Tao Wang

ORCID: 0000-0003-3886-0420
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Speech Recognition and Synthesis
  • Speech and Audio Processing
  • Caching and Content Delivery
  • Gene Regulatory Network Analysis
  • Hate Speech and Cyberbullying Detection
  • Complex Network Analysis Techniques
  • Social Capital and Networks
  • Blockchain Technology Applications and Security
  • Graph theory and applications
  • Cloud Computing and Resource Management
  • Advanced Steganography and Watermarking Techniques
  • Privacy-Preserving Technologies in Data
  • Knowledge Management and Sharing

Simon Fraser University
2021-2024

University of Hong Kong
2018-2020

Hong Kong University of Science and Technology
2018-2020

Hudson Institute
2019

John Wiley & Sons (United States)
2019

City University of Hong Kong
2019

Traffic analysis attacks to identify which web page a client is browsing, using only her packet metadata - known as website fingerprinting (WF) has been proven effective in closed-world experiments against privacy technologies like Tor. We want investigate their usefulness the real open world. Several WF claim have high recall and low false positive rate, but they shown succeed base rate pages. explicitly incorporate into precision call it r-precision. Using this metric, we show that best...

10.1109/sp40000.2020.00015 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2020-05-01

Website Fingerprinting (WF) attacks utilize size and timing information of encrypted network traffic to infer the user's browsing activity, posing a great threat privacy-enhancing technologies like Tor; nevertheless, Tor has not adopted any defense because existing defenses are convincing enough show their effectiveness. Some have been overcome by newer attacks; other never implemented tested in real open-world scenario.In this paper, we propose Surakav, tunable practical that is effective...

10.1109/sp46214.2022.9833722 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

In a Website Fingerprinting (WF) attack, local, passive eavesdropper utilizes network flow information to identify which web pages user is browsing. Previous researchers have extensively demonstrated the feasibility and effectiveness of WF, but only under strong Single Page Assumption: extracted by adversary always belongs single page. other words, WF classifier will never be asked classify corresponding more than one page, or part The Assumption unrealistic because people often browse with...

10.1145/3274694.3274697 article EN 2018-12-03

In Website Fingerprinting (WF) attack, a local passive eavesdropper utilizes network flow information to identify which web pages user is browsing. Previous researchers have demonstrated the feasibility and effectiveness of WF attacks under strong Single Page Assumption: extracted by adversary belongs single page. reality, assumption may not hold because users tend open multiple tabs simultaneously (or within short period time) so that their traffic mixed. this article, we propose an...

10.1109/tdsc.2021.3104869 article EN IEEE Transactions on Dependable and Secure Computing 2021-08-16

Tor~\citetor is the most widely used anonymous communication network with millions of daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds malware binaries found in wild rely on it to hide their presence hinder Command & Control (C&C) takedown operations. We believe a paramount tool enabling online freedom privacy, blocking defend against such infeasible for both users organizations. In this work, we present effective traffic analysis approaches that can...

10.1145/3548606.3560604 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

Offchain networks emerge as a promising solution to address the scalability challenge of blockchain. Participants directly make payments through network payment channels without overhead committing onchain transactions. Routing is critical performance offchain networks. Existing solutions use either static routing with poor or dynamic high obtain channel balance information. In this paper, we propose Flash, new that leverages unique characteristics transactions in strike better tradeoff...

10.48550/arxiv.1902.05260 preprint EN other-oa arXiv (Cornell University) 2019-01-01

10.1109/tifs.2023.3327662 article EN IEEE Transactions on Information Forensics and Security 2023-10-25

Tor, an onion-routing anonymity network, has been shown to be vulnerable Website Fingerprinting (WF), which de-anonymizes web browsing by analyzing the unique characteristics of encrypted network traffic. Although many defenses have proposed, few implemented and tested in real world; others were only simulated. Due its synthetic nature, simulation may fail capture performance these defenses. To figure out how perform world, we propose WFDefProxy, a general platform for WF defense...

10.48550/arxiv.2111.12629 preprint EN cc-by arXiv (Cornell University) 2021-01-01

The onion router (Tor) is a network system for anonymous communication. However, website fingerprinting (WF) attacks have threatened the anonymity of Tor. WF attackers can passively monitor and collect traffic, classify victims' traffic based on machine learning or deep learning, identify websites victims visit. In recent years, there has been some research defense, but most works high bandwidth latency overhead. Besides, defenses are criticized as being unrealistic to implement in real-time...

10.1109/tnsm.2024.3360082 article EN IEEE Transactions on Network and Service Management 2024-01-30

This paper, the factors to consider dynamic and static local routing strategy of scalefree networks.Don't have access global information for large network, put forward a kind combined with current topology network node traffic flow situation considering information.Based on scale-free networks in simulation model, analyses congestion shift.Through experiments research, found that there are optimal control parameters, makes throughput can reach maximum.

10.14257/ijsia.2014.8.3.14 article EN International Journal of Security and Its Applications 2014-05-31

Traffic analysis attacks to identify which web page a client is browsing, using only her packet metadata --- known as website fingerprinting has been proven effective in closed-world experiments against privacy technologies like Tor. However, due the base rate fallacy, these have failed large open-world settings clients that visit sensitive pages with low rate. We find this because they poor precision were designed maximize recall. In work, we argue more important than recall for...

10.48550/arxiv.1802.05409 preprint EN cc-by-sa arXiv (Cornell University) 2018-01-01

Do entrepreneurs in online communities gain more knowledge from their peers when they present inquiries with empathy cues such as emotional distress and personal profile? While can evoke one’s motivate prosocial helping behaviour, also signal the high expectation of seeker cognitive cost provider to fulfil expectation. Given self-disclosure intimate information communications process, we adopt social penetration theory examine utility sharing entrepreneurs. We hypothesize that embedded will...

10.5465/ambpp.2022.13015abstract article EN Academy of Management Proceedings 2022-07-06
Coming Soon ...