Tao Hou
Ph.D. student,
Department of Computer Science and Engineering, University of South Florida.
4202 E Fowler Ave, ENB 118, Tampa, FL 33620.
Phone: 813.390.8851      
Email: taohou@mail.usf.edu



 
I'm a Ph.D. student in the Department of Computer Science and Engineering at Unversity of South Florida. My advisors are Dr. Zhuo Lu and Dr. Yao Liu. I received my B.E. & M.E. degree from Jilin University, China. My research interests span quite a few areas, including network security, system security, machine learning for cybersecurity, high performance computing, and graph data analytics. Right now, I am working mostly on web security, binary analysis, and adversary machine learning.

One of my calligraphy works, the contents come from a poem by Tang poet Li Bai, entitled HARD TRAVELING.

"A time will come to ride the wind and cleave the waves, I’ll set my cloud-white sail and cross the sea which raves."

Recent News
[Dec, 2019] The paper on proactive network topology obfuscation has been accepted by IEEE INFOCOM 2020.
[Nov, 2019] Our paper "Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic" won the Best Paper Award at IEEE GlobalSIP'19.
[Nov, 2019] I have been selected to receive a 2019 ACSAC Student Travel Grant.
[Oct, 2019] I received the International Travel Grant from USF OGS to attend the IEEE GlobalSIP'19 conference in Ottawa, Canada.
Education
University of South Florida, Florida, USA   ( 2016 - Present )
Ph.D. student, RA in The Communications, Security, and Analytics (CSA) Lab.
Jilin University, Jilin, China   ( 2013 - 2016 )
Master student, RA in Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education of China.
Jilin University, Jilin, China   ( 2009 - 2013 )
Undergraduate student, RA in Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education of China.
Publications


ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference      
Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Conference on Computer Communications (INFOCOM), Beijing, China, 2020
 

I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network      
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
Annual Computer Security Applications Conference, Poster Session (ACSAC), San Juan, Puerto Rico, 2019
 

Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic      [ PDF ]   [ Slides ]   [ Best Paper Award ]
Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu
IEEE Global Conference on Signal and Information Processing (GlobalSIP), Ottawa, Canada, 2019
 

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis      
Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu
Autonomous Adaptive Cyber Systems, Springer, 2019
 

Signal Entanglement based Pinpoint Waveforming for Location-restricted Service Access Control     [ PDF ] 
Tao Wang, Yao Liu, Tao Hou, Qingqi Pei, and Song Fang
IEEE Transactions on Dependable and Secure Computing (TDSC), 2016
 

Location-restricted Services Access Control Leveraging Pinpoint Waveforming     [ PDF ]   [ Video Demo ]
Tao Wang, Yao Liu, Qingqi Pei, and Tao Hou
Proceedings of 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, 2015
 

Works
Experience
I create and organize the China fan club of famous actor Lee Minho. There are more than 368,560 fans join our club's membership since 2009. We have more than 30 provincial club chapters all over the China mainland, and 4 special chapters for Hong Kong, Taiwan, Korea, and Japan.
Website: Minhofans.com     Weibo: @Minhofans     Wechat Page: LOVEMHF
Official anthem: We Promise. Produced by me. Composed and sang by fans.   

Professional Info

Teaching

CGS1540.701F16 Intro to Database (TA, Fall 2016)
COP4710.001S16 Database Design (TA, Spring 2016)

Paper Reviewers

IEEE CCNCPS 2017
IEEE CNS 2017, 2018
ACM CCS-MTD 2017
International Journal of Security and Networks (IJSN)
IEEE SmartGridComm 2017
IEEE Access
IEEE ICC 2018

Awards

ACSAC'19 Student Travel Grant
USF International Travel Grant
USENIX Security'18 Student Grant
Florida's TEAm scholarship (USF)
Outstanding Graduate Student Scholarship (Jilin University)
Outstanding Thesis (Jilin University)
IEEE GlobalSIP Best Paper Award
NeTS Early Career Workshop Travel Grant
Black Hat USA 2018 Student Scholarship
Second-class Academic Scholarship (Jilin University)
Provincial-Level Merit Student

Professional Memberships

Student member of IEEE
Member of Tau Beta Pi, the engineering honor society
Research Projects

Developing Automated and Practical Frameworks to Reinforce Neural Networks in Cyber Security Domain Leveraging GANs.     [2018 ~ Present]

With great usage and wide adoption of neural networks, especially in sensitive domain such as healthcare diagnosis and network security, the reliability of their results is necessary. This project aims to develop a defense mechanism, which is practical in real-world application with pre-trained neural networks, leveraging generative adversarial networks (GANs). Since the vulnerability against adversaries is inherent to the world of neural networks, using an iterative offensive approach to generate new attacks to help strengthen the neural network is the best defense.

Towards Secure and Reliable Network Tomography in Wireline and Wireless Networks     [2018 ~ Present]

Today's networks, such as the Internet, cellular networks, and the Internet of Things, provide ubiquitous wired or wireless connections over large areas. Secure and reliable operations are among the most important objectives in these networks. Network tomography has become a promising framework for accurate monitoring of network operation status, which is vital to ensure an efficient and reliable network environment. However, this measurement process can be exploited by malicious attackers to generate falsified, misleading measurement or monitoring results, which significantly affects follow-on network operations based on these results, and accordingly degrades the operational reliability and health of today's networks. The goal of this project is to analyze security vulnerabilities, understand potential security attack strategies and their impact, and design effective defense mechanisms against such attacks.

Web Security: Development of Vulnerability Measurement and Defense Techniques     [2017 ~ Present]

World Wide Web is a critical infrastructure that serves our society by facilitating information exchange, business and education. Our works focus on improving the security of the Internet, including developing new techniques for vulnerability measurement, and risk defense at Internet wide scale in a timely, accurate, complete, and ethical manner.

SELECT: Secure and Lightweight Computing Environment for HPC systems     [2016 ~ 2018]

Providing strong cyber security tools that can protect the data and prevent tampering is of critical importance to secure HPC systems. Nonetheless, there are still no comprehensive software design and implementation to systemically address cyber security issues in HPC systems. To address this need, we propose to develop a Secure and Lightweight Computing Environment (SELECT) software tool for HPC systems, and the key innovation is to integrate both coarse-grained security and fine-grained security with low overhead to provide sensitive data leakage detection and real-time tampering defense.

MSanalysis: A Push-based System for Molecular Simulation Data Analysis     [2016]

The frontend user interface of MSanalysis is a web application written by python based on Django, while the backend processing engine is developed by C++ following the proposed push-based data processing model.
Known scientific data analysis systems, as well as traditional DBMSs, follow a pull-based architectural design, where the executed queries mandate the data needed. Such design involves redundant and random I/Os, considerably affecting the data throughput in the system. We design and implement a push-based type system that allows high-throughput data analysis in the process of scientific discovery. By this way the system lowers the unnecessary I/O overhead imposed by the randomized, index-based scan and that of a multiple data reads if each query were to be fed separately.
Top