 1733-1748 (2022) - [j27]Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, Yao Liu:
Context-Aware Online Client Selection for Hierarchical Federated Learning. IEEE Trans. Parallel Distributed Syst. 33(10): 4353-4367 (2022) - [j26]Yao Liu, Min Li, An Liu, Jianmin Lu, Tony Xiao Han:
Information-Theoretic Limits of Integrated Sensing and Communication With Correlated Sensing and Channel States for Vehicular Networks. IEEE Trans. Veh. Technol. 71(9): 10161-10166 (2022) - [c49]Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu:
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. CCS 2022: 905-919 - [c48]Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu:
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. CCS 2022: 1383-1397 - [c47]Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. CNS 2022: 290-298 - [c46]Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang, Zhuo Lu:
Generalized Federated Learning via Sharpness Aware Minimization. ICML 2022: 18250-18280 - [c45]Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, Yalin E. Sagduyu:
MUSTER: Subverting User Selection in MU-MIMO Networks. INFOCOM 2022: 140-149 - [c44]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. WiseML@WiSec 2022: 63-68 - [c43]Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. WISEC 2022: 222-232 - [i9]Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, Yao Liu:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. CoRR abs/2201.02873 (2022) - [i8]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. CoRR abs/2201.03281 (2022) - [i7]Yao Liu, Min Li, An Liu, Jianmin Lu, Rui Du, Tony Xiao Han:
Generalized Modeling and Fundamental Limits for Multiple-Access Integrated Sensing and Communication Systems. CoRR abs/2205.05328 (2022) - [i6]Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang, Zhuo Lu:
Generalized Federated Learning via Sharpness Aware Minimization. CoRR abs/2206.02618 (2022) - [i5]Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu:
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. CoRR abs/2207.13192 (2022) - [i4]Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, Yao Liu:
On the Convergence of Multi-Server Federated Learning with Overlapping Area. CoRR abs/2208.07893 (2022) - 2021
- [j25]Tao Wang, Jian Weng, Jay Ligatti, Yao Liu:
Far Proximity Identification in Wireless Systems. IEEE Trans. Dependable Secur. Comput. 18(5): 2403-2418 (2021) - [j24]Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, Yao Liu:
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment. IEEE Trans. Dependable Secur. Comput. 18(6): 2996-3011 (2021) - [j23]Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, Yao Liu:
How to Test the Randomness From the Wireless Channel for Security? IEEE Trans. Inf. Forensics Secur. 16: 3753-3766 (2021) - [j22]Song Fang, Ian D. Markwood, Yao Liu:
Wireless-Assisted Key Establishment Leveraging Channel Manipulation. IEEE Trans. Mob. Comput. 20(1): 263-275 (2021) - [j21]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. IEEE/ACM Trans. Netw. 29(6): 2779-2792 (2021) - [c42]Jikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su:
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism. ACISP 2021: 490-509 - [c41]Junjie Xiong, Mingkui Wei, Zhuo Lu, Yao Liu:
Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud. CCS 2021: 955-969 - [c40]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. DySPAN 2021: 280-287 - [c39]Yan He, Qiuye He, Song Fang, Yao Liu:
MotionCompass: pinpointing wireless camera via motion-activated traffic. MobiSys 2021: 215-227 - [c38]Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han, Junjie Xiong:
Smartphone Location Spoofing Attack in Wireless Networks. SecureComm (2) 2021: 295-313 - [i3]Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, Yao Liu:
How to Test the Randomness from the Wireless Channel for Security? CoRR abs/2106.07715 (2021) - [i2]Yao Liu, Min Li, An Liu, Jianmin Lu, Tony Xiao Han:
Information-Theoretic Limits of Integrated Sensing and Communication with Correlated Sensing and Channel States. CoRR abs/2110.12683 (2021) - [i1]Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, Yao Liu:
