His main research interests are in the areas of Cyber Security (Computer and Network Security), with the focus of protecting emerging information/networked systems from adversarial behaviors. He is always interested in problems that have real-world impact, solutions that are simple but based on solid mathematical foundations, and tries to bridge theory and practice. Current emphases include the following topics:
Cloud andbig data security & privacy: secure data & computation outsourcing and private data analytics; applied cryptography.
"Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice", ACM ASIACCS 2015 (with Y. Hou, R. Chauhan, R. Gerdes, and K. Zeng)
"Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index'', ACM ASIACCS 2014 (with B. Wang, Y. Hou, H. Wang and H. Li)
"A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys'', IEEE CNS 2014 (with B. Wang, S. S. M. Chow and H. Li)
"Storing Shared Data on the Cloud via Security-Mediator'', ICDCS 2013 (with B. Wang, S. S. M. Chow and H. Li)
"Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking'', ACM ASIACCS 2013 (with W. Sun, B. Wang, N. Cao, W. Lou, Y. T. Hou and H. Li) (Distinguished paper award)
"Chorus: Scalable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel'', ACM WiSec 2013 (with Y. Hou and J. D. Guttman)
Awards & Honors
National Science Foundation Faculty Early Career Development (CAREER) Award, 2014
Distinguished Paper Award, ACM ASIACCS 2013.
USU CS Faculty Research Award, 2013.
Editor, KSII Transactions on Internet and Information Systems