- Wireless Communication Security Techniques
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Adversarial Robustness in Machine Learning
- Advanced MIMO Systems Optimization
- Security in Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Chaos-based Image/Signal Encryption
- Cooperative Communication and Network Coding
- Advanced Malware Detection Techniques
- Wireless Signal Modulation Classification
- User Authentication and Security Systems
- Security and Verification in Computing
- DNA and Biological Computing
- Advanced Wireless Communication Technologies
- Cryptographic Implementations and Security
- Mobile Ad Hoc Networks
- Speech Recognition and Synthesis
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cryptography and Data Security
- Spam and Phishing Detection
- Antenna Design and Analysis
- Energy Efficient Wireless Sensor Networks
- Wireless Networks and Protocols
Northern University of Malaysia
2025
Shandong Women’s University
2021-2025
University of South Florida
2015-2024
Shanghai Institute of Optics and Fine Mechanics
2023
Zhejiang University
2023
Taiwan Semiconductor Manufacturing Company (China)
2023
Fujian Normal University
2023
Nanjing University of Posts and Telecommunications
2022
Engineering Arts (United States)
2022
Jining Normal University
2022
By exploiting the communication infrastructure among sensors, actuators, and control systems, attackers may compromise security of smart-grid with techniques such as denial-of-service (DoS) attack, random data-injection attack. In this paper, we present a mathematical model system to study these pitfalls propose robust framework for smart grid. Our adopts Kalman filter estimate variables wide range state processes in model. The estimates from readings are then fed into χ <sup>2</sup>...
In this study, we present WindTalker, a novel and practical keystroke inference framework that allows an attacker to infer the sensitive keystrokes on mobile device through WiFi-based side-channel information. WindTalker is motivated from observation devices will lead different hand coverage finger motions, which introduce unique interference multi-path signals can be reflected by channel state information (CSI). The adversary exploit strong correlation between CSI fluctuation user's number...
Federated learning (FL) provides a high efficient decentralized machine framework, where the training data remains distributed at remote clients in network. Though FL enables privacy-preserving mobile edge computing framework using IoT devices, recent studies have shown that this approach is susceptible to poisoning attacks from side of clients. To address on FL, we provide <i>two-phase</i> defense algorithm called <inline-formula><tex-math notation="LaTeX">${\underline{Lo}cal\...
Federated Learning (FL) has been considered as an appealing framework to tackle data privacy issues of mobile devices compared conventional Machine (ML). Using Edge Servers (ESs) intermediaries perform model aggregation in proximity can reduce the transmission overhead, and it enables great potential low-latency FL, where hierarchical architecture FL (HFL) attracted more attention. Designing a proper client selection policy significantly improve training performance, widely investigated...
A reactive jammer jams wireless channels only when target devices are transmitting; Compared to constant jamming, jamming is harder track and compensate against [2], [38]. Frequency hopping spread spectrum (FHSS) direct sequence (DSSS) have been widely used as countermeasures attacks. However, both will fail if the all frequency or has high transmit power. In this paper, we propose an anti-jamming communication system that allows in presence of a broadband power jammer. The proposed...
With the prevalent of smart devices and home automations, voice command has become a popular User Interface (UI) channel in IoT environment. Although Voice Control System (VCS) advantages great convenience, it is extremely vulnerable to spoofing attack (e.g., replay attack, hidden/inaudible attack) due its broadcast nature. In this study, we present WiVo, device-free liveness detection system based on wireless signals generated by without any additional or sensors carried users. The basic...
The emerging paradigm for dynamic spectrum sharing is based on allowing secondary users (SUs) to exploit white space frequency that not occupied by primary users. White database provides an opportunity SUs obtain availability information submitting a location-based query. However, this new can also be exploited the attackers significantly enhance their jamming capability due available channel from queries, which expected increasingly block SUs. challenge unique characteristics (e.g., lack of...
