2024

  • Warmonger attack: A Novel Attack Vector in Serverless Computing,
    Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu
    IEEE/ACM Transactions on Networking (ToN), To Appear.
  • The Perils of Wi-Fi Spoofing Attack Via Geolocation API and its Defense,
    Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, and Yao Liu
    IEEE Transactions on Dependable and Secure Computing (TDSC), To Appear.
  • Bandwidth Allocation for Federated Learning with Wireless Providers and Cost Constraints,
    Jiaohao Xue, Zhe Qu, Jie Xu, Yao Liu, and Zhuo Lu
    IEEE Transactions on Mobile Computing (TMC), vol. 23, no. 6, pp. 7470-7482, Jun 2024.
  • Precise Wireless Camera Localization Leveraging Traffic-aided Spatial Analysis,
    Yan He, Qiuye He, Song Fang, and Yao Liu
    IEEE Transactions on Mobile Computing (TMC), vol. 23, no. 6, pp. 7256-7269, June 2024.
  • Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics,
    Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, and Zhuo Lu
    IEEE Conference on Computer Communications (INFOCOM), May 2024.
  • Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information,
    Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, and Zhuo Lu
    IEEE Symposium on Security and Privacy (S&P), May 2024.
  • Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models,
    Rui Duan, Zhe Qu, Leah Ding, Yao Liu, and Zhuo Lu
    Network and Distributed System Security Symposium (NDSS), Feb 2024.
  • Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines,
    Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu and Kui Ren
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 21, no. 1, pp. 403-418, Jan 2024.
  • Eyes See Hazy while Algorithms Recognize Who You Are,
    Yong Zeng, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma, and Yao Liu
    ACM Transactions on Privacy and Security (TOPS), vol. 27, no. 1, pp. 1-23, Jan 2024.

2023

  • When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription,
    Yan He, Qiuye He, Song Fang, and Yao Liu
    ACM Conference on Computer and Communications Security (CCS), Nov 2023.
  • On the Convergence of Multi-Server Federated Learning with Overlapping Area,
    Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, and Yao Liu
    IEEE Transactions on Mobile Computing (TMC), vol. 22, no. 11, pp. 6647-6662, Nov 2023.
  • SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity,
    Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu and Tao Wang
    IEEE Conference on Communications and Network Security (CNS), Oct 2023.
  • Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security,
    Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu and Zhuo Lu
    IEEE Conference on Computer Communications and Networks (ICCCN), Jul 2023.
  • Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks,
    Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 20, pp. 637-649, Jan 2023.
  • LoMar: A Local Defense Against Poisoning Attack on Federated Learning,
    Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu (The first two authors are co-primary authors)
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 20, no. 1, pp. 437-450, Jan 2023.

2022

  • Context-Aware Online Client Selection for Hierarchical Federated Learning,
    Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, and Yao Liu
    IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 22, pp. 4353-4367, Dec 2022.
  • Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API,
    Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, and Yao Liu
    ACM Conference on Computer and Communications Security (CCS), Nov 2022.
  • Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception ,
    Rui Duan, Zhe Qu, Shanqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu
    ACM Conference on Computer and Communications Security (CCS), Nov 2022.
  • When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet,
    Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
    IEEE Conference on Communication Network Security (CNS), Oct 2022.
  • CFHider: Protecting Control Flow Confidentiality with Intel SGX,
    Yongzhi Wang, Yu Zou, Yulong Shen, and Yao Liu
    IEEE Transactions on Computer (TC), vol. 71, no. 9, pp. 2128-2141, Sep 2022.
  • Wireless Training-free Keystroke Inference Attack and Defense,
    Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu
    IEEE/ACM Transactions on Networking (ToN), vol. 30, no. 4, pp. 1733-1748, Aug. 2022.
  • Generalized Federated Learning via Sharpness Aware Minimization,
    Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang, and Zhuo Lu
    International Conference on Machine Learning (ICML), Jul 2022.
  • DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security,
    Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei
    ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022.
  • Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication,
    Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu
    ACM Workshop on Wireless Security and Machine Learning (WiSec-WiseML), May 2022.
  • MUSTER: Subverting User Selection in MU-MIMO Networks,
    Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Saguduyu
    IEEE Conference on Computer Communications (INFOCOM), May 2022.

