Ting Zhu

ORCID: 0000-0003-3307-050X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Networks and Protocols
  • Energy Harvesting in Wireless Networks
  • Network Security and Intrusion Detection
  • Cooperative Communication and Network Coding
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Security in Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • IoT and Edge/Fog Computing
  • AI in cancer detection
  • Internet Traffic Analysis and Secure E-voting
  • Smart Grid Energy Management
  • Caching and Content Delivery
  • User Authentication and Security Systems
  • Advanced MIMO Systems Optimization
  • Smart Grid Security and Resilience
  • Adversarial Robustness in Machine Learning
  • Wireless Body Area Networks
  • Electric Vehicles and Infrastructure
  • Time Series Analysis and Forecasting
  • Advanced Battery Technologies Research
  • Software-Defined Networks and 5G

China Railway Shanghai Design Institute Group (China)
2024

The Ohio State University
2022-2024

Jiangxi University of Science and Technology
2022

University of Maryland, Baltimore County
2014-2021

University of Maryland, Baltimore
2016-2021

East China University of Technology
2020

University of Maryland, College Park
2015-2020

Northwestern Polytechnical University
2020

Wuhan University of Science and Technology
2016-2017

Binghamton University
2006-2016

Web service is one of the key communications software services for Internet. phishing many security threats to web on aims steal private information, such as usernames, passwords, and credit card details, by way impersonating a legitimate entity. It will lead information disclosure property damage. This paper mainly focuses applying deep learning framework detect websites. first designs two types features phishing: original interaction features. A detection model based Deep Belief Networks...

10.1155/2018/4678746 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

The exponentially increasing number of internet things (IoT) devices and the data generated by these introduces spectrum crisis at already crowded ISM 2.4 GHz band. To address this issue enable more flexible concurrent communications among IoT devices, we propose B2W2, a novel communication framework that enables N-way WiFi Bluetooth Low Energy (BLE) devices. Specifically, demonstrate it is possible to BLE cross-technology while supporting communications. We conducted extensive experiments...

10.1145/2994551.2994561 article EN 2016-11-04

10.1016/j.jnca.2013.09.014 article EN Journal of Network and Computer Applications 2013-10-31

Existing flooding algorithms have demonstrated their effectiveness in achieving communication efficiency and reliability wireless sensor networks. However, further performance improvement has been hampered by the assumption of link independence, a design premise imposing need for costly acknowledgements (ACKs) from every receiver. In this paper, we present Collective Flooding (CF), which exploits correlation to achieve using concept collective ACKs. CF requires only 1-hop information sender,...

10.5555/1855711.1855715 article EN 2010-04-28

Flooding in low-duty-cycle wireless sensor networks is very costly due to asynchronous schedules of nodes. To adapt existing flooding-tree-based designs for networks, we shall schedule nodes common parents wake up simultaneously. Traditionally, energy optimality a designated flooding-tree achieved by selecting with the highest link quality. In this work, demonstrate that surprisingly more can be saved considering correlation. Specifically, work first experimentally verifies existence...

10.1109/icnp.2011.6089078 article EN 2011-10-01

Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits highly complex network configuration. AMI shares information about consumption, outages, and electricity rates reliably efficiently by bidirectional communication between meters utilities. However, numerous being connected through mesh networks open new opportunities for attackers to interfere with communications compromise utilities assets or steal customers private information. In this paper, we...

10.1109/icc.2014.6883456 article EN 2014-06-01

The exponentially increasing number of IoT devices makes the unlicensed industrial, scientific, and medical (ISM) radio bands (e.g., 2.4 GHz) extremely crowded. Currently, there is no efficient solution to coordinate large amount heterogeneous that have different communication technologies WiFi ZigBee). To fill this gap, in paper, we introduce embedded multiple flows (EMF) method, which (i) embeds pieces information existing traffic (ii)concurrently sends out these from one sender receivers...

10.1109/infocom.2017.8057109 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

To support ubiquitous computing for various applications (such as smart health, homes, and cities), the communication system requires to be ubiquitously available, ultra-low-power, high throughput, low-latency. A passive such backscatter is desirable. However, existing systems cannot achieve all of above requirements. In this paper, we present first LTE (LScatter) that leverages continuous ambient traffic ubiquitous, throughput low latency communication. Our design motivated by our...

10.1145/3387514.3405861 article EN 2020-07-30

Due to volatile and rising energy prices, smart microgrids appear be increasingly popular. Instead of one centrally located power plant, the will rely on solar panels wind turbines every house sharing renewable among houses. How efficiently optimally share is a challenging problem. In order energy, routing protocols in data network are needed, which introduces another design challenge that how feasibly detect defend major attacks against for microgrids. Most existing secure other networks...

10.1109/smartgridcomm.2011.6102307 article EN 2011-10-01

With advances in energy harvesting techniques, it is now feasible to build sustainable sensor networks (SSN) support long-term applications. Unlike battery-powered networks, the objective of effectively utilize a continuous stream ambient energy. Instead pushing limits conservation, we are aiming at energy-synchronized designs <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sup> keep supplies and demands balance. Specifically, this work...

10.1109/icnp.2009.5339699 article EN 2009-10-01

10.1016/j.jnca.2015.04.015 article EN publisher-specific-oa Journal of Network and Computer Applications 2015-05-20

The exponentially increasing number of heterogeneous Internet Things (IoT) devices motivate us to explore more efficient and higher throughput communication, especially at the bottleneck (i.e., edge) IoT networks. Our work, named Chiron, opens a promising direction for Physical (PHY) layer concurrent high communication (e.g., wider-band WiFi narrower-band ZigBee). Specifically, PHY layer, Chiron enables concurrently transmitting (or receiving) 1 stream data up 4 streams ZigBee from)...

