PolySec Lab

Publications

Book Chapter

  • S. Fang, A. Portante, and Husain, M. I.: Moving Target Defense Mechanisms in Cyber-Physical Systems. Chapter 3, In Securing Cyber-Physical System editor Al-Sakib Khan Pathan, CRC Press, ISBN 9781498700986. 2015.

Refereed Conference Proceedings

  • Y. Mao, Tingting Chen, Y. Zhang, T. Wang, and S. Zhong, Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks. The 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2015), Cancun, Mexico, Nov., 2015.
  • D. Pal, Tingting Chen J. Thomas, Privacy Preserving Sequential Pattern Mining Across Multiple Medical Sites. The 2015 American Medical Informatics Association (AMIA) Annual Symposium (poster), San Francisco, November 2015.
  • D. Pal, P. Khethavath, J. Thomas, and Tingting Chen, Multilevel Threshold Secret Sharing in Distributed Cloud. Third International Symposium on Security in Computing and Communications (SSCC 2015), August, 2015, pp 13-23.
  • D. Pal, P. Khethavath, J. Thomas, and Tingting Chen, Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique. Third International Symposium on Security in Computing and Communications (SSCC 2015), August, 2015, pp 146-156.
  • S. Ji, Tingting Chen, F. Wu, Crowdsourcing with Trembles: Incentive Mechanisms for Mobile Phones with Uncertain Sensing Time. International Conference on Communications (IEEE ICC), London, UK, June, 2015.
  • N. Pantic and Mohammad Iftekhar Husain, Covert Botnet Command and Control Using Twitter. 31st Annual Computer Security Applications Conference (ACSAC'15), Los Angeles, 2015.
  • B. Wu, T. Nguyen, and Mohammad I Husain, Implementation Vulnerability Associated with OAuth 2.0:. A Case Study on Dropbox, 6th Symposium on Security and Privacy in Next Generation Networks in conjunction with 12th International Conference on Information Technology : New Generations (ITNG'15), Nevada, 2015.
  • S. Fang, D. Rajamanthri and Mohammad I Husain, Facebook Privacy Management Simplified, 6th Symposium on Security and Privacy in Next Generation Networks in conjunction with 12th International Conference on Information Technology : New Generations (ITNG'15), Nevada, 2015.
  • K. Ding, N. Pantic, Y. Lu, S. Manna, and Mohammad I Husain, Towards Building a Word Similarity Dictionary for Personality Bias Classification of Phishing Email Contents.Ninth IEEE International Conference on Semantic Computing (ICSC'15), Anaheim, 2015.
  • S. Ji, Tingting Chen, Crowdsensing Incentive Mechanisms for Mobile Systems with Finite Precisions. International Conference on Communications (IEEE ICC), Sydney, Australia, June, 2014.
  • S. Ji, Tingting Chen, S. Zhong, S. Kak, DAWN: Defending Against Wormhole Attacks in Wireless Network Coding Systems. IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, April, 2014.
  • M.Wolotsky and Mohammad Iftekhar Husain. Coercion Resistant Authentication Systems (CRAS) using Physiological Responses to Chill Music. 23rd Usenix Security Symposium (poster session), San Diego, 2014.
  • N. Pantic, J. Mansur, and Mohammad Iftekhar Husain, Twitter Covert Channel: How to Hide in Human Behavior. 23rd Usenix Security Symposium (poster session), San Diego, 2014.
  • Mohammad Iftekhar Husain, K. Courtright and R. Sridhar, Reconfigurable Encryption Architecture for Moving Target Defense. Proceeding of the IEEE Military Communications Conference (MILCOM'13), San Diego, 2013.
  • Tingting Chen, S. Zhong, On Designing Truthful Spectrum Auctions for Variable Bandwidths. International Conference on Communications (IEEE ICC), June, 2013.
  • J. Yuan, T. Ward, S. Honarvar, Tingting Chen, J. Thomas, HMM-driven Smart White-space-aware Frame Control Protocol for Coexistence of ZigBee and WiFi. IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013, WIP track, (Corresponding Author).
  • L. Mandvekar, C. Qiao and Mohammad Iftekhar Husain: Enabling Wide Area Single System Image Experimentation on the GENI Platform. Proceeding of the 2013 GENI Research and Educational Experiment Workshop (GREE'13), Utah, 2013.
  • M. Alam, S. Salloum and Mohammad Iftekhar Husain: Improving Network Management by XML to Relational Data Translation. Proceeding of the 2013 IEEE Wireless Telecommunications Symposium (WTS'13), Arizona, 2013.
  • E. Chan-Tin, Tingting Chen and S. Kak, A Comprehensive Security Model for New Challenges in Networking Applications. Proceedings of Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST), 2012, collocated with ICCCN 2012.
  • F. Wu, Tingting Chen S. Zhong, C. Qiao and G. Chen, A Bargaining-Based Approach for Incentive-Compatible Message Forwarding in Opportunistic Networks. Proceedings of International Conference on Communications(IEEE ICC 2012), Ottawa, Canada, 2012.
  • Mohammad Iftekhar Husain, R. Sridhar: Protection Profile-Based Scenario-Centric Taxonomy of Secure Routing Protocols in Ad hoc Networks, Proceeding of the 7th Annual Symposium on Information Assurance (ASIA'11), Albany, 2011.
  • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'10), UAE, 2010.
  • Tingting Chen and S. Zhong, An Efficient Privacy Preserving Method for Matching Patient Data Across Different Providers. Proceedings of the 2010 American Medical Informatics Association (AMIA) Annual Symposium (poster), Washington, DC, November 2010.
  • Tingting Chen and S. Zhong, INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM), 2010.
  • Mohammad Iftekhar Husain, R. Sridhar: D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis. Proceeding of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering (CAINE'09), San Fransisco, 2009.
  • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. Proceedings of the International Conference on Digital Forensics & Cyber Crime (ICDF2C'09), Albany, 2009.
  • S. Sankaran, Mohammad Iftekhar Husain, R. Sridhar: IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Network. Proceeding of the 5th Annual Symposium on Information Assurance (ASIA'09), Albany, 2009.
  • A. Parameswaran, Mohammad Iftekhar Husain and S. Upadhyaya: Is RSSI a Reliable Parameter in Sensor Localization Algorithms: An Experimental Study. Field Failure Data Analysis Workshop (F2DA'09), New York, 2009.
  • F. Wu, Tingting Chen, S. Zhong, L. (Erran) Li, Y. R. Yang, Incentive-compatible opportunistic routing for wireless networks. Proceedings of The Fourteenth Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2008), San Francisco, CA, USA, Sep. 14-19, 2008.
  • Tingting Chen, S. Zhong, Enhancing Privacy of Released Database. Proceedings of 2007 IEEE International Conference on Granular Computing (GrC 2007), San Jose, California, USA, 2-4 November 2007. (Invited Paper).
  • Tingting Chen, Y. Wang, B. Fang, J. Zheng, Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree. Proceedings of 2006 International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), 19-25 Feb. 2006 Page(s): 30.
  • Tingting Chen, B. Fang, J. Zheng, A data analyzer in network anomaly detection system based on hierarchical self-organizing map (in Chinese). Proceedings of National Open Distributed and Parallel Computing Symposium, Shanghai, China, Oct. 27-29. 2005. Best Paper Award.

