12.07.2015 Views

Curriculum Vitae, Yu Chen - Binghamton University - Harvey ...

Curriculum Vitae, Yu Chen - Binghamton University - Harvey ...

Curriculum Vitae, Yu Chen - Binghamton University - Harvey ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[C13][C14][C15][C16][C17][C18][C19][C20][C21][C22][C23][C24]CA, USA, January 28 - 31, 2013.B. Kerrigan and Y. <strong>Chen</strong>, “A Study of Entropy Sources in Cloud Computers: RandomNumber Generation on Cloud Hosts,” the 6 th International Conference on MathematicalMethods, Models, and Architecture for Computer Network Security(MMM-ACNS-2012), St. Petersburg, Russia, October 17-20, 2012.J. Feng, Y. <strong>Chen</strong>, D. Summerville, and Z. Su, "An Extension of RDP Code with ParallelDecoding Procedure," the 9 th IEEE Consumer Communications and NetworkingConference (CCNC 2012), Las Vegas, NV, USA, Jan. 14 - 17, 2012.Z. Su, P. Ren, and Y. <strong>Chen</strong> "Consistency Control to Manage Dynamic Contents overVehicular Communication Networks," the IEEE GlobeCom 2011- Communications QoS.Reliability, and Modeling Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011.M. Xiang, Y. <strong>Chen</strong>, W.-S. Ku, and Z. Su, "Mitigating DDoS Attacks using ProtectionNodes in Mobile Ad hoc Networks," the IEEE GlobeCom 2011- Communication &System Security Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011.S. Mazur, E. Blasch, Y. <strong>Chen</strong>, and V. Skormin, "Mitigating Cloud Computing Securityusing a Self-Monitoring Defense Scheme," the 2011 National Aerospace & ElectronicsConference (NAECON’11), Dayton, OH., USA, July 20 - 22, 2011.J. Feng, Y. <strong>Chen</strong>, and D. Summerville, "A Fair Multi-Party Non-Repudiation Scheme forStorage Clouds," the 2011 International Conference on Collaboration Technologies andSystems (CTS 2011), Philadelphia, PA., USA, May 23 - 27, 2011.Y. <strong>Chen</strong>, C. Twigg, O. Sadik, and S. Tong, “A Self-Powered Adaptive Wireless SensorNetwork for Wastewater Treatment Plants”, the 9 th Annual IEEE Conference onPervasive Computing and Communications (PerCom’2011), Seattle, USA, March 21 -25, 2011.J. Feng, Y. <strong>Chen</strong>, D. Summerville, W.-S. Ku, and Z. Su, “Enhancing Cloud StorageSecurity against Roll-back Attacks with a New Fair Multi-Party Non-RepudiationProtocol”, the 8 th IEEE Consumer Communications and Networking Conference -Security for CE Communications (CCNC’11), Las Vegas, Nevada, USA, January 9 - 12,2011.Y. <strong>Chen</strong>, C.-J. Wang, W.-S. Ku, and Z. Su, “A Location Aware Virtual Infrastructure forVANETs”, the 8 th IEEE Consumer Communications and Networking Conference -Security for CE Communications (CCNC’11), Las Vegas, Nevada, USA, January 9 - 12,2011.H. <strong>Chen</strong> and Y. <strong>Chen</strong>, “A Comparison Study of Collaborative Strategies for DistributedDefense against Internet Worms based on Small-World Modeling,” the 6 th InternationalConference on Collaborative Computing: Networking, Applications and Worksharing(CollaborateCom 2010), Chicago, Illinois, USA, Oct. 9 – 12, 2010.J. Feng, Y. <strong>Chen</strong>, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and aNon-repudiation Protocol for Cloud Data Storage Platforms," the 2 nd InternationalWorkshop on Security in Cloud Computing (SCC 2010), held in conjunction with the 39 thInternational Conference on Parallel Processing (ICPP 2010), San Diego, California,USA, Sept. 13, 2010.J. Feng, Y. <strong>Chen</strong>, W.-S. Ku, and Z. Su, “D-DOG: Securing Sensitive Data in DistributedStorage Space by Data Division and Out-of-order keystream Generation”, the 2010 IEEE6