Context-Aware Online Client Selection for Hierarchical Federated Learning. CoRR abs/2112.00925 (2021) - 2020
- [j20]Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 19(2): 432-449 (2020) - [c37]Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu:
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference. INFOCOM 2020: 1598-1607 - [c36]Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu, Yao Liu:
Comb Decoding towards Collision-Free WiFi. NSDI 2020: 933-951 - [p1]Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu:
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. Adaptive Autonomous Secure Cyber Systems 2020: 109-129
2010 – 2019
- 2019
- [j19]Dakun Shen, Ian D. Markwood, Dan Shen, Yao Liu:
Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices. IEEE Trans. Mob. Comput. 18(3): 688-701 (2019) - [c35]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic. GlobalSIP 2019: 1-5 - [c34]Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. INFOCOM 2019: 541-549 - [c33]Shangqing Zhao, Zhuo Lu, Zhengping Luo, Yao Liu:
Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks. INFOCOM 2019: 1603-1611 - [c32]Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Entrapment for Wireless Eavesdroppers. INFOCOM 2019: 2530-2538 - 2018
- [j18]Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. IEEE Trans. Dependable Secur. Comput. 15(5): 853-867 (2018) - [j17]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices. IEEE Trans. Inf. Forensics Secur. 13(3): 802-817 (2018) - [j16]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Haojin Zhu:
Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817]. IEEE Trans. Inf. Forensics Secur. 13(6): 1595 (2018) - [j15]Chao Shen, Yufei Chen, Yao Liu, Xiaohong Guan:
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference. IEEE Trans. Neural Networks Learn. Syst. 29(12): 6292-6302 (2018) - [j14]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Miao Pan, Hongning Li:
Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking. IEEE Trans. Veh. Technol. 67(6): 5042-5053 (2018) - [j13]Fan Jiang, Benchao Wang, Changyin Sun, Yao Liu, Xianchao Wang:
Resource allocation and dynamic power control for D2D communication underlaying uplink multi-cell networks. Wirel. Networks 24(2): 549-563 (2018) - [j12]Zi Li, Qingqi Pei, Yao Liu:
Spoofing attacks and countermeasures in fm indoor localization system. World Wide Web 21(1): 219-240 (2018) - [c31]Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. CCS 2018: 1747-1760 - [c30]Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, Yao Liu:
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment. MobiHoc 2018: 81-90 - 2017
- [j11]Qun Jin, Yong Xiang, Guozi Sun, Yao Liu, Chin-Chen Chang:
Cybersecurity for Cyber-Enabled Multimedia Applications. IEEE Multim. 24(4): 10-13 (2017) - [j10]Fan Jiang, Yao Liu, Benchao Wang, Xianchao Wang:
A Relay-Aided Device-to-Device-Based Load Balancing Scheme for Multitier Heterogeneous Networks. IEEE Internet Things J. 4(5): 1537-1551 (2017) - [j9]Fan Jiang, Yao Liu, Chenbi Li, Changyin Sun:
Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective. Mob. Inf. Syst. 2017: 7148564:1-7148564:17 (2017) - [j8]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, Tao Wang:
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks. IEEE Trans. Mob. Comput. 16(2): 566-580 (2017) - [c29]Song Fang, Ian D. Markwood, Yao Liu:
Manipulatable wireless key establishment. CNS 2017: 1-9 - [c28]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
CovertMIMO: A covert uplink transmission scheme for MIMO systems. ICC 2017: 1-6 - [c27]Ian D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua:
Electric grid power flow model camouflage against topology leaking attacks. INFOCOM 2017: 1-9 - [c26]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. MILCOM 2017: 40-45 - [c25]Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, Yao Liu:
Stateful Inter-Packet Signal Processing for Wireless Networking. MobiCom 2017: 15-27 - [c24]Ian D. Markwood, Dakun Shen, Yao Liu, Zhuo Lu:
PDF Mirage: Content Masking Attack Against Information-Based Online Services. USENIX Security Symposium 2017: 833-847 - 2016
