- Network Security and Intrusion Detection
- Information and Cyber Security
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Software Engineering Research
- Software-Defined Networks and 5G
- Access Control and Trust
- Digital and Cyber Forensics
- Galaxies: Formation, Evolution, Phenomena
- Smart Grid Security and Resilience
- Advanced Software Engineering Methodologies
- Software System Performance and Reliability
- Adversarial Robustness in Machine Learning
- Astronomy and Astrophysical Research
- Data Quality and Management
- Cloud Computing and Resource Management
- Mobile Ad Hoc Networks
- Software Reliability and Analysis Research
- Privacy, Security, and Data Protection
- Advanced Database Systems and Queries
- Stellar, planetary, and galactic studies
Shanghai Jiao Tong University
2025
Concordia University
2015-2024
Concordia University
2006-2024
SRON Netherlands Institute for Space Research
2019-2024
University of Groningen
2019-2024
Southeast University
2024
Xi'an University of Architecture and Technology
2023
University of Milan
2022
Polytechnique Montréal
2022
University of Pittsburgh
2022
The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent leaks in the cloud. A key challenge to designing such encryption schemes lies efficient management keys. desired flexibility any group selected documents demands keys be used for documents. However, this also implies necessity securely distributing a large number both and search, those will have store received keys, submit an equally keyword...
Attribute based access control (ABAC) grants accesses to services on the attributes possessed by requester. Thus, ABAC differs from traditional discretionary model replacing subject a set of and object in matrix. The former is appropriate an identity-less system like Internet where subjects are identified their characteristics, such as those substantiated certificates. These can be modeled attribute sets. latter because most users not privy method names residing remote servers. sets service...
Given the increasing dependence of our societies on networked information systems, overall security these systems should be measured and improved. Existing metrics have generally focused measuring individual vulnerabilities without considering their combined effects. Our previous work tackle this issue by exploring causal relationships between encoded in an attack graph. However, evolving nature networks has largely been ignored. In paper, we propose a Dynamic Bayesian Networks (DBNs)-based...
Given the increasing dependence of our societies on information systems, overall security these systems should be measured and improved. Existing work generally focuses measuring individual vulnerabilities instead their combined effects. Recent research has explored application attack graphs probabilistic metrics to address this challenge. However, such usually assumes independently distributed combines them in an arbitrary manner. They cannot more realistic cases, as exploiting one...
By enabling a direct comparison of different security solutions with respect to their relative effectiveness, network metric may provide quantifiable evidences assist practitioners in securing computer networks. However, research on metrics has been hindered by difficulties handling zero-day attacks exploiting unknown vulnerabilities. In fact, the risk vulnerabilities considered as something unmeasurable due less predictable nature software flaws. This causes major difficulty metrics,...
Diversity has long been regarded as a security mechanism for improving the resilience of software and networks against various attacks. More recently, diversity found new applications in cloud computing security, moving target defense, robustness network routing. However, most existing efforts rely on intuitive imprecise notions diversity, few models are mostly designed single system running diverse replicas or variants. At higher abstraction level, global property entire network, its effect...
In measuring the overall security of a network, crucial issue is to correctly compose measure individual components. Incorrect compositions may lead misleading results. For example, network with less vulnerabilities or more diversified configuration not necessarily secure. To obtain correct measures, we need first understand interplay between how can be combined by attackers in advancing an intrusion. Such understanding becomes possible recent advances modeling using attack graphs. Based on...
In this paper, we study leader election in the presence of selfish nodes for intrusion detection mobile ad hoc networks (MANETs). To balance resource consumption among all and prolong lifetime an MANET, with most remaining resources should be elected as leaders. However, there are two main obstacles achieving goal. First, without incentives serving others, a node might behave selfishly by lying about its avoiding being elected. Second, electing optimal collection leaders to minimize overall...
Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number sensors in network. In node replication attack, take advantage credentials compromised surreptitiously introduce replicas into Without effective efficient detection mechanism, these be used launch variety attacks undermine many applications protocols. this paper, we present novel distributed approach called Localized Multicast for detecting attacks. The...
A critical aspect of malware forensics is authorship analysis. The successful outcome such analysis usually determined by the reverse engineer's skills and volume complexity code under To assist engineers in a tedious error-prone task, it desirable to develop reliable automated tools for supporting practice attribution. In recent work, machine learning was used rank select syntax-based features as n-grams flow graphs. experimental results showed that top ranked were unique each author, which...
The capability of efficiently recognizing reused functions for binary code is critical to many digital forensics tasks, especially considering the fact that modern malware typically contain a significant amount borrowed from open source software packages. Such will not only improve efficiency reverse engineering, but also reduce odds common libraries leading false correlations between unrelated bases. In this paper, we propose SIGMA, technique identifying in by matching traces novel...
The smart grid frequently collects consumers' fine-grained power usage data through meters to facilitate various applications, such as billing, load monitoring, regional statistics, and demand response. However, the meter reading streams may also pose severe privacy threats consumers by leaking their appliances' ON/OFF status. In this paper, we first quantitatively measure information leakage with respect specific status from any stream, define a novel notion bound leakage. addition, propose...
We study stellar and black hole mass assembly in a sample of 42 infrared-luminous galaxy mergers at z<0.3 by combining results from radiative transfer modelling with archival measures molecular gas mass. The ratios mass, to each other are consistent those massive gas-rich galaxies z<0.3. advanced may show increased ratios, the transition AGN ellipticals implying substantial growth over course merger. Star formation rates enhanced relative local main sequence, factors ~100 starburst ~1.8...
Galaxy morphology is a powerful diagnostic to assess the realism of cosmological hydrodynamical simulations. Determining simulated galaxies requires generation synthetic images through 3D radiative transfer post-processing that properly accounts for different stellar populations and interstellar dust attenuation. We use SKIRT code generate TNG50-SKIRT Atlas, UV near-infrared broadband image atlas complete stellar-mass selected sample 1154 extracted from TNG50 simulation at z = 0. The have...