[C25][C26][C27][C28][C29][C30][C31][C32][C33][C34][C35][C36]International Conference on Communications - Communication and Information SystemSecurity Symposium (ICC'10 CISS), Cape Town, South Africa, May 23 - 27, 2010.J. Feng, Y. <strong>Chen</strong>, D. Summerville, "EEO: an Efficient MDS-like RAID-6 Code forParallel Implementation," the 33rd IEEE Sarnoff Symposium, Princeton, NJ, USA, Apr.12-14, 2010.P. Gasti and Y. <strong>Chen</strong>, “Breaking and Fixing the Self-Encryption Scheme for DataSecurity in Mobile Devices”, the 18 th Euromicro International Conference on Parallel,Distributed and network-based Processing (PDP 2010) – Special Session “Security inNetworked and Distributed Systems” (SNDS 2010), Pisa, Italy, February 17 - 19, 2010.J. Feng, Y. <strong>Chen</strong> and P. Liu, “Bridging the Missing Link of Cloud Data Storage Securityin AWS”, the 7 th IEEE Consumer Communications and Networking Conference -Security for CE Communications (CCNC’10), Las Vegas, Nevada, USA, January 9 - 12,2010.Y. <strong>Chen</strong> W.-S. Ku, K. Sakai, and C. DeCruze, “A Novel DDoS Attack DefendingFramework with Minimized Bilateral Damages”, the 7 th IEEE ConsumerCommunications and Networking Conference - Security for CE Communications(CCNC’10), Las Vegas, Nevada, USA, January 9 - 12, 2010.H. <strong>Chen</strong>, D. Summerville, and Y. <strong>Chen</strong>, “Two-Stage Decomposition of SNORT Rulestowards Efficient Hardware Implementation,” the 7 th International Workshop on Designof Reliable Communication Networks (DRCN 2009), Washington, D.C., USA, October25 – 28, 2009.Z. Su, Z. Zhang, and Y. <strong>Chen</strong>, “Performance Evaluation of a Novel Caching Algorithmfor Scalable Image Contents,” the 2 nd International Symposium on Intelligent Informatics(ISII 2009), Qinhuangdao, China, September 13 – 15, 2009.I. M. Atakli, Y. <strong>Chen</strong>, Q. Wu, and S. Craver, “BLINK: Pixel-Domain Encryption forSecure Document Management”, the 11 th ACM Workshop on Multimedia and Security(MMSEC 2009), Princeton, New Jersey, USA, September 7 - 8, 2009.Y. <strong>Chen</strong> and W.-S. Ku, “Self-Encryption Scheme for Data Security in Mobile Devices”,the 6 th IEEE Consumer Communications and Networking Conference - Security for CECommunications (CCNC’09), Las Vegas, Nevada, USA, January 10 - 13, 2009.S. Craver, Y. <strong>Chen</strong>, H. <strong>Chen</strong>, J. <strong>Yu</strong>, and I. M. Atakli, “BLINK: Securing Information tothe Last Connection”, the 6 th IEEE Consumer Communications and NetworkingConference (CCNC’09), Las Vegas, Nevada, USA, January 10 - 13, 2009.Z. Su, J. Katto, Y. Yasuda, and Y. <strong>Chen</strong>, “Consistency Control for Dynamic Contents inMobile Overlay Network,” the 3 rd International Conference on Communications andNetworking in China (ChinaCom’08), Hangzhou, China, August 25 – 27, 2008. [BestPaper Award]Z. Su, Z. Zhang, and Y. <strong>Chen</strong>, “Retrieve Scalable Image Contents over Image ContentsNetwork by Efficient Caching Algorithms,” the 3 rd International Conference ofInnovative Computing, Information and Control (ICICIC 2008), Dalian, China, June 18 –20, 2008.H. <strong>Chen</strong> and Y. <strong>Chen</strong>, “A Novel Embedded Accelerator for Online Detection of ShrewDDoS Attacks,” the 2008 IEEE International Conference on Networking, Architecture,and Storage (NAS’08), Chongqing, China, June 12 – 14, 2008.7


[C37][C38]Y. <strong>Chen</strong>, J. Bao, W.-S. Ku, and J.-L. Huang, “Cache Management Techniques forPrivacy Protected Location-based Services,” the 2 nd International Workshop onPrivacy-Aware Location-based Mobile Services (PALMS’08), in conjunction with the 9 thInternational Conference on Mobile Data Management (MDM’08), Beijing, China,April 27, 2008.I. Atakli, H. Hu, Y. <strong>Chen</strong>, W.-S. Ku, and Z. Su, “Malicious Node Detection in WirelessSensor Networks using Weighted Trust Evaluation,” invited paper, the ACM/SIGSIMSymposium on Simulation of System Security (SSSS’08), Ottawa, Canada, April 14 – 17,2008.[C39] Y. <strong>Chen</strong>, “NeuroNet: Towards an Intelligent Internet Infrastructure”, the 5 th IEEEConsumer Communications and Networking Conference (CCNC’08), Las Vegas,Nevada, USA, January 10 - 12, 2008.[C40][C41][C42][C43][C44][C45][C46][C47][C48]Y. <strong>Chen</strong>, K. Hwang, and W.-S. Ku, “Distributed Change-Point Detection of DDoSAttacks: Experimental Results on DETER Testbed”, DETER Community Workshop onCyber Security Experimentation and Test, in conjunction with USENIX SecuritySymposium (Security’07), Boston, MA., USA, August 6-7, 2007.Y. <strong>Chen</strong> and K. Hwang, “Spectral Analysis of TCP Flows for Defense againstReduction-of-Quality Attacks,” the 2007 IEEE International Conference onCommunications (ICC’07), Glasgow, Scotland, June 24-28, 2007.Y. <strong>Chen</strong> and K. Hwang, “Collaborative Change Detection of DDoS Attacks onCommunity and ISP Networks,” the 2006 IEEE International Symposium onCollaborative Technologies and Systems (CTS’06), Las Vegas, Nevada, USA, May.15-17, 2006.Y. <strong>Chen</strong>, K. Hwang, and Y.-K. Kwok, “Filtering of Shrew DDoS Attacks in FrequencyDomain,” the First IEEE LCN Workshop on Network Security (WoNS), in conjunctionwith the LCN 2005, Sydney, Australia, Nov. 15-17, 2005.Y.-K. Kwok, R. Tripathi, Y. <strong>Chen</strong>, and K. Hwang, “HAWK: Halting Anomalies withWeighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks,”the 2005 International Conference on Computer Networks and Mobile Computing(ICCNMC’05), Zhangjiajie, China, Aug. 2-4, 2005.Y. <strong>Chen</strong>, Y.-K. Kwok, and K. Hwang, “MAFIC: Adaptive Packet Dropping for CuttingMalicious Flows to Push Back DDoS Attacks,” the 2 nd International Workshop onSecurity in Distributed Computing Systems (SDCS’05), in conjunction with ICDCS 2005,Columbus, OH, USA, June 6-10, 2005.K. Hwang, Y.-K. Kwok, S. Song, M. Cai, <strong>Yu</strong> <strong>Chen</strong>, R. Zhou, Ying <strong>Chen</strong>, and X. Lou,“GridSec: Trusted Grid Computing with Security Binding and Self-Defense againstNetwork Worms and DDoS Attacks,” in Proceedings of International Workshop on GridComputing Security and Resource Management (GSRM-2005), in conjunction with theICCS-2005, Atlanta, GA, May 22-24, 2005.W. <strong>Yu</strong>, X. Zhong, Z. Wu, and Y. <strong>Chen</strong>, “Analysis of Dual-Frequency MEMS AntennaUsing H-MRTD Method,” International Symposium on Optical Science and Technology,SPIE 49th Annual Meeting, Denver, USA, August 2-6, 2004.Z. Wu, X. Zhong, W. <strong>Yu</strong>, and Y. <strong>Chen</strong>, “Simulation of Photonic Crystals Antenna UsingADI-FDTD Method,” International Symposium on Optical Science and Technology,8