In this study, we present WindTalker, a novel and practical keystroke inference framework that can be used to infer the sensitive keystrokes on mobile device through WiFi-based side-channel information. WindTalker is motivated from an observation devices will lead different hand coverage finger motions, which introduce unique interference multi-path signals reflected by channel state information (CSI). An attacker exploit strong correlation between CSI fluctuation user's password input....
Wireless link signature is a physical layer authentication mechanism, using the multipath effect between transmitter and receiver to provide of wireless signals. This paper identifies new attack, called mimicry against existing schemes. An attacker can forge legitimate transmitter's as long it knows signal at receiver's location, does not have be exactly same location transmitter. We also extend attack multiple-input multiple-output (MIMO) systems, conclude that feasible only when number...
As a key feature of the next generation wireless networks (5G), heterogeneous (HetNets) architecture is embraced as fundamental network technology to meet immensely diverse service requirements and characteristics various devices. By introducing underlaying device-to-device (D2D) communication into HetNets, it possible offload unevenly distributed load from overloaded macrocell uncongested femtocell in multitier HetNets. However, performance balancing (LB) scheme heavily depends on D2D relay...
To meet the increasing demand of wireless broadband applications in future 5G cellular networks, Device-to-Device (D2D) communications serve as a candidate paradigm to improve spectrum efficiency. Considering challenges after D2D transmission is introduced for this paper deals with mode selection and resource allocation issues related communications. First, we propose scheme which aims at guaranteeing users also considering potential interference. We analyze condition under underlay should...
Traditional methods to eavesdrop keystrokes leverage some malware installed in a target computer record the for an adversary. Existing research work has identified new class of attacks that can non-invasive way without infecting install malware. The common idea is pressing key keyboard cause unique and subtle environmental change, which be captured analyzed by eavesdropper learn keystrokes. For these attacks, however, training phase must accomplished establish relationship between observed...
CSI fingerprint localization is an advanced and promising technique for indoor localization, which identifies the user's location by mapping his measured against server's database. This approach highlighted due to its high granularity distinction strong robustness noise disturbances, but it also causes potential privacy leakage three participants in process: user, server, AP. Currently, there has been little research done on this issue, existing work often ignores concern To fill gap, paper...
Federated Learning (FL) is a promising framework for performing privacy-preserving, distributed learning with set of clients. However, the data distribution among clients often exhibits non-IID, i.e., shift, which makes efficient optimization difficult. To tackle this problem, many FL algorithms focus on mitigating effects heterogeneity across by increasing performance global model. almost all leverage Empirical Risk Minimization (ERM) to be local optimizer, easy make model fall into sharp...
This study examines motivation and multilingualism using quantitative data from 468 language learners in China. More precisely, the point of inquiry was to investigate language-specificity psychological aspects self within L2 Motivational Self System (L2MSS). The Exploratory Factor Analysis (EFA) with English revealed a strong anti-ought-to factor, along expected ideal ought-to selves; however, EFA for Japanese patterned similarly an emergent self, whereas this not case French. These results...
In wireless networks, location distinction aims to detect changes or facilitate authentication of users. To achieve distinction, recent research has focused on investigating the spatial uncorrelation property channels. Specifically, differences in channel characteristics are used distinguish locations identify changes. However, we discover a new attack against all existing approaches that built such an attack, adversary can easily hide her impersonate movements by injecting fake into target...
Multi-server Federated learning (FL) has been considered as a promising solution to address the limited communication resource problem of single-server FL. We consider typical multi-server FL architecture, where coverage areas regional servers may overlap. The key point this architecture is that clients located in overlapping update their local models based on average model all accessible models, which enables indirect sharing among different servers. Due complicated network topology,...
Wireless link signature is a physical layer authentication mechanism, which uses the multi-path effect between transmitter and receiver to provide of wireless signals. We identify new attack, called mimicry against scheme in [7]. It assumed past that an attacker cannot "spoof" arbitrary will not have same at unless it exactly location as legitimate transmitter. However, we show can forge long knows signal receiver's location, does be order its signature.