Curriculum Vitae
							Curriculum Vitae Link
						
							Education
					
									- 
						PhD, University of South Florida, 2019
						Major: Computer Science and Engineering
																	 
									
						
			
									
						
			Current Scheduled Teaching
			
							
												
								| CSCE 5580.002 | Computer Networks | Fall 2025 | 
								
								
																 | 
								
								
																 | 
								
							
													
								| CSCE 6940.875 | Individual Research | Fall 2025 | 
								
								
																 | 
								
								
																 | 
								
							
						
				
						
			
				Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
			
		 
		
		
			
			Previous Scheduled Teaching
							
												
								| CSCE 5580.003 | Computer Networks | Spring 2025 | 
								
								
																 | 
								
								
																	SPOT
																 | 
								
							
													
								| CSCE 6940.975 | Individual Research | Spring 2025 | 
								
								
																 | 
								
								
																 | 
								
							
													
								| CSCE 5580.005 | Computer Networks | Fall 2024 | 
								
								
																 | 
								
								
																	SPOT
																 | 
								
							
													
								| CSCE 6940.875 | Individual Research | Fall 2024 | 
								
								
																 | 
								
								
																 | 
								
							
													
								| CSCE 5580.003 | Computer Networks | Spring 2024 | 
								
								
																 | 
								
								
																	SPOT
																 | 
								
							
													
								| CSCE 6940.975 | Individual Research | Spring 2024 | 
								
								
																 | 
								
								
																 | 
								
							
						
				
						
			
				Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
			
		 
		
		
											Published Intellectual Contributions
					
																													
														- Hou, T., Wang, T., Shen, D., Lu, Z., Liu, Y. (2020). Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.  Adaptive Autonomous Secure Cyber Systems.   109--129.  Springer. 
 
																													
														- Alanazi, H., Bi, S., Wang, T., Hou, T. (2023). Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection.  IEEE Military Communications Conference (IEEE MILCOM'23).      
 
																				- Alanazi, H., Bi, S., Wang, T., Hou, T. (2023). Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection.  IEEE International Conference on Communications (IEEE ICC'23).      
 
																				- Shen, D., Hou, T., Lu, Z., Liu, Y., Wang, T. (2023). SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.  IEEE Conference on Communications and Network Security (IEEE CNS'23).      
 
																				- Chen, S., McCracken, J., Lu, K., Wang, T., Hou, T. (2023). Taking a Look into the Cookie Jar: A Comprehensive Study towards the Security of Web Cookies.  National Workshop for REU Research in Networking and Systems (REUNS'23).      
 
																				- Bi, S., Hou, T., Wang, T., Liu, Y., Lu, Z., Pei, Q. (2022). DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.  ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec'22).      
 
																				- Hou, T., Bi, S., Wang, T., Lu, Z., Liu, Y., Misra, S., Sagduyu, Y. (2022). MUSTER: Subverting User Selection in MU-MIMO Networks.  IEEE Conference on Computer Communications (IEEE INFOCOM'22).      
 
																				- Hou, T., Wang, T., Lu, Z., Liu, Y., Sagduyu, Y. (2022). Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.  Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning.   63--68.   
 
																				- Hou, T., Bi, S., Mingkui, W., Wang, T., Lu, Z., Liu, Y. (2022). When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.  IEEE Conference on Communications and Network Security (IEEE CNS'22).      
 
																				- Hou, T., Wang, T., Lu, Z., Liu, Y., Sagduyu, Y. (2021). IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.  IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN'21).      
 
																				- Hou, T., Qu, Z., Wang, T., Lu, Z., Liu, Y. (2020). ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.  IEEE Conference on Computer Communications (IEEE INFOCOM'20).      
 
																				- Hou, T., Wang, T., Lu, Z., Liu, Y. (2019). I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network.  Annual Computer Security Applications Conference (ACSAC), Poster Session.      
 
																				- Hou, T., Wang, T., Lu, Z., Liu, Y. (2019). Smart spying via deep learning: inferring your activities from encrypted wireless traffic.  IEEE Global Conference on Signal and Information Processing (IEEE GlobalSIP'19).      
 
																				- Wang, T., Liu, Y., Pei, Q., Hou, T. (2015). Location-restricted services access control leveraging pinpoint waveforming.  Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.   292--303.   
 
																													
														- Zibaeirad, A., Koleini, F., Bi, S., Hou, T., Wang, T. (2024). A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities. Other.       
 
																				- Salas-Nino, M., Ritter, G., Hamdan, D., Wang, T., Hou, T. (2024). The Evolution of Keylogger Technologies: A Survey from Historical Origins to Emerging Opportunities. Other.       
 
																				- Alvarado, M., Gayler, L., Seals, A., Wang, T., Hou, T. (2024). A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges. Other.       
 
																				- Hou, T., Wang, T. (2023). Dynamic and Lightweight Encryption towards Data Confidentiality in Medical loT Devices (MloT).        
 
																				- Wang, T. (2022). Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. IEEE Transactions on Dependable and Secure Computing.       
 
																				- Hou, T., Wang, T., Lu, Z., Liu, Y. (2021). Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. Other.       
 
																				- Wang, T., Liu, Y., Hou, T., Pei, Q., Fang, S. (2016). Signal entanglement based pinpoint waveforming for location-restricted service access control. IEEE Transactions on Dependable and Secure Computing.  15 (5) 853--867.  IEEE. 
 
											
					 
		
		
											Contracts, Grants and Sponsored Research
					
																													
														- Hou, T. (Principal), Wang, T. (Co-Principal), "Towards the Research and Education for Trustworthy and Resilient Artificial Intelligence of Things,"  sponsored by DoD Army Research Office (ARO), Federal, $222569 Funded. (2024).
 
																				- Wang, T. (Co-Principal), "Testing & Evaluation for Soldier-Device Teaming Compatibility, Vulner- ability, and Durability in Emergent Situations,"  sponsored by Department of Defense, Federal, $750000 Funded. (2022 - 2027).
 
																				- Wang, T. (Co-Principal), "Building a Federated Learning Framework for Trustworthy and Resilient Energy Internet of Things (eIoT) Infrastructure,"  sponsored by Department of Energy, Federal, $750000 Funded. (2023 - 2025).
 
																				- Wang, T. (Principal), "Dynamic Wireless Channel Pad: A Lightweight and Effective Security Design Towards Non-cryptographic IoT Confidentiality,"  sponsored by National Science Foundation, Federal, $200000 Funded. (2022 - 2024).
 
																				- Wang, T. (Principal), "AFMR: Secure Resource Allocation for the Next Generation Network,"  sponsored by Microsoft, National, $20000 Funded. (2024 - 2024).
 
																				- Wang, T. (Principal), "WeCARE: Wireless Networking Infrastructure for Imperative Cybersecurity Research and Education,"  sponsored by Department of Defense (DoD), Federal, $124876 Funded. (2023 - 2023).