Posts by Collection

publications

Video Aficionado: We Know What You Are Watching

Published in IEEE Transactions on Mobile Computing, 2020

In this paper, we design and implement a new side-channel attack system, named video aficionado, which can identify video watching information without violating any access control policies on Android.

Download here

Proof of Continuous Work for Reliable Data Storage over Permissionless Blockchain

Published in IEEE Internet of Things Journal, 2021

In this paper, we first design a variant consensus algorithm named proof of continuous work (PoCW) with a storage-related incentive mechanism. Miners can accumulate mining advantage by continuously submitting proofs of storage. Then we present a hash ring-based data allocation algorithm using the blockchain’s state. Combined with both of them, we build a reliable blockchain-based storage system without relying on any third parties.

Download here

talks

teaching

Eureka Labs

Hands-on cybersecurity labs, Suitable for students, practitioners, and educators, 2020

Introduction

The Eureka Labs are designed for learners at all levels of experience and interest in security concepts and technologies. Exploratory labs stimulate interest among learners with little or no prior experience with security techniques and concepts. Core labs allow learners to build their conceptual understanding and repertoire of security techniques through interactive experiences. Advanced labs place learners at the cutting edge of security risks associated with the latest generation network technology. We welcome and encourage feedback on each lab.

Introduction to Python for Data Analytics

Undergraduate course, All majors, 2021

Course Overview

The goal of this course is to give the students a working knowledge of how to use Python to perform data analytics. We will introduce Python data structures (e.g., strings, lists, tuples, dictionaries, NumPy ndarrays, and Pandas DataFrames) and ways to manipulate data (e.g., selection, iteration, and visualization). Students will design, implement, and test Python programs.

Computer and Network Security

Undergraduate course, CS and IT, 2022

Course Overview

This course covers fundamental principles, concepts, and common practices of computer and network security. Key topics include cryptographic algorithms, security protocols, threats/attacks, and countermeasures.

Unix/Linux System Administration

Undergraduate course, CS and IT, 2022

Course Overview

Study of UNIX/Linux system administration. Topics include system installation, filesystems, BASH Shell, user and process management, backup/restore, and common administrative tasks. This course includes a lab intensive component.