Curriculum Vitae: Xiaohui Liang 1/7 XIAOHUI LIANG

Size: px
Start display at page:

Download "Curriculum Vitae: Xiaohui Liang 1/7 XIAOHUI LIANG"

Transcription

1 Curriculum Vitae: Xiaohui Liang 1/7 XIAOHUI LIANG Mail Address Department of Electrical and Computer Engineering University of Waterloo 200 University Avenue West, Waterloo, Ontario, Canada N2L 3G1 Contact Homepage: x27liang Cell Phone: (226) Office Phone: +1 (519) ext EDUCATION University of Waterloo, Canada Ph.D., Electrical and Computer Engineering Dissertation: Security and Privacy Preservation in Mobile Social Networks Supervisor: Professor Xuemin (Sherman) Shen Shanghai Jiao Tong University, China M.Sc., Computer Science and Engineering Shanghai Jiao Tong University, China B.Sc., Computer Science and Engineering, ACM Honored Class RESEARCH INTERESTS Network Security and Privacy in Mobile Social Networks Information Security and Applied Cryptography E-healthcare, Smart Grid and Cloud Computing SELECTED PUBLICATIONS Book & Book Chapter: B1. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, Security and Privacy in Mobile Social Networks, Springer Briefs in Computer Science, ISBN , B2. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks, Handbook on Opportunistic Mobile Social Networks, CRC Press, Taylo & Francis Group, USA, Refereed Journal Papers: J1. Qinghua Shen, Xiaohui Liang, Xuemin (Sherman) Shen, Xiaodong Lin, and Henry Luo, Exploiting Geo-Distributed Clouds for E-Health Monitoring System with Minimum Service Delay and Privacy Preservation, submitted to IEEE Journal of Biomedical and Health Informatics, J2. Xiaohui Liang, Xiaodong Lin, and Xuemin (Sherman) Shen, Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2013, to appear. J3. Xiaohui Liang, Xu Li, Kuan Zhang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, Fully Anonymous Profile Matching in Mobile Social Networks, IEEE Journal on Selected Areas of Communications (JSAC), vol. 31, no. 9, pp , J4. Xiaohui Liang, Kuan Zhang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, EPS: An Efficient and Privacy- Preserving Service Searching Scheme for Smart Community, IEEE Sensor Journal, vol. 13, no. 10, pp , J5. Mi Wen. Rongxing Lu, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, and Xuemin (Sherman) Shen, PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid, IEEE Transactions on Emerging Topics in Computing (TETC), vol. 1, no. 1, pp , J6. Hongwei Li, Xiaodong Lin, Haomiao Yang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2013, to appear. J7. Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, RCare: Extending Secure Health Care to Rural Area Using VANETs, ACM Mobile Networks and Applications (MONET), 2013, to appear.

2 Curriculum Vitae: Xiaohui Liang 2/7 J8. Mi Wen, Rongxing Lu, Jingsheng Lei, Hongwei Li, Xiaohui Liang, and Xuemin (Sherman) Shen, SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing, Security and Communication Networks (SCN), to appear. J9. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid, IEEE Transactions on Smart Grid (TSG), vol. 4, no. 1, pp , J10. Xiaohui Liang, Xu Li, Tom Luan, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, Morality-driven Data Forwarding with Privacy Preservation in Mobile Social Networks, IEEE Transactions on Vehicular Technology (TVT), vol. 61, no. 7, pp , J11. Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin (Sherman) Shen, EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications, IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 9, pp , J12. Xiaohui Liang, Mrinmoy Barua, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, HealthShare: Achieving Secure and Privacy-preserving Health Information Sharing through Health Social Networks, Computer Communications, vol. 35, no. 15, pp , J13. Rongxing Lu, Xiaodong Lin, Tom Luan, Xiaohui Liang, and Xuemin (Sherman) Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs, IEEE Transactions on Vehicular Technology (TVT), vol. 61, no. 1, pp , J14. Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, ESPAC: Enabling Security and Patient-centric Access Control for ehealth in Cloud Computing, International Journal of Security and Networks, vol. 6, no. 2, pp , J15. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, A Secure Handshake Scheme with Symptoms- Matching for mhealthcare Social Network, ACM Mobile Networks and Applications (MONET), vol. 16, no. 6, pp , J16. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, An Efficient and Provably Secure Public Key Encryption Scheme based on Coding Theory, Security and Communication Networks (SCN), vol. 4, no. 12, pp , J17. Xiaohui Liang, Mrinmoy Barua, Rongxing Lu, and Xuemin (Sherman) Shen, Privacy-preserving Wireless Data Transmission for e-healthcare Applications, IEEE COMSOC MMTC E-Letter, vol. 6, no. 11, pp , J18. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, A Dynamic Privacy-Preserving Key Management Scheme for Location Based Services in VANETs, IEEE Transactions on Intelligent Transportation Systems (TITS), vol. 13, no. 1, pp , J19. Xiaohui Liang, Rongxing Lu, Le Chen, Xiaodong Lin, and Xuemin (Sherman) Shen, PEC: A Privacy-preserving Emergency Call Scheme for Mobile Healthcare Social Networks, IEEE Journal of Communications and Networks, vol. 13, no. 2, pp , J20. Rongxing Lu, Xiaodong Lin, Haojing Zhu, Xiaohui Liang, and Xuemin (Sherman) Shen, BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 1, pp , J21. Huang Lin, Zhenfu Cao, Xiaohui Liang, and Jun Shao, Secure threshold multi authority attribute based encryption without a central authority, Information Sciences, vol. 180, no. 13, pp , J22. Jun Shao, Zhenfu Cao, Xiaohui Liang, and Huang Lin, Proxy re-encryption with keyword search, Information Sciences, vol. 180, no. 13, pp , J23. Xiaohui Liang, Zhenfu Cao, Rongxing Lu, and Liuquan Qin, Efficient and Secure Protocol in Fair Document Exchange, Computer Standards and Interfaces, vol. 30, no. 3, pp , J24. Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, and Xiaohui Liang, New (t, n) Threshold Directed Signature Scheme with Provable Security, Information Sciences, vol. 178, no. 3, 2008, pp Refereed Magazine Articles: M1. Xiaohui Liang, Xiaodong Lin, Kuan Zhang, and Xuemin (Sherman) Shen, Security and Privacy in Mobile Social Network: Challenges and Solutions, IEEE Wireless Communications, 2013, minor revision. M2. Xiaohui Liang, Xu Li, Mrinmoy Barua, Le Chen, Rongxing Lu, Xuemin (Sherman) Shen, and Henry Luo, Enable Pervasive Healthcare through Continuous Remote Health Monitoring, IEEE Wireless Communications, vol. 19, no. 6, pp , 2012.

