Wireless Networking Thrust:

Cyber Security Thrust:

  • Mathematical Modeling and Theoretical Foundation: Interference cancellation modeling and analysis, MIMO ad hoc networks, cognitive radio ad hoc networks, wireless energy transfer
  • Network Optimization: Large-scale, discrete and continuous non-convex optimization problems that arise from cross-layer optimizations involving advanced physical layer technologies
  • Algorithm and Protocol Design: Provably optimal and near-optimal algorithms, distributed algorithms and light weight protocols for wireless networks (e.g., ad hoc and sensor networks, multi-hop cooperative communications, opportunistic routing, network coding)
  • Blockchain and IoT Security: blockchain-based systems, smart contract, consensus protocol, user data privacy protection, Internet of Things (IoT) security and privacy
  • Security and Privacy in Networked Information System: ABE-based data encryption and sharing, privacy-preserving data outsourcing in cloud computing, search over encrypted data, secure data computation, trusted execution environment (TEE)
  • Wireless Security: security and privacy in wireless networks and mobile computing, confidentiality and authentication, anonymization and information privacy, cognitive radio networks security, cross-layer methods for security enhancement, location privacy
  • Applied Cryptography

Useful Links: