Publications

Journal Articles

  1. M.D. Shahriar, M.R. Ansari, J-P. Monteuuis, M.S. Haque, C. Chen, J. Petit, Y.T. Hou, W. Lou, "VehiGAN: Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems," ACM Transactions on Cyber-Physical Systems, Volume 9, Issue 3, Article 30, Pages 1-26, August 2025, https://doi.org/10.1145/3745787.
  2. N. Wang, S. Shi, Y. Chen, W. Lou and Y. T. Hou, "FeCo: Boosting Intrusion Detection Capability in IoT Networks via Contrastive Learning," IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 04, pp. 4215-4230, July-Aug. 2025, doi: 10.1109/TDSC.2025.3544106.
  3. Y. Li, I. Alom, W. Sun and Y. Xiao, "DEXO: A Secure and Fair Exchange Mechanism for Decentralized IoT Data Markets," IEEE Internet of Things Journal, vol. 12, no. 11, pp. 16095-16111, 1 June 2025, doi: 10.1109/JIOT.2025.3535671.
  4. N. Wang, C. Zhang, Y. Xiao, Y. Chen, W. Lou and Y. T. Hou, "FLARE: Defending Federated Learning Against Model Poisoning Attacks via Latent Space Representations," IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 03, pp. 2607-2623, May-June 2025, doi: 10.1109/TDSC.2024.3521297.

Conference Papers

  1. Z. Jiang, X. Lyu, S. Shi, Y. Xiao, Y. Chen, Y.T. Hou, W. Lou and N. Wang, "BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning," 28th European Conference on Artificial Intelligence (ECAI), Oct 25-30, 2025, Bologna, Italy.
  2. H. Yu, M. Barat, Y. Xiao, Y.T. Hou, W. Lou, "Closing the Visibility Gap: A Monitoring Framework for Verifiable Open RAN Operations," IEEE CNS, Oct. 8-11, 2025, Avignon, France.
  3. F. Zhou, Y. Shi, Y. Wu, S. Acharya, L. DaSilva, S. Kompella, W. Lou, and Y. T. Hou, "WOS: An optimized scheduling scheme for federated learning in dynamic wireless networks," IEEE Military Communications (MILCOM), October 6–10, 2025, Los Angeles, CA.
  4. C. Zhang, H. Jin, S. Shi, H. Yu, S. Johns, Y. T. Hou, and W. Lou, "Enabling Trustworthy Federated Learning via Remote Attestation for Mitigating Byzantine Threats," IEEE Military Communications (MILCOM), October 6–10, 2025, Los Angeles, CA.
  5. M.H. Shahriar, N. Wang, N. Ramakrishnan, Y.T. Hou, W. Lou, "Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks," ESORICS, September 22-26, 2025, Toulouse, France.
  6. S. Shi, M.S. Haque, A. Parida, C. Zhang, M.G. Linguraru, Y.T. Hou, S.M. Anwar, W. Lou, "MedLeak: Multimodal Medical Data Leakage in Secure Federated Learning with Crafted Models," IEEE/ACM CHASE, June 24-26, 2025, New York City, NY.
  7. Z. Li, H. Liu, A. Li, C.-H. Chan, Y. Vorobeychik, W. Yeoh, W. Lou, N. Zhang, "Resilient Federated Learning on Embedded Devices with Constrained Network Connectivity," DAC, June 22-25, 2025, San Francisco, CA.
  8. S. Li, X. Lyu, N. Wang, T. Li, D. Chen, Y. Chen, "Beyond Uniformity: Robust Backdoor Attacks on Deep Neural Networks with Trigger Selection," 29th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), June 10-13, 2025, Sydney, Australia.
  9. C. Zhang, H. Yu, S. Shi, S. Li, Y. Shi, E. Burger, Y. T. Hou, W. Lou, "StarCast: Securing Multicast Communications in LEO Satellite Networks," IEEE DySPAN, May 12-15, 2025, London, United Kingdom.
  10. S. Shi, N. Wang, Y. Xiao, C. Zhang, Y. Shi, Y. T. Hou, W. Lou, "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction," NDSS, February 24–28, 2025, San Diego, CA, USA.

Dissertation

  1. Shanghao Shi, "Building Trustworthy Artificial Intelligence of Things Systems in Adversarial Environments," Ph.D. Dissertation, Department of Computer Science, Virginia Tech, 2025.