Assistant Professor Department of Electrical Engineering and Computer Science University of Cincinnati Cincinnati, Ohio 45221

Similar documents
Department of Electrical Engineering and Computer Science

Online Word of Mouth; Economics of Information Systems; Information Systems and Marketing; Pricing and Competitive Strategies

Online Word of Mouth; Economics of Information Systems; Information Systems and Marketing; Pricing and Competitive Strategies

Roshni Raveendhran. University of Texas at Arlington May 2011 Bachelor of Arts (Honors) in Psychology Summa cum laude

Address: 103 East Architecture Building Georgia Institute of Technology th Street Atlanta, GA Tel:

Jun Pei. 09/ /2009 Bachelor in Management Science and Engineering

Jun Pei. 09/ /2009 Bachelor in Management Science and Engineering

Mochen Yang EDUCATION RESEARCH INTERESTS JOURNAL PUBLICATIONS PAPERS UNDER REVIEW

Ying Liao, Ph.D. Associate Professor College of Business East Carolina University

Matthew E. Simmons B.S. Wildlife and Range Resources, Brigham Young University Minor: Zoology

Dr. Qun Zhou Update: 8/2/2018

Sabbie A. Miller Civil and Environmental Engineering, University of California, Davis 3157 Ghausi Hall, Davis, CA

Amanda L. Christensen Assistant Professor of Management Department of Management Carl H. Lindner College of Business

Non-degree Graduate Student, Department of Civil and Environmental Engineering

Yu Amy Xia, Ph.D. Northeastern University Brookline, MA Hayden Hall 360 Huntington Ave Boston, MA,

Assistant Professor, Department of Management and Marketing, Hong Kong Polytechnic University, June 2009-June 2015

Assistant Professor University of Colorado Colorado Springs AUG 2010 to present

CURRICULUM VITAE. Biographical Summary

Alice Alipour CV - Page 1 of 5

ZHIHUA WANG ARIZONA STATE UNIVERSITY

Babak Haji. babak.hajii

Toshifumi Kuroda. April, 2018

Curriculum Vitae Name Title Birth Date Gender Address Telephone Mobile Education Background Professional Experience

MINGON KANG. Department of Computer Science & Information Systems. University of Texas at Arlington Department of Computer Science and Engineering

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System

Assistant Professor, Department of Electrical Engineering, Hong Kong Polytechnic University

Ph.D. Texas A&M University, College Station, Texas 01/ /2013 Major: Hydrology Advisor: Vijay P. Singh

Associate Professor, Biomedical Engineering Program Director, Electrical Engineering and Computer Science

SHUO WANG Ph.D. in Environmental Systems Engineering, University of Regina, Canada

LIANG, XIAO. Hunan University July 2010 B.Eng. in Civil Engineering Program: Structural Engineering Advisor: Prof. Yan Xiao

Ying Chen, Ph.D UTSA BLVD, Apt 2102, San Antonio, Texas, 78249

SKILLS Statistical Programs: HLM, Lisrel, Mplus, R, SPSS, UCINET Language: Full professional proficiency in English, native in Chinese (Mandarin)

Lina Xiong. PUBLICATIONS Research areas: Internal branding, service management, customer loyalty

MIN Z. CARTER. Master of Business Administration (December 2002) Troy State University, Troy, Alabama

Mark A. Jacobs, Ph.D.

16th International Conference on Security and Cryptography

Q I W E I G A N Assistant Professor of MIS

School of Management & Labor Relations, Rutgers University, Piscataway, NJ Assistant Professor, Human Resource Management

Lin Xiu. Workplace diversity, work-life balance, compensation management, and strategic HRM in the context of globalization

Bachelor of Science in Mechanical Engineering (with Distinction) Zhejiang University, Zhejiang, China (One of the top five universities in China)

XIAOYAN DENG. Curriculum Vitae. Department of Marketing & Logistics Fisher College of Business The Ohio State University

Personalized Shopping App with Customer Feedback Mining and Secure Transaction

Alex Scott Purdue University, B.S., Industrial Engineering, West Lafayette, IN

Sheng (Monica) Wang. The Ohio State University Major Human Resource Management/Organizational Behavior Minor Quantitative Psychology

