default search action
Tengyao Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xiaoyun Yuan, Tengyao Li, Lingling Li, Ruixiang Li, Zhiquan Wang, Xiangyang Luo:
HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch. Comput. Networks 241: 110217 (2024) - [j15]Wangxin Feng, Xiangyang Luo, Tengyao Li, Chunfang Yang:
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing. Comput. Secur. 139: 103701 (2024) - [j14]Zhiquan Wang, Tengyao Li, Meijuan Yin, Xiaoyun Yuan, Xiangyang Luo, Lingling Li:
WF3A: A N-shot website fingerprinting with effective fusion feature attention. Comput. Secur. 140: 103796 (2024) - 2022
- [j13]Tengyao Li, Kaiyue Liu, Wangxin Feng, Chunfang Yang, Xiangyang Luo:
HeteroTiC: A robust network flow watermarking based on heterogeneous time channels. Comput. Networks 219: 109424 (2022) - 2021
- [j12]Peng Luo, Buhong Wang, Tengyao Li, Jiwei Tian:
ADS-B anomaly data detection model based on VAE-SVDD. Comput. Secur. 104: 102213 (2021) - [j11]Jiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Rongxiao Guo:
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems. IEEE Internet Things J. 8(2): 1001-1015 (2021) - 2020
- [j10]Chuang Zhang, Xiubin Zhao, Chunlei Pang, Tengyao Li, Liang Zhang:
Adaptive Fault Isolation and System Reconfiguration Method for GNSS/INS Integration. IEEE Access 8: 17121-17133 (2020) - [j9]Fute Shang, Buhong Wang, Tengyao Li, Jiwei Tian, Kunrui Cao:
CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems. IEEE Access 8: 166951-166962 (2020) - [j8]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Dynamic temporal ADS-B data attack detection based on sHDP-HMM. Comput. Secur. 93: 101789 (2020) - [j7]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Threat model and construction strategy on ADS-B attack data. IET Inf. Secur. 14(5): 542-552 (2020) - [j6]Kunrui Cao, Buhong Wang, Haiyang Ding, Tengyao Li, Jiwei Tian, Fengkui Gong:
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping. IEEE Trans. Inf. Forensics Secur. 15: 2930-2943 (2020) - [j5]Kunrui Cao, Buhong Wang, Haiyang Ding, Tengyao Li, Fengkui Gong:
Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users. IEEE Trans. Veh. Technol. 69(2): 1942-1955 (2020) - [j4]Fute Shang, Buhong Wang, Tengyao Li, Jiwei Tian, Kunrui Cao, Rongxiao Guo:
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection. IEEE Wirel. Commun. Lett. 9(10): 1734-1737 (2020)
2010 – 2019
- 2019
- [j3]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Online sequential attack detection for ADS-B data based on hierarchical temporal memory. Comput. Secur. 87 (2019) - [j2]Tengyao Li, Buhong Wang:
Sequential collaborative detection strategy on ADS-B data attack. Int. J. Crit. Infrastructure Prot. 24: 78-99 (2019) - [j1]Fute Shang, Buhong Wang, Fuhu Yan, Tengyao Li:
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems. Secur. Commun. Networks 2019: 8936784:1-8936784:11 (2019) - [c3]Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
ADS-B Data Attack Detection Based on Generative Adversarial Networks. CSS (1) 2019: 323-336 - [c2]Jiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li:
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning. CSS (1) 2019: 337-347 - [c1]Jiwei Tian, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li, Mete Ozay:
Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems. SmartGridComm 2019: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint