- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- RFID technology advancements
- Recommender Systems and Techniques
- Music and Audio Processing
- Data Mining Algorithms and Applications
- Network Security and Intrusion Detection
- Rough Sets and Fuzzy Logic
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
- Cloud Computing and Resource Management
- Security in Wireless Sensor Networks
- Caching and Content Delivery
- Speech and Audio Processing
- Advanced Data Storage Technologies
- Interactive and Immersive Displays
- Cloud Data Security Solutions
- Educational Technology and Assessment
- Advanced Graph Neural Networks
- Sentiment Analysis and Opinion Mining
- Speech Recognition and Synthesis
- Imbalanced Data Classification Techniques
- Wireless Communication Security Techniques
- Software-Defined Networks and 5G
- Network Packet Processing and Optimization
University of Michigan–Dearborn
2024
Dalian Maritime University
2024
North Minzu University
2022-2024
Guangzhou College of Commerce
2023
California State Polytechnic University
2023
Arizona State University
2018-2022
National University of Defense Technology
2015-2022
Anhui Jiyuan Software
2020
Beijing Ditan Hospital
2020
Capital Medical University
2020
Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user’s tapping rhythm. addition verifying card’s identification information as usual, backend server compares...
Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user authentication, as tags can be easily stolen, lost, or cloned by attackers. This paper presents the design and evaluation of SmartRFID, a novel UHF system to promote commodity crypto-less for security-sensitive applications. SmartRFID explores extremely popular smart devices requires legitimate enroll his device along with tag. Besides authenticating tag usual, verifies whether simultaneously possesses...
The commonly used high utility itemsets mining method for massive data is the intelligent optimization algorithm. In this paper, WHO (Whale-Hawk Optimization) algorithm proposed by integrating harris hawk (HHO) with beluga whale (BWO) Additionally, a initialization strategy based on good point set proposed. This helps to guide search in initial phase and increase diversity of population, which turn improve convergence speed performance. By applying improved field mining, it provides new...
Cooperative spectrum sensing (CSS) adopted by spectrum-sensing providers (SSPs) plays a key role for dynamic access and is essential avoiding interference with licensed primary users (PUs). A typical SSP system consists of geographically distributed sensors which can be compromised to submit fake reports. In this paper, we propose SpecKriging, new spatial-interpolation technique based on Inductive Graph Neural Network Kriging (IGNNK) secure CSS. first pretrain graphical neural network (GNN)...
Acinetobacter baumannii has become a major healthcare threat that causes nosocomial infections, especially in critically ill patients. The spread of carbapenem-resistant A. (CRAB) strains long been clinical concern. It is important to study the epidemiology and virulence characteristics different CRAB isolates order tailor infection prevention antibiotic prescribing. In this study, total 71 were collected hospital, infections analyzed. genomic phylogenetic relationships elucidated based on...
Tag cloning and spoofing pose great challenges to RFID applications. This paper presents the design evaluation of RCID, a novel system fingerprint tags based on unique reflection coefficient each tag circuit. Based OFDM-based collector, our can quickly acquire verify tag's RCID which are independent reader measurement environment. Our applies COTS readers after firmware update at reader. Extensive prototyped experiments 600 confirm that is highly secure with authentication accuracy up 97.15%...
Music listening is a commonplace activity that has transformed as users engage with online streaming platforms. When presented anytime, anywhere access to vast catalog of music, face challenges in searching for what they want hear. We propose who domain-specific search (e.g., music search) have different information-seeking needs than general search. Using mixed-method approach combines large-scale user survey behavior data analyses, we describe the construct mindset on leading platform and...
The Internet of Things (IoT) networks are finding massive applications in mission-critical contexts. A group key is needed to encrypt and authenticate broadcast/multicast messages commonly seen large-scale wireless networks. In this paper, we propose DroneKey, a novel drone-aided PHY-based Group-Key Generation (GKG) scheme for IoT drone dispatched fly along random 3D trajectories keep broadcasting standard signals refresh the keys whole network. Every device receives broadcast from which...
The rapid growth of e-commerce platforms has resulted in an overwhelming abundance product information, leading to choice paralysis and information overload for users. To address these challenges enhance the user experience, intelligent recommendation system based on machine learning is proposed. This paper aims design implement such a platform information. Firstly, we review relevant theories technologies systems, including application Kafka message queues Lambda architecture, as well two...
