Introduction

WeiYu-photoWei Yu (Ph.D.) Wilson H. Elkins Professorship, Associate Professor
Department of Computer & Information Sciences Towson University, Towson, MD 21252
Phone: 410-704-5528
Email: wyu (at) towson (dot) edu
Office: YR 467

Background

I received my Ph.D. degree in Computer Engineering from Texas A&M University in May 2008. My advisor is Dr. Wei Zhao, with whom I have been working on my research and dissertation since 1999. Before joining Towson University, I also worked as a software developer for Cisco Systems, Inc. for almost nine years. My work at Cisco involves developing the world’s leading enterprise VoIP System.

Research Interests and Summary

My research interests are in the various issues in Cyber Security, Computer Networks, Cyber-Physical Systems, and Distributed Systems. My research work has been published in important networking and system conferences and journals, including IEEE International Conference on Computer Communications (INFOCOM), IEEE International Conference on Distributed Computing Systems (ICDCS), IEEE International Conference on Dependable Systems and Networks (DSN), Annual Computer Security Applications Conference (ACSAC),  IEEE/ACM Transactions on Networking (ToN), IEEE Transactions on Parallel & Distributed Systems (TPDS), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Computers (TC), IEEE Transactions on Mobile Computing (TMC), IEEE Transactions on Information Forensics and Security (TIFS), and IEEE Transactions on Vehicular Technology (TVT).

Selected Publications

  • Xinyu Yang, Ting Wang, Xuebin Ren, and Wei Yu, “Survey on Improving Data Utility in Differentially Private Sequential Data Publishing,” to appear in IEEE Transactions on Big Data (TBD), 2017.
  • Xialei Zhang, Xinyu Yang, Jie Lin, Guobin Xu, and Wei Yu, “Towards Efficient and Secured Real-time Pricing in Energy-based Cyber-Physical Systems,” IEEE Transactions on Parallel and Distributed Systems (TPDS), 28(1): 170-187, 2017.
  • Xuebin Ren, Xinyu Yang, Jie Lin, and Wei Yu, “On Binary Decomposition based Privacy-preserving Aggregation Scheme in the Real-time Monitoring Systems,” IEEE Transactions on Parallel and Distributed Systems (TPDS), 27(10): 2967-2983, 2016.
  • Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu, “How Privacy Leaks from Bluetooth Mouse?” IEEE Transactions on Dependable and Secured Computing (TDSC), 13(4): 461-473, 2016.
  • Jie Lin, Wei Yu, and Xinyu Yang, “On False Data Injection Attack against Multistep Electricity Price in Electricity Market in Smart Grid,” IEEE Transactions on Parallel and Distributed Systems (TPDS), 27(1): 286-302, 2016.
  • Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, and Xinwen Fu, “TorWard: Discovery, Classification and Response of Malicious Traffic over Tor,” IEEE Transactions on Forensics and Security (TIFS), 10(12): 2515 – 2530, September 2015.
  • Zhen Ling, Ming Yang, Junzhou Lou, Xinwen Fu, and Wei Yu, “De-Anonymization and Countermeasures in Anonymous Communication Networks,” IEEE Communication Magazine, 53(4): 60-66, 2015.
  • Guobin Xu, Wei Yu, Zhijiang Chen, Hanlin Zhang, Paul Moulema, Xinwen Fu, and Chao Lu, “A Cloud Computing Based System for Network Security Management,” International Journal of Parallel, Emergent and Distributed Systems (IJPEDS) – Taylor & Francis, 30(1):29-45, 2015.
  • Xinyu Yang, Jie Lin, Wei Yu, Paul Moulema, Xinwen Fu, and Wei Zhao, “A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems,” IEEE Transactions on Computers (TC), 64(1): 4-18, 2015.
  • Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai, and Nada Golmie, “An Integrated Detection System against False Data Injection Attacks in the Smart Grid,” International Journal of Security and Communication Networks (SCN) – John Wiley & Sons, 8(2): 91-109, 2015.
  • Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang and Xinwen Fu, “Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery,” IEEE Transactions on Parallel and Distributed Systems (TPDS), 26(7): 1887-1899, July 2015.
  • Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, and Wei Zhao, “On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures,” IEEE Transactions on Parallel and Distributed System (TPDS), 25(3): 717-729, 2014.
  • Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo, “Novel Packet Size Based Covert Channel Attacks against Anonymizer,” IEEE Transactions on Computers (TC), 62(12): 2411-2426, 2013.
  • Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, and Weijia Jia, “A New Cell Counting Based Attack against Tor,” IEEE/ACM Transactions on Networking (ToN), 20(4):1245-1261, August 2012.
  • Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, and Weijia Jia, “A New Cell Counter Based Attack Against Tor”, in Proceedings of 16th ACM Conference on Computer and Communications Security (CCS), August 2009 (Acceptance ratio=18%).
  • Xinwen Fu, Aniket Pingley, Nan Zhang, Wei Yu, Jie Wang, and Wei Zhao, “The Digital Marauders Map: A New Threat to Location Privacy in Wireless Networks”, in Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), June 2009 (Acceptance ratio=16%).
  • Ryan Pries, Wei Yu, Xinwen Fu, and Wei Zhao, “A New Replay Attack against Tor Anonymous Communication Network”, in of IEEE International Conference on Communications (ICC) (Best Paper Award of Information and Network Security Symposium), May 2008.
  • Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, and Wei Zhao, “DSSS-Based Flow Marking Technique for Invisible Traceback”, in of IEEE Symposium on Security and Privacy (S&P), May 2007 (Acceptance ratio=8.3%)
Honors and Awards
  • Best Paper Award: The 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2017
  • The Wilson H. Elkins Professorship, University System of Maryland (USM), 2016
  • Best Paper Award: IEEE International Performance Computing and Communications Conference (IPCCC), 2016
  • University System of Maryland Regents’ Faculty Award for Excellence in Scholarship, Research, or Creative Activity, 2015
  • NSF CAREER Award, 2014
  • Best Paper Award: 2013 IEEE International Conference on Communications (ICC) – Communication and Information Systems Security Symposium. This research effort has been actively funded by National Science Foundation and been highlighted in April 2014 issue of IEEE Communications Technology News: http://www.comsoc.org/ctn/ieee-comsoc-technology-news-special-issue-communications-and-network-security
  • 2012 Excellence in Scholarship Award, Fisher College of Science and Mathematics, Towson University
  • Best Paper Award: 2008 IEEE International Conference on Communications (ICC) – Information and Network Security Symposium

Selected Professional Activities

  • Associate Editor, IEEE Transactions on Information Forensics and Security (T-IFS), 2017 – 2020
  • Publicity Co-chair of IEEE Wireless Communication and Networking Conference (WCNC), 2017
  • Guest Editor (Co-Lead), Special Issue on “Security and Privacy in Cyber-Physical Systems”, IEEE Internet of Things Journal, 2017.
  • Program Co-Chair, The 11th International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2016
  • Guest Editor, Special issue on Recent Advances of Models and Algorithms in Wireless Networks for Cyber-Physical Systems in International Journal of Distributed Sensor Networks, 2016
  • Department of Energy (DoE) Panelist, 2015, 2016National Science Foundation (NSF) Panelist, 2014, 2015
  • Program Track-Chair, International Conference on Computer Communications and Networks (ICCCN), Track on Multimedia Services and Real-time Networking (MRN), 2015
  • Program Track-Chair, IEEE International Conference on Computer Communications and Networks (ICCCN), Track on Multimedia Services and Real-time Networking (MRN), 2015
  • Program Co-Chair, Second International Symposium on Control, Automation, Industrial Informatics and Smart Grid (ICAIS), 2014
  • Program Vice-Chair, ACM Conference on Research in Adaptive and Convergent Systems (RACS), 2014
  • Symposium Co-Chair, 2014 International Conference on Computing, Networking and Communication Honolulu: Symposium on Cognitive Computing and Networking, Hawaii, USA February 3-6, 2014 (http://www.conf-icnc.org/2014)
  • Publicity Co-chair of IEEE Wireless Communication and Networking Conference (WCNC), Shanghai 2013 (http://www.ieee-wcnc.org/)
  • Program Co-chair of IEEE Consumer Communications and Networking Conference (CCNC) – Wireless Networking Track, Las Vegas, 2013 (http://www.ieee-ccnc.org/)
  • Web Chair of Cyber-Physical System Week 2012, Beijing, 2012 (http://triton.towson.edu/~cpsweek/default.htm)
  • Panel speaker, “Security in Smart Grid: Challenges and Potential Solutions”, the Second China Smart Grid Submmit, 2011
  • Submission Chair of IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering 2011
  • Guest editor of special issue of Quality of Service in Wireless Networks, EURASIP International Journal of Wireless Network, 2011
  • Technical program committee member of IEEE INFOCOM 2012-2016
  • Technical program committee member of the Third IEEE International Conference on Smart Grid Communications (SmartGridComm), 2012-2016
  • Technical program committee member of IEEE GLOBECOM 2008-2016
  • Technical program committee member of IEEE ICC 2007, 2009, 2010, 2011, 2012, 2013 (Computer and Network Security Symposium)
  • Technical program committee member of IEEE Military Communication (MILCOM) 2011-2016
  • Technical program committee member of First International Workshop on Data Security and PrivAcy in Wireless Networks 2010-2012
  • Technical program committee member of IEEE TrustCom 2010-2016