3 Curriculum Vitae: Xiaohui Liang 3/7 M3. Xu Li, Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Haojing Zhu, and Xuemin (Sherman) Shen, Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges, IEEE Communications Magazine, vol. 50, no. 8, pp , M4. Rongxing Lu, Xu Li, Xiaohui Liang, Xiaodong Lin, and Xuemin (Sherman) Shen, GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications, IEEE Communications Magazine, vol. 49, no. 4, pp , M5. Xu Li, Rongxing Lu, Xiaohui Liang, Jiming Chen, Xiaodong Lin, and Xuemin (Sherman) Shen, Smart Community: an Internet of Things Application, IEEE Communications Magazine, vol. 49, no. 11, pp , Refereed Conference Papers: C1. Qinghua Shen, Xiaohui Liang, Xuemin (Sherman) Shen, Xiaodong Lin, and Henry Luo, RECCE: A Reliable and Efficient Cloud Cooperation Scheme in E-healthcare, GLOBECOM IEEE Global Telecommunications Conference, December C2. Kuan Zhang, Rongxing Lu, Xiaohui Liang, Jian Qiao, and Xuemin (Sherman) Shen, PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid, ICCC 2013 IEEE & CIC International Conference on Communications in China, August C3. Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, SAFE: A Social Based Updatable Filtering Protocol with Privacy Preservation in Mobile Social Networks, ICC 2013 IEEE International Conference on Communications, June C4. Hongwei Li, Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, EDR: An Efficient Demand Response Scheme for Achieving Forward Secrecy in Smart Grid, GLOBECOM IEEE Global Telecommunications Conference, December C5. Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin (Sherman) Shen, and Hai Zhao, VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs, GLOBECOM IEEE Global Telecommunications Conference, December C6. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks, ICDCS 2012 International Conference on Distributed Computing Systems, June (Acceptance rate is 13%) C7. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, Enabling Pervasive Healthcare with Privacy Preservation in Smart Community, ICC 2012 IEEE International Conference on Communications, June C8. Xiaohui Liang, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen, and Weihua Zhang, Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks, INFOCOM 2012 IEEE International Conference on Computer Communications, March (Acceptance rate is 17.97%) C9. Rongxing Lu, Xiaodong Lin, Tom Luan, Xiaohui Liang, Xu Li, Le Chen, and Xuemin (Sherman) Shen, PReFilter: A Privacypreserving Relay Filtering Scheme for Delay Tolerant Networks, INFOCOM 2012 IEEE International Conference on Computer Communications, March (Acceptance rate is 17.97%) C10. Xu Li, Shibo He, Jiming Chen, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, Coordinate-free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks, GLOBECOM 2011 IEEE Global Communications Conference, December C11. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, An Efficient and Secure User Revocation Scheme in Mobile Social Networks, GLOBECOM 2011 IEEE Global Communications Conference, December C12. Le Chen, Zhenfu Cao, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen, EPF: An Event-aided Packet Forwarding Protocol for Privacy-preserving Mobile Healthcare Social Networks, GLOBECOM 2011 IEEE Global Communications Conference, December C13. Xu Li, Xiaohui Liang, Rongxing Lu, Shibo He, Jiming Chen, and Xuemin (Sherman) Shen, Toward Reliable Actor Service in Wireless Sensor and Actor Networks, MASS 2011 IEEE International Conference on Mobile Ad hoc and Sensor Systems, October C14. Xiaohui Liang, Xu Li, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, Fine-grained Identification with Real-time Fairness in Mobile Social Networks, ICC 2011 IEEE International Conference on Communications, June C15. Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen, Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks, ICC 2011 IEEE International Conference on Communications, June 2011.

4 Curriculum Vitae: Xiaohui Liang 4/7 C16. Rongxing Lu, Xiaodong Lin, Tom Luan, Xiaohui Liang, and Xuemin (Sherman) Shen, Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs, ICC 2011 IEEE International Conference on Communications, June C17. Xiaodong Lin, Rongxing Lu, Xiaohui Liang and Xuemin (Sherman) Shen, STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs, INFOCOM 2011 IEEE International Conference on Computer Communications, April (Acceptance rate is 15.96%) C18. Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, PEACE: An Efficient and Secure Patient-Centric Access Control Scheme for EHealth Care System, INFOCOM-SCNC 2011 IEEE International Conference on Computer Communications workshops on Security in Computers, Networking and Communications, April C19. Mrinmoy Barua, Md. Shamsul Alam, Xiaohui Liang, and Xuemin (Sherman) Shen, Secure and Quality of Service Assurance Scheduling Scheme for WBAN with Application to EHealth, WCNC IEEE Wireless Communications and Networking Conference, March C20. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen, Message Authentication with Non-transferability for Location Privacy in Mobile Ad hoc Networks, GLOBECOM 2010 IEEE Global Communications Conference, December C21. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, FLIP: An Efficient Privacy-preserving Protocol for Finding Like-minded Vehicles on the Road, GLOBECOM 2010 IEEE Global Communications Conference, December C22. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET, GLOBECOM 2010 IEEE Global Communications Conference, December C23. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks, VTC-Fall 2010 IEEE Vehicular Technology Conference, September, C24. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, Secure Handshake with Symptoms-matching: The Essential to the Success of mhealthcare Social Network, BodyNets 2010 International Conference on Body Area Networks, September, Best Paper Award C25. Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin (Sherman) Shen, Patient Self-controllable Access Policy on PHI in ehealthcare Systems, AHIC 2010 Advances in Health Informatics Conference, April C26. Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing, How to Construct Interval Encryption from Binary Tree Encryption, ACNS 2010 Applied Cryptography and Network Security, April (Acceptance rate is 17.98%) C27. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, ASIACCS 2010 ACM Symposium on Information, Computer and Communications Security, April, (Acceptance rate is 22.89%) C28. Xiaohui Liang, Zhenfu Cao, Huang Lin and Dongsheng Xing, Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption, ASIACCS 2009 ACM Symposium on Information, Computer and Communications Security, March (Acceptance rate is 23.6%) C29. Xiaohui Liang, Zhenfu Cao, Huang Lin and Jun Shao, Attribute Based Proxy Re-encryption with Delegating Capabilities, ASIACCS 2009 ACM Symposium on Information, Computer and Communications Security, March (Acceptance rate is 23.6%) C30. Huang Lin, Zhenfu Cao, Xiaohui Liang, and Jun Shao, Secure Threshold Multi-authority Attribute Based Encryption without a Central Authority, INDOCRYPT 2008 International Conference on Cryptology in India, December C31. Jun Shao, Zhenfu Cao, Licheng Wang, and Xiaohui Liang, Proxy Re-signature Schemes without Random Oracles, INDOCRYPT 2007 International Conference on Cryptology in India, December (Acceptance rate is 20.95%) C32. Xiaohui Liang, Zhenfu Cao, Jun Shao, and Huang Lin, Short Group Signature without Random Oracles, ICICS 2007 International Conference on Information and Communications Security, December (Acceptance rate is 17.12%)

5 Curriculum Vitae: Xiaohui Liang 5/7 SELECTED SEMINARS AND PRESENTATIONS P1. SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks, ICDCS 2012 International Conference on Distributed Computing Systems, June P2. Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks, INFOCOM 2012 IEEE International Conference on Computer Communications, March P3. PReFilter: A Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks, INFOCOM 2012 IEEE International Conference on Computer Communications, March P4. Enabling Pervasive Healthcare with Privacy Preservation in Smart Community, BBCR seminar, University of Waterloo, September, P5. Fine-grained Identification with Real-time Fairness in Mobile Social Networks, BBCR seminar, University of Waterloo, June, P6. STAP: A Social-Tier-Assisted Packet Forwarding Protocol for Achieving Receiver-Location Privacy Preservation in VANETs, INFOCOM 2011 IEEE International Conference on Computer Communications, April P7. PEACE: An Efficient and Secure Patient-Centric Access Control Scheme for ehealth care system, INFOCOM-SCNC 2011 IEEE International Conference on Computer Communications workshops on Security in Computers, Networking and Communications, April P8. PPC: Privacy-preserving Chatting in Vehicular Peer-to-peer Networks, VTC-Fall 2010 IEEE Vehicular Technology Conference, September, P9. Patient Self-controllable Access Policy on PHI in ehealthcare Systems, BBCR seminar, University of Waterloo, April, P10. Security and Privacy Preservation in Mobile Heatlthcare Social Networks (MHSN), BBCR seminar, University of Waterloo, January, P11. Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption, ASIACCS 2009 ACM Symposium on Information, Computer and Communications Security, March P12. Attribute Based Proxy Re-encryption with Delegating Capabilities, ASIACCS 2009 ACM Symposium on Information, Computer and Communications Security, March P13. Short Group Signature without Random Oracles, ICICS 2007 International Conference on Information and Communications Security, December RESEARCH AND TEACHING EXPERIENCE University of Waterloo, Canada Postdoctoral Fellow, Broadband Communications Research (BBCR) Laboratory University of Waterloo, Canada Administrator, Broadband Communications Research (BBCR) Laboratory 10/2013-Present 01/2010-Present Maintain and update both hardware and software for all computers, manage computer accounts, and assist each member to be familiar with facilities and research resources University of Waterloo, Canada 05/ /2013 Research Assistant, Broadband Communications Research (BBCR) Laboratory Designed secure, efficient, and privacy-preserving communication protocols for mobile communication systems, such as, e-healthcare system, mobile social networks, and smart grid Simulated a mobile social network by using the real-trace data, implemented and validated the designed protocols in the simulated environment, Java programming in Linux Implemented Bluetooth communications between iphone with CIM sensors, read and modified C# codes from Btstack open source Developed a Gesture-based Electronic namecard application (GEM) in Android for users to share electronic namecards using their Smartphones with Gesture-based authentication adopted to ensure security. The software can be downloaded at bbcr.uwaterloo.ca/ x27liang/gem.htm. University of Waterloo, Canada 09/ /2009 Teaching Assistant for Undergraduate Course in Electrical and Computer Engineering Worked for ECE 222 Digital Computers, provided tutorials on basic knowledge of memory, register and assembly language, and supervised lab sessions on programming in MCB1700 Evaluation Board

6 Curriculum Vitae: Xiaohui Liang 6/7 Shanghai Jiao Tong University, China 2006, 2007, 2008 Teaching Assistant for Undergraduate Course in Computer Science Worked for Discrete Mathematics, managed tutorials on set theory, graph theory, etc. National Institute of Information and Communications Technology, Japan 11/2008 Visiting Student, Theoretic Foundation Group Shanghai Jiao Tong University, China 07/ /2006 Research Assistant, Trusted Digital Technology Laboratory Designed secure, efficient, and privacy-preserving encryption and signature schemes and implemented attributebased encryption algorithms, C++ programming in Linux Microsoft Research Asia, China 07/ /2005 Research Intern, Wireless and Networking Group Examined and analyzed MAC Layer Misbehavior UNDERGRADUATE RESEARCH SUPERVISION EXPERIENCE Jianqiao Shao, undergraduate co-op student 05/ /2009 An Investigation on Researches of E-Health System Security Bin Liu, undergraduate exchange student 09/ /2009 Implement an attribute based encryption system for e-healthcare system Wei Zhang, undergraduate co-op student 01/ /2012 Implement Bluetooth communication between Apple iphone/ipod and CIM devices Nan Chen, undergraduate exchange student A survey of big data analysis and energy efficiency for ehealthcare 09/2013-present VOLUNTEER EXPERIENCE GradTalk team leader for each term from fall 2010 to fall 2011, responsible for inviting all ECE graduate students to provide research talks and tutorials, evaluating their performances, and selecting best speakers GradTalk team member for each term from fall 2009 to fall 2012 Group leader of BBCR e-health group, organizing group members to do advanced research and develop technologies for e-healthcare systems, and maintaining a bibliography website on secure e-healthcare systems. The bibliography can be found bbcr.uwaterloo.ca/ x27liang/seehealthbib.htm. Assistant for the International Conference VTC2010-Fall, Ottawa, Canada, September 6-9, 2010 HONORS and AWARDS Outstanding Achievement in Graduate Studies, University of Waterloo 2013 Ontario Graduate Scholarship, University of Waterloo President s Graduate Scholarship, University of Waterloo Doctoral Thesis Completion Award, University of Waterloo 2013 Faculty of Engineering Graduate Scholarship, University of Waterloo Ontario Research and Development Challenge Fund Bell Scholarship 2012 Chinese Government Award for Outstanding Self-financed Students Abroad 2012 Graduate Scholarship, University of Waterloo, five consecutive terms International Doctoral Student Award, University of Waterloo INFOCOM 2011 Student Travel Grant 2011 Shanghai Excellent Master Thesis Award 2011 Co-recipient of ICST BodyNets 2010 Best Paper Award 2010 National Excellent Graduate Scholarship, China 2007

