Ang Li

ORCID: 0000-0003-0298-9329
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • RFID technology advancements
  • Recommender Systems and Techniques
  • Music and Audio Processing
  • Data Mining Algorithms and Applications
  • Network Security and Intrusion Detection
  • Rough Sets and Fuzzy Logic
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Cloud Computing and Resource Management
  • Security in Wireless Sensor Networks
  • Caching and Content Delivery
  • Speech and Audio Processing
  • Advanced Data Storage Technologies
  • Interactive and Immersive Displays
  • Cloud Data Security Solutions
  • Educational Technology and Assessment
  • Advanced Graph Neural Networks
  • Sentiment Analysis and Opinion Mining
  • Speech Recognition and Synthesis
  • Imbalanced Data Classification Techniques
  • Wireless Communication Security Techniques
  • Software-Defined Networks and 5G
  • Network Packet Processing and Optimization

University of Michigan–Dearborn
2024

Dalian Maritime University
2024

North Minzu University
2022-2024

Guangzhou College of Commerce
2023

California State Polytechnic University
2023

Arizona State University
2018-2022

National University of Defense Technology
2015-2022

Anhui Jiyuan Software
2020

Beijing Ditan Hospital
2020

Capital Medical University
2020

Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user’s tapping rhythm. addition verifying card’s identification information as usual, backend server compares...

10.1109/infocom41043.2020.9155427 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user authentication, as tags can be easily stolen, lost, or cloned by attackers. This paper presents the design and evaluation of SmartRFID, a novel UHF system to promote commodity crypto-less for security-sensitive applications. SmartRFID explores extremely popular smart devices requires legitimate enroll his device along with tag. Besides authenticating tag usual, verifies whether simultaneously possesses...

10.1109/twc.2022.3226753 article EN IEEE Transactions on Wireless Communications 2022-12-12

The commonly used high utility itemsets mining method for massive data is the intelligent optimization algorithm. In this paper, WHO (Whale-Hawk Optimization) algorithm proposed by integrating harris hawk (HHO) with beluga whale (BWO) Additionally, a initialization strategy based on good point set proposed. This helps to guide search in initial phase and increase diversity of population, which turn improve convergence speed performance. By applying improved field mining, it provides new...

10.3233/jifs-236793 article EN Journal of Intelligent & Fuzzy Systems 2024-02-06

Cooperative spectrum sensing (CSS) adopted by spectrum-sensing providers (SSPs) plays a key role for dynamic access and is essential avoiding interference with licensed primary users (PUs). A typical SSP system consists of geographically distributed sensors which can be compromised to submit fake reports. In this paper, we propose SpecKriging, new spatial-interpolation technique based on Inductive Graph Neural Network Kriging (IGNNK) secure CSS. first pretrain graphical neural network (GNN)...

10.1109/twc.2022.3181064 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2022-06-14

Acinetobacter baumannii has become a major healthcare threat that causes nosocomial infections, especially in critically ill patients. The spread of carbapenem-resistant A. (CRAB) strains long been clinical concern. It is important to study the epidemiology and virulence characteristics different CRAB isolates order tailor infection prevention antibiotic prescribing. In this study, total 71 were collected hospital, infections analyzed. genomic phylogenetic relationships elucidated based on...

10.1080/21505594.2020.1856560 article EN cc-by Virulence 2020-12-01

Tag cloning and spoofing pose great challenges to RFID applications. This paper presents the design evaluation of RCID, a novel system fingerprint tags based on unique reflection coefficient each tag circuit. Based OFDM-based collector, our can quickly acquire verify tag's RCID which are independent reader measurement environment. Our applies COTS readers after firmware update at reader. Extensive prototyped experiments 600 confirm that is highly secure with authentication accuracy up 97.15%...

10.1109/infocom48880.2022.9796663 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02

Music listening is a commonplace activity that has transformed as users engage with online streaming platforms. When presented anytime, anywhere access to vast catalog of music, face challenges in searching for what they want hear. We propose who domain-specific search (e.g., music search) have different information-seeking needs than general search. Using mixed-method approach combines large-scale user survey behavior data analyses, we describe the construct mindset on leading platform and...

10.1145/3308558.3313627 article EN 2019-05-13

The Internet of Things (IoT) networks are finding massive applications in mission-critical contexts. A group key is needed to encrypt and authenticate broadcast/multicast messages commonly seen large-scale wireless networks. In this paper, we propose DroneKey, a novel drone-aided PHY-based Group-Key Generation (GKG) scheme for IoT drone dispatched fly along random 3D trajectories keep broadcasting standard signals refresh the keys whole network. Every device receives broadcast from which...

10.1145/3460120.3484789 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

The rapid growth of e-commerce platforms has resulted in an overwhelming abundance product information, leading to choice paralysis and information overload for users. To address these challenges enhance the user experience, intelligent recommendation system based on machine learning is proposed. This paper aims design implement such a platform information. Firstly, we review relevant theories technologies systems, including application Kafka message queues Lambda architecture, as well two...

10.1117/12.3013353 article EN 2023-11-29

Wireless home alarm systems are being widely deployed, but their security has not been well studied. Existing attacks on wireless exploit the vulnerabilities of networking protocols while neglecting problems arising from physical component IoT devices. In this paper, we present new event-eliminating and event-spoofing commercial by interfering with reed switch in almost all COTS sensors. both attacks, external adversary uses his own magnet to control state order either eliminate legitimate...

10.1109/infocom42981.2021.9488873 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2021-05-10

Secure and usable user authentication is the first line of defense against cyber attacks on smart end-user devices. Advanced hacking techniques pose severe threats to traditional systems based password/PIN/fingerprint. We propose MagAuth, a secure two-factor scheme with commercial off-the-shelf (COTS) wrist wearables magnetic strap bands enhance security usability password-based for mobile touchscreen In enrolls self-chosen unlock pattern or touch gesture into his device by performing it...

10.1109/tmc.2021.3072598 article EN IEEE Transactions on Mobile Computing 2021-04-12

Wireless networks of different technologies may interfere with each other when they are deployed at proximity. Such cross-technology interference (CTI) has become prevalent the surge IoT devices. In this paper, we exploit CTI in coexisting WiFi-Zigbee and propose DeepJam, a new stealthy jamming strategy, to jam Zigbee traffic. DeepJam relies on deep learning techniques capture temporal pattern past wireless traffic predict future By only victim's transmissions that not disrupted by CTI, can...

10.1109/tnet.2021.3082839 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2021-05-28

Nowadays many people store photos in smartphones. Many of the contain sensitive, private information, such as a photocopy driver's license and credit card. An arising privacy concern is with unauthorized accesses to by installed apps. Coarse-grained access control systems Android permission system offer all-or-nothing stored on smartphones, users are unaware exact behavior Our analysis finds that 82% top 200 free apps popular app have complete network user's smartphone, which indicates...

10.1109/pac.2018.00008 preprint EN 2018-09-01

The SSD is adopted to improve the IO performanceof storage system in data center, throughput allocation for clients a challenging problem. We need find method, which can determine allocations of on each server, while both providing fair and maximizing utilization resource entire center. In this paper, we propose an unified framework(UAF), UAF jointly allocates across allheterogeneous servers, achieve all maximize prove that satisfies fairness properties Envy Freedom, Sharing Incentive Pareto...

10.1109/hpcc-css-icess.2015.49 article EN 2015-08-01

This paper presents a denoising and dereverberation hierarchical neural vocoder (DNR-HiNet) to convert noisy reverberant acoustic features into clean speech waveforms. The DNR-HiNet is built by modifying the amplitude spectrum predictor (ASP) in original HiNet vocoder. modified ASP (DNR-ASP) can predict log spectra from input degraded features. To achieve this, DNR-ASP first predicts of speech, additive noise room impulse response (RIR) then performs initial signal processing algorithms....

10.1109/taslp.2022.3182268 article EN IEEE/ACM Transactions on Audio Speech and Language Processing 2022-01-01

With the development of cloud-based systems and applications, a number major technical firms have started to provide public cloud storage services, store user data in datacenters strategically positioned across Internet. However, when users private shared datacenters, they lose control over how are stored accessed. Multiple classes personnel may access physical media potentially read data. While strong cryptographic methods can protect files from unauthorized accesses, incur computational...

10.1109/csc.2011.6138512 article EN 2011-12-01

Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user's tapping rhythm. addition verifying card's identification information as usual, backend server compares...

10.1109/tnet.2022.3204204 article EN IEEE/ACM Transactions on Networking 2022-09-14

Population Based Training (PBT) is a recent approach that jointly optimizes neural network weights and hyperparameters which periodically copies of the best performers mutates during training. Previous PBT implementations have been synchronized glass-box systems. We propose general, black-box framework distributes many asynchronous "trials" (a small number training steps with warm-starting) across cluster, coordinated by controller. The design does not make assumptions on model...

10.48550/arxiv.1902.01894 preprint EN other-oa arXiv (Cornell University) 2019-01-01

GitHub has accumulated a great number of developers and open source projects. In this research, we utilize property graph model to explore complex relationships entities GitHub. We attempt answer three questions associated with using the dataset from MSR2014 data challenge. Firstly, propose based method find out cross technology background on Secondly define interesting metrics discrete entropy analyze project imbalance induced by commit action within software family. The results show that...

10.1109/fcst.2015.45 article EN 2015-08-01

Acoustic fingerprinting aims to identify a mobile device based on its internal microphone(s) and speaker(s) which are unique due manufacturing imperfection. This paper seeks thorough understanding of the (in)security exploring acoustic fingerprints for achieving distributed authentication. Our contributions threefold. First, we present new fingerprint-emulation attack demonstrate that it is common vulnerability authentication systems. Second, propose dynamic challenge-response defense secure...

10.1109/tmc.2021.3053282 article EN IEEE Transactions on Mobile Computing 2021-01-21

In the ever-evolving digital audio landscape, Spotify, well-known for its music and talk content, has recently introduced audiobooks to vast user base. While promising, this move presents significant challenges personalized recommendations. Unlike podcasts, audiobooks, initially available a fee, cannot be easily skimmed before purchase, posing higher stakes relevance of Furthermore, introducing new content type into an existing platform confronts extreme data sparsity, as most users are...

10.48550/arxiv.2403.05185 preprint EN arXiv (Cornell University) 2024-03-08
Coming Soon ...