10.1145/3210240.3210346 article EN 2018-06-10

The exponentially increasing number of Internet things (IoT) devices introduces spectrum crisis to the widely used industrial, scientific, and medical (ISM) frequency band. Since IoT use heterogeneous radios with different bandwidths (e.g., 20 MHz for WiFi 2 ZigBee), traditional interference avoidance methods, such as time-division multiple access (TDMA) carrier-sense (CSMA), have very low utilization. This is because TDMA CSMA allocate packets at time domain, without considering bandwidth...

10.1109/icnp.2017.8117550 article EN 2017-10-01

The camera is one of the most important sensors for an autonomous vehicle (AV) to perform Environment Perception and Simultaneous Localization Mapping (SLAM). To secure camera, current vehicles not only utilize data gathered from multiple (e.g., Camera, Ultrasonic Sensor, Radar, or LiDAR) environment perception SLAM but also require human driver always realize driving situation, which can effectively defend against previous attack approaches (i.e., creating visible fake objects introducing...

10.1145/3460120.3484766 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Human posture recognition has a wide range of applications including elderly care and video surveillance. This paper discusses how to recognize human postures using wearable devices. From real-world data, we analyze the challenges in terms result performance, efficiency sensor selection. To deal with challenges, present our design five techniques: i) oversampling undersampling methods, ii) ensemble learning, iii) selection, iv) stream data classification v) post-processing techniques. We...

10.1109/bigdata.2016.7841004 article EN 2021 IEEE International Conference on Big Data (Big Data) 2016-12-01

Recent advances in cross-technology communication have significantly improved the spectrum efficiency same ISM band among heterogeneous wireless devices (e.g., WiFi and ZigBee). However, further performance improvement whole network is hampered because layer missing. As first design, our work, named ECT, opens a promising direction for reducing packet delivery delay via collaborative concurrent between ZigBee devices. Specifically, ECT can dynamically change nodes' priorities reduce from...

10.1109/infocom.2018.8486349 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

The password has become today's dominant method of authentication. While brute-force attack methods such as HashCat and John the Ripper have proven unpractical, research then switches to guessing. State-of-the-art approaches Markov Model probabilistic context-free grammar (PCFG) are all based on statistical probability. These require a large amount calculation, which is time-consuming. Neural networks more accurate practical in guessing than traditional methods. However, raw neural network...

10.1109/tmm.2019.2940877 article EN cc-by IEEE Transactions on Multimedia 2019-09-11

Although existing flooding protocols can provide efficient and reliable communication in wireless sensor networks on some level, further performance improvement has been hampered by the assumption of link independence, which requires costly acknowledgments (ACKs) from every receiver. In this paper, we present collective (CF), exploits correlation to achieve reliability using concept ACKs. CF only 1-hop information at each node, making design highly distributed scalable with low complexity....

10.1109/tnet.2012.2197689 article EN IEEE/ACM Transactions on Networking 2013-02-01

Location based social networks (LBSNs) are becoming increasingly popular with the fast deployment of broadband mobile and growing prevalence versatile devices. This success has attracted great interest in studying measuring characteristics LBSNs, such as Facebook Places, Yelp, Google+ Local. However, it is often prohibitive, sometimes too costly, to obtain a detailed complete snapshot LBSN due its usually massive scale. In this work, taking Foursquare an example, we focus on sampling...

10.1109/icde.2014.6816726 article EN 2014-03-01

Password has become today's dominant method of authentication in social network. While the brute-force attack methods, such as HashCat and John Ripper, are unpractical, research then switches to password guess. The state-of-the-art approaches, Markov Model probabilistic context-free grammars(PCFG), all based on statistical probability. These approaches have a low matching rate. methods neural network been proved more accurate practical for guessing than traditional methods. However, raw...

10.1109/icc.2018.8422243 article EN 2018-05-01

The exponentially increasing number of Internet Things (IoT) devices and the data generated by these introduces spectrum crisis at already crowded ISM 2.4-GHz band. To address this issue enable more flexible concurrent communications among IoT devices, we propose B <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> W , a novel communication framework that enables N-way Wi-Fi Bluetooth low energy (BLE) devices. Specifically, demonstrate it...

10.1109/tnet.2019.2908754 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2019-04-25

Virtualization is a technique that allows multiple instances typically running different guest operating systems on top of single physical hardware. A hypervisor, layer software the host system, runs and manages these systems. Rather than to run services servers for reliability security reasons, companies started employ virtualization over their within server. This approach proves beneficial as it provides much better reliability, stronger isolation, improved resource utilization compared...

10.48550/arxiv.2501.01334 preprint EN arXiv (Cornell University) 2025-01-02

Wireless communication consumes a significant amount of energy in wireless networks. Most multi-hop routing protocols are adopted from wired network and use pre-selected single or multiple minimum cost paths to forward data packets. However unlike networks, has unique characteristics such as unreliable links receivers associated with packet transmission. These particular make it inefficient by using preselected In this paper we propose scalable, opportunistic, efficient protocol (E <sup...

10.1109/infcomw.2011.5928821 article EN 2011-04-01

When the number of data generating sensors increases and amount sensing grows to a scale that traditional methods cannot handle, big are needed for applications. However, is fuzzy science concept there no existing research architecture it nor generic application structure in field sensing. In this survey, we explore many scattered results have been achieved by combining techniques with present our vision Firstly, outline categories generally summarize achievements. Then discuss proposed...

10.1155/2015/902982 article EN cc-by International Journal of Distributed Sensor Networks 2015-01-01
Coming Soon ...