- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Cryptography and Data Security
- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Adversarial Robustness in Machine Learning
- Blockchain Technology Applications and Security
- Privacy, Security, and Data Protection
- Real-Time Systems Scheduling
- Distributed systems and fault tolerance
- Digital and Cyber Forensics
- Embedded Systems Design Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Healthcare Technology and Patient Monitoring
- Cloud Computing and Resource Management
- Image and Video Quality Assessment
- Access Control and Trust
- Video Coding and Compression Technologies
- Complexity and Algorithms in Graphs
- Speech and Audio Processing
- Digital Media Forensic Detection
- Internet Traffic Analysis and Secure E-voting
Washington University in St. Louis
2011-2025
Second Affiliated Hospital of Zhejiang University
2025
California Institute of Technology
2024
Hong Kong Polytechnic University
2024
University of Dubai
2024
Urumqi Vocational University
2023
Northeastern University
2023
University of Arizona
2020-2022
University of Windsor
2021
Texas A&M University – Corpus Christi
2020
Since the inception of Bitcoin, cryptocurrencies and underlying blockchain technology have attracted an increasing interest from both academia industry. Among various core components, consensus protocol is defining behind security performance blockchain. From incremental modifications Nakamoto to innovative alternative mechanisms, many protocols been proposed improve network itself or accommodate other specific application needs. In this survey, we present a comprehensive review analysis on...
In today's digital era, the security of networked systems is utmost importance amidst increasing prevalence cyber threats and sophisticated intrusion techniques. This paper addresses critical need for robust network detection (NIDS) in landscape, escalating threats. Leveraging a dataset derived from simulated military environment, we explore various scenarios encountered warfare. Reviewing existing literature reveals spectrum methodologies, including anomaly-based deep learning approaches....
Android system provides application developers with the ability to define custom permissions, which serve regulate sharing of resources and functionalities other applications. However, developers' improper development practices can render permission mechanism ineffective, facilitating easy exploitation by attackers. This paper presents a comprehensive examination problematic surrounding permissions employed developers, referred as Bad Practices Custom Permissions (BPCP issues). To accomplish...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in both academic research and commercial products protect sensitive code data a privileged, isolated execution environment. However, design of cannot prevent physical memory disclosure attacks such as cold boot attack from gaining unrestricted read access contents dynamic random (DRAM). A number system-on-chip (SoC) bound solutions have proposed thaw by storing only CPU registers, cache or...
Internet-of-Things IoT devices are increasingly targeted Uy adversaries due to their unique characteristics such as constant online connection, lack of protection, and full integration in people's daily life. As attackers shift targets towards devices, malware has been developed compromise equipped with different CPU architectures. While detection a well-studied area for desktop PCs, heterogeneous processor architecture brings challenges. Existing approaches utilize static or dynamic binary...
Embedded devices are becoming increasingly pervasive in safety-critical systems of the emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM TrustZone, have been widely deployed mobile platforms, little attention has given to deployment on real-time systems, which present a different set challenges compared applications. For autonomous drones or automobiles, current TEE paradigm, focuses only confidentiality and integrity, is insufficient. Computation these...
In the domain of e-commerce, customer reviews wield significant influence over business strategies. Despite existence various recommendation methodologies like collaborative filtering and deep learning, they often encounter difficulties in accurately analyzing sentiment semantics within feedback. Addressing these challenges head-on, this paper introduces BERTFusionDNN, a novel framework merging BERT for extracting textual features Deep Neural Network integrating numerical features. We assess...
As an important application of the Internet Things, many remote monitoring systems adopt a device-to-cloud network paradigm. In patient case, various resource-constrained devices are used to measure health conditions target in distant non-clinical environment and collected data sent cloud backend authorized care service for processing decision making. measurements involve private information, access control trustworthy confidential become very important. Software-based solutions that...
LiDAR-based perception is a central component of autonomous driving, playing key role in tasks such as vehicle localization and obstacle detection. Since the safety perceptual pipelines critical to safe number past efforts have investigated its vulnerability under adversarial perturbations raw point cloud inputs. However, most focused on investigating impact predictions (integrity), little has been done understand latency (availability), concern for real-time cyber-physical systems. We...
With the emergence of Internet Things, mobile devices are generating more network traffic than ever. TrustZone is a hardware-enabled trusted execution environment for ARM processors. While effective in providing much-needed memory isolation, we observe that it possible to derive secret information from secure world using cache contention, due its high-performance sharing design. In this work, propose TruSense study timing-based side-channel leakage TrustZone. can be launched not only normal...
Blockchain, the technology behind popular Bitcoin, is considered a "security by design" system as it meant to create security among group of distrustful parties yet without central trusted authority. The blockchain relies on premise honest-majority, namely, assumed be secure long majority consensus voting power honest. And in case proof-of-work (PoW) blockchain, adversaries cannot control more than 50% network's gross computing power. However, this threshold based analysis only, with...
With the emergence of low-cost smart and connected IoT devices, area cyber-physical security is becoming increasingly important. Past research has demonstrated new threat vectors targeting transition process between cyber physical domains, where attacker exploits sensing system as an attack surface for signal injection or extraction private information. Recently, there have been attempts to characterize abstracted model injection, but they primarily focus on path processing. This paper aims...
Automated monitoring of dark web (DW) platforms on a large scale is the first step toward developing proactive Cyber Threat Intelligence (CTI). While there are efficient methods for collecting data from surface web, large-scale collection often hindered by anti-crawling measures. In particular, text-based CAPTCHA serves as most prevalent and prohibiting type these measures in web. Text-based identifies blocks automated crawlers forcing user to enter combination hard-to-recognize alphanumeric...
The field of text-to-image generation has made remarkable strides in creating high-fidelity and photorealistic images. As this technology gains popularity, there is a growing concern about its potential security risks. However, been limited exploration into the robustness these models from an adversarial perspective. Existing research primarily focused on untargeted settings, lacks holistic consideration for reliability (attack success rate) stealthiness (imperceptibility). In paper, we...
Data sharing within psychiatric and behavioral research represents a novel application of ethical principles in practice; however, it suffers from dearth practical experience established norms. In this study, we comprehensively examined the considerations surrounding acquisition, management, sharing, utilization such data. We graded sensitive data suggest standards for privacy protection based on varying levels sensitivity. The objective study is to foster orderly standardized open data,...
With recent advances in communication and data storage technology, an explosive amount of information is being collected stored the Internet. Even though such vast presents great opportunities for knowledge discovery, organizations might not want to share their due legal or competitive reasons. This posts challenge mining while preserving privacy. Current efficient privacy-preserving algorithms are based on assumption that it acceptable release all intermediate results during operations....
With the growing importance of networked embedded devices in upcoming Internet Things, new attacks targeting OSes are emerging. ARM processors, which power over 60% devices, introduce a hardware security extension called TrustZone to protect secure applications an isolated world that cannot be manipulated by compromised OS normal world. LeveragingTrustZone technology, number memory integrity checking schemes have been proposed introspect malicious modification In this paper, we first...
The rapid development of deep neural networks and generative AI has catalyzed growth in realistic speech synthesis. While this technology great potential to improve lives, it also leads the emergence ''DeepFake'' where synthesized can be misused deceive humans machines for nefarious purposes. In response evolving threat, there been a significant amount interest mitigating threat by DeepFake detection.
In the era of ubiquitous intelligence, Internet Things (IoT) holds promise as a breakthrough technology to enable diverse applications that benefit societal problems. Yet interconnecting myriad heterogeneous IoT devices across various application domains remain security challenge. Decentralized has recently emerged powerful primitive in building distributed facilitate secure transactions between mutually distrustful parties trustworthy manner. Unfortunately, these decentralized protocols...
As the cost of human full genome sequencing continues to fall, we will soon witness a prodigious amount genomic data in public cloud. To protect confidentiality genetic information individuals, has be encrypted at rest. On other hand, encryption severely hinders use this valuable information, such as Genome-wide Range Query (GRQ), medical/genomic research. While problem secure range query on outsourced been extensively studied, current schemes are far from practical deployment terms...
With increasingly complex cyber attacks occurring every day, memory-based forensic techniques are becoming instrumental in digital investigations. Forensic examiners can unravel what happened on a system by acquiring and inspecting in-memory data. However, the foundation of this analysis be invalidated if memory acquisition has been altered. In paper, we study feasibility malicious software misusing architectural features to sabotage forensics. The misuse two features, namely, physical...
Elastic scheduling is a framework to reduce task utilizations (often by increasing periods) in response system overload. This paper extends elastic uniprocessor of implicit-deadline sets for which periods must remain harmonic. We argue that tasks with constrained continuous intervals, the problem selecting harmonic from those intervals unlikely have polynomial time solution. However, we outline an approach pseudo-polynomial range acceptable periods. then show NP-hard constraints....