Publications
2025
- Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius Linguraru, Chaoyu Zhang, Y. Thomas Hou, Syed Anwar, and Wenjing Lou. “MedLeak: Harvesting Multimodal Medical Data in Secure Federated Learning with Crafted Models”. In IEEE/ACM Conference on Connected Health: Applications, Systems, and Engineering Technologies 2025 (CHASE 25), June 24-26, 2025, Manhattan, New York City, USA.
- Ning Wang, Shanghao Shi, Yimin Chen, Wenjing Lou and Y. Thomas Hou, “FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning”. In IEEE Transactions on Dependable and Secure Computing (TDSC 25), doi: 10.1109/TDSC.2025.3544106.
- Chaoyu Zhang, Hexuan Yu, Shanghao Shi, Shaoyu Li, Yi Shi, Eric Burger, Y. Thomas Hou, Wenjing Lou. “StarCast: Securing Multicast Communications in LEO Satellite Networks,” In 2025 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN 25), May 12-15, 2025, London, United Kingdom.
2024
- Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, and Wenjing Lou. “Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction”. In Network and Distributed System Security Symposium 2025 (NDSS 25), 24-28 February 2025, San Diego, CA, USA. [PDF]
- Chaoyu Zhang, Shanghao Shi, Ning Wang, Xiangxiang Xu, Shaoyu Li, Lizhong Zheng, Randy Marchany, Mark Gardner, Y. Thomas Hou, Wenjing Lou. “Hermes: Boosting the Performance of Machine-Learning-Based Intrusion Detection System through Geometric Feature Learning”. In Proceedings of the 25th International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc 24). Association for Computing Machinery, New York, NY, USA, 251–260. [PDF]
- Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, and Y. Thomas Hou. “ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models”. In 2024 IEEE Conference on Communications and Network Security (CNS 24), pp. 1-9. IEEE, 2024. [PDF] (Best Paper Award)
- Ning Wang, Shanghao Shi, Yang Xiao, Yimin Chen, Y. Thomas Hou, and Wenjing Lou. “BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning”. In the arXiv preprint arXiv: 2407.09658, 2024. [PDF]
- Hexuan Yu, Shanghao Shi, Yi Shi, Eric Burger, Y. Thomas Hou, and Wenjing Lou. “Pri-Share: Enabling Inter-SAS Privacy Protection via Secure Multi-Party Spectrum Allocation.” In 2024 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN 24), Washington, DC, USA, 2024, pp. 347-356. [PDF]
- Shanghao Shi, Yang Xiao, Changlai Du, Yi Shi, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Eric Burger, Luiz DaSilva, and Wenjing Lou. 2024. “TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.” In ACM Asia Conference on Computer and Communications Security (ASIA CCS 24), July 1–5, 2024, Singapore, Singapore. ACM, New York, NY, USA, 13 pages. [PDF]
2023
- Chaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, and Y. Thomas Hou. “MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection.” In 2023 IEEE Military Communications Conference (MILCOM 23), pp. 331-338. IEEE, 2023. [PDF]
- Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou, and Wenjing Lou. “Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.” In European Symposium on Research in Computer Security (ESORICS 23), pp. 306-326. Cham: Springer Nature Switzerland, 2023. [PDF]
- Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, and Jeffrey H. Reed. “BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment.” IEEE Transactions on Cognitive Communications and Networking (TCCN 23), vol. 9, no. 4, pp. 842-856, Aug. 2023. [PDF]
- Shanghao Shi, Yang Xiao, Changlai Du, Md Hasan Shahriar, Ao Li, Ning Zhang, Y. Thomas Hou, and Wenjing Lou. 2023. MS-PTP: Protecting Network Timing from Byzantine Attacks. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 23). Association for Computing Machinery, New York, NY, USA, 61–71. [PDF]
Before
- Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, and Jeffrey H. Reed. “Decentralized spectrum access system: Vision, challenges, and a blockchain solution.” IEEE Wireless Communications 29, no. 1 (WCM 22): 220-228. [PDF]
- Shanghao Shi, Yang Xiao, Wenjing Lou, Chonggang Wang, Xu Li, Y. Thomas Hou, and Jeffrey H. Reed. “Challenges and new directions in securing spectrum access systems.” IEEE Internet of Things Journal 8, no. 8 (IoT-J 21): 6498-6518. [PDF]
- Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, and Y. Thomas Hou. “Session key distribution made practical for CAN and CAN-FD message authentication.” In Annual Computer Security Applications Conference (ACSAC 20), pp. 681-693. 2020. [PDF]