Shyh-Ming Huang ( 黃識銘 )

SHUO LI. (817) UTA Boulevard, Engineering Research Building 205, Arlington, TX 76019

XIAO LIANG, Ph.D. BIOGRAPHY SKETCH EDUCATION APPOINTMENTS

Jian Shi, Ph.D. Assistant Professor Department of Engineering Technology University of Houston Office: (713)

Yan (Lucy) Liu 刘焱 Oct Mays Business School Phone: (979) Texas A&M University Cell: (979)

Bachelor of Science in Mechanical Engineering (with Distinction) Zhejiang University, Zhejiang, China

Adam J. Fleischhacker

Psychology & Sociology; Minor in Social and Behavioral Sciences Methodology Degree with Highest Distinction May 2012 University of Kansas

DAN WEI. Academic and Professional Positions Research Assistant Professor, School of Policy, Planning, and Development,

Tingting Yan. Associate Professor (with tenure) Department of Marketing & Supply Chain Management 317 Prentis Building

CURRICULUM VITAE. 4. Sutley, E.J., J.W. van de Lindt, and L. Peek, (2016). Community-Level Framework for Seismic

PEER-REVIEWED JOURNAL PUBLICATIONS

Hee Man Park. The Ohio State University, Max M. Fisher College of Business Ph.D. in Management and Human Resources, 2017

REBECCA M. PALUCH Phone: (847)

15 Prospect Street, Room 021 Voice: (203)

REBECCA M. PALUCH Phone: (847)

Dept. of Industrial & Manufacturing Systems Engineering 3004 Black Engineering Bldg. Ames, IA 50011

Privacy Preserving Data Mining in Application

Rebecca Jen-Hui Wang

Ruixia (Sandy) Shi. Phone: Department of Supply Chain Management, University of San Diego

Ruixia (Sandy) Shi. Phone: Department of Supply Chain Management, University of San Diego

KEYNOTE SPEAKER. Professional Preparation

Bachelor of Science in Mechanical Engineering (with Distinction) Zhejiang University, Zhejiang, China

Richard L Wood, Ph.D.

WENDONG LI Department of Psychological Sciences, Kansas State University 467 Bluemont Hall, Manhattan, Kansas

Han Du. Department of Psychology University of California, Los Angeles Los Angeles, CA

Ph.D. in Information and Computer Science (Area: Bioinformatics), University of California, Irvine, August, (Advisor: Dr.

Devaki Rau Associate Professor Department of Management, College of Business Northern Illinois University De Kalb, IL

CRISTINA IFTODE. Current position: Associate Professor, Rowan University, Dept. Biological Sciences. Research Interests. Education.

CURRICULUM VITAE. Wei Tan OFFICES: SUMMARY OF EXPERIENCE

ZOEY CHEN (fall 2017) Phone: (305) zchen[at]bus[dot]miami[dot]edu

Yulan Amanda Wang EDUCATION ACADEMIC POSITION RESEARCH INTERESTS PUBLICATIONS

REFERRED JOURNAL PUBLICATIONS AND BOOK CHAPTERS

JONATHAN Z. ZHANG. Michael G. Foster School of Business University of Washington PACCAR Hall Box Seattle, WA

KRISTINA M. WORKMAN. Phone: (607) Fax: By Request

HA THU LE. Biography EDUCATION

Ann Melissa Campbell

PROFESSIONAL EXPERIENCE

Han Du. Department of Psychology University of Notre Dame Notre Dame, IN Telephone:

A STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF GENE MICROARRAY DATASET

AHMAD HADAVI. Civil Engineering from Iran University of Science and Technology, Tehran, Iran, 1978.

Deeksha Singh. Assistant Professor, School of Business, Rutgers University, Camden. Phone:

Application of Four-electrode Method to Analysis Resistance Characteristics of Conductive Concrete

BIOGRAPHICAL SKETCH. Dr. GARY S. TJADEN. Doctor of Philosophy, Computer Science The Johns Hopkins University 1973

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Jiman Hong Ph.D./Professor

CS 644: Introduction to Big Data. Chapter 1. Introduction

HELI WANG. Professor Strategy & Organization Lee Kong Chian School of Business Tel: (65)

University of Illinois at Chicago Last updated: Mar 08, S. Morgan (M/C 249) Web: sxie Chicago, Illinois

BART ORRIENS. PhD in Information Systems from Tilburg University, The Netherlands (September 2007).

Curriculum Vitae of Cheng JIANG

Deeksha Singh. Assistant Professor, School of Business, Rutgers University, Camden. Phone:

Water Quality Online Monitoring System Integration of Three Gorges Drawdown Areas

Curriculum Vitae (June 2013) Zhiqing Zhou. Department of Psychology, University of South Florida Phone: /

Comprehensive Energy Efficiency Analysis of Buildings Based on FP-Growth Association Rules

Arshan Nasir Ph:

Transcription:

Boyang Wang Ph.D. Present Appointment Assistant Professor Department of Electrical Engineering and Computer Science University of Cincinnati Cincinnati, Ohio 45221 Office: 532 Engineering Research Center Phone: 513-556-4785 Email: boyang.wang@uc.edu Web: http://homepages.uc.edu/~wang2ba/ Research Interests Education Honors and Awards Research Experience Privacy-preserving technologies, data privacy, applied cryptography, network security, machine learning and data mining Google Scholar Citations: 1,500 (as of August 2017) The University of Arizona, Tucson, Arizona Ph.D. in Electrical and Computing Engineering, May 2017 Dissertation Title: Secure Geometric Search on Encrypted Spatial Data Advisor: Dr. Ming Li Xidian University, Xi an, China Ph.D. in Cryptography, December 2013 Dissertation Title: The Study of Public Auditing for Shared Data in the Cloud Advisor: Dr. Hui Li Xidian University, Xi an, China B.S. in Information Security, July 2007 Presidential Doctoral Research Fellowship, Utah State University, 2014 (10 recipients/year) Outstanding Ph.D. Dissertation Award, Xidian University, 2014 (20 recipients/year) The University of Arizona, Tucson, Arizona August 2015 - May 2017 Research Assistant, Advisor: Dr. Ming Li Bosch Research & Technology Center, Pittsburgh, PA June 2015 - August 2015 Research Intern, Advisors: Dr. Jorge Guajardo and Dr. Xinxin Fan Utah State University, Logan, Utah January 2014 - August 2015 Research Assistant, Advisor: Dr. Ming Li Utah State University, Logan, Utah October 2012 - December 2013 Visiting Student, Advisor: Dr. Ming Li University of Toronto, Toronto, Ontario, Canada September 2010 - August 2012 Visiting Student, Advisor: Dr. Baochun Li Xidian University, Xi an, Shannxi March 2009 - December 2013 Research Assistant, Advisor: Dr. Hui Li 1

Teaching Experience Publications Dept. of ECE, The University of Arizona Spring 2016 Teaching Assistant, ECE 275 Computer Programming II, 100 undergraduate students Dept. of CS, Utah State University Fall 2013, Fall 2012 Guest Lecturer, CS 5460 Computer Security I, 30 undergraduate & graduate students Manuscripts under Review 1. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li and Yuqing Zhang, Efficient and Secure Reachability on Encrypted Location Data, IEEE Transactions on Information Forensics and Security (TIFS), under review (the full version of CANS 16 paper). 2. Boyang Wang, Yantian Hou and Ming Li, QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data, IEEE Transactions on Services Computing (TSC), under review (the full version of INFOCOM 16 paper). Journal Papers 1. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu and Yanfeng Shi, Toward Practical Privacy- Preserving Frequent Itemset Mining on Encrypted Cloud Data, IEEE Transactions on Cloud Computing (TCC), accepted, 2017. 2. Boyang Wang, Ming Li and Li Xiong, FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data, IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2017. 3. Boyang Wang and Xinxin Fan, Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data, IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, 2016. 4. Boyang Wang, Ming Li and Haitao Wang, Geometric Range Search on Encrypted Spatial Data, IEEE Transactions on Information Forensics and Security (TIFS), 11(4), pp.704-719, 2016. (top-20 popular TIFS articles in July and August 2016) 5. Yong Yu, Jiangbing Ni, Man Ho Au, Yi Mu, Boyang Wang and Hui Li, On the Security of a Public Auditing Mechanism for Shared Cloud Data Service, IEEE Transactions on Services Computing (TSC), 8(6), pp.998 999, 2015. 6. Boyang Wang, Baochun Li and Hui Li, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, IEEE Transactions on Services Computing (TSC), 8(1), pp.92 106, 2015. (The full version of INFOCOM 13 paper.) Citations>220. 7. Boyang Wang, Hui Li, Xuefeng Liu, Fenghua Li and Xiaoqing Li, Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud, IEEE Journal of Communication and Networks (JCN), 16(6), pp.592 599, 2014. 8. Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li, Preserving Identity Privacy on Multi-Owner Cloud Data during Public Verification, Security and Communication Networks (SCN), 7(11), pp.2104-2113, Wiley, 2014. 9. Boyang Wang, Baochun Li and Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Transactions on Cloud Computing (TCC), 1(2), pp.43-56, 2014. (The full version of Cloud 12 paper.) Citations>320. 10. Hui Li, Wenhai Sun, Fenghua Li and Boyang Wang, Secure and Privacy-Preserving Data Storage Service in Public Cloud, Journal of Computer Research and Development, 7(51), pp.1397-1409, 2014 (in Chinese). 11. Xuefeng Liu, Yuqing Zhang, Boyang Wang and Huaqun Wang, An Anonymous Data Aggregation Scheme for Smart Grid Systems, Security and Communication Networks (SCN), 7(3), pp.602-610, Wiley, 2014. 2

12. Xuefeng Liu, Yuqing Zhang, Boyang Wang and Jingbo Yan, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions on Parallel and Distributed Systems (TPDS), 24(6), pp.1182-1191, 2013. Citations>230. 13. Boyang Wang, Hui Li and Jin Cao, An Efficient Homomorphic MAC Scheme for Secure Network Coding with Probabilistic Detection, Frontier of Computer Science, 6(4), pp.429-441, Springer, 2012. Conference Papers 1. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li and Yuqing Zhang, SecReach: Secure Reachability Computation on Encrypted Location Check-in Data, the 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November, 2016 (Acceptance rate: 30/116=26%). 2. Boyang Wang, Yantian Hou, and Ming Li, Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data, in Proceedings of the 35th IEEE International Conference on Computer Communications (INFOCOM 2016), pp.1-9, San Francisco, California, April 10-15, 2016 (Acceptance rate: 300/1644=18%). 3. Boyang Wang, Ming Li, Haitao Wang and Hui Li, Circular Range Search on Encrypted Spatial Data, in Proceedings of the 3rd IEEE Conference on Communication and Security Networks (CNS 2015), pp.182-190, Florence, Italy, September 28-30, 2015 (Acceptance rate: 48/171=28%). 4. Boyang Wang, Ming Li, Sherman S.M. Chow and Hui Li, A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys, in Proceedings of the 2nd IEEE Conference on Communication and Security Networks (CNS 2014), pp.337-345, San Francisco, California, October 29-31, 2014 (Acceptance rate: 38/130=29%). 5. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li, Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy, in Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014), pp.374-394, Beijing, China, September 24-26, 2014. 6. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li, Maple: Scalable Multi- Dimensional Range Search over Encrypted Cloud Data with Tree-based Index, in Proceedings of the 9th ACM Symposium on Information, Computer and Communication Security (ACM ASIACCS 2014), pp.111-122, Kyoto, Japan, June 3-6, 2014 (Acceptance rate: 52/260=20%). Citations>20. 7. Boyang Wang, Baochun Li, Hui Li and Fenghua Li, Certificateless Public Auditing for Data integrity in the Cloud, in Proceedings of the First IEEE Conference on Communications and Network Security (CNS 2013), pp.276-284, Washington D.C., October 14-16, 2013 (Acceptance rate: 40/141=28%). Citations>40. 8. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li, Storing Shared Data on the Cloud via Security-Mediator, in Proceedings of the 33rd International Conference on Distributed Computing Systems (ICDCS 2013), pp.124-133, Philadelphia, Pennsylvania, July 8-11, 2013 (Acceptance rate: 61/464=13%). Citations>170. 9. Boyang Wang, Hui Li and Ming Li, Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics, in Proceedings of the IEEE International Conference on Communications (ICC 2013), pp.539-543, Budapest, Hungary, June 9-13, 2013. Citations>50. 10. Boyang Wang, Baochun Li and Hui Li, Public Auditing for Shared Data with Efficient User Revocation in the Cloud, in Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), pp.2904-2912, Turin, Italy, April 14-19, 2013 (Acceptance rate: 280/1613=17%). 3

11. Boyang Wang, Baochun Li and Hui Li, Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks, in Proceedings of the IEEE Globecom 2012, pp.744-749, Anaheim, California, December 3-7, 2012. 12. Boyang Wang, Baochun Li and Hui Li, Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud, in Proceedings of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), pp.507-525, Singapore, June 26-29, 2012 (Acceptance rate: 33/192=17%). Citations>160. 13. Boyang Wang, Baochun Li and Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, in Proceedings of the 5th IEEE International Conference on Cloud Computing (Cloud 2012), pp.295 302, Honolulu, Hawaii, June 24-29, 2012 (Acceptance rate: 48/282=17%). Workshop Papers and Posters 1. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang, Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large- Scale Datasets, in Proceedings of the 4th International Workshop on Security in Cloud Computing (SCC in conjunction with ACM ASIACCS 2016). 2. Boyang Wang, Ming Li, Haitao Wang, and Hui Li Circular Range Search on Encrypted Spatial Data, in Proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS 2015), two-page poster. 3. Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li, Computing Encrypted Cloud Data Efficiently under Multiple Keys, in Proceedings of the 4th International Workshop on Security and Privacy in Cloud Computing (SPCC in conjunction with IEEE CNS 2013). Patents 1. Xinxin Fan and Boyang Wang, Method and System for Range Search on Encrypted Data, U.S. Patent (US20170091475 A1), filed at Bosch RTC, Pittsburgh. 2. Xinxin Fan and Boyang Wang, Method and System for Verifiable Searchable Symmetric Encryption, U.S. Patent (pending), filed at Bosch RTC, Pittsburgh. 3. Hui Li, Boyang Wang, and Jin Cao, Network encoding method against pollution attacks based on probabilistic detection, Chinese Patent, Publication Number CN101714910 B. Professional Services and Activities Technical Program Committee IEEE International Conference on Communications (ICC), 2018 The International Conference on Networks (ICN), 2015, 2014 Journal Reviewers IEEE Journal on Selected Areas in Communications (JSAC) IEEE Transactions on Cloud Computing (TCC) IEEE Transactions on Computers (TC) IEEE Transactions on Information Forensics and Security (TIFS) IEEE Transactions on Industrial Informatics (TII) IEEE Transactions on Knowledge and Data Engineering (TKDE) IEEE Transactions on Mobile Computing (TMC) IEEE Transactions on Parallel and Distributed Systems (TPDS) IEEE Transactions on Wireless Communications (TWC) IEEE Transactions on Services Computing (TSC) IEEE Transactions on Vehicular Technology (TVT) IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB) IEEE Wireless Communication Letters (WCL) IEEE/KICS Journal of Communications and Networks (JCN) 4

IET Information Security International Journal of Communication Systems, Wiley Information Sciences, Elsevier KII Transactions on Internet and Information Systems Journal of Network and Computer Applications, Elsevier Journal of Network and Systems Management, Springer Pervasive and Mobile Computing, Elsevier Security and Communication Networks (SCN), Elsevier Conference Reviewers ACM CCS, ACM Mobicom, IWQoS, ASIACCS, CloudCom, INFOCOM, ICC, CNS, ICDCS, MASS, ICME, ICNP, NetCod, ACNS, ICICS, SECRYPT, MILCOM. 5