Hongxin Hu - University At Buffalo

Transcription

Hongxin HuAssociate ProfessorComputer Science and Engineering DepartmentUniversity at Buffalo, The State University of New York (SUNY)Davis Hall, Buffalo, NY 14260Email: hongxinh@buffalo.eduHomepage: https://cse.buffalo.edu/ hongxinh/RESEARCHINTERESTS Emerging Network Technologies and Security (NFV, SDN, 5G/Next-G, Edge,etc.) Security and Privacy in IoT and CPS Machine Learning for Security, Privacy, and Networking Security and Privacy in Social Networks Usable Privacy and Security Security in Cloud and Mobile ComputingACHIEVEMENTHIGHLIGHTS Received 11 NSF awards (7 as PI and 4 as Co-PI) including an NSF CAREERAward, a 3M large-size NSF grant, a 2.7M large-size NSF grant, and a 1Mmedium-size NSF grant within 6 years Secured grants 12.12M total as PI or Co-PI Over 100 publications (citations 5,000 , h-index 36), some of which appeared in top-tier conferences such as CCS, USENIX Security, NDSS, SIGCOMM, INFOCOM, ICNP, CHI, and CSCW, and top journals such as IEEETDSC, IEEE TIFS, IEEE/ACM TON, JSAC, and IEEE TKDE Eight papers received or nominated for Best Paper Award Research received 50 media coverage Advising/co-advising 6 Ph.D. students. They have recently authored top-tiersecurity conference papers (NDSS’21 [1], CCS’20 [2], NDSS’20 [7], CCS’18[11][12], and NDSS’17 [20]), top-tier networking conference papers (SIGCOMM’20 [4],SIGCOMM’17 [18], ICNP’20 [5], INFOCOM’19 [10], and ICNP’18 [14]), andtop-tier HCI conference papers (CHI’20 [8], CSCW’18 [13]) Early promotion to Associate Professor with tenure (2019) Received NSF CAREER Award (2019) Received Dean’s Faculty Fellows Award (2017) One Ph.D. student received Outstanding Ph.D. Student Award (2019) Led the effort to enable Clemson University to be designated as a NationalCenter of Academic Excellence in Research (CAE-R) Helped establish a Cybersecurity Minor at Clemson University and make Clemson University to be designated as a National Center of Academic Excellencein Cyber Defense Education (CAE-CDE) Founded ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security), and served asprogram co-chairs of SDN-NFV Security 2016-2019

Served in several conference organizing roles, such as program committeesof AAAI 2021, WWW 2021, 2019, ACSAC 2018-2020, ASIACCS 2018-2021,WiSec 2020, CODASPY 2018, SACMAT 2013-2015/2018-2021, and CNS 20172020, proceedings chairs of SACMAT 2014/2016-2021 and CODASPY 2017,the poster chair of CODASPY 2018-2021, and the web chair and session chairof CCS 2014 Gave several talks about NFV security research at NFV World CongressEDUCATIONPh.D. in Computer Science and Engineering, Arizona State University, 2012M.S. in Computer Science, China University of Geosciences, 2002B.S. in Computer Science, China University of Geosciences, 1997PROFESSIONAL Associate ProfessorJanuary 2021 - PresentEXPERIENCEComputer Science and Engineering Department, University at Buffalo, SUNY, NYDirector of Cybersecurity CenterAssociate Professor, School of ComputingAssistant Professor, School of ComputingDean’s Faculty Fellow of Computer ScienceClemson University, SCAugust 2020 - JanuaryAugust 2019 - JanuaryJuly 2014 - AugustJanuary 2017 - January2021202120192021Assistant ProfessorAugust 2012 - June 2014Department of Computer and Information Sciences, Delaware State University, DEGraduate Student Researcher & Lead Graduate Student August 2008 - July 2012Laboratory of Security Engineering for Future Computing (SEFCOM), Arizona StateUniversity, AZGraduate Student ResearcherJanuary 2006 - July 2008Laboratory of Information Integration, Security and Privacy (LIISP), University ofNorth Carolina at Charlotte, NCVisiting ScholarJanuary 2005 - December 2005Laboratory of Information Integration, Security and Privacy (LIISP), University ofNorth Carolina at Charlotte, NCLecturerAugust 2002 - December 2004College of Computing, China University of Geosciences, ChinaHONORS ANDAWARDS Best Paper Award, IEEE International Conference on Communications (ICC), 2020 NSF CAREER Award, 2019 First Place, Student Research Competition (SRC) in ACM SIGCOMM, 2018 Best Paper Award, ACM Technical Symposium on Computer Science Education (SIGCSE), 2018 Dean’s Faculty Fellows Award, College of Engineering, Computing andApplied Sciences, Clemson University, 2017 Best Paper Honorable Mention Award, ACM Symposium on Access Control Models and Technologies (SACMAT), 2016 Best Paper Award Nominee, IEEE International Conference on NetworkProtocols (ICNP), 20152

Top-10 Finalist for Best Applied Security Paper Award, New YorkUniversity Cyber Security Awareness Week (CSAW), 2015 Spotlight Paper, IEEE Transactions on Dependable and Secure Computing(TDSC), 2015 Front Page News, Post and Courier, 2015 Third Place Award, Extreme SDN Innovation Challenge, 2015 Best Paper Award, ACM Conference on Data and Application Security andPrivacy (CODASPY), 2014 Spotlight Paper, IEEE Transactions on Dependable and Secure Computing(TDSC), 2014 Featured Research Paper, IEEE Special Technical Community on SocialNetworking (STCSN), 2013 First Place Award, Delaware U.S. Cyber Challenge Competition, “My LittlePwnies” (60% of female students), 2013 Applied Security Research Best Paper Award Nominee, New York UniversityCyber Security Awareness Week (CSAW), 2013 Outstanding Ph.D. Student Finalist in Computer Science, Arizona StateUniversity, 2012 Best Paper Award Nominee, ACM Symposium on Access Control Modelsand Technologies (SACMAT), 2011 Best Paper Award Nominee, International Conference on CollaborativeComputing: Networking, Applications and Worksharing (CollaborateCom),2011 Applied Security Research Best Paper Award Nominee, New York UniversityCyber Security Awareness Week (CSAW), 2011 NSF Travel Grant, NSF CAREER Proposal Writing Workshop, 2013 ACSAC Conferenceship Award, Annual Computer Security Applications Conference (ACSAC), 2011 NSF Travel Grant, ACM Conference on Computer and Communications Security (CCS), 2010 IBM PhD Fellowship Nominee, UNCC, 2008 Outstanding Teaching Award, China University of Geosciences, 2004GRANTSFunding Summary: Eleven NSF grants (including an NSF CAREER award, a 3M large-sizeNSF grant, a 2.7M large-size NSF grant, and a 1M medium-size NSF grant) Total funding: 12,120,718 ( 2,285,965 as PI) Grants from NSF (SaTC, CNS, IIS, OAC, SOC, and DGE), USDOT, U.S.Army, VMware, Google, Amazon, Dell, etcExternal Grants:1. Co-PI, NSF, “RAPID: Cyber-Hostility and COVID-19”, (PI: Matthew Costello;other Co-PIs: Feng Luo, Yin Yang, Long Cheng), 199,996, 06/15/2020 05/31/2021.3

2. Co-PI, NSF, “CloudLab Phase III: Expanding the Frontiers of Cloud Computing Through World-Class Community Infrastructure”, (Clemson PI: KuangChing Wang; other Co-PI: Amy Apon), 2,699,985 (total: 10M), subcontracting from University of Utah, 10/01/2020 - 09/30/2024.3. Co-PI, U.S. Army, “Cross Cutting Autonomy Enablers”, (PI: Richard Brooks;other Co-PIs: Pierluigi Pisu, Linke Guo, Jerome McLendon), 860,488, subcontracting from Army GVSC, 09/01/2020 - 08/31/2022.4. PI, NSF, “CAREER: Towards Elastic Security with Safe and Efficient NetworkSecurity Function Virtualization”, 500,000, 10/01/2019 - 09/30/2024.5. PI, NSF & VMware, “SDI-CSCS: Collaborative Research: S2 OS: EnablingInfrastructure-Wide Programmable Security with SDI”, 600,000 (total: 2,999,489),collaborative project with Guifei Gu (Texas A&M University), Donald Porter(University of North Carolina at Chapel Hill), Eric Keller (University of Colorado at Boulder), and Zhiqiang Lin (Ohio State University), 09/01/2017 08/31/2021.6. Lead PI, NSF, “Collaborative Research: CICI: Secure and Resilient Architecture: SciGuard: Building a Security Architecture for Science DMZ based onSDN and NFV Technologies”, 499,805 (total: 999,189), collaborative projectwith Gail-Joon Ahn (Arizona State University), 01/01/2017 - 12/31/2020.7. PI, NSF, “SaTC: EDU: Collaborative: Enhancing Security Education throughTransiting Research on Security in Emerging Network Technologies”, 79,999(total: 299,998), collaborative project with Younghee Park (San Jose StateUniversity) and Xiaohong Yuan (North Carolina A&T State University), 09/01/2017- 08/31/2020.8. Lead PI, NSF, “III: Small: Collaborative Research: Privacy-aware Collaborative Data Sharing in Human-centered Social Networks”, 299,767 (total: 523,767), collaborative project with Gail-Joon Ahn (Arizona State University), 09/01/2015 - 08/31/2019. Additional 16,000 awarded May 2017 for Research Experiences for Undergraduates (REU) supplement. Additional 8,000 awarded May 2016 for Research Experiences for Undergraduates (REU) supplement.9. PI, NSF, “EAGER: Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks”, 239,680, 09/01/2015 - 08/31/2018. Additional 16,000 awarded May 2016 for Research Experiences for Undergraduates (REU) supplement.10. PI, NSF, “NSF Student Travel Grant for 2018 ACM International Workshopon Security in Software Defined Networks and Network Function Virtualization(SDN-NFV Security)”, 5,600, 03/01/2018 - 02/28/2020.11. Co-PI, NSF, “Collaborative Research: CICI: Regional: SouthEast SciEntificCybersecurity for University Research (SouthEast SECURE)”, (PI: Jill Gemmill; other Co-PIs: Jan Holmevik, Nuyun Zhang), 158,004 (total: 452,464),10/01/2016 - 09/30/2019.12. Co-PI, NSF, “US Ignite: Track 1: Enabling Connected Vehicle Applicationsthrough Advanced Network Technology”, (PI: James Martin; other Co-PIs:Mashrur Chowdhury, Kuang-Ching Wang), 614,582, 09/01/2015 - 08/31/2020.13. Co-PI, USDOT (U.S. Department of Transportation), “University Transportation Center - Center for Connected Multimodal Mobility (C2 M2 )”, (PI:4

Mashrur Chowdhury; other Co-PIs: Amy Apon, Jim Martin, etc.), 1,402,200,11/30/2016 - 09/30/2022.14. Co-PI, USDOT (through University of Tennessee/Southeastern Transportation Center), “Development of a Security Platform for Vehicle to InfrastructureNetwork”, (PI: Mashrur Chowdhury), 77,287, 05/02/2016 - 08/31/2017.15. PI, Google, “Cyber-Hostility and COVID-19”, 4,637, 08/27/2020 - 08/26/2021.16. PI, Amazon, “Secure Sharing of Electronic Health Records with AWS”, 5,000,07/07/2015 - 07/06/2016.17. Co-PI, Dell, “Dasein Connector - NFV Extensions”, (PI: Amy W. Apon), 107,843, 09/01/2014 - 12/31/2015.Internal Grants:19. Co-PI, Clemson University CBSHS/IMPACT grant, “Understanding and Combatting Cyberhate on Social Media”, (PI: Matthew John Costello; other Co-PIs:Joseph P Maer, Feng Luo, Long Cheng), 20,000, 09/01/2019 - 08/30/2020.20. Co-PI, Clemson University SUCCEEDS, “Next Generation IoT Hardware Security for Resilient Smart Grid and ICT Infrastructures”, (PI: Kumar Venayagamoorthy; other Co-PIs: Yingjie Lao, Kuangching Wang, Michal Jermanowski), 37,036, 07/01/2018 - 06/30/2019.21. Co-PI, Clemson University/One-Year Accelerate (OYA) Grant, “Alleviatingthe Negative Consequences of Habitual Trust on Collaborative Privacy Control in Online Social Networks”, (PI: Heshan Sun), 20,000, 09/01/2016 08/31/2018.22. PI, NSF-funded HBCU-UP SMILE Minigrant, “Security-Enhanced Mobile Platforms”, 5,487, 09/01/2013 - 06/30/2014.23. PI, DSU/Academic Enrichment Program Award, “Secure Data Sharing in Online Social Networks”, 5,990, 12/15/2012 - 06/15/2013.PUBLICATIONS Publication Summary: Given the inter-disciplinary nature of my work, I have published across a widerange of conferences, including security (CCS, USENIX Security, NDSS, ACSAC, ESORICS, ASIACCS), networking (SIGCOMM, INFOCOM, ICNP,HotSDN, IWQoS), human-computer interaction (CHI, CSCW, HFES), system (APSys), and computer science education (SIGCSE). My work has been cited a total of 5,198 times with an h-index of 36 and ani10-index of 80 (according to Google Scholar as of October 2020). I have 8 papers received or nominated for Best Paper Award, as well as 2spotlight papers and 1 featured paper.Representative Conference/Workshop Publications:1. Wenbo Ding, Hongxin Hu and Long Cheng, “IoTSafe: Enforcing Safety andSecurity Policy with Real IoT Physical Interaction Discovery”, In Proceedings ofthe 28th Network and Distributed System Security Symposium (NDSS 2021),February 21-24, 2021. (Under Minor Revisions)2. Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, HongxinHu, “Dangerous Skills Got Certified: Measuring the Trustworthiness of SkillCertification in Voice Personal Assistant Platforms”, In Proceedings of the ACM5

Conference on Computer and Communications Security (CCS 2020), November 9-13, 2020. [Acceptance rate: 121/715 16.9%]3. Song Liao, Christin Wilson, Long Cheng, Hongxin Hu and Huixing Deng, “Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications”,In Proceedings of the 2020 Annual Computer Security Applications Conference(ACSAC 2020), December 7-11, 2020. [Acceptance rate: 70/302 23.2%]4. Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao and HongxinHu, “Interpreting Deep Learning-Based Networking Systems”, In Proceedingsof the ACM SIGCOMM Conference (SIGCOMM 2020), August 10-14, 2020.5. Shuhe Wang, Chen Sun, Zili Meng, Minhu Wang, Jiamin Cao, Mingwei Xu, JunBi, Qun Huang, Masoud Moshref, Tong Yang, Hongxin Hu and Gong Zhang,“Martini: Bridging the Gap between Network Measurement and Control UsingSwitching ASICs”, In Proceedings of the 26th IEEE International Conferenceon Network Protocols (ICNP 2020), Madrid, Spain, October 13-16, 2020.[Acceptance rate: 16.84%]6. Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, ong Cheng, Hai Xiao and Rong Ge,“DeepPower: Early Detection of IoT Malware through Fine-grained ActivityRecognition using Power Side Channels”, In Proceedings of the 15th ACM ASIAConference on Computer and Communications Security (ASIACCS 2020),Taipei, Taiwan, June 1-5, 2020. [Acceptance rate: 67/308 21.7%]7. Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, HongxinHu, Guofei Gu, Qi Li, Mingwei Xu and Jianping Wu, “Poseidon: Enabling Costefficient and Agile DDoS Defense with Programmable Switches”, In Proceedings of the 27th Network and Distributed System Security Symposium (NDSS2020), San Diego, CA, USA, February 23-26, 2020. [Acceptance rate: 88/506 17.4%]8. Yifang Li, Nishant Vishwamitra, Hongxin Hu and Kelly Caine, “Towards ATaxonomy of Content Sensitivity and Sharing Preferences for Photos”, In Proceedings of the 2020 ACM Conference on Human Factors in Computing Systems (CHI 2020), Honolulu, Hawaii, USA, April 25-30, 2020. [Acceptancerate: 760/3126 24.3%]9. Zili Meng, Jing Chen, Yaning Guo, Chen Sun, Hongxin Hu and Mingwei Xu,“PiTree: Practical Implementation of ABR Algorithms Using Decision Trees”,In Proceedings of the 27th ACM International Conference on Multimedia (MM2019), Nice, France, October 21-25, 2019. [Oral paper acceptance rate: 88/936 9.4%]10. Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu andJianping Wu, “Octans: Optimal Placement of Service Function Chains in ManyCore Systems”, In Proceedings of the 37th IEEE International Conference onComputer Communications (INFOCOM 2019), Paris, France, April 29-May2, 2019. [Acceptance rate: 288/1464 19.7%]11. Wenbo Ding and Hongxin Hu, “On the Safety of IoT Device Physical Interaction Control”, In Proceedings of the 25th ACM Conference on Computer andCommunications Security (CCS 2018), Toronto, Canada, October 15-19, 2018.[Acceptance rate: 134/809 16.6%]12. Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn and Fuqiang Zhang, “vNIDS:Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems”, In Proceedings of the 25th ACM Conference onComputer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018. [Acceptance rate: 134/809 16.6%]6

13. Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu and KellyCaine, “Effectiveness and Users’ Experience of Obfuscation as a Privacy-EnhancingTechnology for Sharing Photos”, In Proceedings of the 21st ACM Conference onComputer-Supported Cooperative Work and Social Computing (CSCW 2018),Jersey City, NJ, USA, November 3-7, 2018. [Acceptance rate: 105/384 27.3%]14. Zhilong Zheng, Jun Bi, Haiping Wang, Chen Sun, Heng Yu, Hongxin Hu, KaiGao and Jianping Wu, “Grus: Enabling Latency SLOs for GPU-AcceleratedNFV Systems”, In Proceedings of 26th IEEE International Conference on Network Protocols (ICNP 2018), Cambridge, UK, September 24-27, 2018. [Acceptance rate: 35/196 17.9%]15. Chen Sun, Jun Bi, Zili Meng, Xiao Zhang and Hongxin Hu, “OFM: Optimized Flow Migration for NFV Elasticity Control”, In Proceedings of the 26thIEEE/ACM International Symposium on Quality of Service (IWQoS 2018),Banff, Alberta, Canada, June 4-6, 2018. [Acceptance rate: 26/125 20.8%]16. Younghee Park, Hongxin Hu, Xiaohong Yuan and Hongda Li, “Enhancing Security Education Through Designing SDN Security Labs in CloudLab”, In Proceedings of the 49th ACM Technical Symposium on Computer Science Education(SIGCSE 2018), Baltimore, Maryland, USA, February 21-24, 2018. (BestPaper Award)17. Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin and Donald Porter, “Building a Security OS with Software Defined Infrastructure”, In Proceedings of the8th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2017), IIT,Bombay, Indian, September 2-3, 2017.18. Chen Sun, Jun Bi, Zhilong Zheng, Heng Yu and Hongxin Hu, “NFP: EnablingNetwork Function Parallelism in NFV”, In Proceedings of the ACM SIGCOMMConference (SIGCOMM 2017), Los Angeles, CA, USA, August 21-25, 2017.[Acceptance rate: 36/250 14.4%]19. Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine andGail-Joon Ahn, “Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks”, In Proceedings of the 22nd ACM Symposiumon Access Control Models And Technologies (SACMAT 2017), Indianapolis,IN, USA, June 21-23, 2017. [Acceptance rate: 14/50 28.0%]20. Juan Deng*, Hongda Li*, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn,Ziming Zhao and Wonkyu Han, “On the Safety and Efficiency of Virtual Firewall Elasticity Control”, In Proceedings of the 24th Network and DistributedSystem Security Symposium (NDSS 2017), San Diego, California, February26 - March 1, 2017 (*co-first author). [Acceptance rate: 68/423 16.1%]21. Kang Chen, Ryan Izard, Hongxin Hu, Kuangching