- Vehicular Ad Hoc Networks (VANETs)
- Wireless Networks and Protocols
- Indoor and Outdoor Localization Technologies
- Security and Verification in Computing
- Mobile Crowdsensing and Crowdsourcing
- Cognitive Functions and Memory
- Advanced Wireless Network Optimization
- Millimeter-Wave Propagation and Modeling
- Network Time Synchronization Technologies
- Advanced MIMO Systems Optimization
- User Authentication and Security Systems
- Autonomous Vehicle Technology and Safety
- Air Traffic Management and Optimization
- Mobile Ad Hoc Networks
- Speech and Audio Processing
- Adversarial Robustness in Machine Learning
- Cooperative Communication and Network Coding
- Forensic Toxicology and Drug Analysis
- Numerical methods in inverse problems
- Software-Defined Networks and 5G
- Advanced Multi-Objective Optimization Algorithms
- Anomaly Detection Techniques and Applications
- Distributed Sensor Networks and Detection Algorithms
- Auction Theory and Applications
- Smart Grid Security and Resilience
Yanshan University
2024
University of Washington
2015-2021
Chinese University of Hong Kong
2013
Clemson University
1996
Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN). These protocols were designed under assumption separating communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries able infiltrate network. Motivated these attacks, intrusion detection systems (IDSs) have...
It is a promising vision to utilize white spaces, i.e., vacant VHF and UHF TV channels, satisfy skyrocketing wireless data demand in both outdoor indoor scenarios. While most prior works have focused on exploring the story largely open for investigation. Motivated by this observation that 70% of spectrum comes from environments, we carry out comprehensive study spaces. We first present large-scale measurement occupancy 30+ diverse locations typical metropolis Hong Kong. Our results confirm...
This paper presents a new masquerade attack called the cloaking and provides formal analyses for clock skew-based intrusion detection systems (IDSs) that detect attacks in controller area network (CAN) automobiles. In attack, adversary manipulates message inter-transmission times of spoofed messages by adding delays so as to emulate desired skew avoid detection. order predict characterize impact terms success probability on given CAN bus IDS, we develop models two IDSs, i.e.,...
The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages increasingly congested airspace. It provides accurate aircraft localization and efficient air traffic management also improves safety billions current future passengers. While benefits ADS-B are well known, lack basic security measures like encryption authentication introduces various exploitable vulnerabilities. One practical threat...
Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude operations using insecure Controller Area Network (CAN) bus in Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and safety passengers is at risk. In this paper, we present TACAN (Transmitter Authentication CAN), which provides secure authentication ECUs by...
The paradigm of shared spectrum allows secondary devices to opportunistically access bands underutilized by primary owners. Recently, the FCC has targeted sharing 3.5 GHz (3550-3700 MHz) federal with commercial systems such as small cells. rules require a system (SAS) accommodate three service tiers: 1) incumbent access; 2) priority (PA); and 3) generalized authorized (GAA). In this paper, we study SAS-assisted dynamic channel assignment (CA) for PA GAA tiers. We introduce node-channel-pair...
White Space Networking crucially relies on the active monitoring of spectrum usage (to identify white space opportunities) in both and time. One way to achieve this is wide-area deployment sensors gather spatio-temporal data, use them construct better Radio Environment Maps (REMs) via suitable statistical interpolation techniques (i.e., Kriging). Cost such large-scale sensor can be reduced crowdsourcing, i.e., outsourcing sensing task mobile users equipped with sensorized high-end client...
Per FCC rules, secondary users in TV White Spaces must operate only within spectrum subject to a no-harmful-interference condition existing primary receivers. In effect, this translates into protection region around every transmitter, wherein nodes not transmit (on the same channel). This is implemented by requiring consult database prior any channel access so as obtain local prohibited channels/spatial zones (or equivalently free channels or Spaces). Construction of such regions for...
Networking on white spaces (i.e., locally unused spectrum) relies active monitoring of spectrum usage. Spectrum databases based empirical radio propagation models are widely adopted but shown to be error-prone, since they do not account for built environments (e.g., trees and man-made buildings). As an alternative, crowd-sensed mapping by mobile clients who acquire local data transmit it a central aggregator (platform) processing, results in more accurate maps. Success such crowd-sensing...
The paradigm of shared spectrum allows secondary devices to opportunistically access bands underutilized by primary owners. As the first step, FCC targeted sharing 3.5 GHz (3550-3700 MHz) federal with commercial systems. proposed rules require a Spectrum Access System implement three-tiered management framework, and one its key functions is dynamic channel allocation (CA) for devices. In this paper, we introduce coexistence-aware radio-channel-pair conflict graphs capture pairwise...
It is a promising vision to exploit white spaces , that is, vacant VHF and UHF TV channels, meet the rapidly growing demand for wireless data services in both outdoor indoor scenarios. While most prior works have focused on space, story largely open investigation. Motivated by this observation discovering 70% of spectrum comes from environment, we carry out comprehensive study explore spaces. We first conduct large-scale measurement compare occupancy at 30+ diverse locations typical...
In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to widespread use legacy in-vehicle communication systems. As a representative bus system, Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial for vehicles functioning. this scenario, malicious actors can exploit CAN vulnerabilities, such as lack built-in authentication and encryption schemes, launch attacks (e.g., suspension, injection, masquerade attacks)...
White Space (WS) Networking crucially relies on the active monitoring of spatio-temporal spectrum usage (to identify WS opportunities). To achieve this, one way is to gather data via wide-area sensor deployment and construct better Radio Environment Maps (REMs) with spatial models such as Kriging Gaussian Process (GP). An economically viable alternative incentivized crowdsourcing, i.e., outsourcing sensing tasks mobile users who have sensorized high-end client devices like tablets or...
Coexistence of Wi-Fi and LTE Unlicensed (LTE-U) in shared or unlicensed bands has drawn growing attention from both academia industry. An important consideration is fairness between duty cycled LTE-U, which often defined terms channel access time, as adopted by the LTE-U Forum. Despite many studies on cycle adaptation design for fair sharing, one crucial fact been neglected: systems unilaterally control cycles; hence, selfinterested users, they have incentives to misbehave, e.g.,...
The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages increasingly congested airspace. It provides accurate aircraft localization and efficient air traffic management also improves safety billions current future passengers. While benefits ADS-B are well known, lack basic security measures like encryption authentication introduces various exploitable vulnerabilities. One practical threat...
Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude operations using insecure Controller Area Network (CAN) bus in Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and safety passengers is at risk. In this paper, we present TACAN (Transmitter Authentication CAN), which provides secure authentication ECUs by...
Traditional LiDAR and air-medium-based single-photon struggle to perform effectively in high-scattering environments. The laser beams are subject severe medium absorption multiple scattering phenomena such conditions, greatly limiting the maximum operational range imaging quality of system. high sensitivity temporal resolution enable high-resolution depth information acquisition under limited illumination power, making it highly suitable for operation environments with extremely poor...
Coexistence of Wi-Fi and LTE Unlicensed (LTE-U) in shared or unlicensed bands has drawn growing attention from both academia industry. An important consideration is fairness between duty cycled LTE-U, which often defined terms channel access time, as adopted by the LTE-U Forum. Despite many studies on cycle adaptation design for fair sharing, one crucial fact been neglected: systems unilaterally control cycles; hence, self- interested users, they have incentives to misbehave, e.g.,...
Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN). These protocols designed under the assumption separating communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries were able infiltrate network. Motivated these attacks, intrusion detection systems (IDSs) have...