[C49][C50][C51]SPIE 49th Annual Meeting, Denver, USA, August 2-6, 2004.Y. <strong>Chen</strong>, X. Zhong, K. Li, and S. Xiao, “A MEMS CAD System Based on CORBA,”International Symposium on Smart Structures and Microsystems (IS 3 M 2000), HongKong, October 19-21, 2000.K. Li, X. Zhong, and Y. <strong>Chen</strong>, “Design for Micro Diffractive Lens for Imaging,”International Symposium on Smart Structures and Microsystems (IS 3 M 2000), HongKong, October 19-21, 2000.K. Li, X. Zhong, and Y. <strong>Chen</strong>, “Compensation Network for Multiple IntensityModulated Optical Fiber Sensors,” International Conference on Sensors and ControlTechniques (ICSC 2000), Wuhan, China, May 2000.Selected Other Publications[1] A. Bardhan, Y. <strong>Chen</strong>, A. Fuchs, A. Kapre, A. Lane, R. Lu, P. Manadhata, J. Molina, A.C. Mora, P. Murthy, A. Roy, S. Sathyadevan, and N. Shah, “Top Ten Big Data Securityand Privacy Challenges,” Cloud Security Alliance (CSA) Annual Congress 2012,Orlando, FL, USA, Nov. 7, 2012, organized by S. P. Rajan, W. van Ginkel, and N.Sundaresan, available at https://cloudsecurityalliance.org/download/expanded-top-ten-big-data-security-and-privacy-challenges/.[2] Y. <strong>Chen</strong>, X. Zhong, and K. Li, “A Distributed MEMS CAD Based on 3-Tier Structure”,Micro-Nanometer Science & Technology (in Chinese), Vol. 5, No.1, 2000, pp78-81.[3] Y. <strong>Chen</strong>, C. Wang, and Q. Ye, “Implementation of Three-Tier Structure In A DistributedMEMS CAD System”, Journal of Chongqing <strong>University</strong> of Post and Telecommunication(in Chinese), No.3, September, 2000, pp1-5.[4] Y. <strong>Chen</strong>, X. Zhong, and K. Li, “Research Achievement of MEMS CAD”, Optics andPrecision Engineering (in Chinese), Vol.17, No.6, 1999, pp1-5.[5] Y. <strong>Chen</strong>, X. Zhong, D. Xu, K. Li, and S. Xiao, “Micromechanical Array Filter”, ChineseJournal of Scientific Instrument (in Chinese), Vol.20, No.4, 1999, pp200-203.[6] K. Li, X. Zhong, and Y. <strong>Chen</strong>, “Status of Microsystem Technology in Blood CellDetection and its Perspective”, Chinese Journal of Scientific Instrument (in Chinese),Vol.20, No.4, 1999, pp176-179.[7] S. Xiao, X. Zhong, Y. <strong>Chen</strong>, and X. Miu, “Study on an Image Measurement for IrregularRotary Objects”, Optics and Precision Engineering (in Chinese), Vol.15, No.4, 1997,pp99-103.[8] L. Li, X. Zhong, and Y. <strong>Chen</strong>, “Non-Contact Detection Techniques of 3D CurveProfile”, Practical Measurement Technology (in Chinese), No.1, 1996, pp22-24;[9] G. Liu, X. Zhong, K. Li, and Y. <strong>Chen</strong>, “Characteristic Study of Light IntensityModulation Methods for Fiberoptic Vibration Sensor with Cantilever”, Journal ofTransducer Technology (in Chinese), No.3, 1995, pp20-23.Invited Talks[T1][T2]“Information Fusion in Cloud Computing Era: A Systems-Level Perspective,” theAFRL/RIEA Alford Lecture Series Opportunities (ALSO), Rome, NY, July 25, 2013.“A Remote Trustworthy Attestation Scheme for Mobile Cloud Auditing DataDistribution,” the 2013 AFRL CyberBAT/VFRP Technical Interchanging Meeting (TIM),9