Journal/Lecture Notes/Online Archives

  • Mohammad Iftekhar Husain, S. Ko, S. Uurtamo, A. Rudra, and R. Sridhar. Bidirectional Data Verification for Cloud Storage. Elsevier Journal of Networks and Computer Applications,Volume 45, October 2014, Pages 96-107.
  • S. Ji, Tingting Chen: Incentive Mechanisms for Discretized Mobile Crowdsensing. accepted, to appear in IEEE Transactions on Wireless Communications.
  • Tingting Chen, S. Zhong: An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Transactions on Vehicular Technology 63(9):4476-4491(2014).
  • S. Ji, Tingting Chen, S. Zhong, Wormhole Attack Detection Algorithms in Wireless Network Coding Systems, accepted, to appear, IEEE Transactions on Mobile Computing, 2014.
  • A. T. Boloorchi, M.H. Samadzadeh, Tingting Chen, Symmetric Threshold Multipath (STM): An online symmetric key management scheme,Elsevier Information Sciences, Volume 268, June, 2014, Pages: 489-504.
  • D. Pal, Tingting Chen, S. Zhong, P. Khethavath, Designing an Algorithm to Preserve Privacy for Medical Record Linkage With Error-Prone Data, in press, JMIR Medical Informatics, 2014.
  • Tingting Chen, S. Zhong. Truthful Auctions for Continuous Spectrum with Variable Bandwidths, IEEE Transactions on Wireless Communications 13(2), 1116-1128, 2014.
  • Alam, M., Salloum, S., & Mohammad Iftekhar Husain. Improving Network Management by XML to Relational Data Translation. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(3), 34-48. 2013.
  • Tingting Chen, F. Wu, S. Zhong. On Designing Protocols for Non-cooperative, Multi-Radio Channel Assignment in Multiple Collision Domains, IEEETransactions on Computers, 62(7), 1403-1416, 2013.
  • F. Wu, Tingting Chen, S. Zhong, C. Qiao, G. Chen. A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks, IEEE Transactions on Wireless Communications, 12(4), 1573-1583, 2013.
  • Mohammad Iftekhar Husain, L. Mandvekar, C. Qiao and R. Sridhar: How to Bypass Verified Boot Security in Chromium OS. CoRR abs/1202.5282, arXiv:1202.5282. 2012.
  • Tingting Chen, S. Zhong. Emergency Access Authorization for Personally Controlled Online Health Care Data,(JMS) Journal of Medical Systems, 36(1): 291-300, 2012.
  • Tingting Chen, A. Bansal, S. Zhong and X. Chen, Protecting Data Privacy in Growing Neural Gas, Neural Computing & Applications,(LSMS2010) 21(6): 1255-1262, 2012.
  • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Almost Universal Functions are also Storage Enforcing. CoRR abs/1205.1462, arXiv:1205.1462. 2012.
  • Mohammad Iftekhar Husain, S. Ko, A. Rudra, and S. Uurtamo: Storage Enforcement with Kolmogorov Complexity and List Decoding. Electronic Colloquium on Computational Complexity (ECCC) 18: 80, 2011.
  • Mohammad Iftekhar Husain, R. Sridhar and I. Baggili: A Simple Cost-Effective Framework for iPhone Forensic Analysis. Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 53, pp. 27-37, 2011.
  • Mohammad Iftekhar Husain, M. Chandrasekaran, S. Upadhyaya and R. Sridhar: Cross-layer Soft Security Framework for Wireless Embedded Systems. IJWCN: International Journal of Wireless Communications and Networking, 2011.
  • Tingting Chen and S. Zhong, Privacy-Preserving Models for Comparing Survival Curves Using the Logrank Test,(CMPB) Computer Methods and Programs in Biomedicine, 104(2): 249-253, 2011.
  • Tingting Chen, F. Wu, S. Zhong. FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad-Hoc Networks,IEEE Transactions on Computers, Volume 60, Issue 7, July 2011, Page(s):1045 - 1056.
  • S. Zhong, Tingting Chen. An Efficient, Identity-based Protocol for Private Matching,(IJCS) International Journal of Communication Systems, Volume 24, Issue 4, Apr. 2011. Page(s): 543-552.
  • Tingting Chen, A. Bansal and S. Zhong, A Reputation System for Wireless Mesh Networks Using Network Coding, Journal of Network and Computer Applications,(Microsoft) Volume 34, Number 2, Mar. 2011, Pages 1058-1061.
  • A. Bansal, Tingting Chen, S. Zhong. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data, Neural Computing & Applications, Volume 20, Number 1, Feb. 2011, Pages 1058-1061.
  • Tingting Chen, L. Zhu, F. Wu, S. Zhong. Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach, IEEE Transactions on Vehicular Technology, Volume 60, Issue 2, Feb. 2011, Page(s):566 - 579.
  • Mohammad Iftekhar Husain, R. Sridhar: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. : Digital Forensics and Cyber Crime, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Revised Selected Papers from ICDF2C), Vol. 31, pp. 9-18, 2010.
  • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, LASE: Latency Aware Simple Encryption for Embedded Systems Security. IJCSNS: International Journal of Computer Science and Network Security, Vol.9 No.10, pp. 1-6, 2009.
  • Tingting Chen, S. Zhong. Perfectly Fair Channel Assignment in Non-cooperative Multi-radio Multi-channel Wireless Networks,(ACMDL) Computer Communications, Volume 32, Number 6, Pages 1058-1061, 2009.
  • Tingting Chen, S. Zhong. Privacy Preserving Back-Propagation Neural Network Learning, IEEE Transactions on Neural Networks, Volume 20, Issue 10, Oct. 2009, Page(s):1554 - 1564.
  • K. Courtright, Mohammad Iftekhar Husain, R. Sridhar, Latency Aware General Encryption Hardware for Secure Real-time Embedded System, IJESC: International Journal of Embedded Systems and Computer Engineering, Vol. 1 No. 2, pp 89-97, December, 2009.
  • S. Zhong, Z. Yang, Tingting Chen, k-Anonymous Data Collection, Elsevier Information Sciences, Volume 179, Issue 17, Aug. 2009, Pages 2948-2963.
  • Mohammad Iftekhar Husain, S. Upadhyaya and M. Chandrasekaran: A Novel Approach for Security and Robustness in Wireless Embedded Systems. Information Systems and Applications, incl. Internet/Web, and HCI, Lecture Notes in Computer Science, Vol. 5287, pp 323-335, 2008.