7 Curriculum Vitae: Xiaohui Liang 7/7 Excellent Graduate, Shanghai Jiao Tong University 2006 Excellent Undergraduate Thesis Award, Shanghai Jiao Tong University 2006 First Price, 18th National Contest in Mathematics, Hubei Region, China 2002 SERVICE Publicity co-chair for INFOCOM 2011 workshop on Security in Computers, Networking and Communications Session chair for VTC-Fall Technique program committee for GLOBECOM 2013 Reviewer for Journals IEEE Journal on Selected Areas of Communications IEEE Transactions on Mobile Computing IEEE Transactions on Vehicular Technology IEEE Transactions on Parallel and Distributed Systems IEEE Transactions on Smart Grid IEEE Communication Magazine IEEE/KICS Journal of Communications and Networks IEEE Sensor Journal Reviewer for Conferences IEEE INFOCOM, 2010, 2011, 2012 IEEE Healthcom 2013 IEEE WCNC 2012, 2013 IEEE MILCOM 2012 IEEE MASS 2011

Curriculum Vitae: Xiaohui Liang (Aug-2018) 1/12 XIAOHUI LIANG

Curriculum Vitae: Xiaohui Liang (Aug-2018) 1/12 XIAOHUI LIANG Curriculum Vitae: Xiaohui Liang (Aug-2018) 1/12 XIAOHUI LIANG Department of Computer Science University of Massachusetts Boston 100 Morrissey Boulevard, Boston, MA 02125 Email: Xiaohui.Liang at umb.edu

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

KAN YANG. Department of Electrical and Computer Engineering

KAN YANG. Department of Electrical and Computer Engineering Kan YANG-Curriculum Vitae 1/5 KAN YANG Department of Electrical and Computer Engineering +1-519 721 1218 University of Waterloo kan.yang@uwaterloo.ca Waterloo, ON, Canada N2L 3G1 www.ece.uwaterloo.ca/~kan.yang

More information

Computer Science and Engineering Ira A. Fulton Schools of Engineering

Computer Science and Engineering Ira A. Fulton Schools of Engineering DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION

More information

Curriculum Vitae: Lin X. Cai 1 / 10. Ms. Lin X. Cai

Curriculum Vitae: Lin X. Cai 1 / 10. Ms. Lin X. Cai Curriculum Vitae: Lin X. Cai 1 / 10 Ms. Lin X. Cai Citizenship: Canadian Address: Tel: +1 (519) 888-4567 ext. 37466 (Office) Department of Electrical and Computer Engineering +1 (519) 884-6110 (home) University

More information

Jinyuan Stella Sun. CONTACT INFORMATION 604 Min Kao, 1520 Middle Drive, Knoxville, TN USA

Jinyuan Stella Sun. CONTACT INFORMATION 604 Min Kao, 1520 Middle Drive, Knoxville, TN USA Jinyuan Stella Sun CONTACT INFORMATION 604 Min Kao, 1520 Middle Drive, Knoxville, TN 37996 USA Phone: 865-974-0426 Fax: 865-974-4404 Email: jysun@utk.edu URL: http://web.eecs.utk.edu/~jysun EDUCATION 08/2006

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience Dr. Zheng Chang Assistant Professor (Tutkijatohtori, Docent) Faculty of Information Technology University of Jyväkylä P.O.Box 35(Agora), 40014 Jyväkylä, Finland Phone: +358 408054143 Email: zheng.chang@jyu.fi

More information

Mobile Health Monitoring Based On New Power Management Approach

Mobile Health Monitoring Based On New Power Management Approach Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile

More information

Curriculum Vitae: Nan (Chris) Cheng (June-2018) 1 of 9 NAN (CHRIS) CHENG

Curriculum Vitae: Nan (Chris) Cheng (June-2018) 1 of 9 NAN (CHRIS) CHENG Curriculum Vitae: Nan (Chris) Cheng (June-2018) 1 of 9 NAN (CHRIS) CHENG Department of Electrical and Computer Engineering University of Toronto 27 King s College Cir, Toronto, Ontario, M5S 1A1, Canada