2021

  • IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification,
    Tao Hou, Tao Wang, Zhuo Lu, Yao Liu and Yalin Sagduyu
    IEEE Symposium on Dynamic Spectrum Access Networks (DySPAN), Dec. 2021.
  • Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation,
    Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
    IEEE/ACM Transactions on Networking (ToN), vol. 29, no. 6, pp. 2779-2792, Dec. 2021.
  • Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud ,
    Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu
    ACM Conference on Computer and Communications Security (CCS), Nov. 2021.
  • Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment,
    Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, and Yao Liu
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 6, pp. 2996-3011, Nov 2021.
  • Smartphone Location Spoofing Attack in Wireless Networks,
    Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han and Junjie Xiong
    EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Sept 2021.
  • MotionCompass: pinpointing wireless camera via motion-activated traffic,
    Yan He, Qiuye He, Song Fang, and Yao Liu
    ACM Conference on Mobile Systems, Applications, and Services (MobiSys), Jun 2021.
  • Far Proximity Identification in Wireless Systems,
    Tao Wang, Jian Weng, Jay Ligatti, and Yao Liu
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 16, pp. 3753-3766, June 2021.
  • How to Test the Randomness from the Wireless Channel for Security?,
    Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu
    IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 3753-3766, June 2021.
  • Wireless-Assisted Key Establishment Leveraging Channel Manipulation,
    Song Fang, Ian Markwood, Yao Liu
    IEEE Transactions on Mobile Computing (TMC), vol. 20, no. 1, pp. 263-275, Jan 2021.

2020

  • ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference,
    Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2020.
  • Comb Decoding towards Collision-Free WiFi,
    Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu
    USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020.
  • Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures,
    Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu and Na Ruan
    IEEE Transactions on Mobile Computing (TMC), vol. 19, no. 2, pp. 432-449, Feb 2020.

2019

  • Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic,
    Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
    IEEE Global Conference on Signal and Information Processing (GlobalSIP), Nov. 2019.
  • CFHider: Control Flow Obfuscation with Intel SGX,
    Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, and Yao Liu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
  • Entrapment for Wireless Eavesdroppers,
    Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
  • Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks,
    Shangqing Zhao, Zhengping Luo, Zhuo Lu, and Yao Liu
    IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
  • Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices,
    Dakun Shen, Ian Markwood, Dan Shen, and Yao Liu
    IEEE Transactions on Mobile Computing (TMC), Mar. 2019.

2018

  • Adaptive Human-Machine Interactive Behavior Analysis with Wrist-Worn Devices for Password Inference,
    Chao Shen, Yufei Chen, Yao Liu, and Xiaohong Guan
    IEEE Transactions on Neural Networks and Learning Systems (TNNLS), Dec. 2018.
  • No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing,
    Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu
    ACM Conference on Computer and Communications Security (CCS), Oct. 2018.
  • WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment,
    Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, and Yao Liu
    ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), June 2018.
  • Location Privacy Violation via GPSagnostic Smart Phone Car Tracking,
    Zi Li, Qingqi Pei, Ian Markwood, Yao Liu, Miao Pan, and Hongning Li
    IEEE Transactions on Vehicular Technology (TVT), June 2018.
  • Secret Key Establishment via RSS Trajectory Matching,
    Zi Li, Qingqi Pei, Ian Markwood, Yao Liu, and Haojin Zhu
    IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 3, Mar. 2018.

2017

2016

2015

2014

2013

2012

2011

2010

2009



© COPYRIGHT 2024 Yao Liu, University of South Florida.