Tao Wei

ORCID: 0000-0002-4765-1826
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Fiber Optic Sensors
  • Photonic and Optical Devices
  • Advanced Fiber Laser Technologies
  • Advanced Malware Detection Techniques
  • Semiconductor Lasers and Optical Devices
  • Security and Verification in Computing
  • Network Security and Intrusion Detection
  • Photonic Crystal and Fiber Optics
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Spam and Phishing Detection
  • Software Testing and Debugging Techniques
  • Optical Network Technologies
  • Peer-to-Peer Network Technologies
  • Optical measurement and interference techniques
  • Analytical Chemistry and Sensors
  • Software Reliability and Analysis Research
  • Integrated Circuits and Semiconductor Failure Analysis
  • Cryptographic Implementations and Security
  • Fire dynamics and safety research
  • Radio Frequency Integrated Circuit Design
  • Advanced Photonic Communication Systems
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Measurement and Metrology Techniques
  • Advanced Power Amplifier Design

Clemson University
2025

Changzhou Academy of Intelli-Ag Equipment (China)
2024

University of Rhode Island
2015-2024

Nanjing Medical University
2023-2024

Hohai University
2024

Wuhan Polytechnic University
2024

Institute of Electronics
2024

Henan Normal University
2024

Naval University of Engineering
2024

Changzhou University
2024

Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and compatibility issues limit its adoption. We propose new practical realistic method called CCFIR (Compact Randomization), which addresses the main barriers to CFI collects all legal targets of indirect control-transfer instructions, puts them into dedicated "Springboard section" in random order, then limits transfers flow only them. Using Springboard section for...

10.1109/sp.2013.44 article EN IEEE Symposium on Security and Privacy 2013-05-01

We report a miniaturized fiber inline Fabry-Perot interferometer (FPI), with an open micro-notch cavity fabricated by one-step fs laser micromachining, for highly sensitive refractive index measurement. The device was tested measurement of the indices various liquids including isopropanol, acetone and methanol at room temperature, as well temperature-dependent deionized water from 3 to 90 degrees C. sensitivity change 1163 nm/RIU wavelength 1550 nm. temperature cross-sensitivity about...

10.1364/oe.16.005764 article EN cc-by Optics Express 2008-04-10

Fuzz testing has proven successful in finding security vulnerabilities large programs. However, traditional fuzz tools have a well-known common drawback: they are ineffective if most generated malformed inputs rejected the early stage of program running, especially when target programs employ checksum mechanisms to verify integrity inputs. In this paper, we present TaintScope, an automatic fuzzing system using dynamic taint analysis and symbolic execution techniques, tackle above problem....

10.1109/sp.2010.37 article EN IEEE Symposium on Security and Privacy 2010-01-01

Data intensive analysis is the major challenge in smart cities because of ubiquitous deployment various kinds sensors. The natural characteristic geodistribution requires a new computing paradigm to offer location-awareness and latency-sensitive monitoring intelligent control. Fog Computing that extends edge network, fits this need. In paper, we introduce hierarchical distributed architecture support integration massive number infrastructure components services future cities. To secure...

10.1109/tii.2017.2679740 article EN publisher-specific-oa IEEE Transactions on Industrial Informatics 2017-03-08

The ubiquitous deployment of various kinds sensors in smart cities requires a new computing paradigm to support Internet Things (IoT) services and applications, big data analysis. Fog Computing, which extends Cloud Computing the edge network, fits this need. In paper, we present hierarchical distributed architecture integration massive number infrastructure components future cities. To secure communities, it is necessary build large-scale, geospatial sensing networks, perform analysis,...

10.1145/2818869.2818898 article EN 2015-10-07

We report a miniaturized inline Fabry-Perot interferometer directly fabricated on single-mode optical fiber with femtosecond laser. The device had loss of 16 dB and an interference visibility exceeding 14 dB. was tested survived in high temperatures up to 1100 degrees C. With accessible cavity all-glass structure, the new is attractive for sensing applications high-temperature harsh environments.

10.1364/ol.33.000536 article EN Optics Letters 2008-03-05

A recently developed scanning tip microwave near-field microscope has been improved to achieve a spatial resolution of 100 nm (∼λ/106). Furthermore, explicit calculations the field distribution using simplified model allow quantitative microscopy dielectric properties for materials. detection sensitivity δε/ε∼6×10−4 achieved.

10.1063/1.120444 article EN Applied Physics Letters 1997-09-29

Hybrid testing combines fuzz and concolic execution. It leverages to test easy-to-reach code regions uses execution explore blocks guarded by complex branch conditions. As a result, hybrid is able reach deeper into program state space than or alone. Recently, has seen significant advancement. However, its coverage-centric design inefficient in vulnerability detection. First, it blindly selects seeds for aims new continuously. as statistics show, large portion of the explored often bug-free....

10.1109/sp40000.2020.00002 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2020-05-01

Social networks have become one of the most popular platforms for users to interact with each other. Given huge amount sensitive data available in social network platforms, user privacy protection on has urgent research issues. As a traditional information stealing technique, phishing attacks still work their way cause lot violation incidents. In Web-based attack, an attacker sets up scam Web pages (pretending be important Website such as portal) lure input private information, passwords,...

10.1109/access.2017.2743528 article EN cc-by-nc-nd IEEE Access 2017-01-01

We report a fiber inline Mach-Zehnder-type core-cladding-mode interferometer fabricated by two-point CO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> laser irradiations on single-mode fiber. The caused efficient light coupling from the core mode to lower order cladding modes and vise versa. High-quality interference spectra with fringe visibility of about 20 dB were observed for four different lengths (5, 10, 20, 40 mm). temperature...

