Yao Liu

ORCID: 0000-0003-3382-798X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Communication Security Techniques
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Adversarial Robustness in Machine Learning
  • Advanced MIMO Systems Optimization
  • Security in Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Chaos-based Image/Signal Encryption
  • Cooperative Communication and Network Coding
  • Advanced Malware Detection Techniques
  • Wireless Signal Modulation Classification
  • User Authentication and Security Systems
  • Security and Verification in Computing
  • DNA and Biological Computing
  • Advanced Wireless Communication Technologies
  • Cryptographic Implementations and Security
  • Mobile Ad Hoc Networks
  • Speech Recognition and Synthesis
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Data Security
  • Spam and Phishing Detection
  • Antenna Design and Analysis
  • Energy Efficient Wireless Sensor Networks
  • Wireless Networks and Protocols

Northern University of Malaysia
2025

Shandong Women’s University
2021-2025

University of South Florida
2015-2024

Shanghai Institute of Optics and Fine Mechanics
2023

Zhejiang University
2023

Taiwan Semiconductor Manufacturing Company (China)
2023

Fujian Normal University
2023

Nanjing University of Posts and Telecommunications
2022

Engineering Arts (United States)
2022

Jining Normal University
2022

By exploiting the communication infrastructure among sensors, actuators, and control systems, attackers may compromise security of smart-grid with techniques such as denial-of-service (DoS) attack, random data-injection attack. In this paper, we present a mathematical model system to study these pitfalls propose robust framework for smart grid. Our adopts Kalman filter estimate variables wide range state processes in model. The estimates from readings are then fed into χ <sup>2</sup>...

10.1109/tcns.2014.2357531 article EN IEEE Transactions on Control of Network Systems 2014-09-12

In this study, we present WindTalker, a novel and practical keystroke inference framework that allows an attacker to infer the sensitive keystrokes on mobile device through WiFi-based side-channel information. WindTalker is motivated from observation devices will lead different hand coverage finger motions, which introduce unique interference multi-path signals can be reflected by channel state information (CSI). The adversary exploit strong correlation between CSI fluctuation user's number...

10.1145/2976749.2978397 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Federated learning (FL) provides a high efficient decentralized machine framework, where the training data remains distributed at remote clients in network. Though FL enables privacy-preserving mobile edge computing framework using IoT devices, recent studies have shown that this approach is susceptible to poisoning attacks from side of clients. To address on FL, we provide <i>two-phase</i> defense algorithm called <inline-formula><tex-math notation="LaTeX">${\underline{Lo}cal\...

10.1109/tdsc.2021.3135422 article EN IEEE Transactions on Dependable and Secure Computing 2021-12-14

Federated Learning (FL) has been considered as an appealing framework to tackle data privacy issues of mobile devices compared conventional Machine (ML). Using Edge Servers (ESs) intermediaries perform model aggregation in proximity can reduce the transmission overhead, and it enables great potential low-latency FL, where hierarchical architecture FL (HFL) attracted more attention. Designing a proper client selection policy significantly improve training performance, widely investigated...

10.1109/tpds.2022.3186960 article EN IEEE Transactions on Parallel and Distributed Systems 2022-06-28

A reactive jammer jams wireless channels only when target devices are transmitting; Compared to constant jamming, jamming is harder track and compensate against [2], [38]. Frequency hopping spread spectrum (FHSS) direct sequence (DSSS) have been widely used as countermeasures attacks. However, both will fail if the all frequency or has high transmit power. In this paper, we propose an anti-jamming communication system that allows in presence of a broadband power jammer. The proposed...

10.1109/tdsc.2015.2399304 article EN IEEE Transactions on Dependable and Secure Computing 2015-02-03

With the prevalent of smart devices and home automations, voice command has become a popular User Interface (UI) channel in IoT environment. Although Voice Control System (VCS) advantages great convenience, it is extremely vulnerable to spoofing attack (e.g., replay attack, hidden/inaudible attack) due its broadcast nature. In this study, we present WiVo, device-free liveness detection system based on wireless signals generated by without any additional or sensors carried users. The basic...

10.1145/3209582.3209591 article EN 2018-06-20

The emerging paradigm for dynamic spectrum sharing is based on allowing secondary users (SUs) to exploit white space frequency that not occupied by primary users. White database provides an opportunity SUs obtain availability information submitting a location-based query. However, this new can also be exploited the attackers significantly enhance their jamming capability due available channel from queries, which expected increasingly block SUs. challenge unique characteristics (e.g., lack of...

10.1109/jsac.2016.2605799 article EN publisher-specific-oa IEEE Journal on Selected Areas in Communications 2016-09-07

In this study, we present WindTalker, a novel and practical keystroke inference framework that can be used to infer the sensitive keystrokes on mobile device through WiFi-based side-channel information. WindTalker is motivated from an observation devices will lead different hand coverage finger motions, which introduce unique interference multi-path signals reflected by channel state information (CSI). An attacker exploit strong correlation between CSI fluctuation user's password input....