[T3][T4][T5][T6][T7]Rome, NY, July 15-18, 2013.“In Introduction to Moving-Target Defense for Cloud Systems,” the CoCo SeminarSeries, <strong>Binghamton</strong> <strong>University</strong>, November 7, 2012."A Fair Non-Repudiation Framework for Data Integrity in Cloud Storage Services," theAFCEA Cyber and Information Challenges Conference, Marcy, NY, USA., June 12-14,2012."A Fair Non-Repudiation Framework for Cloud Storage," the 11th Emerging Informationand Technology Conference (EITC 2011), Chicago, Illinois, USA., July 28-29, 2011.“Analysis of Integrity Vulnerabilities and a Non-repudiation Framework for StorageCloud,” Temple <strong>University</strong>, Philadelphia, PA., August 2010.Regional Symposium on Graduate Education and Research in Information Security(GERIS’09), <strong>Binghamton</strong>, NY., October 2009.[T8] SUNY-<strong>Binghamton</strong> CoCo Technical Seminar, March 2009.PATENTS[PI][PII][PIII][PIV]I. Atakli, S. Craver, and Y. <strong>Chen</strong>, “BLINK: a Hardware System for Secure DocumentManagement,” SUNY RB 358, USPTO Ser. Nr. 61/xxx,xxx, June 30, 2011;J. Feng and Y. <strong>Chen</strong>, “Extended Row Diagonal Parity with Optimal DecodingProcedure,” SUNY RB 350, USPTO Ser. Nr. 61/365,075, July 16, 2010;J. Feng and Y. <strong>Chen</strong>, “System and Method for Efficient Horizontal Maximum DistanceSeparable RAID,” SUNY RB 348, USPTO Ser. Nr. 61/332,568, April 9, 2010;Y. <strong>Chen</strong>, “Triple Layer Distributed Data Storage Security,” SUNY RB 338, USPTO Ser.Nr. 61/293,409, Jan. 8, 2010;PROFESSIONAL ACTIVITIESOff-Campus ServicesChair, IEEE Computer Society, <strong>Binghamton</strong> Chapter, 2012 ~ 2013.Secretary, IEEE Communication Society, <strong>Binghamton</strong> Chapter, 2012 ~ 2013.Vice Chair, IEEE Communication Society, <strong>Binghamton</strong> Chapter, 2009 ~ 2011.On Campus ServicesThe Library Committee, Watson School of Engineering, Since Fall 2008.The Graduate Study Committee, Dept. of ECE, Since Fall 2008.Journal Editorial Board Memberships:[E1]Associate Editor, the International Journal of Intelligent Information Processing (IJIIP)[E2] Associate Editorial, the FTRA Journal of Convergence (JoC), 2013 ~[E3] Editorial Board Member, the Journal of Platform Technology (JPT), 2013 ~[E4] Editorial Board Member, the Journal of Multimedia Information Systems, 2013 ~[E5]Editorial Board Member, the International Journal of Computer Networks (IJCN)10


