2024
-
Warmonger attack: A Novel Attack Vector in Serverless Computing,
Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu
IEEE/ACM Transactions on Networking (ToN), To Appear.
-
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and its Defense,
Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, and Yao Liu
IEEE Transactions on Dependable and Secure Computing (TDSC), To Appear.
-
Bandwidth Allocation for Federated Learning with Wireless Providers and Cost Constraints,
Jiaohao Xue, Zhe Qu, Jie Xu, Yao Liu, and Zhuo Lu
IEEE Transactions on Mobile Computing (TMC), vol. 23, no. 6, pp. 7470-7482, Jun 2024.
-
Precise Wireless Camera Localization Leveraging Traffic-aided Spatial Analysis,
Yan He, Qiuye He, Song Fang, and Yao Liu
IEEE Transactions on Mobile Computing (TMC), vol. 23, no. 6, pp. 7256-7269, June 2024.
-
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics,
Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, and Zhuo Lu
IEEE Conference on Computer Communications (INFOCOM), May 2024.
-
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information,
Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, and Zhuo Lu
IEEE Symposium on Security and Privacy (S&P), May 2024.
-
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models,
Rui Duan, Zhe Qu, Leah Ding, Yao Liu, and Zhuo Lu
Network and Distributed System Security Symposium (NDSS), Feb 2024.
-
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines,
Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu and Kui Ren
IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 21, no. 1, pp. 403-418, Jan 2024.
-
Eyes See Hazy while Algorithms Recognize Who You Are,
Yong Zeng, Jiale Liu, Tong Dong, Qingqi Pei, Jianfeng Ma, and Yao Liu
ACM Transactions on Privacy and Security (TOPS), vol. 27, no. 1, pp. 1-23, Jan 2024.
2023
-
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription,
Yan He, Qiuye He, Song Fang, and Yao Liu
ACM Conference on Computer and Communications Security (CCS), Nov 2023.
-
On the Convergence of Multi-Server Federated Learning with Overlapping Area,
Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, and Yao Liu
IEEE Transactions on Mobile Computing (TMC), vol. 22, no. 11, pp. 6647-6662, Nov 2023.
-
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity,
Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu and Tao Wang
IEEE Conference on Communications and Network Security (CNS), Oct 2023.
-
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security,
Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu and Zhuo Lu
IEEE Conference on Computer Communications and Networks (ICCCN), Jul 2023.
-
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks,
Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu
IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 20, pp. 637-649, Jan 2023.
-
LoMar: A Local Defense Against Poisoning Attack on Federated Learning,
Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu (The first two authors are co-primary authors)
IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 20, no. 1, pp. 437-450, Jan 2023.
2022
-
Context-Aware Online Client Selection for Hierarchical Federated Learning,
Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, and Yao Liu
IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 22, pp. 4353-4367, Dec 2022.
-
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API,
Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, and Yao Liu
ACM Conference on Computer and Communications Security (CCS), Nov 2022.
-
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception ,
Rui Duan, Zhe Qu, Shanqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu
ACM Conference on Computer and Communications Security (CCS), Nov 2022.
-
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet,
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Conference on Communication Network Security (CNS), Oct 2022.
-
CFHider: Protecting Control Flow Confidentiality with Intel SGX,
Yongzhi Wang, Yu Zou, Yulong Shen, and Yao Liu
IEEE Transactions on Computer (TC), vol. 71, no. 9, pp. 2128-2141, Sep 2022.
-
Wireless Training-free Keystroke Inference Attack and Defense,
Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu
IEEE/ACM Transactions on Networking (ToN), vol. 30, no. 4, pp. 1733-1748, Aug. 2022.
-
Generalized Federated Learning via Sharpness Aware Minimization,
Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang, and Zhuo Lu
International Conference on Machine Learning (ICML), Jul 2022.
-
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security,
Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022.
-
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication,
Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu
ACM Workshop on Wireless Security and Machine Learning (WiSec-WiseML), May 2022.
-
MUSTER: Subverting User Selection in MU-MIMO Networks,
Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Saguduyu
IEEE Conference on Computer Communications (INFOCOM), May 2022.
2021
-
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification,
Tao Hou, Tao Wang, Zhuo Lu, Yao Liu and Yalin Sagduyu
IEEE Symposium on Dynamic Spectrum Access Networks (DySPAN), Dec. 2021.
-
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation,
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
IEEE/ACM Transactions on Networking (ToN), vol. 29, no. 6, pp. 2779-2792, Dec. 2021.
-
Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud ,
Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu
ACM Conference on Computer and Communications Security (CCS), Nov. 2021.
-
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment,
Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, and Yao Liu
IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 6, pp. 2996-3011, Nov 2021.
-
Smartphone Location Spoofing Attack in Wireless Networks,
Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han and Junjie Xiong
EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Sept 2021.
-
MotionCompass: pinpointing wireless camera via motion-activated traffic,
Yan He, Qiuye He, Song Fang, and Yao Liu
ACM Conference on Mobile Systems, Applications, and Services (MobiSys), Jun 2021.
