Publications
2024
- Chaoyu Zhang, Shanghao Shi, Ning Wang, Xiangxiang Xu, Shaoyu Li, Lizhong Zheng, Randy Marchany, Mark Gardner, Y. Thomas Hou, Wenjing Lou. “Hermes: Boosting the Performance of Machine-Learning-Based Intrusion Detection System through Geometric Feature Learning”. In the 25th International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc 24). [PDF]
- Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius Linguraru, Y. Thomas Hou, Syed Anwar, and Wenjing Lou. “Harvesting Private Medical Images in Federated Learning Systems with Crafted Models”. In the arXiv preprint arXiv: 2407.09972, 2024. [PDF]
- Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, and Y. Thomas Hou. “ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models”. In the IEEE Conference on Communications and Network Security 2024 (CNS 24). [PDF]
- Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, and Wenjing Lou. “Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction”. In the arXiv preprint arXiv: 2311.05808, 2024. [PDF]
- Ning Wang, Shanghao Shi, Yang Xiao, Yimin Chen, Y. Thomas Hou, and Wenjing Lou. “BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning”. In the arXiv preprint arXiv: 2407.09658, 2024. [PDF]
- Hexuan Yu, Shanghao Shi, Yi Shi, Eric Burger, Y. Thomas Hou, and Wenjing Lou. “Pri-Share: Enabling Inter-SAS Privacy Protection via Secure Multi-Party Spectrum Allocation.” In 2024 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN 24). [PDF]
- Shanghao Shi, Yang Xiao, Changlai Du, Yi Shi, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Eric Burger, Luiz DaSilva, and Wenjing Lou. 2024. “TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.” In ACM Asia Conference on Computer and Communications Security (ASIA CCS 24), July 1–5, 2024, Singapore, Singapore. ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3634737.3645005 [PDF]
2023
- Chaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, and Y. Thomas Hou. “MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection.” In 2023 IEEE Military Communications Conference (MILCOM 23), pp. 331-338. IEEE, 2023. [PDF]
- Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou, and Wenjing Lou. “Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.” In European Symposium on Research in Computer Security (ESORICS 23), pp. 306-326. Cham: Springer Nature Switzerland, 2023. [PDF]
- Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, and Jeffrey H. Reed. “BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment.” IEEE Transactions on Cognitive Communications and Networking (2023). [PDF]
- Shanghao Shi, Yang Xiao, Changlai Du, Md Hasan Shahriar, Ao Li, Ning Zhang, Y. Thomas Hou, and Wenjing Lou. 2023. MS-PTP: Protecting Network Timing from Byzantine Attacks. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘23). Association for Computing Machinery, New York, NY, USA, 61–71. https://doi.org/10.1145/3558482.3590184 [PDF]
Before
- Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, and Jeffrey H. Reed. “Decentralized spectrum access system: Vision, challenges, and a blockchain solution.” IEEE Wireless Communications 29, no. 1 (2022): 220-228. [PDF]
- Shanghao Shi, Yang Xiao, Wenjing Lou, Chonggang Wang, Xu Li, Y. Thomas Hou, and Jeffrey H. Reed. “Challenges and new directions in securing spectrum access systems.” IEEE Internet of Things Journal 8, no. 8 (2021): 6498-6518. [PDF]
- Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, and Y. Thomas Hou. “Session key distribution made practical for CAN and CAN-FD message authentication.” In Annual Computer Security Applications Conference (ACSAC 20), pp. 681-693. 2020. [PDF]