[E6] Editorial Board Member, the FTRA Journal of Convergence (JoC), 2012[E7][E8][E9]Editorial Board Member, the International Journal of Adaptive and Innovative Systems(IJAIS), 2011 ~ 2012.Guest Editor, the International Journal of Cloud Computing, Special Issue on InformationAssurance and System Security in Cloud Computing, 2012.Guest Editor, Peer-to-Peer Networking and Applications, Special Issue on Cloud, Grid,P2P and Internet Computing, 2012.[E10] Guest Editor, Special Issue in Information Journal, 2012.[E11] Guest Editor, Peer-to-Peer Networking and Applications, Special Issue on NewTechnologies and Research Trends in Ubiquitous Sensor Network and P2P SocialNetwork Services, 2012.[E12] Guest Editorial Board Member, Journal of Universal Computer Science, Special Issue onData Security and Privacy Protection in Pervasive Computing Environments, 2008Conference/Workshop Organizer:[O1] The 2 nd International Workshop on Advanced Technologies of Cloud Computing(WATCC’2014), Minneapolis, MN, USA, September 9-12, 2014.[O2][O3][O4]The 2013 International Workshop on Cloud Enhanced Information Fusion(CloudFusion’2013), Gwangju, Korea, September 4-6, 2013.The International Workshop on Advanced Technologies of Cloud Computing(WATCC’2013), Lyon, France, October 04, 2013.The 8 th FTRA International Conference on Future Information Technology (FutureTech2013), Gwangju, Korea, September 4-6, 2013.[O5] The 4 th International Workshop on Security in Cloud Computing (CloudSec’2012),Pittsburgh, PA. USA, September 12, 2012.[O6] The 9 th IFIP International Conference on Network and Parallel Computing (NPC 2012),Gwangju, Korea, Sept. 6-8, 2012.[O7]The 2012 FTRA International Conference on Mobile, Ubiqitous and IntelligentComputing (MUSIC 2012), Vancouver, Canada, June 26 – 28, 2012.[O8] The 3 rd International Workshop on Security in Cloud Computing (CloudSec’2011),Taipei, Taiwan, September, 2011.[O9]The 2 nd International Workshop on Security in Cloud Computing (SCC’2010), San Diego,California, USA, Sept. 2010.[O10] The 2009 International Workshop on Security in Cloud Computing (SCC’09), <strong>Chen</strong>gdu,China, Dec. 2009.[O11] The 2009 International Workshop on Secure Multimedia Communication and Services(SECMCS’09), Wuhan, China, Nov. 2009.[O12] The 2009 International Conference on Multimedia Information NEtworking and Security(MINES 2009), Wuhan, China, Nov. 2009.[O13] ChinaCom’08 Workshop on MUltimedia Security In Communications (MUSIC’08),Hangzhou, China, Aug. 2008.11


Conference Chairs:[H1]Program Co-chair, CSA-14[H2] Publicity Co-chair, FutureTech 2014[H3] Program Vice Co-Chair, IEEE/IFIP EUC 2013, Reconfigurable Computing Systems andApplications Track[H4] General Co-Chair, CloudFusion’2013[H5] General Co-Chair, WATCC-2013[H6] Workshop Co-Chair, FutureTech-2013[H7] Program Co-Chair, WTA’2012[H8] TPC Chair, CloudSec’2012.[H9] Program Co-Chair, NPC-2012[H10] Program Chair, MUSIC 2012[H11] TPC Chair, CloudSec’2011.[H12] Publicity Chair, F2GC 2010, F2GC 2011.[H13] Session Chair, IEEE CCNC 2008, 2009, 2010, 2011, 2012[H14] Session Chair, IEEE GlobeCom 2011[H15] TPC Chair, SCC’2010.[H16] Symposium Co-Chair, IEEE WCNIS2010 “Communication and Information SecuritySymposium”.[H17] Publicity Chair, MINES’2010.[H18] General Chair, SCC’09.[H19] Publicity Chair, SECMCS’09.[H20] Publicity Chair, MINES’09.[H21] TPC Chair, MUSIC’08.[H22] Session Chair, IEEE NAS’08[H23] Session Chair, SCS & ACM/SIGSIM SSSS’08Conference Technical Program Committee (TPC):[M1][M2][M3]IEEE International Conference on Communications (ICC)• Communication and Information Systems Security Symposium (CISS, 2009, 2010,2011, 2012, 2013)• Mobile and Wireless Networks Symposium (MWN 2014)• Wireless Networks Symposium (WN, 2008, 2009, 2010, 2012, 2013)• Ad-hoc and Sensor Networking Symposium (AHSN, 2012, 2013, 2014)IEEE Global Communications Conference (GLOBECOM)• Communication & Information System Security Symposium (CISS, 2008, 2009, 2010,2011, 2012, 2013, 2014)• Ad-hoc and Sensor Networking Symposium (AHSN, 2010, 2011, 2012, 2013, 2014)• Wireless Networking Symposium (WN, 2011, 2013, 2014)• Cognitive Radio and Network Symposium (CogRN 2013, 2014)The IFIP International Conference on New Technologies, Mobility and Security (NTMS,12


2008, 2009, 2011, 2012, 2014)[M4] IEEE INFOCOM’2014 Workshop on Mobile Cloud Computing[M5] The International Conference on Computing, Networking and Communications• Cloud Computing and Networking Symposium (CLD 2012)• Communications and Information Security Symposium (CIS 2012)[M6] The 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEEMASS 2013)[M7] The IEEE International Conference on Advanced Information Networking andApplications (AINA-2012, 2013), Track 10 (Multimedia and Social Networking)[M8] The IEEE Asia Pacific Cloud Computing Congress 2012 (AP-Cloud)[M9] The 2014 International Conference on Internet of Vehicles (IOV 2014)[M10] The 9 th International Conference on Risks and Security of Internet and Systems: CriSIS2014[M11] The 23 rd International Conference on Computer Communication Networks (ICCCN2014), Track on Multimedia and Real-Time Networking (MRN)[M12] The 22 nd International Conference on Computer Communication Networks (ICCCN2013), Track on Security, Privacy and Trust (SPT)[M13] The ACM/SIGSIM/SCS Annual Simulation Symposium (ANSS, 2009, 2010, 2011,2012)[M14] IEEE International Wireless Communications and Mobile Computing Conference• Computer and Network Security Symposium (CNS), 2008• Wireless Network Symposium (WNS), 2014[M15] The IEEE/IFIP International Symposium on Trusted Computing and Communications(TrustCom 2009, 2010, 2011, 2012, 2013)[M16] The IEEE International Conference on High Performance Computing andCommunications (HPCC’2010, 2014)[M17] The IEEE International Conference on Wireless and Mobile Computing, Networkingand Communications (WiMob 2010, 2011, 2012, 2013, 2014)[M18] The IEEE Consumer Communications and Networking Conference (CCNC 2008, 2009,2010, 2011, 2012)[M19] The Annual IEEE International Symposium on Personal, Indoor and Mobile RadioCommunications (PIMRC 2011, 2012)[M20] The IEEE International Workshop on Cloud Security Auditing (CSAW 2013, 2014)[M21] IEEE Wireless Communications & Networking Conference 2014 (WCNC’14)[M22] The ACM/IEEE/IFAC/TRB International Conference on Connected Vehicles (ICCVE2012)[M23] The IEEE 8th International Symposium on Embedded Multicore/Many-coreSystem-on-Chip (MCSoC-14)[M24] The 2014 International Conference on Platform Technology and Service (PlatCon 14)[M25] The International Conference on Selected Topics in Mobile & Wireless Networking(iCOST, 2011, 2012)[M26] The First IEEE International Conference on Communications in China: CommunicationsQoS and Reliability (ICCC'12 - CQR)13


[M27] The 2013 International Conference on Connected Vehicles & Expo. (ICCVE 2013)[M28] International Conference on Cloud and Green Computing (CGC 2011, 2012)[M29] The International workshop on Data Center Performance (DCPerf 2011, 2012, 2013)[M30] The 1 st International Workshop on Enterprise Cloud Computing: Solutions andStrategies (ECCSS 2012)[M31] The International Conference on Security in Computer Networks and DistributedSystems (SNDS-2012)[M32] The IEEE International Workshop on Wireless and Sensor Network Security (WSNS,2008, 2009, 2010, 2011)[M33] The 2012 International Workshop on Mobile Cloud and Ubiquitous Computing(Mobi-Cloud 2012)[M34] The IEEE International Conference on Utility and Cloud Computing (UCC 2010, 2011)[M35] The 3 rd IEEE International Symposium on UbiSafe Computing (UbiSafe 2011)[M36] The International Conference on Computing, Networking and Communications, InternetServices and Applications Symposium (ICNC – ISA 2013, 2014).[M37] The FTRA International Symposium on Advances in Cryptography, Security andApplications for Future Computing (ACSA 2009, 2010, 2011, 2012)[M38] The 2012 International Conference on Wireless Communications & Signal Processing,Wireless Networking Symposium (WCSP 2012 - WNS)[M39] The First IEEE International Conference on Communications in China: WirelessNetworking and Applications (ICCC'12 - WNA)[M40] The International Conference on Frontier of Computer Science and technology (FCST2009, 2011, 2012)[M41] The IEEE Workshop on Grid and P2P Systems and Applications (ICCCN GridPeer2009, 2010, 2011)[M42] The International Workshop on Sustainable High Performance Cloud Computing(SHPCC 2011, SHPCloud-2012)[M43] The Annual International Conference on Mobile Communications, Networking andApplications 2011 (MobiCONA 2011)[M44] The 9th ACS/IEEE International Conference on Computer Systems and Applications(ICCSA 2011)[M45] The 14th IEEE International Conference on Computational Science (CSE 2011)[M46] The International Conference on Communications and Mobile Computing (CMC 2009,2010, 2011)[M47] The 2011 International Conference on Cloud and Service Computing (CSC2011)[M48] The International Workshop on Secure Multimedia Communication and Services(SECMCS 2009, 2010, 2011)[M49] The 2011 International Workshop on Computing and Communications (CC-11)[M50] The International Conference and workshop on Current Trends in InformationTechnology (CTIT 2009, 2011)[M51] the 6th International Conference on Intelligent Sensors, Sensor Networks andInformation Processing (ISSNIP 2010)[M52] The 4 th International Workshop on Localized Algorithms and Protocols for WirelessSensor Networks (LOCALGOS 2010)14


[M53] CHINACOM Wireless Communications and Networking Symposium (CHINACOMWCN 2009, 2010)[M54] The 7 th European Conference on Wireless Sensor Networks (EWSN 2010)[M55] The 2 nd IEEE International Workshop on Information and Data Assurance (WIDA’09)[M56] The IEEE International Workshop on Security and Privacy in Wireless and MobileComputing, Networking and Communications (SecPri_WiMob 2008, 2009)[M57] IEEE Workshop on Web Privacy and Trust (held with IEEE/WIC/ACM InternationalConference on Web Intelligence, 2009)[M58] The 4 th International Symposium on Information Security (OTM IS 2009)[M59] The Workshop on Advanced Wireless Broadband Networks (AWBN’09), held inconjunction with MobiQuitous’09.[M60] The International Conference on Security and Cryptography (SECRYPT 2009)[M61] The 3 rd International Workshop on Privacy-Aware Location-based Mobile Services(PALMS’09)[M62] The 2009 SCS Symposium on Simulation of System Security (SSSS’09)[M63] The 1 st International Conference on Network and Service Security (N2S 2009)[M64] Workshop on Radio Resource Management in Wireless Mesh Networks 2008(RRMinMesh’08)Invited Reviewer:[R1][R2][R3][R4][R5][R6][R7][R8][R9]IEEE Transactions on Information Forensics and SecurityIEEE Transactions on ComputersIEEE Transactions on Wireless CommunicationsIEEE Transactions on Network and Service ManagementIEEE Transactions on Parallel and Distributed SystemsIEEE Transactions on Mobile ComputingIEEE Communications LettersACM Transactions on Sensor NetworksACM/Springer Wireless Network Journal (WINET)[R10] International Journal of Parallel and Distributed Computing, Elsevier[R11] International Journal of Network and Computer Applications, Elsevier[R12] International Journal of Applied Soft Computing, Elsevier[R13] International Journal of Computer Communications, Elsevier[R14] International Journal of Grid Computing: Theory, Methods and Applications, Elsevier[R15] International Journal of Pervasive and Mobile Computing, Elsevier[R16] International Journal of Ad Hoc Networks, Elsevier[R17] International Journal of Future Generation Computer Systems, Elsevier[R18] International Journal of Computers & Electrical Engineering, Elsevier15


[R19] International Journal of Information Security, Springer[R20] International Journal of Wireless Communications and Mobile Computing, Wiley[R21] International Journal of Security and Communication Networks, Wiley.[R22] International Journal of Software: Practice and Experience.[R23] International Journal of Information and Computer Security.[R24] International Journal of Information, Intelligence and Knowledge[R25] International Journal of Open Problems in Computer Science and Mathematics[R26] International Journal of Universal Computer Science[R27] EURASIP Journal on Advances in Signal Processing[R28] EURASIP Journal on Information Security[R29] Electronics and Telecommunications Research Institute Journal (ETRI)[R30] Scientific Journals International (SJI)[R31] Book chapter review: Encyclopedia of Data Warehousing and Mining, 2 nd Ed., (2007)[R32] European Conference on Complex Systems 2009 (ECCS’09)[R33] IEEE 28 th International Conference on Distributed Computing Systems, 2008(ICDCS’08)[R34] IEEE 14 th International Symposium on High-Performance Computer Architecture, 2008(HPCA’08)[R35] IEEE Wireless Communications & Networking Conference 2006, 2007, 2008(WCNC’06, ’07, ’08).[R36] IEEE International Conference on Communications, Computer and CommunicationNetwork Security Symposium 2007, 2008 (ICC CCN ‘07, ‘08)[R37] The 14 th Asia-Pacific Conference on Communications, 2008 (APCC’08)[R38] The 4 th European Conference on Wireless Sensor Networks 2007 (EWSN 2007).[R39] The 2 nd IEEE International Workshop on Security in Distributed Computing Systems(SDCS 2005).TEACHING ACTIVITIESCoursesEECE 658 Hardware-based Security Sp’08, Sp’10, Sp’12, Sp’14EECE 657 Network Security Sp’07, Sp’09, Sp’11, Sp’13EECE 553 Computer Network Architecture Every Fall semester since 2007EECE 352 Computer Architecture Every Spring semester since 2009Current AdvisingPhD Students: Bingwei Liu (Outstanding PhD Teaching Assistant Award, ECE Dept.,Spring 2013).MS Students:David Arnold, Alex Diperna, Qi Dong, Daniel Fashakin, Qi Li, Aaron Lin,16


Graduated StudentsPh.D. Dissertations:Tianchong Li, Brendon Poland, Curt Ryersen, Raghavendra Vurumunder,Yang Zhang, Da Zhou.Hao <strong>Chen</strong>, Su’ 2014. (Outstanding PhD Student Research Award, ECE Dept., Spring 2013)“A Hardware-based, Collaborative, Auto-Defensive Network Infrastructure”Jun Feng, Fa’ 2012. (Outstanding PhD Student Research Award, ECE Dept., Spring 2012)“Data Security Technologies for Robust Cloud Storage Services”Masters (Thesis):Yang Huang, MSEE, December 2013.“Application of Graphic Social Network in Ancient Chinese History Research”Brendan Kerrigan, MSEE, May 2012.“A Study of Entropy Sources in Cloud Computers: Random Number Generation on CloudHosts”Rohan Golatkar, MSEE, December 2011.“LAVI: A Location Aware Virtual Infrastructure for Vehicle Ad hoc Networks”Christopher Hui, MSEE, May 2011.“An Optimal Design of Bloom Filters for Fast String Matching”Minda Xiang, MSEE, December 2010.“Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad hoc Networks”Masters (Project):Hongwei Ren, MSEE, December 2013.“Stock Returns Analysis and Prediction Based on Hadoop”Alex Hoang, MSEE, May 2013.“Experimental Validation of Unclonable Digital Fingerprint of Smartphones”Tianruo Hu, MSEE, May 2013.“A New Alternative Approach for Data Confidentiality”Mao Lin, MSEE, May 2013.“Power Management System for Microbial Fuel Cell”Ken J. <strong>Chen</strong>, MSEE, December 2012.“NS2 LAVI Implementation and Simulation.”Eric Norris, MSEE, May 2012.“Red Hat Enterprise Virtualization Cloud Platform”Robert Leiss, MSEE, December 2011.“Source Code Translation Tool: For use with the X# XML Schema Definition”Sean Xu, MSEE, December 2011.“A Survey of Top Cloud Computing Security Issues.”Michael Schneberg, MSEE, May 2011.“A Comparative Study of Grid and Cloud Simulation Software.”Sushant Agrawal, MSEE, May 2011.17


“Security in Routing Protocols in Mobile Ad Hoc Networks.”Ziyad Rouhana, MSEE, May 2011.“Computer Architecture Course Project Development.”Jim Mash, MSEE, December 2010.“A Study and Evaluation of Cloud Simulation Tools.”Krunal G. Shah, MSEE, Aug. 2010.“Threats and Security Issues in Cloud Computing.”Prerna Lele, MSEE, Aug. 2010.“DDOS Attack generation and analysis.”Jonah Roth, MEng, may 2009.“Experimental Study of Malicious Nodes Detection in Wireless Sensor Networks.”Bharti Dadhich, MSEE, Dec. 2008.“Wireless Sensor Networks – Experiment, Study, and Simulation.”Advising Board ServicesPhD Dissertation Committee Served On:Current:<strong>Chen</strong>, XiaomingWang, WeiWang, XiaoliangGui, QiongBhowmik, RajdeepKim, MinaNykodym, TomasSabbah, EricSieffert, MichaelGe, YangAtakli, Idris M.Completed:Kim, Daihee(ME dept. <strong>Binghamton</strong> Univ., extern member)(ME dept. <strong>Binghamton</strong> Univ., extern member)(ECE dept. <strong>Binghamton</strong> Univ.)(ECE dept. <strong>Binghamton</strong> Univ.)(CS dept. <strong>Binghamton</strong> Univ., extern member)(ECE dept. <strong>Binghamton</strong> Univ.)(ECE dept. <strong>Binghamton</strong> Univ.)(CS dept. <strong>Binghamton</strong> Univ., extern member)(ECE dept. <strong>Binghamton</strong> Univ.)(ECE dept. <strong>Binghamton</strong> Univ.)(ECE dept. <strong>Binghamton</strong> Univ.)(CS dept. <strong>Binghamton</strong> Univ., extern member, Sp’2014)Wang, Xiaoshuang (CS dept. <strong>Binghamton</strong> Univ., extern member, Fa’ 2013)Luo, RuiqiLi, XianDolgikh, AndreyMunishwar, VikramLu, JunLi, Enping(CS dept. <strong>Binghamton</strong> Univ., extern member, Su’2013)(CS dept. <strong>Binghamton</strong> Univ., extern member, Sp’2013)(ECE dept. <strong>Binghamton</strong> Univ., Sp’2013)(CS dept. <strong>Binghamton</strong> Univ., extern member, Fa’2012)(ECE dept. <strong>Binghamton</strong> Univ., Su’2012)(ECE dept. <strong>Binghamton</strong> Univ., Su’2012)18


Tan, Ying(ECE dept. <strong>Binghamton</strong> Univ., Sp’2012)Quinn, Rian (ECE dept. <strong>Binghamton</strong> Univ., Sp’2012)Wang, Jian (CS dept. <strong>Binghamton</strong> Univ., extern member, Su’2011)Zhou, Yan(CS dept. <strong>Binghamton</strong> Univ., extern member, Su’2011)Rood, Brent (CS dept. <strong>Binghamton</strong> Univ., extern member, Sp’2011)Oh, Jisu(CS dept. <strong>Binghamton</strong> Univ., extern member, Sp’2011)Tokhtabayev, Arnur (ECE dept. <strong>Binghamton</strong> Univ., Fa’2010)Zhang, Jingyi (ECE dept. <strong>Binghamton</strong> Univ., Sp’2010)Malani, Parth (ECE dept. <strong>Binghamton</strong> Univ., Su’2009)Suri, Tameesh (ECE dept. <strong>Binghamton</strong> Univ., Su’2009)Razak, Saquib (CS dept. <strong>Binghamton</strong> Univ., extern member, Su’2009)Pan, Yinfei (CS dept. <strong>Binghamton</strong> Univ., extern member, Sp’2009)Yang, Weishuai (CS dept. <strong>Binghamton</strong> Univ., extern member, Fa’2008)Liu, Ke(CS dept. <strong>Binghamton</strong> Univ., extern member, Sp’2008)Master Thesis Committee Served On:Viglucci, Paul (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2014)Temkin, Kyle (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2012)Van Tussel, Justin (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2011)Kumar, Anand (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2009)Zabran, Mikhail (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2009)Gopal, Darshan (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2009)Gadela, Siva Aneesh (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2008)Lee, Jenog Kyun (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2008)Ardolino, Kyle (ECE dept. <strong>Binghamton</strong> <strong>University</strong>, 2008)19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!