-
Far Proximity Identification in Wireless Systems,
Tao Wang, Jian Weng, Jay Ligatti, and Yao Liu
IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 16, pp. 3753-3766, June 2021.
-
How to Test the Randomness from the Wireless Channel for Security?,
Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu
IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 3753-3766, June 2021.
-
Wireless-Assisted Key Establishment Leveraging Channel Manipulation,
Song Fang, Ian Markwood, Yao Liu
IEEE Transactions on Mobile Computing (TMC), vol. 20, no. 1, pp. 263-275, Jan 2021.
2020
-
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference,
Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Conference on Computer Communications (INFOCOM), Apr. 2020.
-
Comb Decoding towards Collision-Free WiFi,
Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu
USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020.
-
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures,
Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu and Na Ruan
IEEE Transactions on Mobile Computing (TMC), vol. 19, no. 2, pp. 432-449, Feb 2020.
2019
-
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic,
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Global Conference on Signal and Information Processing (GlobalSIP), Nov. 2019.
-
CFHider: Control Flow Obfuscation with Intel SGX,
Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, and Yao Liu
IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
-
Entrapment for Wireless Eavesdroppers,
Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu
IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
-
Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks,
Shangqing Zhao, Zhengping Luo, Zhuo Lu, and Yao Liu
IEEE Conference on Computer Communications (INFOCOM), Apr. 2019.
-
Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices,
Dakun Shen, Ian Markwood, Dan Shen, and Yao Liu
IEEE Transactions on Mobile Computing (TMC), Mar. 2019.
2018
-
Adaptive Human-Machine Interactive Behavior Analysis with Wrist-Worn Devices for Password Inference,
Chao Shen, Yufei Chen, Yao Liu, and Xiaohong Guan
IEEE Transactions on Neural Networks and Learning Systems (TNNLS), Dec. 2018.
-
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing,
Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu
ACM Conference on Computer and Communications Security (CCS), Oct. 2018.
-
WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment,
Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, and Yao Liu
ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), June 2018.
-
Location Privacy Violation via GPSagnostic Smart Phone Car Tracking,
Zi Li, Qingqi Pei, Ian Markwood, Yao Liu, Miao Pan, and Hongning Li
IEEE Transactions on Vehicular Technology (TVT), June 2018.
-
Secret Key Establishment via RSS Trajectory Matching,
Zi Li, Qingqi Pei, Ian Markwood, Yao Liu, and Haojin Zhu
IEEE Transactions on Information Forensics and Security (TIFS), vol. 13, no. 3, Mar. 2018.
2017
-
On Eavesdropping Attacks and Countermeasures for MU-MIMO Systems,
Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi and Limin Sun
IEEE Military Communications Conference (MILCOM), Oct. 2017.
-
Manipulatable Wireless Key Establishment,
Song Fang, Ian Markwood and Yao Liu
IEEE Conference on Communications and Network Security (CNS), Oct. 2017.
-
Stateful Inter-Packet Signal Processing for Wireless Networking,
Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, and Yao Liu
ACM Conference on Mobile Computing and Networking (MobiCom), Oct. 2017.
-
A Relay-aided Device-to-Device Based Load Balancing Scheme for Multi-tier Heterogeneous Networks,
Fan Jiang, Yao Liu, Benchao Wang, and Xianchao Wang
IEEE Internet of Things Journal (IoT), vol. 4, no. 5, pp. 1537-1551, Oct. 2017.
-
PDF Mirage: Content Masking Attack Against Information-Based Online Services,
Ian Markwood, Dakun Shen, Yao Liu, and Zhuo Lu (The first two authors are co-first authors in alphabetical order)
USENIX Security Symposium (USENIX Security), Aug. 2017.
-
Electric Grid Power Flow Model Camouflage Against Topology Leaking Attacks,
Ian Markwood, Yao Liu, Kevin Kwiat, and Charles A Kamhoua
IEEE International Conference on Computer Communications (INFOCOM), May 2017.
2016
-
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals,
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan
ACM Conference on Computer and Communications Security (CCS), Oct. 2016.
-
Virtual Safe: Unauthorized Movement Detection for Mobile Devices,
Dakun Shen, Ian Markwood, Dan Shen, and Yao Liu
IEEE Conference on Communications and Network Security (CNS), Sept. 2016.
-
Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition,
Ian Markwood, and Yao Liu
ACM Asia Conference on Computer and Communications Security (AsiaCCS), May 2016.
-
Randomized Positioning DSSS for Anti-Jamming Wireless Communications,
Ahamed Alagil, Meshari Alotaibi, and Yao Liu
International Conference on Computing, Networking and Communications (ICNC), Feb 2016.
-
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks,
Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, and Tao Wang
IEEE Transactions on Mobile Computing (TMC), 2016.
