Introduction

WeiYu-photoWei Yu (Ph.D.) Wilson H. Elkins Professorship, Professor
Department of Computer & Information Sciences Towson University, Towson, MD 21252
Phone: 410-704-5528
Email: wyu (at) towson (dot) edu
Office: YR 467

Research Interests and Summary

My research interests are in the various issues in Cyber Security and Privacy, Cyber-Physical Systems, Internet of Things, and Distributed Data and Learning Driven Applications. My research work has been published in important security and system conferences and journals, including IEEE Transactions on Information Forensics and Security (TIFS), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Networking (ToN), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Big Data (TBD), IEEE Transactions on Computers (TC), IEEE Transactions on Mobile Computing (TMC), IEEE Transactions on Service Computing (TSC), IEEE Transactions on Vehicular Technology (TVT), IEEE Transactions on Emerging Topics in Computing, IEEE Transactions on Big Data, IEEE Transactions on Systems, Man, and Cybernetics (SMC), and IEEE Internet of Things, as well as at highly esteemed conferences such as the IEEE International Conference on Computer Communications (INFOCOM) and the IEEE International Conference on Distributed Computing Systems (ICDCS), among others.

Selected Publications (Detail See Google Scholar)

  • Z. Chen, P. Tian, W. Liao, X. Chen, G. Xu, and W. Yu, “Resource-aware Knowledge Distillation for Federated Learning,” IEEE Transactions on Emerging Topics in Computing, 2022.
  • C. Qian, W. Yu, C. Lu, D. Griffith, and N. Golmie, “Towards Generative Adversarial Network on Industrial IoT,” IEEE Internet of Things Journal, 9(19): 19147-19159, October 2022.
  • C. Qian, X. Liu, C. Ripley, M. Qian, F. Liang, and W. Yu, “Digital Twin – Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions,” Journal of Future Internet, 14(2), 2022.
  • W. G. Hatcher, C. Qian, F. Liang, W. Yu, and E. Blasch, “Secure IoT Search Engine: Survey, Challenges Issues, Case Study, and Future Research Direction,” IEEE Internet of Things Journal, 9(18): 16807-16823, 2022.
  • F. Liang, W. Yu, X. Liu, D. Griffith, and N. Golmie, “Towards Deep Q-Network Based Resource Allocation in Industrial Internet of Things,” IEEE Internet of Things Journal, 9(12): 9138-9150, June 2022
  • P. Tian, W. Liao, and W. Yu, “An Asynchronous Federated Denoising Autoencoder based Anomaly Detection System,” Journal of Computer and Security, 108(C), September 2021.
  • H. Xu, X. Liu, W. G. Hatcher, G. Xu, W. Liao, and W. Yu, “Priority-aware Reinforcement Learning-Based Integrated Design of Networking and Control for Industrial Internet of Things,” IEEE Internet of Things Journal, 8(6), 4668-4680, March 2021.
  • Z. Chen, P. Tian, W. Liao, and W. Yu, “Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning,” IEEE Transactions on Network Science and Engineering, 8(2): 1070-1083, April-June 2021.
  • F. Liang, W. Yu, X. Liu, D. Griffith, and N. Golmie, “Towards Edge-Based Deep Learning in Industrial Internet of Things,” IEEE Internet of Things Journal, 7(5): 4329-4341, May 2020.
  • H. Xu, X. Liu, W. Yu, D. Griffith, and N. Golmie, “Reinforcement Learning-Based Control and Networking Co-design for Industrial Internet of Things,” IEEE Journal of Selected Areas of Communications (JSAC), 38(5): 885-898, May 2020.
  • W. Gao, W. Yu, F. Liang, W. G. Hatcher, and C. Lu, “Privacy-Preserving Big Data Auction Using Homomorphic Encryption,” IEEE Transactions on Network Science and Engineer, 7(2): 776-791, 2020.
  • W. Gao, J. Nguyen, Y. Wu, W. G. Hatcher, and W. Yu, “Routing in Large-Scale Dynamic Networks: A Bloom Filter-Based Dual-Layer Scheme,” ACM Transactions on Internet Technology (TOIT), 20 (4): 1-24, 2020.
  • F. Liang, W. G. Hatcher, W. Liao, W. Gao, and W. Yu, “Machine Learning for Security and the Internet of Things: the Good, the Bad, and the Ugly,” IEEE Access, 7: 158126-158147, December 2019.
  • H. Xu, W. Yu, D. Griffith, and N. Golmie, “Survey of Industrial Internet of Things: A Cyber-Physical System Perspective,” IEEE Access, 6: 78238-78259, 2018.
  • F. Liang, C. Qian, W. G. Hatcher, and W. Yu, “Search Engine for the Internet of Things: Lessons from Web Search, Vision, and Opportunities,” IEEE Access, 7: 104673-104691, July 2019.
  • H. Xu, W. Yu, D. Griffith, and N. Golmie, “Survey of Industrial Internet of Things: A Cyber-Physical System Perspective,” IEEE Access, 6: 78238-78259, 2018.
  • W. G. Hatcher and W. Yu, “A Survey of Deep Learning: Applications and Emerging Research Trends,” IEEE Access, 6: 24411 – 24432, April 2018.
  • J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet-of-Things (IoT) Journal, 4(5): 1125 – 1142, October 2017.
  • Q. Yang, D. An, R. Min, W. Yu, X. Yang, and W. Zhao, “Optimal PMU Placement Based Defense against Data Integrity Attacks in Smart Grid,” IEEE Transactions on Forensics and Information Security (TIFS), 12(7): 1735 – 1750, July 2017.
  • W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, “A Survey on the Edge Computing for the Internet of Things,” IEEE Access, 6: 6900 – 6919, November 2017.
  • G. Xu, W. Yu, Z. Chen, H. Zhang, P. Moulema, X. Fu, and C. Lu, “A Cloud Computing Based System for Network Security Management,” International Journal of Parallel, Emergent and Distributed Systems (IJPEDS) – Taylor & Francis, 30(1):29-45, 2015.
  • Q. Yang, J. Yang, W. Yu, D. An, N. Zhang, and W. Zhao, “On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures,” IEEE Transactions on Parallel and Distributed System (TPDS), 25(3): 717-729, 2014.
  • Z. Ling, X. Fu, W. Jia, W. Yu, D. Xuan, J. Luo, “Novel Packet Size Based Covert Channel Attacks against Anonymizer,” IEEE Transactions on Computers (TC), 62(12): 2411-2426, 2013.
  • J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, “On False Data Injection Attacks against Distributed Energy Routing in Smart Grid,” in Proc. of the 3rd ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), April 2012.
  • Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, “A New Cell Counting Based Attack against Tor,” IEEE/ACM Transactions on Networking (ToN), 20(4):1245-1261, August 2012.
  • Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, “A New Cell Counter Based Attack Against Tor”, in Proc. of 16th ACM Conference on Computer and Communications Security (CCS), August 2009.
  • X. Fu, A. Pingley, N. Zhang, W. Yu, J. Wang, and W. Zhao, “The Digital Marauders Map: A New Threat to Location Privacy in Wireless Networks”, in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), June 2009.
  • R. Pries, W. Yu, X. Fu, and W. Zhao, “A New Replay Attack against Tor Anonymous Communication Network”, in Proc. of IEEE International Conference on Communications (ICC) (Best Paper Award of Information and Network Security Symposium), May 2008.
  • W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, “DSSS-Based Flow Marking Technique for Invisible Traceback”, in Proc. of IEEE Symposium on Security and Privacy (S&P), May 2007 (Acceptance ratio=8.3%)
Honors and Awards
  • Best Paper Award: IEEE Cyber Science and Technology Congress (CyberSciTech), 2020
  • Best Paper Award: IEEE International Conference on Dependable, Automatic and Secure Computing (DASC), 2020
  • Best Paper Award: The 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2017
  • The Wilson H. Elkins Professorship, University System of Maryland (USM), 2016
  • Best Paper Award: IEEE International Performance Computing and Communications Conference (IPCCC), 2016
  • University System of Maryland Regents’ Faculty Award for Excellence in Scholarship, Research, or Creative Activity, 2015
  • NSF CAREER Award, 2014
  • Best Paper Award: 2013 IEEE International Conference on Communications (ICC) – Communication and Information Systems Security Symposium. This research effort has been actively funded by National Science Foundation and been highlighted in April 2014 issue of IEEE Communications Technology News: http://www.comsoc.org/ctn/ieee-comsoc-technology-news-special-issue-communications-and-network-security
  • 2012 Excellence in Scholarship Award, Fisher College of Science and Mathematics, Towson University
  • Best Paper Award: 2008 IEEE International Conference on Communications (ICC) – Information and Network Security Symposium

