no code implementations • 10 Jan 2022 • Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin Sagduyu
In this research, we propose a novel attack strategy named IoTGAN to manipulate an IoT device's traffic such that it can evade machine learning based IoT device identification.
no code implementations • 12 Mar 2021 • Tamal K. Dey, Tao Hou
Specifically, given a filtration with $m$ additions and deletions on a graph with $n$ vertices and edges, the algorithm for $0$-dimension runs in $O(m\log^2 n+m\log m)$ time and the algorithm for 1-dimension runs in $O(m\log^4 n)$ time.
Computational Geometry Algebraic Topology