​
Login / Signup
Tengyao Li
ORCID
Publication Activity (10 Years)
Years Active: 2019-2024
Publications (10 Years): 19
Top Topics
Attack Detection
Watermarking Method
Website
Network Flow
Top Venues
Comput. Secur.
CSS (1)
Comput. Networks
IEEE Access
</>
Publications
</>
Zhiquan Wang
,
Tengyao Li
,
Meijuan Yin
,
Xiaoyun Yuan
,
Xiangyang Luo
,
Lingling Li
WF3A: A N-shot website fingerprinting with effective fusion feature attention.
Comput. Secur.
140 (2024)
Xiaoyun Yuan
,
Tengyao Li
,
Lingling Li
,
Ruixiang Li
,
Zhiquan Wang
,
Xiangyang Luo
HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch.
Comput. Networks
241 (2024)
Wangxin Feng
,
Xiangyang Luo
,
Tengyao Li
,
Chunfang Yang
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Comput. Secur.
139 (2024)
Tengyao Li
,
Kaiyue Liu
,
Wangxin Feng
,
Chunfang Yang
,
Xiangyang Luo
HeteroTiC: A robust network flow watermarking based on heterogeneous time channels.
Comput. Networks
219 (2022)
Jiwei Tian
,
Buhong Wang
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Rongxiao Guo
TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber-Physical Systems.
IEEE Internet Things J.
8 (2) (2021)
Peng Luo
,
Buhong Wang
,
Tengyao Li
,
Jiwei Tian
ADS-B anomaly data detection model based on VAE-SVDD.
Comput. Secur.
104 (2021)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Tengyao Li
,
Jiwei Tian
,
Fengkui Gong
Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping.
IEEE Trans. Inf. Forensics Secur.
15 (2020)
Fute Shang
,
Buhong Wang
,
Tengyao Li
,
Jiwei Tian
,
Kunrui Cao
CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems.
IEEE Access
8 (2020)
Chuang Zhang
,
Xiubin Zhao
,
Chunlei Pang
,
Tengyao Li
,
Liang Zhang
Adaptive Fault Isolation and System Reconfiguration Method for GNSS/INS Integration.
IEEE Access
8 (2020)
Kunrui Cao
,
Buhong Wang
,
Haiyang Ding
,
Tengyao Li
,
Fengkui Gong
Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users.
IEEE Trans. Veh. Technol.
69 (2) (2020)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
Dynamic temporal ADS-B data attack detection based on sHDP-HMM.
Comput. Secur.
93 (2020)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
Threat model and construction strategy on ADS-B attack data.
IET Inf. Secur.
14 (5) (2020)
Fute Shang
,
Buhong Wang
,
Tengyao Li
,
Jiwei Tian
,
Kunrui Cao
,
Rongxiao Guo
Adversarial Examples on Deep-Learning-Based ADS-B Spoofing Detection.
IEEE Wirel. Commun. Lett.
9 (10) (2020)
Jiwei Tian
,
Buhong Wang
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Jing Li
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning.
CSS (1)
(2019)
Jiwei Tian
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Jing Li
,
Mete Ozay
Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems.
SmartGridComm
(2019)
Tengyao Li
,
Buhong Wang
Sequential collaborative detection strategy on ADS-B data attack.
Int. J. Crit. Infrastructure Prot.
24 (2019)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
ADS-B Data Attack Detection Based on Generative Adversarial Networks.
CSS (1)
(2019)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
Online sequential attack detection for ADS-B data based on hierarchical temporal memory.
Comput. Secur.
87 (2019)
Fute Shang
,
Buhong Wang
,
Fuhu Yan
,
Tengyao Li
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems.
Secur. Commun. Networks
2019 (2019)