10.1109/tmc.2019.2893338 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2019-01-16

Wireless link signature is a physical layer authentication mechanism, using the multipath effect between transmitter and receiver to provide of wireless signals. This paper identifies new attack, called mimicry against existing schemes. An attacker can forge legitimate transmitter's as long it knows signal at receiver's location, does not have be exactly same location transmitter. We also extend attack multiple-input multiple-output (MIMO) systems, conclude that feasible only when number...

10.1109/tifs.2016.2541307 article EN IEEE Transactions on Information Forensics and Security 2016-03-11

As a key feature of the next generation wireless networks (5G), heterogeneous (HetNets) architecture is embraced as fundamental network technology to meet immensely diverse service requirements and characteristics various devices. By introducing underlaying device-to-device (D2D) communication into HetNets, it possible offload unevenly distributed load from overloaded macrocell uncongested femtocell in multitier HetNets. However, performance balancing (LB) scheme heavily depends on D2D relay...

10.1109/jiot.2017.2677975 article EN IEEE Internet of Things Journal 2017-03-03

To meet the increasing demand of wireless broadband applications in future 5G cellular networks, Device-to-Device (D2D) communications serve as a candidate paradigm to improve spectrum efficiency. Considering challenges after D2D transmission is introduced for this paper deals with mode selection and resource allocation issues related communications. First, we propose scheme which aims at guaranteeing users also considering potential interference. We analyze condition under underlay should...

10.1109/cc.2016.7513201 article EN China Communications 2016-06-01

Traditional methods to eavesdrop keystrokes leverage some malware installed in a target computer record the for an adversary. Existing research work has identified new class of attacks that can non-invasive way without infecting install malware. The common idea is pressing key keyboard cause unique and subtle environmental change, which be captured analyzed by eavesdropper learn keystrokes. For these attacks, however, training phase must accomplished establish relationship between observed...

10.1145/3243734.3243755 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

CSI fingerprint localization is an advanced and promising technique for indoor localization, which identifies the user's location by mapping his measured against server's database. This approach highlighted due to its high granularity distinction strong robustness noise disturbances, but it also causes potential privacy leakage three participants in process: user, server, AP. Currently, there has been little research done on this issue, existing work often ignores concern To fill gap, paper...

10.1109/glocom.2015.7417168 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2015-12-01

Federated Learning (FL) is a promising framework for performing privacy-preserving, distributed learning with set of clients. However, the data distribution among clients often exhibits non-IID, i.e., shift, which makes efficient optimization difficult. To tackle this problem, many FL algorithms focus on mitigating effects heterogeneity across by increasing performance global model. almost all leverage Empirical Risk Minimization (ERM) to be local optimizer, easy make model fall into sharp...

10.48550/arxiv.2206.02618 preprint EN other-oa arXiv (Cornell University) 2022-01-01

This study examines motivation and multilingualism using quantitative data from 468 language learners in China. More precisely, the point of inquiry was to investigate language-specificity psychological aspects self within L2 Motivational Self System (L2MSS). The Exploratory Factor Analysis (EFA) with English revealed a strong anti-ought-to factor, along expected ideal ought-to selves; however, EFA for Japanese patterned similarly an emergent self, whereas this not case French. These results...

10.1080/13670050.2018.1452892 article EN International Journal of Bilingual Education and Bilingualism 2018-04-12

In wireless networks, location distinction aims to detect changes or facilitate authentication of users. To achieve distinction, recent research has focused on investigating the spatial uncorrelation property channels. Specifically, differences in channel characteristics are used distinguish locations identify changes. However, we discover a new attack against all existing approaches that built such an attack, adversary can easily hide her impersonate movements by injecting fake into target...

10.1109/tmc.2016.2549519 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2016-03-31

Multi-server Federated learning (FL) has been considered as a promising solution to address the limited communication resource problem of single-server FL. We consider typical multi-server FL architecture, where coverage areas regional servers may overlap. The key point this architecture is that clients located in overlapping update their local models based on average model all accessible models, which enables indirect sharing among different servers. Due complicated network topology,...

10.1109/tmc.2022.3200016 article EN IEEE Transactions on Mobile Computing 2022-08-19

Wireless link signature is a physical layer authentication mechanism, which uses the multi-path effect between transmitter and receiver to provide of wireless signals. We identify new attack, called mimicry against scheme in [7]. It assumed past that an attacker cannot "spoof" arbitrary will not have same at unless it exactly location as legitimate transmitter. However, we show can forge long knows signal receiver's location, does be order its signature.

10.1145/2046707.2093497 article EN 2011-10-17
Coming Soon ...