![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Tao Hou
Person information
Refine list
![note](https://dblp1.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Hansong Li
, Guangjun Lu
, Jiande Su, Tao Hou, Faguan Huang, Youshi Pan:
Improved Particle Swarm Fuzzy PID Temperature Control for the Pellet Grills. IEEE Access 12: 66373-66381 (2024) - [c25]Tamal K. Dey, Tao Hou:
Computing Zigzag Vineyard Efficiently Including Expansions and Contractions. SoCG 2024: 49:1-49:15 - 2023
- [j27]Tao Hou, Ting Cui, Jiyan Zhang
:
Practical Attacks on Reduced-Round 3D and Saturnin. Comput. J. 66(2): 479-495 (2023) - [j26]Qiaoliang Liu
, Fu Liu
, Yan Miao
, Jiaxue He, Tian Dong, Tao Hou, Yun Liu
:
Virsearcher: Identifying Bacteriophages from Metagenomes by Combining Convolutional Neural Network and Gene Information. IEEE ACM Trans. Comput. Biol. Bioinform. 20(1): 763-774 (2023) - [c24]Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, Tao Wang:
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity. CNS 2023: 1-9 - [c23]Hamidah Alanazi, Shengping Bi, Tao Wang, Tao Hou:
Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection. ICC 2023: 783-789 - [c22]Hamidah Alanazi, Shengping Bi, Tao Wang, Tao Hou:
Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection. MILCOM 2023: 542-547 - [c21]Sean Chen
, Jaelyn McCracken
, Kevin Lu
, Tao Wang
, Tao Hou
:
Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies. MobiHoc 2023: 474-479 - [c20]Tamal K. Dey, Tao Hou, Salman Parsa:
Revisiting Graph Persistence for Updates and Efficiency. WADS 2023: 371-385 - [i13]Tamal K. Dey, Tao Hou:
Revisiting Graph Persistence for Updates and Efficiency. CoRR abs/2302.12796 (2023) - [i12]Tamal K. Dey, Tao Hou:
Computing Zigzag Vineyard Efficiently Including Expansions and Contractions. CoRR abs/2307.07462 (2023) - [i11]Marel Alvarado, Luke Gayler, Alex Seals, Tao Wang, Tao Hou:
A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges. CoRR abs/2312.10430 (2023) - [i10]Marco Salas-Nino, Grant Ritter, Daniel Hamdan, Tao Wang, Tao Hou:
The Evolution of Keylogger Technologies: A Survey from Historical Origins to Emerging Opportunities. CoRR abs/2312.10445 (2023) - 2022
- [b1]Tao Hou:
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies. University of South Florida, Tampa, USA, 2022 - [j25]Lianshan Sun
, Hanchao Du
, Tao Hou:
FR-DETR: End-to-End Flowchart Recognition With Precision and Robustness. IEEE Access 10: 64292-64301 (2022) - [j24]Weiping Ding
, Bairu Pan, Hengrong Ju
, Jiashuang Huang
, Chun Cheng, Xinjie Shen, Yu Geng, Tao Hou:
RG-GCN: Improved Graph Convolution Neural Network Algorithm Based on Rough Graph. IEEE Access 10: 85582-85594 (2022) - [j23]Yan Miao
, Fu Liu, Tao Hou, Yun Liu
:
Virtifier: a deep learning-based identifier for viral sequences from metagenomes. Bioinform. 38(5): 1216-1222 (2022) - [j22]Fu Liu
, Yan Miao
, Yun Liu
, Tao Hou:
RNN-VirSeeker: A Deep Learning Method for Identification of Short Viral Sequences From Metagenomes. IEEE ACM Trans. Comput. Biol. Bioinform. 19(3): 1840-1849 (2022) - [c19]Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. CNS 2022: 290-298 - [c18]Tamal K. Dey, Tao Hou:
Fast Computation of Zigzag Persistence. ESA 2022: 43:1-43:15 - [c17]Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, Yalin E. Sagduyu:
MUSTER: Subverting User Selection in MU-MIMO Networks. INFOCOM 2022: 140-149 - [c16]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. WiseML@WiSec 2022: 63-68 - [c15]Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. WISEC 2022: 222-232 - [i9]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. CoRR abs/2201.03281 (2022) - [i8]Tamal K. Dey, Tao Hou:
Fast Computation of Zigzag Persistence. CoRR abs/2204.11080 (2022) - 2021
- [j21]Fu Liu, Tian Dong, Tao Hou, Yun Liu
:
A Hybrid Short-Term Load Forecasting Model Based on Improved Fuzzy C-Means Clustering, Random Forest and Deep Neural Networks. IEEE Access 9: 59754-59765 (2021) - [j20]Tao Hou, Ting Cui:
Yoyo trick on type-II generalised Feistel networks. IET Inf. Secur. 15(6): 457-471 (2021) - [j19]Yun Liu
, Yanfang Jiang, Tao Hou, Fu Liu:
A new robust fuzzy clustering validity index for imbalanced data sets. Inf. Sci. 547: 579-591 (2021) - [j18]Yun Liu, Tao Hou, Yan Miao
, Meihe Liu, Fu Liu:
IM-c-means: a new clustering algorithm for clusters with skewed distributions. Pattern Anal. Appl. 24(2): 611-623 (2021) - [j17]Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu:
Binary Code Similarity Detection through LSTM and Siamese Neural Network. EAI Endorsed Trans. Security Safety 8(29): e1 (2021) - [j16]Tao Hou
, Tao Wang
, Zhuo Lu
, Yao Liu
:
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. IEEE/ACM Trans. Netw. 29(6): 2779-2792 (2021) - [c14]Tamal K. Dey, Tao Hou:
Computing Zigzag Persistence on Graphs in Near-Linear Time. SoCG 2021: 30:1-30:15 - [c13]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. DySPAN 2021: 280-287 - [i7]Tamal K. Dey, Tao Hou:
Computing Zigzag Persistence on Graphs in Near-Linear Time. CoRR abs/2103.07353 (2021) - [i6]Anand V. Patel
, Tao Hou, Juan D. Beltran Rodriguez, Tamal K. Dey, Dunbar P. Birnie III:
3D Microstructure Segmentation by Topological Persistence. CoRR abs/2104.13430 (2021) - [i5]Tamal K. Dey, Tao Hou:
Computing Optimal Persistent Cycles for Levelset Zigzag on Manifold-like Complexes. CoRR abs/2105.00518 (2021) - [i4]Tamal K. Dey, Tao Hou:
On Association between Absolute and Relative Zigzag Persistence. CoRR abs/2110.06315 (2021) - [i3]Tamal K. Dey, Tao Hou:
Updating Zigzag Persistence and Maintaining Representatives over Changing Filtrations. CoRR abs/2112.02352 (2021) - 2020
- [j15]Fu Liu, Shoukun Jiang
, Bing Kang, Tao Hou:
A Recognition System for Partially Occluded Dorsal Hand Vein Using Improved Biometric Graph Matching. IEEE Access 8: 74525-74534 (2020) - [j14]Guoshuai Zhao, Tianlei Liu, Xueming Qian
, Tao Hou, Huan Wang, Xingsong Hou
, Zhetao Li
:
Location Recommendation for Enterprises by Multi-Source Urban Big Data Analysis. IEEE Trans. Serv. Comput. 13(6): 1115-1127 (2020) - [c12]Zhengping Luo
, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework. INFOCOM Workshops 2020: 550-555 - [c11]Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu:
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference. INFOCOM 2020: 1598-1607 - [c10]Tamal K. Dey, Tao Hou, Sayan Mandal:
Computing Minimal Persistent Cycles: Polynomial and Hard Cases. SODA 2020: 2587-2606 - [p1]Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu:
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. Adaptive Autonomous Secure Cyber Systems 2020: 109-129
2010 – 2019
- 2019
- [j13]Tao Hou, Jun Xu, Willemijn S. Elkhuizen
, Charlie C. L. Wang
, Jiehui Jiang, Jo M. P. Geraedts, Yu Song
:
Design of 3D Wireless Power Transfer System Based on 3D Printed Electronics. IEEE Access 7: 94793-94805 (2019) - [j12]Qiaoliang Liu
, Fu Liu, Jiaxue He, Miaolei Zhou, Tao Hou, Yun Liu:
VFM: Identification of Bacteriophages From Metagenomic Bins and Contigs Based on Features Related to Gene and Genome Composition. IEEE Access 7: 177529-177538 (2019) - [j11]Min Chen
, Songshan Yue, Guonian Lü, Hui Lin, Chaowei Yang, Yongning Wen, Tao Hou, Dawei Xiao, Hao Jiang:
Teamwork-oriented integrated modeling method for geo-problem solving. Environ. Model. Softw. 119: 111-123 (2019) - [j10]Dawei Xiao, Min Chen
, Yuchen Lu, Songshan Yue, Tao Hou:
Research on the Construction Method of the Service-Oriented Web-SWMM System. ISPRS Int. J. Geo Inf. 8(6): 268 (2019) - [j9]Jian Xue, Fu Liu, Jing Bai, Tao Hou:
Modelling of gene signal attribute reduction based on neighbourhood granulation and rough approximation. Int. J. Model. Identif. Control. 31(2): 161-168 (2019) - [j8]Rui Liu, Wei-Chu Sun, Tao Hou, Chun-Hong Hu
, Lin-Bo Qiao:
Block coordinate descentwith time perturbation for nonconvex nonsmooth problems in real-world studies. Frontiers Inf. Technol. Electron. Eng. 20(10): 1390-1403 (2019) - [c9]Tamal K. Dey, Tao Hou, Sayan Mandal
:
Persistent 1-Cycles: Definition, Computation, and Its Application. CTIC 2019: 123-136 - [c8]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic. GlobalSIP 2019: 1-5 - [i2]Tamal K. Dey, Tao Hou, Sayan Mandal:
Computing Minimal Persistent Cycles: Polynomial and Hard Cases. CoRR abs/1907.04889 (2019) - 2018
- [j7]Qiang Xu
, Yue Zhao, Tao Hou, Jianxin Wang, Xin Zhao, Jiegang Liu, Dan Wang:
The evolution of folds-thrust wedges: Mathematical simulation based on finite difference method. J. Intell. Fuzzy Syst. 34(2): 1071-1081 (2018) - [j6]Tao Wang
, Yao Liu, Tao Hou, Qingqi Pei, Song Fang:
Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control. IEEE Trans. Dependable Secur. Comput. 15(5): 853-867 (2018) - [j5]Min Chen
, Chen Yang, Tao Hou, Guonian Lü, Yongning Wen, Songshan Yue:
Developing a data model for understanding geographical analysis models with consideration of their evolution and application processes. Trans. GIS 22(6): 1498-1521 (2018) - [c7]Tao Hou, Yu Song
, Willemijn S. Elkhuizen
, Jiehui Jiang, Jo M. P. Geraedts:
3D wireless power transfer based on 3D printed electronics. CASE 2018: 499-505 - [c6]Fu Liu, Shoukun Jiang, Bing Kang, Tao Hou:
A New Hand Shape Recognition Algorithm Based on Delaunay Triangulation. CCBR 2018: 22-28 - [c5]Jun Gong, Da-Yuan Huang, Teddy Seyed, Te Lin, Tao Hou, Xin Liu, Molin Yang, Boyu Yang, Yuhan Zhang, Xing-Dong Yang:
Jetto: Using Lateral Force Feedback for Smartwatch Interactions. CHI 2018: 426 - [i1]Tamal K. Dey, Tao Hou, Sayan Mandal:
Persistent 1-Cycles: Definition, Computation, and Its Application. CoRR abs/1810.04807 (2018) - 2017
- [j4]Yun Liu
, Tao Hou, Bing Kang, Fu Liu:
Unsupervised Binning of Metagenomic Assembled Contigs Using Improved Fuzzy C-Means Method. IEEE ACM Trans. Comput. Biol. Bioinform. 14(6): 1459-1467 (2017) - 2016
- [j3]Tao Hou, Li Chen:
On-the-fly simplification of large iso-surfaces with per-cube vertex modifiability detection. J. Vis. 19(4): 715-726 (2016) - [c4]Tianlei Liu, Guoshuai Zhao
, Huan Wang, Xingsong Hou, Xueming Qian, Tao Hou:
Finding Optimal Meteorological Observation Locations by Multi-source Urban Big Data Analysis. CCBD 2016: 175-180 - 2015
- [j2]Jinmeng Liu, Tao Hou, Yuge Zheng:
两类网络图的边-平衡指数集 (On Edge-balanced Index Sets of Two Classes of Nested Network Graph). 计算机科学 42(3): 245-251 (2015) - [c3]Tao Wang, Yao Liu, Qingqi Pei, Tao Hou:
Location-restricted Services Access Control Leveraging Pinpoint Waveforming. CCS 2015: 292-303 - 2011
- [j1]Weimin Wang, Jingchun Zhang, Cong Cao, Tao Hou, Yue Liu
, Keji Chen:
An efficient approach to representing and mining knowledge from Qing court medical records. Frontiers Comput. Sci. China 5(4): 395-404 (2011)
2000 – 2009
- 2008
- [c2]Wei-Qiang Zhang, Liang He, Tao Hou, Jia Liu:
Fractional Fourier transform based auditory feature for language identification. APCCAS 2008: 209-212 - 2004
- [c1]Huadong Guo
, Yun Shao, Xiangtao Fan, Tao Hou, Boqin Zhu, Jianwen Ma, Yong Xue:
An environmental remote sensing monitoring system for 2008 Olympic Game in Beijing. IGARSS 2004: 3888-3890
Coauthor Index
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-07 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint