- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Organic Electronics and Photovoltaics
- Blockchain Technology Applications and Security
- Thin-Film Transistor Technologies
- Advanced Memory and Neural Computing
- Mobile Crowdsensing and Crowdsourcing
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
- Advanced Adaptive Filtering Techniques
- Intellectual Property Law
- Advanced Neural Network Applications
- Semiconductor materials and devices
- Conducting polymers and applications
- Speech and Audio Processing
- Smart Grid Security and Resilience
- Complexity and Algorithms in Graphs
- Advanced Image and Video Retrieval Techniques
- Adversarial Robustness in Machine Learning
- Advancements in Semiconductor Devices and Circuit Design
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Advancements in Battery Materials
- Security in Wireless Sensor Networks
Pusan National University
2025
University of Notre Dame
2018-2024
University of Maryland, College Park
2024
University of Oxford
2023
The Faraday Institution
2023
Illinois Institute of Technology
2012-2017
University of Science and Technology of China
2016
Seoul National University of Science and Technology
2008-2015
Tsinghua University
2015
Hyundai Motors (South Korea)
2014
Cloud computing is a revolutionary paradigm, which enables flexible, on-demand, and low-cost usage of resources, but the data outsourced to some cloud servers, various privacy concerns emerge from it. Various schemes based on attribute-based encryption have been proposed secure storage. However, most work focuses contents access control, while less attention paid privilege control identity privacy. In this paper, we present semianonymous scheme AnonyControl address not only privacy, also...
Cloud computing is a revolutionary paradigm which enables flexible, on-demand and low-cost usage of resources. Those advantages, ironically, are the causes security privacy problems, emerge because data owned by different users stored in some cloud servers instead under their own control. To deal with various schemes based on Attribute-Based Encryption have been proposed recently. However, problem yet to be solved. This paper presents an anonymous privilege control scheme AnonyControl...
The smart grid introduces new privacy implications to individuals and their family due the fine-grained usage data collection. For example, metering could reveal highly accurate real-time home appliance energy load, which may be used infer human activities inside houses. One effective way hide actual loads from outsiders is Battery-based Load Hiding (BLH), in a battery installed for each household smartly controlled store supply power appliances. Even though such technique has been...
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), its context-rich functionalities attract considerable users. Many LBS providers use users' location information to offer them convenience useful functions. However, could greatly breach personal privacy because itself contains much information. Hence, preserving while achieving utility from it is still an challenging question now. This paper tackles this...
Much research has been conducted to securely outsource multiple parties' data aggregation an untrusted aggregator without disclosing each individual's privately owned data, or enable parties jointly aggregate their while preserving privacy. However, those works either require secure pair-wise communication channels suffer from high complexity. In this paper, we consider how external can learn some algebraic statistics (e.g., sum, product) over participants' the We assume all are subject...
Social network data is widely shared, transferred and published for research purposes business interests, but it has raised much concern on users' privacy. Even though identity information always removed, attackers can still de-anonymize users with the help of auxiliary information. To protect against de-anonymization attack, various privacy protection techniques social networks have been proposed. However, most existing approaches assume specific restrict structure as background knowledge...
Many cloud platforms emerge to meet urgent requirements for large-volume personal image store, sharing and search. Though most would agree that images contain rich sensitive information (e.g., people, location event) people's privacy concerns hinder their participation into untrusted services, today's provide little support protection. Facing large-scale from multiple users, it is extremely challenging the maintain index structure schedule parallel computation without learning anything about...
Surface polarization in a poly(4-vinyl phenol) (PVP) dielectric induced by water molecules has been qualitatively investigated pentacene thin-film transistors. The magnitudes of drain currents from devices with PVP dielectrics subject to specific surface treatments increased humidity, whereas the opposite responses were observed device SiO2 dielectrics. increase current is attributed accumulation extra charge carriers addition that vertical electric field. Such effects should be carefully...
The electrical characteristics of bottom-contact organic field-effect transistors fabricated with the air-stable n-type semiconductor N,N′-bis(n-octyl)-dicyanoperylene-3,4:9,10-bis(dicarboximide) (PDI-8CN2) are described. mobility, threshold voltage, subthreshold swing, and Ion∕Ioff ratio(VDS=40V, VG=0∼40V) 0.14cm2∕Vs, 1.6V, 2.0V/decade, 1.2×103, respectively. effect electrode/dielectric surface treatment on these devices is also examined, a combination 1-octadecanethiol...
Much research has been conducted to securely outsource multiple parties' data aggregation an untrusted aggregator without disclosing each individual's privately owned data, or enable parties jointly aggregate their while preserving privacy. However, those works either require secure pair-wise communication channels suffer from high complexity. In this paper, we consider how external can learn some algebraic statistics (e.g., sum, product) over participants' the We assume all are subject...
Facing a large number of personal photos and limited resource mobile devices, cloud plays an important role in photo storing, sharing searching. Meanwhile, some recent reputation damage stalk events caused by leakage increase people's concern about privacy. Though most would agree that search function privacy are both valuable, few system supports them simultaneously. The center such ideal is privacy-preserving outsourced image similarity measurement, which extremely challenging when the...
With the increased popularity of smartphones, various security threats and privacy leakages targeting them are discovered investigated. In this work, we present SilentSense, a framework to authenticate users silently transparently by exploiting dynamics mined from user touch behavior biometrics micro-movement device caused user's screen-touch actions. We build “touch-based biometrics” model owner extracting some principle features, then verify whether current is or guest/attacker. When using...
High-performance, n-channel organic transistors are prepared from an air-stable, n-type semiconductor, and their complementary circuits, in which both p- materials solution deposited, presented. Ring oscillators D flip-flops fabricated the operate air without passivation or packaging.
In this work, we explore a new networking mechanism with smart glasses, through which users can express their interest and connect to target simply by gaze. Doing this, attempt let wearable devices understand human attention intention, pair carried according such intention. To achieve ambitious goal, propose proof-of-concept system iGaze, visual driven suite: an iGaze glass (hardware), protocol VAN (software). Our glass, is low-cost head-mounted camera, orientation sensors, microphone...
We propose AccountTrade, a set of accountable protocols, for big data trading among dishonest consumers. To secure the environment, our protocols achieve book-keeping ability and accountability against consumers who may misbehave throughout dataset transactions. Specifically, we study responsibilities in design AccountTrade to try deviate from their responsibilities. uniqueness index, new rigorous measurement uniqueness, as well several enable brokers blame consumer when misbehavior is...
Many proximity-based mobile social networks are developed to facilitate connections between any two people, or help a user find people with matched profile within certain distance. A challenging task in these applications is protect the privacy of participants' profiles and communications. In this paper, we design novel mechanisms, when given preference-profile submitted by user, that search persons matching-profile decentralized networks. Meanwhile, our mechanisms establish secure...
We are speeding toward a not-too-distant future when we can perform human-computer interaction using solely our voice. Speech recognition is the key technology that powers voice input, and it usually outsourced to cloud for best performance. However, user privacy at risk because voiceprints directly exposed cloud, which gives rise security issues such as spoof attacks on speaker authentication systems. Additionally, may cause well, instance, speech content could be abused profiling. To...
We propose a graph-based framework for privacy preserving data publication, which is systematic abstraction of existing anonymity approaches and criteria. Graph explored dataset representation, background knowledge specification, operation design, as well attack inferring analysis. The designed to accommodate various datasets including social networks, relational tables, temporal spatial sequences, even possible unknown models. utility measurements the are also quantified in terms graph...
Mobile crowdsensing (MCS) has been emerging as a new sensing paradigm where vast numbers of mobile devices are used for and collecting data in various applications. Auction based participant selection widely current MCS systems to achieve user incentive task assignment optimization. However, problems solved with auction-based approaches usually involve participants' privacy concerns because participant's bids may contain her private information (such location visiting patterns), disclosure...
In this paper, a set of accountable protocols denoted as AccountTrade is proposed for big data trading among dishonest consumers. For achieving secure environment, achieves book-keeping ability and accountability against consumers throughout the (i.e., buying selling) datasets. We investigate consumers' responsibilities in dataset trading, then we design to achieve that are likely deviate from responsibilities. Specifically, uniqueness index defined proposed, which new rigorous measurement...
Homomorphic encryption (HE) allows direct computations on encrypted data. Despite numerous research efforts, the practicality of HE schemes remains to be demonstrated. In this regard, enormous size ciphertexts involved in degrades computational efficiency. Near-memory Processing (NMP) and Computing-in-memory (CiM) - paradigms where computation is done within memory boundaries represent architectural solutions for reducing latency energy associated with data transfers data-intensive...
Most liquid lithium-ion-battery electrolytes incorporate cosolvent blends, but the dominant electrochemical transport models adopt a single-solvent approximation, which assumes in part that nonuniform ratios do not affect cell voltage. For popular electrolyte formulation based on ethyl-methyl carbonate (EMC), ethylene (EC), and LiPF6, we perform measurements with fixed-reference concentration cells, finding appreciable liquid-junction potentials when only ratio is polarized. A previously...
The field effect in pentacene thin-film transistors was studied using bottom-contact devices with channel lengths below 10nm. To suppress spreading current these devices, which have a small width-to-length (W-L) ratio, we employed pair of guarding electrodes as close 20nm to the two sides channel. responses nanometer scale exhibit good gate modulation. Mobilities 0.046cm2∕Vs and on/off ratios 97 were achieved sub-10-nm transistors. We find that device response is strongly influenced by...