- [j7]Qingqi Pei, Pin-Han Ho, Yao Liu, Qinghua Li, Lin Chen:
Cognitive Networking for Next-G Wireless Communications. Int. J. Distributed Sens. Networks 12(2): 9172605:1-9172605:2 (2016) - [j6]Haojin Zhu, Chenliaohui Fang, Yao Liu, Cailian Chen, Mengyuan Li, Xuemin Sherman Shen:
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing. IEEE J. Sel. Areas Commun. 34(10): 2723-2737 (2016) - [j5]Song Fang, Yao Liu, Peng Ning:
Wireless Communications under Broadband Reactive Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 13(3): 394-408 (2016) - [j4]Song Fang, Yao Liu, Peng Ning:
Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature. IEEE Trans. Inf. Forensics Secur. 11(7): 1515-1527 (2016) - [c23]Ian D. Markwood, Yao Liu:
Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition. AsiaCCS 2016: 425-436 - [c22]Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. CCS 2016: 1068-1079 - [c21]Dakun Shen, Ian D. Markwood, Dan Shen, Yao Liu:
Virtual Safe: Unauthorized movement detection for mobile devices. CNS 2016: 315-323 - [c20]Zi Li, Yao Liu, Qingqi Pei, Lei Bai:
Spoofing Attacks against FM Indoor Localization. NaNA 2016: 190-195 - 2015
- [j3]Tao Wang, Yao Liu, Athanasios V. Vasilakos:
Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Networks 21(6): 1835-1846 (2015) - [c19]Tao Wang, Yao Liu, Qingqi Pei, Tao Hou:
Location-restricted Services Access Control Leveraging Pinpoint Waveforming. CCS 2015: 292-303 - [c18]Xiaoshan Wang, Yao Liu, Zhiqiang Shi, Xiang Lu, Limin Sun:
A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. GLOBECOM 2015: 1-6 - [c17]Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, Peng Ning:
No time to demodulate - fast physical layer verification of friendly jamming. MILCOM 2015: 653-658 - [c16]Hongning Li, Qingqi Pei, Yao Liu:
Agent-based Channel Selection scheme against location inference attack in cognitive radio networks. MILCOM 2015: 941-946 - 2014
- [j2]Kebina Manandhar, Xiaojun Cao, Fei Hu, Yao Liu:
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter. IEEE Trans. Control. Netw. Syst. 1(4): 370-379 (2014) - [c15]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu:
MCR Decoding: A MIMO approach for defending against wireless jamming attacks. CNS 2014: 133-138 - [c14]Tao Wang, Yao Liu, Jay Ligatti:
Fingerprinting Far Proximity from Radio Emissions. ESORICS (1) 2014: 508-525 - [c13]Kebina Manandhar, Xiaojun Cao, Fei Hu, Yao Liu:
Combating False Data Injection Attacks in Smart Grid using Kalman Filter. ICNC 2014: 16-20 - [c12]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu:
Where are you from?: confusing location distinction using virtual multipath camouflage. MobiCom 2014: 225-236 - 2013
- [c11]Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures. INFOCOM 2013: 2751-2759 - 2012
- [c10]Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. CCS 2012: 1025-1027 - [c9]Yao Liu, Peng Ning:
BitTrickle: Defending against broadband and high-power reactive jamming attacks. INFOCOM 2012: 909-917 - [c8]Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson:
NSDMiner: Automated discovery of Network Service Dependencies. INFOCOM 2012: 2507-2515 - [c7]Yao Liu, Peng Ning:
Enhanced wireless channel authentication using time-synched link signature. INFOCOM 2012: 2636-2640 - 2011
- [j1]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [c6]Yao Liu, Peng Ning:
Poster: mimicry attacks against wireless link signature. CCS 2011: 801-804 - 2010
- [c5]An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang:
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ACSAC 2010: 367-376 - [c4]Yao Liu, Peng Ning, Huaiyu Dai, An Liu:
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. INFOCOM 2010: 695-703 - [c3]An Liu, Peng Ning, Huaiyu Dai, Yao Liu:
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure. MASS 2010: 41-50 - [c2]Yao Liu, Peng Ning, Huaiyu Dai:
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. IEEE Symposium on Security and Privacy 2010: 286-301
2000 – 2009
- 2009
- [c1]Yao Liu, Michael K. Reiter, Peng Ning:
False data injection attacks against state estimation in electric power grids. CCS 2009: 21-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint