- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- Security and Verification in Computing
- Indoor and Outdoor Localization Technologies
- Opportunistic and Delay-Tolerant Networks
- Cryptography and Data Security
- Advanced Steganography and Watermarking Techniques
- Blockchain Technology Applications and Security
- Network Traffic and Congestion Control
- Digital and Cyber Forensics
- Spam and Phishing Detection
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Bluetooth and Wireless Communication Technologies
- Energy Efficient Wireless Sensor Networks
- Underwater Vehicles and Communication Systems
- Biometric Identification and Security
- IoT-based Smart Home Systems
- Vehicular Ad Hoc Networks (VANETs)
- Robotics and Sensor-Based Localization
University of Massachusetts Lowell
2015-2025
Fujian Agriculture and Forestry University
2024
University of Central Florida
2017-2024
Princeton University
2023
University of Massachusetts Boston
2022
Boston University
2019
University of Victoria
2018
University of Macau
2015
Dalian Maritime University
2014
Xi'an Jiaotong University
2013
Big data is considered to be the key unlocking next great waves of growth in productivity. The amount collected our world has been exploding due a number new applications and technologies that permeate daily lives, including mobile social networking applications, Internet Thing-based smart-world systems (smart grid, smart transportation, cities, so on). With exponential data, how efficiently utilize becomes critical issue. This calls for development big market enables efficient trading. Via...
With the rapid development of Internet Things, more and small devices are connected into for monitoring control purposes. One such type devices, smart plugs, have been extensively deployed worldwide in millions homes home automation. These however, would pose serious security problems if their vulnerabilities were not carefully investigated. Indeed, we discovered that some popular plugs severe which could be fixed but unfortunately left open. In this paper, case study a plug system known...
Law enforcement agencies need the ability to conduct electronic surveillance combat crime, terrorism, or other malicious activities exploiting Internet. However, proliferation of anonymous communication systems on Internet has posed significant challenges providing such traceback capability. In this paper, we develop a new class flow marking technique for invisible based direct sequence spread spectrum (DSSS), utilizing pseudo-noise (PN) code. By interfering with sender's traffic and...
Location-based services (LBS) have become an immensely valuable source of real-time information and guidance. Nonetheless, the potential abuse users' sensitive personal data by LBS server is evolving into a serious concern. Privacy concerns in exist on two fronts: location privacy query privacy. In this paper we investigate issues related to particular, aim prevent from correlating service attribute, e.g., bar/tavern, user's real-world identity. Location obfuscation using spatial...
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal to effectively detect intruders that attempt penetrate the region of interest. A barrier formed by connected cluster across entire deployed region, acting as "trip wire" any crossing intruders. In this paper we study how efficiently improve using mobile sensors with limited mobility. After initial deployment, can move desired locations connect other order...
In transportation-based cyberphysical systems (TCPS), also known as intelligent transportation (ITS), to increase traffic efficiency, a number of dynamic route guidance schemes have been designed assist drivers in determining optimal routes for their travels. To determine routes, it is critical effectively predict the condition roads along guided based on real-time information collected by vehicular networks mitigate congestion and improve efficiency. this paper, we propose Dynamic En-route...
We address issues related to privacy protection in location-based services (LBS). Most existing research this field either requires a trusted third-party (anonymizer) or uses oblivious protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring while being highly efficient terms time space complexities. The problem has two interesting challenging characteristics: First, the degree LBS accuracy depends context,...
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order hide the of users, many pack application data into equal-sized cells (e.g., 512 bytes Tor, a known real-world, circuit-based network). this paper, we investigate new cell counter based attack against which allows attacker confirm relationship among users very quickly. attack, by marginally varying in target traffic at malicious exit onion router,...
In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements into controller through compromised sensor nodes, which not only threaten security of system, but also consume network resources. To deal with this issue, a number en-route filtering schemes have been designed for wireless networks. However, these either lack resilience to nodes or depend on statically configured routes and node localization, are suitable CPNS. paper, we propose Polynomial-based...
In this paper, we introduce a novel computer vision based attack that automatically discloses inputs on touch-enabled device while the attacker cannot see any text or popup in video of victim tapping touch screen. We carefully analyze shadow formation around fingertip, apply optical flow, deformable part-based model (DPM), k-means clustering and other techniques to locate touched points. Planar homography is then applied map estimated points reference image software keyboard keys....