10.1109/lpt.2009.2016116 article EN IEEE Photonics Technology Letters 2009-03-12

This Letter reports a polymer optical fiber (POF) based large strain sensor on the multimode interference (MMI) theory for application of structural health monitoring. A section POFs is sandwiched between two silica single mode fibers to construct single-mode-multimode-single-mode structure that produces MMI spectrum. The sensing mechanism device was investigated and experimentally verified. dynamic range 2×10(4) με (2%) detection limit 33 µε have been demonstrated.

10.1364/ol.37.004308 article EN Optics Letters 2012-10-11

This Letter reports on an ultraweak intrinsic Fabry–Perot interferometer (IFPI) array fabricated by a femtosecond (fs) laser for distributed sensing applications. Ultralow reflectors (<−60 dB) were obtained. IFPIs with different physical lengths showed identical temperature sensitivity (−1.5 GHz/°C). A test was conducted. No crosstalk between IFPI elements in the observed, implying device's utility as system. The possibility of using smaller bandwidths sensor interrogation experimentally...

10.1364/ol.40.000320 article EN Optics Letters 2015-01-20

Intel Software Guard eXtension (SGX), a hardware supported trusted execution environment (TEE), is designed to protect security critical applications. However, it does not terminate traditional memory corruption vulnerabilities for the software running inside enclave, since enclave still developed with type unsafe languages such as C/C++. This paper presents RUST-SGX, an efficient and layered approach exterminating SGX enclaves. The key idea enable development of programs safe system...

10.1145/3319535.3354241 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

The web technology has become the cornerstone of a wide range platforms, such as mobile services and smart Internet-of-things (IoT) systems. In users' data are aggregated to cloud-based platform, where applications used key interface access configure user data. Securing requires solutions deal with threats from both technical vulnerabilities social factors. Phishing attacks one most commonly exploited vectors in engineering attacks. attackers use pages visually mimicking legitimate sites,...

10.1186/s13638-019-1361-0 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-02-20

Variations in dielectric constant and patterns of microwave loss have been imaged a yttrium-doped LiNbO 3 crystal with periodic ferroelectric domains the use scanning-tip near-field microscope. Periodic profiles images domain boundaries were observed at submicrometer resolution. The combination these showed growth-instability–induced defect structure. Evidence lattice-edge dislocation has also through stress-induced variation constant.

10.1126/science.276.5321.2004 article EN Science 1997-06-27

This paper reports the development of a new zeolite thin film-coated long period fiber grating (LPFG) sensor for direct measurement trace organic vapors. The was fabricated by growing pure silica MFI-type film on optical in situ hydrothermal crystallization. measures chemical vapor concentration monitoring molecular adsorption-induced shift LPFG resonant wavelength (lambda(R)) near infrared (IR) region. Upon loading analyte molecules, zeolite's refractive index changes close vicinity where...

10.1364/oe.16.008317 article EN cc-by Optics Express 2008-05-22

This paper reports a coaxial cable Bragg grating (CCBG) fabricated by drilling holes into the at periodic distances along axial direction. Resonances were observed discrete frequencies in both transmission and reflection spectra. The analogy of CCBG with fiber is shown. was tested for potential application as strain-sensing device.

10.1063/1.3636406 article EN Applied Physics Letters 2011-09-12

In this paper, we present a new solution, BaitAlarm, to detect phishing attack using features that are hard evade. The intuition of our approach is pages need preserve the visual appearance target pages. We an algorithm quantify suspicious ratings web based on similarity between Since CSS standard technique specify page layout, solution uses as basis for detecting similarities among prototyped Google Chrome extension and used it rate suspiciousness prototype shows correctness accuracy with...

10.1109/incos.2013.151 article EN 2013-09-01

A fiber inline Michelson interferometer was fabricated by micromachining a step structure at the tip of single-mode optical using femtosecond laser. The splits core into two reflection paths and produces an interference signal. fringe visibility 18 dB achieved. Temperature sensing up to 1000°C demonstrated assembly-free device.

10.1364/ol.37.004489 article EN Optics Letters 2012-10-24

A high performance interrogation method for ultra-weak fiber Bragg grating (UWFBG) using double-pulse and a heterodyne detection is proposed. The perturbation along the UWFBG array located quickly through use of double-pulsed optical input waveform. Then, quantified precisely by demodulating phase differential signals from configuration. efficiency measuring improved more than 20 times that single probe pulse. In comparison with conventional Rayleigh scattering-based approach, proposed...

10.1109/lpt.2018.2811411 article EN IEEE Photonics Technology Letters 2018-03-02

Phishing websites are typical starting points of online social engineering attacks, including many recent scams. The attackers develop web pages mimicking legitimate websites, and send the malicious URLs to victims lure them input their sensitive information. Existing phishing defense mechanisms not sufficient detect with new attacks. In this paper, we aim improve detection techniques using machine learning techniques. particular, propose a learning-based aggregation analysis mechanism...

10.1016/j.procs.2018.03.053 article EN Procedia Computer Science 2018-01-01

Stencil computation is an essential method, particularly useful for numerical simulations in areas like acoustics, heat transfer, and electromagnetism. Recent studies have utilized AMD AI Engines (AIEs) stencil computations by configuring multiple AIE tiles within a Compute Unit to exploit task-level parallelism, achieving notable speedup through concurrent task execution. However, this setup suffers from suboptimal performance due high memory bandwidth demands, resulting underutilization of...

10.1145/3706628.3708822 article EN cc-by 2025-02-26
Coming Soon ...