- Privacy, Security, and Data Protection
- Advanced Malware Detection Techniques
- Green IT and Sustainability
- Context-Aware Activity Recognition Systems
- Building Energy and Comfort Optimization
- Smart Grid Energy Management
- User Authentication and Security Systems
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Internet Traffic Analysis and Secure E-voting
- Innovative Human-Technology Interaction
- Mobile Crowdsensing and Crowdsourcing
- Energy Harvesting in Wireless Networks
- Caching and Content Delivery
- Innovative Energy Harvesting Technologies
- Parallel Computing and Optimization Techniques
- Wireless Networks and Protocols
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Privacy-Preserving Technologies in Data
- Distributed and Parallel Computing Systems
- Semantic Web and Ontologies
- Security and Verification in Computing
- Bluetooth and Wireless Communication Technologies
- Advanced Data Storage Technologies
Carnegie Mellon University
2015-2024
Eindhoven University of Technology
2024
Institute of Electrical and Electronics Engineers
2022
Regional Municipality of Niagara
2022
IEEE Computer Society
2022
University of California, San Diego
2006-2019
Universidad Católica Santo Domingo
2012
UC San Diego Health System
2011
Buildings are among the largest consumers of electricity in US. A significant portion this energy use buildings can be attributed to HVAC systems used maintain comfort for occupants. In most cases these building run on fixed schedules and do not employ any fine grained control based detailed occupancy information. paper we present design implementation a presence sensor platform that accurate detection at level individual offices. Our is low-cost, wireless, incrementally deployable within...
CoolSpots enable a wireless mobile device to automatically switch between multiple radio interfaces, such as WiFi and Bluetooth, in order increase battery lifetime. The main contribution of this work is an exploration the policies that system among these each with diverse characteristics different ranges, save power - supported by detailed quantitative measurements. do not require any changes applications themselves, required existing infrastructure are minimal. Results reported for suite...
Commercial buildings contribute to 19% of the primary energy consumption in US, with HVAC systems accounting for 39.6% this usage. To reduce use, prior studies have proposed using wireless occupancy sensors or even cameras based actuation showing savings up 42%. However, most these solutions require and associated network be designed, deployed, tested maintained within existing which is significantly costly.
The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with estimates over 25 billion devices deployed by 2020. While IoT huge potential for societal impact, it comes a number key security challenges---IoT can become entry points into critical infrastructures and be exploited leak sensitive information. Traditional host-centric solutions in today's IT ecosystems (e.g., antivirus, software patches) are fundamentally at odds realities poor vendor practices constrained...
Smartphone users are often unaware of the data collected by apps running on their devices. We report a study that evaluates benefits giving an app permission manager and sending them nudges intended to raise awareness apps. Our provides both qualitative quantitative evidence these approaches complementary can each play significant role in empowering more effectively control privacy. For instance, even after week with access manager, participants benefited from showing how some sensitive was...
Commercial buildings have long since been a primary target for applications from number of areas: cyber-physical systems to building energy use improved human interactions in built environments. While technological advances made these areas, such solutions rarely experience widespread adoption due the lack common descriptive schema which would reduce now-prohibitive cost porting and different buildings. Recent attempts sought address this issue through data standards metadata schemes, but...
Despite growing concerns about security and privacy of Internet Things (IoT) devices, consumers generally do not have access to information when purchasing these devices. We interviewed 24 participants IoT devices they purchased. While most had considered prior purchase, reported becoming concerned later due media reports, opinions shared by friends, or observing unexpected device behavior. Those who sought before that it was difficult impossible find. asked interviewees rank factors would...
IP based telephony is rapidly gaining acceptance over traditional means of voice communication. Wireless LANs are also becoming ubiquitous due to their inherent ease deployment and decreasing costs. In enterpriseWi-Fi environments, VoIP a compelling application for devices such as smart phones with multiple wireless interfaces. However, the high energy consumption Wi-Fi interfaces, especially when device idle,presents significant barrier widespread adoption Wi-Fi.To address this issue, we...
In this paper we present the design and implementation of ProtectMyPrivacy (PMP), a system for iOS devices to detect access private data protect users by substituting anonymized in its place if decide. We developed novel crowdsourced recommendation engine driven who contribute their protection decisions, which provides app specific privacy recommendations. PMP has been use over nine months 90,621 real users, detailed evaluation based on collected 225,685 unique apps. show that device...
Microelectronic circuits exhibit increasing variations in performance, power consumption, and reliability parameters across the manufactured parts use of these over time field. These have led to overdesign guardbands design test ensure yield with respect a rigid set datasheet specifications. This paper explores possibility constructing computing machines that purposely expose hardware various layers system stack including software. leads vision underdesigned utilizes software...
A holistic approach to reducing the energy footprint of large commercial buildings is proposed. detailed use breakdown within a modern building presented, leading key insight that, in addition HVAC system, used by miscellaneous plug loads which include IT equipment must also be addressed. An actuation framework proposed control plug-loads and system for savings.
Information about the privacy and security of Internet Things (IoT) devices is not readily available to consumers who want consider it before making purchase decisions. While legislators have proposed adding succinct, consumer accessible, labels, they do provide guidance on content these labels. In this paper, we report results a series interviews surveys with experts, as well consumers, where explore test design space include an IoT label. We conduct expert elicitation study by following...
Providing university teachers with high-quality opportunities for professional development cannot happen without data about the classroom environment. Currently, most effective mechanism is an expert to observe one or more lectures and provide personalized formative feedback instructor. Of course, this expensive unscalable, perhaps critically, precludes a continuous learning loop In paper, we present culmination of two years research on EduSense, comprehensive sensing system that produces...
Smartphone-based contact-tracing apps are a promising solution to help scale up the conventional process. However, low adoption rates have become major issue that prevents these from achieving their full potential. In this paper, we present national-scale survey experiment (
Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded networked information processing that has increasingly become part our daily lives. In this paper, we look entirely as energy examine opportunities presented by joint optimization use its occupants equipment. This paper makes two contributions: one, careful...
Modern software systems provide many configuration options which significantly influence their non-functional properties. To understand and predict the effect of options, several sampling learning strategies have been proposed, albeit often with significant cost to cover highly dimensional space. Recently, transfer has applied reduce effort constructing performance models by transferring knowledge about behavior across environments. While this line research is promising learn more accurate...
The complexity of modern HVAC systems leads to device mis-configuration in about 40% buildings, wasting upto the energy consumed. Fault detection methods generate excessive alarms leading operator alert fatigue, faults left unfixed and wastage. Sophisticated fault techniques developed literature are seldom used practice. We investigate this gap by applying various on real data from a 145,000 sqft, five floor building. first find that none these algorithms designed capture control loop...
The enormous popularity of smartphones, their rich sensing capabilities, and the data they have about users lead to millions apps being developed used. However, these capabilities also led numerous privacy concerns. Platform manufacturers, as well researchers, proposed ways mitigating concerns, primarily by providing fine-grained visibility controls user on a per-app basis. In this paper, we show that permission approach is suboptimal for many apps, because most accesses occur due small set...
Apple announced the introduction of app privacy details to their App Store in December 2020, marking first ever real-world, large-scale deployment nutrition label concept, which had been introduced by researchers over a decade earlier. The labels are created developers, who self-report app's data practices. In this paper, we present study examining usability and understandability Apple's creation process from developer's perspective. By observing interviewing 12 iOS developers about how they...