Wireless home alarm systems are being widely deployed, but their security has not been well studied. Existing attacks on wireless exploit the vulnerabilities of networking protocols while neglecting problems arising from physical component IoT devices. In this paper, we present new event-eliminating and event-spoofing commercial by interfering with reed switch in almost all COTS sensors. both attacks, external adversary uses his own magnet to control state order either eliminate legitimate...
Secure and usable user authentication is the first line of defense against cyber attacks on smart end-user devices. Advanced hacking techniques pose severe threats to traditional systems based password/PIN/fingerprint. We propose MagAuth, a secure two-factor scheme with commercial off-the-shelf (COTS) wrist wearables magnetic strap bands enhance security usability password-based for mobile touchscreen In enrolls self-chosen unlock pattern or touch gesture into his device by performing it...
Wireless networks of different technologies may interfere with each other when they are deployed at proximity. Such cross-technology interference (CTI) has become prevalent the surge IoT devices. In this paper, we exploit CTI in coexisting WiFi-Zigbee and propose DeepJam, a new stealthy jamming strategy, to jam Zigbee traffic. DeepJam relies on deep learning techniques capture temporal pattern past wireless traffic predict future By only victim's transmissions that not disrupted by CTI, can...
Nowadays many people store photos in smartphones. Many of the contain sensitive, private information, such as a photocopy driver's license and credit card. An arising privacy concern is with unauthorized accesses to by installed apps. Coarse-grained access control systems Android permission system offer all-or-nothing stored on smartphones, users are unaware exact behavior Our analysis finds that 82% top 200 free apps popular app have complete network user's smartphone, which indicates...
The SSD is adopted to improve the IO performanceof storage system in data center, throughput allocation for clients a challenging problem. We need find method, which can determine allocations of on each server, while both providing fair and maximizing utilization resource entire center. In this paper, we propose an unified framework(UAF), UAF jointly allocates across allheterogeneous servers, achieve all maximize prove that satisfies fairness properties Envy Freedom, Sharing Incentive Pareto...
This paper presents a denoising and dereverberation hierarchical neural vocoder (DNR-HiNet) to convert noisy reverberant acoustic features into clean speech waveforms. The DNR-HiNet is built by modifying the amplitude spectrum predictor (ASP) in original HiNet vocoder. modified ASP (DNR-ASP) can predict log spectra from input degraded features. To achieve this, DNR-ASP first predicts of speech, additive noise room impulse response (RIR) then performs initial signal processing algorithms....
With the development of cloud-based systems and applications, a number major technical firms have started to provide public cloud storage services, store user data in datacenters strategically positioned across Internet. However, when users private shared datacenters, they lose control over how are stored accessed. Multiple classes personnel may access physical media potentially read data. While strong cryptographic methods can protect files from unauthorized accesses, incur computational...
Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user's tapping rhythm. addition verifying card's identification information as usual, backend server compares...
Population Based Training (PBT) is a recent approach that jointly optimizes neural network weights and hyperparameters which periodically copies of the best performers mutates during training. Previous PBT implementations have been synchronized glass-box systems. We propose general, black-box framework distributes many asynchronous "trials" (a small number training steps with warm-starting) across cluster, coordinated by controller. The design does not make assumptions on model...
GitHub has accumulated a great number of developers and open source projects. In this research, we utilize property graph model to explore complex relationships entities GitHub. We attempt answer three questions associated with using the dataset from MSR2014 data challenge. Firstly, propose based method find out cross technology background on Secondly define interesting metrics discrete entropy analyze project imbalance induced by commit action within software family. The results show that...
Acoustic fingerprinting aims to identify a mobile device based on its internal microphone(s) and speaker(s) which are unique due manufacturing imperfection. This paper seeks thorough understanding of the (in)security exploring acoustic fingerprints for achieving distributed authentication. Our contributions threefold. First, we present new fingerprint-emulation attack demonstrate that it is common vulnerability authentication systems. Second, propose dynamic challenge-response defense secure...
In the ever-evolving digital audio landscape, Spotify, well-known for its music and talk content, has recently introduced audiobooks to vast user base. While promising, this move presents significant challenges personalized recommendations. Unlike podcasts, audiobooks, initially available a fee, cannot be easily skimmed before purchase, posing higher stakes relevance of Furthermore, introducing new content type into an existing platform confronts extreme data sparsity, as most users are...