Today's mobile smartphones are very powerful, and many smartphone applications use wireless multimedia communications. Mobile phone security has become an important aspect of issues in As the most popular operating system, Android been extensively studied by researchers. However, few works have security. In this article, we focus on related to cameras. Specifically, discover several new attacks that based We implement real phones, demonstrate feasibility effectiveness attacks. Furthermore,...
2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier adoption-almost every camera-enabled smartphone can scan barcodes. As an alternative NFC technology, been increasingly used for security-sensitive applications including payments and personal identification. However, security of barcode-based communication has not systematically studied. Due visual nature, are subject eavesdropping when they displayed on screens....
In this paper, we present an end-to-end view of IoT security and privacy a case study. Our contribution is twofold. First, our system can guide risk assessment design system. We identify 10 basic functionalities that are related to privacy. Based on view, systematically requirements in terms system, software, networking big data analytics the cloud. Second, using privacy, vulnerability analysis Edimax IP camera first exploit have identified various attacks fully control all cameras from...
In this paper, we present theory and a design of the online double auction for trading energy within smart grid with microgrids (MGs). The has potential to enable allocation surplus electricity MGs that need highest gain in real-time market. Nonetheless, two critical issues remain challenging when designing an effective scheme such system. First, as agents are allowed arrive depart at any time, auctioneer needs make decisions without information further bids asks. Second, economic properties...
Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present new class of attack, replay against Tor. Compared with other existing attacks, attack can confirm relationships quickly and accurately poses serious threat malicious entry onion router duplicates cells stream from sender. The original cell duplicate traverse middle routers arrive at an exit along circuit. Since uses counter mode AES (AES-CTR)...
Oily residues left by tapping fingers on a touch screen may breach user privacy. In this paper, we introduce the fingerprint attack against touch-enabled devices. We dust surface to reveal fingerprints, and use an iPhone camera carefully photograph fingerprints while striving remove virtual image of phone from image. then sharpen in via various processing techniques design effective algorithms automatically map keypad order infer tapped passwords. Extensive experiments were conducted iPad,...
<?Pub Dtl=""?> Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order hide the of users, most pack application data into equal-sized cells (e.g., 512 B Tor, a known real-world, circuit-based, network). Via extensive experiments on we found that size IP packets in network can be very dynamic because cell is an concept layer may repack cells. Based this finding, investigate new cell-counting-based...
In this paper, we address the issue of demand response (DR) in microgrids via vehicle-to-vehicle technology smart grid with consideration for location privacy protection supported by Internet Vehicles. To enable effective DR, online double auction is a viable approach to support energy trading between electric vehicles (EVs) that have surplus or insufficient energy, while utility each participant can be considered. Nonetheless, there are three primary challenges designing such an approach....
Crowdsourcing is a technology with the potential to revolutionize large-scale data gathering in an extremely cost-effective manner. It provides unprecedented means of collecting from physical world, particularly through use modern smartphones, which are equipped high-resolution cameras and various micro-electrical sensors. In this paper, we address critical task reconstructing indoor interior view building crowdsourced data. We propose, design, prototype IndoorCrowd2D, smartphone-empowered...
In an intelligence transportation system (ITS), to increase traffic efficiency, a number of dynamic route guidance schemes have been designed assist drivers in determining the optimal for their travels. order determine routes, it is critical effectively predict condition roads along guided routes based on real-time information mitigate congestion and improve efficiency. this paper, we propose Dynamic En-route Decision Route (DEDR) scheme road caused by sudden vehicles reduce travel time....
IoT security and privacy has raised grave concerns. Efforts have been made to design tools identify understand vulnerabilities of systems. Most the existing protocol analysis techniques rely on a well understanding underlying communication protocols. In this article, we systematically present first manual reverse engineering framework for discovering protocols embedded Linux-based We successfully applied our engineer number As an example, detailed use WeMo smart plug by extracting firmware...
The rapidly expanding Internet of Things (IoT) landscape is shifting toward cloudless architectures, removing reliance on centralized cloud services but exposing devices directly to the internet and increasing their vulnerability cyberattacks. Our research revealed an unexpected pattern substantial Tor network traffic targeting IoT devices. suggesting that attackers are using anonymously exploit undisclosed vulnerabilities (possibly obtained from underground markets). To delve deeper into...