

Short Biography
I am a Ph.D. candidate in the Department of Computer Science and Engineering at Michigan State University (MSU) since 2016. I am advised by Prof. Guan-Hua (Sccot) Tu and Prof. Alex X. Liu (IEEE Fellow) at MSU. I received my B.S. and M.S. (advised by Prof. Xiaofeng Liao (IEEE Fellow)) at Department of Computer Science, Chongqing University, China. In 2013, I worked as a Research Assistant in Texas A&M University at Qatar, working with Prof. Tingwen Huang (IEEE Fellow). In 2017, I had an intern at Ford Motor Company, working on Formal Methods project (advised by Dr. Md Tawhid Bin Waez). I am also the co-founder of Tenon Blockchain. |
Email: my last name + first name (at) msu (dot) edu
Research Interests
IoT security, Blockchain, Database security, Cloud security, Machine learning, Formal methods
Professional Activities Conference Services:
Selected Publications (Google Citation)
-
BFastPay: a Routing-Free Protocol for Fast Bitcoin Payment
ACM Conference on Data and Applicaiton Security and Privacy (ACM CodaSpy), 2021. [PDF]
-
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
ACM Conference on Data and Applicaiton Security and Privacy (ACM CodaSpy), 2021. [PDF]
(CVE-2021-24120 and CVE-2021-24121) -
SecWIR: Securing Smart Home IoT Communications via Wi-Fi Routers with Embedded Intelligence
ACM International Conference on Mobile Systems, Applicaitons, and Services (ACM MobiSys), 2020. [PDF]
-
Tenon BlockChain White PaperTenon BlockChain Techinical Report (Tenon), 2020. [PDF]
-
An Inter-blockchain Escrow Approach for Fast Bitcoin Payment (Extended Abstract)
IEEE International Conference on Distributed Computing Systems (IEEE ICDCS), 2020. [PDF]
-
Fast and Secure kNN Query Processing in Cloud ComputingIEEE Conference on Communications and Network Security (IEEE CNS), 2020. [PDF]
-
SecEQP: A Secure and Efficient Scheme for SkNN Query Problem over Encrypted Geodata on CloudIEEE International Conference on Data Engineering (IEEE ICDE), 2019. [PDF]
-
The Insecurity of Home Digital Voice Assistants-Vulnerabilities, Attacks and CountermeasuresIEEE Conference on Communications and Network Security (IEEE CNS), 2018. [PDF]
-
Secure kNN Queries over Encrypted Data: Dimensionality is not Always a CurseIEEE International Conference on Data Engineering (IEEE ICDE), 2017. [PDF]
-
PTA-SC: Privacy-Preserving Task Allocation for Spatial Crowdsourcing
IEEE Wireless Communications and Networking Conference (IEEE WCNC), 2021. [PDF]
-
Exploring the Insecurity of Google Account Registration Protocol via Model CheckingIEEE Symposium Series on Computational Intelligence (IEEE SCCI), 2019. [PDF]
-
CPSO-THCS: An Optimization Algorithm for Emergency Supply Delivery Routing ProblemInternational Conference on Advanced Computational Intelligence (ICACI), 2020. [PDF]
-
Support-set-assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-cloudsInternational Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2015. [PDF]
-
SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud ComputingIEEE Transactions on Cloud Computing (IEEE TCC), 2019. [PDF]
-
Cloud Computing Service: the Case of Large Matrix Determinant ComputationIEEE Transactions on Services Computing (IEEE TSC), 2015. [PDF]
-
Second-Order Consensus Seeking in Multi-Agent Systems With Nonlinear Dynamics Over Random Switching Directed NetworksIEEE Transactions on Circuits and Systems (IEEE TCAS-I), 2013. [PDF]
Outsourcing Large Matrix Inversion Computation to a Public CloudIEEE Transactions on Cloud Computing (IEEE TCC), 2013. [PDF]
Highly Efficient Linear Regression Outsourcing to a CloudIEEE Transactions on Cloud Computing (IEEE TCC), 2014. [PDF]
NTRU-KE: A Lattice-based Public Key Exchange ProtocolIACR Cryptology ePrint Archive (IACR), 2013. [PDF]
Achieving Security, Robust Cheating Resistance, and High-efficiency for Outsourcing Large Matrix Multiplication Computation to a Malicious CloudInformation Sciences (IS), 2013. [PDF] -
Two-layer Tree-connected Feed-forward Neural Network Model for Neural CryptographyPhysical Review E (PRE), 2013. [PDF]