Selected Professional Activities

  • Senior Area Editor, IEEE Transactions on Information Forensics and Security (T-IFS), 2021 –
  • Associate Editor, IEEE Internet of Things Journal, 2020 –
  • Associate Editor, IEEE Transactions on Information Forensics and Security (T-IFS), 2017 – 2021
  • Guest Editor (Lead), Special Issue on “AI-Enabled Internet of Dependable and Controllable Things”, 2020
  • Publicity Co-chair of IEEE Wireless Communication and Networking Conference (WCNC), 2017
  • Guest Editor (Co-Lead), Special Issue on “Security and Privacy in Cyber-Physical Systems”, IEEE Internet of Things Journal, 2017.
  • Program Co-Chair, The 11th International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2016
  • Guest Editor, Special issue on Recent Advances of Models and Algorithms in Wireless Networks for Cyber-Physical Systems in International Journal of Distributed Sensor Networks, 2016
  • Department of Energy (DoE) Panelist, 2015, 2016National Science Foundation (NSF) Panelist, 2014, 2015
  • Program Track-Chair, International Conference on Computer Communications and Networks (ICCCN), Track on Multimedia Services and Real-time Networking (MRN), 2015
  • Program Track-Chair, IEEE International Conference on Computer Communications and Networks (ICCCN), Track on Multimedia Services and Real-time Networking (MRN), 2015
  • Program Co-Chair, Second International Symposium on Control, Automation, Industrial Informatics and Smart Grid (ICAIS), 2014
  • Program Vice-Chair, ACM Conference on Research in Adaptive and Convergent Systems (RACS), 2014
  • Symposium Co-Chair, 2014 International Conference on Computing, Networking and Communication Honolulu: Symposium on Cognitive Computing and Networking, Hawaii, USA February 3-6, 2014 (http://www.conf-icnc.org/2014)
  • Publicity Co-chair of IEEE Wireless Communication and Networking Conference (WCNC), Shanghai 2013 (http://www.ieee-wcnc.org/)
  • Program Co-chair of IEEE Consumer Communications and Networking Conference (CCNC) – Wireless Networking Track, Las Vegas, 2013 (http://www.ieee-ccnc.org/)
  • Web Chair of Cyber-Physical System Week 2012, Beijing, 2012 (http://triton.towson.edu/~cpsweek/default.htm)
  • Panel speaker, “Security in Smart Grid: Challenges and Potential Solutions”, the Second China Smart Grid Submmit, 2011
  • Submission Chair of IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering 2011
  • Guest editor of special issue of Quality of Service in Wireless Networks, EURASIP International Journal of Wireless Network, 2011
  • Technical program committee member of IEEE INFOCOM 2012-2016
  • Technical program committee member of the Third IEEE International Conference on Smart Grid Communications (SmartGridComm), 2012-2016
  • Technical program committee member of IEEE GLOBECOM 2008-2016
  • Technical program committee member of IEEE ICC 2007, 2009, 2010, 2011, 2012, 2013 (Computer and Network Security Symposium)
  • Technical program committee member of IEEE Military Communication (MILCOM) 2011-2016
  • Technical program committee member of First International Workshop on Data Security and PrivAcy in Wireless Networks 2010-2012
  • Technical program committee member of IEEE TrustCom 2010-2016