More information

Zoltan Safar. Education. Awards and Honors. Experience

Zoltan Safar. Education. Awards and Honors. Experience 1361 A. V. Williams Bldg. Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742, USA Phone: (+1) 301-405-5779 E-mail: zsafar@umd.edu Education Ph.D. in Electrical

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs

VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs Globecom 212 - Ad Hoc and Sensor Networking Symposium VSLP: Voronoi-Socialspot-Aided Packet Forwarding Protocol with Receiver Location Privacy in MSNs Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin (Sherman)

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

A Simple User Authentication Scheme for Grid Computing

A Simple User Authentication Scheme for Grid Computing International Journal of Network Security, Vol.7, No.2, PP.202 206, Sept. 2008 202 A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang (Corresponding

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Hong-Sheng Zhou. Research Interests. Education. Research Experience

Hong-Sheng Zhou. Research Interests. Education. Research Experience Hong-Sheng Zhou Deptartment of Computer Science, University of Maryland (860) 208-8345 3269 A.V. Williams Building, hszhou@cs.umd.edu College Park, MD 20742 http://www.cs.umd.edu/ hszhou/ Research Interests

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

Yi Qian. Department of Electrical and Computer Engineering University of Nebraska, NE, USA. Web: cns.unl.

Yi Qian. Department of Electrical and Computer Engineering University of Nebraska, NE, USA.   Web: cns.unl. Recent Research in Smart Grid Communication Infrastructures and Cyber Security Yi Qian Department of Electrical and Computer Engineering University of Nebraska, NE, USA E-mail: yi.qian@unl.edu Web: cns.unl.edu/yqian

More information

Curriculum Vitae: Ning Zhang 1 of 10 Ning ZHANG

Curriculum Vitae: Ning Zhang 1 of 10 Ning ZHANG Curriculum Vitae: Ning Zhang 1 of 10 Ning ZHANG Department of Computing Sciences Texas A&M University at Corpus Christi 6300 Ocean Dr. Corpus Christi, Texas, 78412, USA Email: ning.zhang@tamucc.edu Phone:

More information

Funded Project Final Survey Report

Funded Project Final Survey Report Funded Project Final Survey Report Principal Investigator: Prof Andrea Goldsmith Project Title: Wireless Sensor Networks Technology for Smart Buildings 1. Project Description: This project sets forth a

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

/15/$ IEEE

/15/$ IEEE A Novel Design for Content Delivery over Software Defined Mobile Social Networks Zhou Su, Qichao Xu, Haojin Zhu, and Ying Wang Abstract With the rapid development of mobile communication technologies,

More information

DAISY Data Analysis and Information SecuritY Lab

DAISY Data Analysis and Information SecuritY Lab DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis

More information

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-location Privacy in VANET Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen Department of Electrical

More information

Dr. Ahmed K. Sadek 2. Experience

Dr. Ahmed K. Sadek 2. Experience Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context

More information

Page 1 of 6. B.Sc. (Honors) in Electrical Engineering, Kuwait University, August 1999.

Page 1 of 6. B.Sc. (Honors) in Electrical Engineering, Kuwait University, August 1999. Abd-Elhamid Mohamed Taha School of Computing, Queen's University, Kingston, Ontario, K7L 3N6 Tel: +1 (613) 533-6000 X75029, Fax: +1 (613) 533-6513 E-mail: taha@cs.queensu.ca, URL: http://www.cs.queensu.ca/~taha

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

Zhengguo Sheng. Thesis Topic: Cooperative Wireless Networks Advisor: Professor Kin K. Leung

Zhengguo Sheng. Thesis Topic: Cooperative Wireless Networks Advisor: Professor Kin K. Leung Contact Information Zhengguo Sheng Address: Top Floor Flat, 10-12 Exhibition Road, London, SW7 2HF, United Kingdom DOB: 25 June, 1983 http://www.commsp.ee.ic.ac.uk/ zs206/ Phone: +44-785-650-1629 Email:

More information

Amir Aminzadeh Gohari

Amir Aminzadeh Gohari Amir Aminzadeh Gohari Contact Information Computer Eng. Phone: (707) 953-2647 E-mail: amirazg@ece.ucsb.edu Santa Barbara, CA 93106 USA Web: http://ece.ucsb.edu/ amirazg Education Sept. 2007 June 2011 Ph.D.,

More information

MAGNO QUEIROZ Curriculum Vitae

MAGNO QUEIROZ Curriculum Vitae MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building

More information

A Simple User Authentication Scheme for Grid Computing

A Simple User Authentication Scheme for Grid Computing A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuai Chai, Xiaohui Liang Department of Computer Science and Engineering, Shanghai Jiao Tong University 800 Dongchuan

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

DR. UMMA HANY. Current Status: Education: Career Summary:

DR. UMMA HANY. Current Status: Education: Career Summary: DR. UMMA HANY Address: House No. 20, Road No. 18, Sector-11, Uttara, Dhaka-1230 Mobile : +8801712002418 e-mail : ummahany@baiust.edu.bd; ummahany@gmail.com. Current Status: Associate Professor and Head

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

Guest Editorial: Introduction to the Special Issue on Data Semantics and Multimedia Information Management

Guest Editorial: Introduction to the Special Issue on Data Semantics and Multimedia Information Management Guest Editorial: Introduction to the Special Issue on Data Semantics and Multimedia Information Management It is our great pleasure to organize a joint special issue in the International Journal of Multimedia

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Office: BA 320A E-mail (Work): msopha@asu.edu W. P. Carey School of Business Phone

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h) HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)

More information

J. Haadi Jafarian CV June J. Haadi Jafarian

J. Haadi Jafarian CV June J. Haadi Jafarian J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina

More information

Education. Professional Experience. Awards and Honors

Education. Professional Experience. Awards and Honors Education Wade Trappe Department of Electrical and Computer Engineering, and Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Road, Piscataway, NJ 08854

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

Curriculum vitae , Athens GREECE : Web:

Curriculum vitae , Athens GREECE : Web: Curriculum vitae EVA H. JAHO 2 Naksou st., Vyronas 16 233, Athens GREECE : +306938648996 E-mail: jaho.eva@gmail.com Web: http://cgi.di.uoa.gr/~ejaho/ EDUCATION 6/2007 12/2011 PhD, Department of Informatics

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Providing Security to the Architecture of Presence Servers

Providing Security to the Architecture of Presence Servers Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,

More information

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network K. Aravindha 1, A. Senthil Kumar 2 Research Scholar, Asst. Professor, Dept. of Computer Science, Tamil university,

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Framework For Cloud Computing Networks Pdf

Framework For Cloud Computing Networks Pdf A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu

More information

Capacity Assurance in Hostile Networks

Capacity Assurance in Hostile Networks PhD Dissertation Defense Wednesday, October 7, 2015 3:30 pm - 5:30 pm 3112 Engineering Building Capacity Assurance in Hostile Networks By: Jian Li Advisor: Jian Ren ABSTRACT Linear network coding provides

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

IEEE Access Special Section Editorial. Yan, Zheng.

IEEE Access Special Section Editorial. Yan, Zheng. https://helda.helsinki.fi IEEE Access Special Section Editorial Yan, Zheng 2018 Yan, Z, Wang, H, Yang, L T & Niemi, V 2018, ' IEEE Access Special Section Editorial : Trust Management in Pervasive Social

More information

CURRICULUM VITAE. Hao MA

CURRICULUM VITAE. Hao MA CURRICULUM VITAE Hao MA Mailing Address: Room 101, HSH Engineering Buildings, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong. Contact Information: Mobile: (+852) 60898067 Email: hma@cse.cuhk.edu.hk

More information

AKIKO MANADA. The University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo, , JAPAN

AKIKO MANADA. The University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo, , JAPAN Curriculum Vitæ AKIKO MANADA The University of Electro-Communications 1-5-1, Chofugaoka, Chofu, Tokyo, 182-8585, JAPAN Email: amanada@uec.ac.jp WORK EXPERIENCE Assistant Professor: February 2012 Present

More information

Wireless Networks. Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada

Wireless Networks. Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada Wireless Networks Series Editor: Xuemin (Sherman) Shen University of Waterloo, Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Rongxing Lu Privacy-Enhancing

More information

Nomair A. Naeem. Personal Data. Education. Teaching Experience. Course Instructor/Sessional

Nomair A. Naeem. Personal Data. Education. Teaching Experience. Course Instructor/Sessional Nomair A. Naeem Personal Data Address: E-mail: Web Page: David R. Cheriton School of Computer Science University of Waterloo 200 University Avenue West Waterloo, ON N2L 3G1, Canada nanaeem@uwaterloo.ca

More information

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research: Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Cooperative Data Dissemination via Roadside WLANs

Cooperative Data Dissemination via Roadside WLANs Cooperative Data Dissemination via Roadside WLANs 1 Hao Liang and Weihua Zhuang Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1 Email: {h8liang,

More information

Blind Signature Scheme Based on Elliptic Curve Cryptography

Blind Signature Scheme Based on Elliptic Curve Cryptography Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,

More information

Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks

Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks Khaled Rabieh 1, Mohamed Mahmoud 1, Ambareen Siraj 2, and Jelena Misic 3 1 Department of

More information

TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks

TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks 2017 31st International Conference on Advanced Information Networking and Applications Workshops TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks JunSik Jeong, Yiwen

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach Jianbing Ni, Xiaodong Lin, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University

More information

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding. Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education

More information

Multi-Method Data Delivery for Green Sensor-Cloud

Multi-Method Data Delivery for Green Sensor-Cloud Green Communications and Computing Multi-Method Data Delivery for Green Sensor-Cloud Chunsheng Zhu, Victor C. M. Leung, Kun Wang, Laurence T. Yang, and Yan Zhang The authors discuss the potential applications

More information

3715 McClintock Ave, GER 240, Los Angeles, CA 90089

3715 McClintock Ave, GER 240, Los Angeles, CA 90089 Meisam Razaviyayn Contact Information razaviya@usc.edu 3715 McClintock Ave, GER 240, Los Angeles, CA 90089 Homepage Google scholar profile Research Interests Appointments Design and study of efficient

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

Stanford University Packing and Padding, Coupled Multi-index for Accurate Image Retrieval.

Stanford University Packing and Padding, Coupled Multi-index for Accurate Image Retrieval. Liang Zheng Nationality: China Information Systems Technology and Design pillar Singapore University of Technology and Design 8 Somapah Road Singapore 487372 Date of Birth: 11 Jun 1987 Phone: +65 84036274

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Call for Papers for Ad-hoc and Sensor Networking Symposium

Call for Papers for Ad-hoc and Sensor Networking Symposium Call for Papers for Ad-hoc and Sensor Networking Symposium Scope and Motivation: An ad hoc network is a system of wireless nodes dynamically self-organizing in arbitrary and temporary network topologies.

More information

Speech in Mobile and Pervasive Environments

Speech in Mobile and Pervasive Environments Speech in Mobile and Pervasive Environments Wiley Series on Wireless Communications and Mobile Computing Series Editors: Dr Xuemin (Sherman) Shen, University of Waterloo, Canada Dr Yi Pan, Georgia State

More information

Imani Palmer ipalmer2.web.engr.illinois.edu

Imani Palmer ipalmer2.web.engr.illinois.edu Imani Palmer ipalmer2@illinois.edu ipalmer2.web.engr.illinois.edu 240.676.7741 Research Interest Education Cyber Security, System Security, Real-Time Streaming Engines, Data Analysis University of Illinois

More information

DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION

DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION 1 VARALATCHOUMY.M, 2 PRATEEK. S. BHARADWAJ, 3 R. ROHITH, 4 NAGACHANDRA. K. P, 5 PRAVEEN. M

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Mai Abdelhakim PROFESSIONAL EXPERIENCE

Mai Abdelhakim PROFESSIONAL EXPERIENCE Mai Abdelhakim School of Computing & Information, University of Pittsburgh 610 IS Building, 135 N. Bellefield Ave, PA 15260, USA Email: maia@pitt.edu, Phone: 412-624-9331 EDUCATION PhD, Electrical Engineering

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority

Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority Securable Message Authentication System in Vehicular Ad Hoc Networks by using Trusted Authority Ranjitha. P Final Year M.Tech CSE, Vedavyasa Institute of Technology,Calicut Abstract The number of automobiles

More information

Amy Babay November Doctor of Philosophy in Computer Science September 2018

Amy Babay November Doctor of Philosophy in Computer Science September 2018 Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education November 2018 Doctor of Philosophy in Computer Science September 2018 Thesis: Timely, Reliable, and Cost-Effective Internet Transport

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Sherenaz Waleed Al-Haj Baddar

Sherenaz Waleed Al-Haj Baddar Sherenaz Waleed Al-Haj Baddar s.alhajbaddar@gmail.coms.baddar@ju.edu.jo Personal Information Nationality: Jordanian Current Employer: King Abdullah II School for Information Technology, The University

More information

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information

More information

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt. AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Amy Babay April 2018

Amy Babay April 2018 Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable

More information

MAURICE J. KHABBAZ, PH.D. ASSISTANT PROFESSOR

MAURICE J. KHABBAZ, PH.D. ASSISTANT PROFESSOR MAURICE J. KHABBAZ, PH.D. ASSISTANT PROFESSOR maurice.khabbaz@gmail.com (+961) 71 400 411 www.linkedin.com/in/mauricekhabbaz/ PORTFOLIO Maurice Khabbaz has graduated from the Lebanese American University

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613)

30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613) 30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613) 907-6109 http://www.sce.carleton.ca/~ufarooq ufarooq@sce.carleton.ca Umar FAROOQ Research Interests Distributed Systems, Large-Scale Multi-Organizational

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

Decentralized Access Control of Data Stored In Cloud Using Encryption

Decentralized Access Control of Data Stored In Cloud Using Encryption Decentralized Access Control of Data Stored In Cloud Using Encryption Mahjabeen PG Scholar, Computer Science and Engineering, Bheema institute of Technology and Science, ABSTRACT: We propose a new decentralized

More information