Shang Gao

ORCID: 0000-0003-2692-057X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Software-Defined Networks and 5G
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Advanced Steganography and Watermarking Techniques
  • User Authentication and Security Systems
  • Spam and Phishing Detection
  • Green IT and Sustainability
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Digital Media Forensic Detection
  • Indoor and Outdoor Localization Technologies
  • DNA and Biological Computing
  • IPv6, Mobility, Handover, Networks, Security
  • Video Surveillance and Tracking Methods
  • Context-Aware Activity Recognition Systems
  • Privacy, Security, and Data Protection
  • Wireless Communication Security Techniques
  • Robotics and Sensor-Based Localization
  • Digital and Cyber Forensics
  • Information and Cyber Security

Hong Kong Polytechnic University
2016-2025

Shandong University of Science and Technology
2020

China Southern Power Grid (China)
2015

Southeast University
2012

Software (Spain)
2008

Wuhan University
2008

Advanced artificial intelligence techniques, such as federated learning, has been applied to broad areas, e.g., image classification, speech recognition, smart city, and healthcare. Despite intensive research on existing schemes are vulnerable attacks can hardly meet the security requirements for real-world applications. The problem of designing a secure learning framework ensure correctness training procedure not sufficiently studied remains open. In this paper, we propose VFChain,...

10.1109/tnse.2021.3050781 article EN IEEE Transactions on Network Science and Engineering 2021-01-13

The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage network traffic. However, SDN will experience long packet delay loss rate when the communication link between two is jammed by SDN-aimed DoS attacks massive table-miss packets. In this paper, we propose FloodDefender, an efficient protocol-independent defense framework for SDN/OpenFlow networks mitigate attacks. It stands controller platform other apps,...

10.1109/infocom.2017.8057009 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

The introduction of software-defined networking (SDN) has emerged as a new network paradigm for innovations. By decoupling the control plane from data in traditional networks, SDN provides high programmability to and manage networks. However, communication between two planes can be bottleneck whole network. SDN-aimed DoS attacks cause long packet delay loss rate by using massive table-miss packets jam links planes. To detect mitigate attacks, this paper presents FloodDefender, an efficient...

10.1109/tnet.2020.2983976 article EN IEEE/ACM Transactions on Networking 2020-04-15

Many efforts have been devoted to the development of efficient Network Intrusion Detection System (NIDS) using machine learning approaches in Software-defined (SDN). Unfortunately, existing solutions failed detect real-time and zero-day attacks due their limited throughput prior knowledge-based detection. To this end, we propose Griffin, a NIDS that uses unsupervised expertise both known intrusion with high accuracy. Specifically, Griffin an feature extraction framework capture sequential...

10.1109/tnsm.2022.3175710 article EN IEEE Transactions on Network and Service Management 2022-05-17

SDN has enabled extensive network programmability and speedy innovations by decoupling the control plane from data plane. However, separation of two planes could also be a potential threat to whole network. Previous approaches pointed out that attackers can launch various attacks against SDN, such as DoS attacks, topology poisoning side-channel attacks. To address security issues, we present comprehensive study in propose FlowKeeper, common framework build robust different FlowKeeper...

10.1109/mnet.2018.1700283 article EN IEEE Network 2018-02-07

Information about vehicle safety, such as the driving safety status and road index, is of great importance to protect humans support safe route planning. Despite some research on analysis, accuracy granularity assessment are both very limited. Also, problem precisely dynamically predicting throughout a city has not been sufficiently studied remains open. With proliferation sensor-equipped vehicles smart devices, huge amount mobile sensing data provides an opportunity conduct analysis. In...

10.1109/mnet.2018.1700389 article EN IEEE Network 2018-07-01

Mining attacks allow attackers to gain an unfair share of the mining reward by deviating from honest strategy in Bitcoin system. Among most well-known are block withholding (BWH), fork after (FAW), and selfish mining. In this paper, we propose two new strategies: power adjusting bribery racing, introduce novel attacks, Power Adjusting Withholding (PAW) Bribery Selfish (BSM) adopting strategies. Both can increase attackers. Furthermore, show PAW avoid "miner's dilemma" BWH attacks. BSM...

10.1145/3319535.3354203 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

With the advancement of medical science, implementation Electronic Medical Records (EMRs) for enhancing efficiency and reliability healthcare services has become a widespread phenomenon. However, EMRs are stored in hospitals institutions independently, leading to sharing challenges. Moreover, highly sensitive prone be tampered with abused, posing privacy security threats. To address aforementioned issues, we propose an Anti- Quantum Attribute-based Signature(AQ — ABS) Secure Sharing...

10.1109/wcnc51071.2022.9771830 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2022-04-10

The Domain Name System (DNS) plays a crucial role in the Internet. However, it is vulnerable to many attacks such as cache poisoning attack and DDoS attack. Though some countermeasures have been proposed, they still limitations. In this paper, we propose B-DNS, blockchain-based domain name system, which can provide secure efficient DNS service. B-DNS fills up two shortcomings of current DNS, namely computation-heavy Proof-of-Work (PoW) protocol inefficient query, by building Proof-of-Stake...

10.1109/tnse.2021.3068788 article EN IEEE Transactions on Network Science and Engineering 2021-03-25

With the advent of Big Data era, industry, business and academia have developed various data exchange schemes to make more economically beneficial. Unfortunately, most existing systems provide only one-time exchanges without ability track provenance transformations datasets. In addition, encrypt protect privacy, which hinders demanders from verifying correctness evaluating its value.To traceability privacy while ensuring fairness during exchanges, we design implement ZKDET, a traceable...

10.1109/icdcs54860.2022.00030 article EN 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) 2022-07-01

The Network Intrusion Detection Systems (NIDS) with machine learning in SDN become increasingly popular solutions. NIDS uses abnormal traffic detection to identify unknown network attacks. Most of today's systems are supposed continuously update the recognition model time based on features from newly collected packets accurately attack behaviors. However, those existing solutions always require a large number train offline. That means it is impossible detect emergence new cyber-attacks...

10.1109/globecom42002.2020.9322187 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2020-12-01

To reduce the transmission cost of blockchain confidential transactions, we propose SymmeProof, a novel communication efficient non-interactive zero-knowledge range proof protocol without trusted setup. We design and integrate two new techniques in namely vector compression inner-product proof. The proposed is able to log(n) for n-size vectors. converts relation into an form, which can further size with technique. Based on these techniques, SymmeProof eventually achieve log(n)-size be used...

10.1109/tdsc.2022.3179913 article EN IEEE Transactions on Dependable and Secure Computing 2022-06-02

Utilizing browsers to identify and track users has become a routine on the Web in recent years. It is easy for browser collect sensitive information construct comprehensive user profiles while are still unaware. As problem mentioned above, several anti-fingerprint mechanisms have been adopted protect privacy. However, our research finds novel method based localization fingerprints that may threaten The location fingerprint obtains response delay of data transmission over link between...

10.1109/icc42927.2021.9500556 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

Unauthorized voice recording via smartphones can leak the talking content stealthily. This would be a serious security threat to those individuals, enterprises and government who need keep conversation confidential. Furthermore, due size miniaturization of smartphones, it is hard find covert from malicious attendees. Existing solutions usually jam with audible noise or electromagnetic emitting. However, will seriously interfere effect emitting limited by distance. In this paper, we propose...

10.1109/icc42927.2021.9500456 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

Internet of Things (IoT) devices deployed in publicly accessible locations increasingly encounter security threats from device replacement and impersonation attacks. Unfortunately, the limited memory poor computing capability on such make solutions involving complex algorithms or enhanced authentication protocols untenable. To address this issue, identification technologies based traffic characteristics finger-printing have been proposed to prevent illegal intrusion impersonation. However,...

10.1109/globecom46510.2021.9685693 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2021-12-01

Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on permissions. However, most them ignore specific permission combinations and categories that affect the accuracy. The features they extracted are neither representative enough distinguish benign applications. For these problems, an Android method sensitivity is proposed. First, for each kind...

10.1155/2021/6689486 article EN cc-by Security and Communication Networks 2021-07-28

Non-cryptographic mobile wireless device authentication based on channel signature has aroused extensive attention. This technology uses the device's physical characteristics to mark and verify its identity, can be used detect impersonation attacks information forgery attacks. Channel State Information (CSI) been generate fine-grained signatures. However, there are two sticking points in using CSI-based for association phase. The first is that state will change as moves, which means local...

10.1109/dsn-w52860.2021.00024 article EN 2021-06-01

In recent years, various sensors have been integrated into smartphones to sense the slight motions of human body. However, security researchers found that these can not only be used in motion detection, but also as side-channel reveal users' privacy data by inferring keystrokes. What is worse, defined W3C specifications, mobile web applications get sensor readings silently without permissions from users. Therefore, when cross-site scripting vulnerabilities are a application, attackers...

10.1109/wcsp.2017.8171036 article EN 2021 13th International Conference on Wireless Communications and Signal Processing (WCSP) 2017-10-01

Smartphone sensors have been applied to record the movement of users for healthy use. However, motion sensor readings recorded by malicious applications can be utilized as a side-channel leak user privacy keystroke inference. Most existing approaches use time-domain statistical characteristics Their systems are poor show subtle changes in short time period, since time- domain features only reflect long-time interval. In this paper, we propose novel framework perform inference on smartphones....

10.1109/glocom.2018.8647385 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

Accurate digital maps play a crucial role in various location-based services and applications.However, store information is usually missing or outdated current maps.In this paper, we propose CrowdGIS, an automatic selfupdating system for that leverages street views sensing data crowdsourced from mobile users.We first develop new weighted artificial neural network to learn the underlying relationship between estimated positions real localize user's shooting positions.Then, novel text...

10.1109/tase.2017.2761793 article EN IEEE Transactions on Automation Science and Engineering 2017-11-03

The advancement of Internet Medical Things (IoMT) leading to the proliferation electronic healthcare scenarios, with an expanding trend hospitals and organizations employing Electronic Records (EMRs) uploading cloud for sharing. However, security challenges exist during generation medical records, such as record tampering, key attacks, etc., which will become maximum bottleneck restricting development e-Health scenarios in near future. Some scholars consider digital signature techniques,...

10.1109/icc45855.2022.9838582 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

With the development of sensing technology, smartphones can provide various kinds data, including inertial WiFi depth and images. These data make it possible to construct accurate indoor floor plans that are critical foundations flourishing location-based services for smartphone. However, even with popular crowdsourcing approach, wide construction has not yet be realized due intensive time consumption. In this paper, we utilize deep learning techniques build PlanSketcher, a system enables...

10.1109/jiot.2018.2863688 article EN IEEE Internet of Things Journal 2018-08-07

Energy saving solutions on smartphone devices can greatly extend a smartphone's lasting time. However, today's push services require keep-alive connections to notify users of incoming messages, which cause costly energy consuming and drain battery quickly in cellular communications. Most force smartphones frequently send heartbeat packets that create additional energy-consuming radio-tails. No previous work has addressed the high-energy consumption services. In this paper, we propose Single...

10.1109/iwqos.2017.7969114 article EN 2017-06-01
Coming Soon ...