-
Mimicry Attacks against Wireless Link Signature and New Defense using Time-Synched Link Signature,
Song Fang, Yao Liu, and Peng Ning
IEEE Transactions on Information Forensics and Security (TIFS), 2016.
-
You Can Jam But You Can't Hide: Defending Against Jamming Attacks for Geo-location Database Driven Spectrum Sharing,
Haojin Zhu, Chengliaohui Fang, Yao Liu, Cailian Chen, Mengyuan Li, and Xuemin Shen
IEEE Journal on Selected Areas in Communications (JSAC), 2016.
-
Signal Entanglement based Pinpoint Waveforming for Location-restricted Service Access Control,
Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, and Song Fang
IEEE Transactions on Dependable and Secure Computing (TDSC), 2016.
-
Resource Allocation and Dynamic Power Control for D2D Communication Underlaying Uplink Multi-cell Networks,
Fan Jiang, Ben-chao Wang, Chang-yin Sun, Yao Liu, and Xianchao Wang
Wireless Networks 2016.
2015
-
A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint,
Xiaoshan Wang, Yao Liu, Zhiqiang Shi, Xiang Lu, and Limin Sun
IEEE Global Communications Conference (GLOBECOM), Dec. 2015.
-
Location-restricted Services Access Control Leveraging Pinpoint Waveforming,
Tao Wang, Yao Liu, Qingqi Pei, and Tao Hou
ACM Conference on Computer and Communications Security (CCS), Oct. 2015.
-
Agent-based Channel Selection Scheme against Location Inference Attack in Cognitive Radio Networks,
Hongning Li, Qingqi Pei, and Yao Liu
IEEE Military Communications Conference (MILCOM), Oct. 2015.
-
No Time to Demodulate - Fast Physical Layer Verification of Friendly Jamming,
Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, and Peng Ning
IEEE Military Communications Conference (MILCOM), Oct. 2015.
-
Wireless Communications under Broadband Reactive Jamming Attacks,
Song Fang, Yao Liu, and Peng Ning
IEEE Transactions on Dependable and Secure Computing (TDSC), 2015.
-
Survey on channel reciprocity based key establishment techniques for wireless systems,
Tao Wang, Yao Liu, and Athanasios V. Vasilakos
Wireless Networks pp. 1 - 12, Jan. 2015.
2014
-
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter,
Kebina Manandhar, Xiaojun Cao, Fei Hu, and Yao Liu
IEEE Transactions on Control of Network Systems (TCNS), vol. 1, no. 4, pp. 370 - 379, Dec. 2014.
-
Secure Distance Indicator Leveraging Wireless Link Signatures ,
Tao Wang and Yao Liu
IEEE Military Communications Conference (MILCOM), Oct. 2014.
-
MCR Decoding: A MIMO Approach for Defending Against Wireless Jamming Attacks,
Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai and Yao Liu
IEEE Conference on Communications and Network Security: Workshop on Physical-layer Methods for Wireless Security (CNS), Sep. 2014.
-
Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage ,
Song Fang, Yao Liu, Wenbo Shen, and Haojin Zhu
ACM Annual International Conference on Mobile Computing and Networking (MobiCom), Sep. 2014.
-
Fingerprinting Far Proximity From Radio Emissions,
Tao Wang, Yao Liu, and Jay Ligatti
European Symposium on Research in Computer Security (ESORICS), Sep. 2014.
-
Combating False Data Injection Attacks in Smart Grid Using Kalman Filter,
Kebina Manandhar, Xiaojun Cao, Fei Hu, and Yao Liu
IEEE International Conference on Computing, Networking and Communications (ICNC), Feb. 2014.
2012
-
Location Privacy Leaking from Spectrum Utilization Information in Database-driven Cognitive Radio Network,
Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li and Zhenfu Cao
ACM Conference on Computer and Communications Security, Poster Session (CCS), Oct. 2012.
-
BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks,
Yao Liu and Peng Ning
IEEE International Conference on Computer Communications (INFOCOM), Apr. 2012.
-
NSDMine: Automated Discovery of Network Service Dependencies,
Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, and Steve E. Hutchinson
IEEE Conference on Computer Communications (INFOCOM), Apr. 2012.
-
Enhanced Wireless Channel Authentication Using Time-Synched Link Signature,
Yao Liu and Peng Ning
IEEE Conference on Computer Communications, mini-conference (INFOCOM), Apr. 2012.
2010
-
Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure,
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, and Cliff Wang
Annual Computer Security Applications Conference (ACSAC), Dec. 2010.
-
USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure,
An Liu, Peng Ning, Huaiyu Dai, and Yao Liu
IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Nov. 2010.
-
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures,
Yao Liu, Peng Ning, and Huaiyu Dai
IEEE Symposium on Security and Privacy (Oakland), May 2010.
-
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication,
Yao Liu, Peng Ning, Huaiyu Dai, and An Liu
IEEE International Conference on Computer Communications (INFOCOM), Mar. 2010.
© COPYRIGHT 2024 Yao Liu, University of South Florida.