Wang and James Martin, “HetSDN: Exploiting SDN for Intelligent Network Usage in HeterogeneousWireless Networks”, In Proceedings of IEEE/ACM International Symposiumon Quality of Service (IWQoS 2016), Beijing, China, June 20-21, 2016.22. Hitesh Padekar, Younghee Park, Hongxin Hu and Sang-Yoon Chang, “EnablingDynamic Access Control for Controller Applications in Software-Defined Networks”, In Proceedings of the 21st ACM Symposium on Access Control ModelsAnd Technologies (SACMAT 2016), Shanghai, China, June 5-8, 2016. (BestPaper Honorable Mention Award)23. Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, KuangChing Wang and Juan Deng, “State-aware Network Access Management forSoftware-Defined Networks”, In Proceedings of the 21st ACM Symposium onAccess Control Models And Technologies (SACMAT 2016), Shanghai, China,June 5-8, 2016.7

24. Shuyong Zhu, Jun Bi, Chen Sun, Chenghui Wu and Hongxin Hu, “SDPA:Enhancing Stateful Forwarding for Software-Defined Networking”, In Proceedings of the 23rd IEEE International Conference on Network Protocols (ICNP2015), San Francisco, USA, November 10-13, 2015. [Acceptance rate: 38/187 20.3%] (Best Paper Nominee)25. Yiming Jing, Ziming Zhao, Gail-Joon Ahn and Hongxin Hu, “Morpheus: Automatically Generating Heuristics to Detect Android Emulators”, In Proceedings ofthe 30th Annual Computer Security Applications Conference (ACSAC2014), New Orleans, LA, USA, December 8-12, 2014. [Acceptance rate: 47/236 19.9%] (Finalist for CSAW 2015 Best Applied Security Paper Award)26. Hongxin Hu, Wonkyu Han, Gail-Joon AhnandZiming Zhao, “FlowGuard: Building Robust Firewalls for Software-Defined Networks”, In Proceedings of ACMSIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN2014), Chicago, IL, USA, August 22, 2014. [Acceptance rate for full paper withlong presentation: 16/114 14.0%]27. Hongxin Hu, Gail-Joon Ahn, Ziming Zhao and Dejun Yang, “Game TheoreticAnalysis of Multiparty Access Control in Online Social Networks”, In Proceedings of the 19th ACM Symposium on Access Control Models And Technologies(SACMAT 2014), London, Ontario, Canada, June 25-27, 2014.28. Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin Hu, “RiskMon: Continuous and Automated Risk Assessment for Mobile Applications”, In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy(CODASPY 2014), San Antonio, TX, USA, March 3-5, 2014. [Acceptancerate: 19/119 16.0%] (Best Paper Award)29. Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo and Hongxin Hu, “On the Securityof Picture Gesture Authentication”, In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 2013), Washington DC, August 2013.[Acceptance rate: 44/277 15.9%] (Media Coverage: ACM TechNews, InformationWeek, WeLiveSecurity, NetworkWorld, SlashDot, SoftPedia, TechEYE,PCInfoSite, PCWorld, TechRadar, TechDigest, ThreatPost, WebRoot, TechNewzie, SiloBreaker,Topix, Neowin, ITSecureSite, CreativeGroups, Sysnative,LifeattheMoment, ParityNews, etc)30. Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi, “SocialImpact:Systematic Analysis of Underground Social Dynamics”, In Proceedings of the17th European Symposium on Research in Computer Security (ESORICS 2012),Pisa, Italy, September 10-14, 2012. [Acceptance rate: 50/248 20.1%]31. Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Mengyan Yu, “Comparison-BasedEncryption for Fine-grained Access Control in Clouds”, In Proceedings of the2nd ACM Conference on Data and Application Security and Privacy (CODASPY2012), San Antonio, Texas, USA, February 7-9, 2012. [Acceptance rate: 21/113 18.6%]32. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang and Shanbiao Wang, “Towards Temporal Access Control in Cloud Computing”, In Proceedings of the 31stIEEE International Conference on Computer Communications (INFOCOM2012), Mini-conference, Orlando, Florida, USA, March 25-30, 2012. [Acceptance rate: 378/1547 24.4%]33. Ruoyu Wu, Gail-Joon Ahn, and Hongxin Hu “Towards HIPPA-compliant Healthcare Systems”, In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium (IHI 2012), Miami, Florida, USA, January 28-30, 2012.[Acceptance rate for oral presentation: 48/269 17.8%]8

34. Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen, “Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks”, InProceedings of the 27th Annual Computer Security Applications Conference(ACSAC 2011), Orlando, Florida, USA, December 5-9, 2011. [Acceptancerate: 39/195 20.0%]35. Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni, “Anomaly Discovery andResolution in Web Access Control Policies”, In Proceedings of the 16th ACMSymposium on Access Control Models And Technologies (SACMAT 2011),Innsbruck, Austria, June 15-17, 2011. (Best Paper Award Candidate;CSAW AT&T Applied Security Research Best Paper Award Nominee).36. Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang and Jean-PierreSeifert, “DRFT: Efficient Remote Attestation Framework for Dynamic Systems”, In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece, September 20-22, 2010.[Acceptance rate: 42/201 20.8%]37. Yan Zhu, Gail-Joon Ahn, Hongxin Hu and Huaixi Wang, “Cryptographic Rolebased Security Mechanisms based on Role-Key Hierarchy”, In Proceedings ofthe 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010. [Acceptance rate:35/166 21%]38. Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and Xinwen Zhang,“Patient-centric Authorization Framework for Sharing Electronic Health Records”,In Proceedings of the 14th ACM Symposium on Access Control Models AndTechnologies (SACMAT 2009), Stresa, Italy, June 3-5, 2009.39. Hongxin Hu and Gail-Joon Ahn, “Enabling Verification and Conformance Testing for Access Control Model”, In Proceedings of the 13th ACM Symposium onAccess Control Models And Technologies (SACMAT 2008), Estes Park, Colorado, USA, June 11-12, 2008. [Acceptance rate: 20/79 25%]40. Gail-Joon Ahn and Hongxin Hu, “Towards Realizing a Formal RBAC Model inReal Systems”, In Proceedings of the 12th ACM Symposium on Access ControlModels And Technologies (SACMAT 2007), Sophia Antipolis, France, June20-22, 2007. [Acceptance rate: 19/79 24%]Representative Journal Publications:42. Xincai Fei, Fangming Liu, Qixia Zhang, Hai Jin and Hongxin Hu, “Paving theWay for NFV Acceleration: A Taxonomy, Survey and Future Directions”, ACMComputing Surveys (CSUR), Vol.53, August 2020.43. Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng and Danfeng Yao, “Contextrich Privacy Leakage Analysis through Inferring Apps in Smart Home IoT”,IEEE Internet of Things Journal (IoTJ), 2020.44. Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Hongxin Hu and Rongxin Lu,“IoT-Praetor: Undesired Behaviors Detection for IoT Devices”, IEEE Internetof Things Journal (IoTJ), 2020.45. Juan Wang, Shirong Hao, Hongxin Hu, Hongda Li, Wenhui Zhang, Jun Xu andPeng Liu, “S-Blocks: Lightweight and Trusted Virtual Security Function withSGX”, IEEE Transactions on Cloud Computing (TCC), 2020.46. Zili Meng, Jun Bi, Haiping Wang, Chen Sun and Hongxin Hu, “MicroNF: AnEfficient Framework for Enabling Modularized Service Chains in NFV”, IEEEJournal of Selected Areas in Communications (JSAC), 2019.9

47. Menghao Zhang, Jun Bi, Kai Gao, Yi Qiao, Guanyu Li, Xiao Kong, Zhaogeng Li and Hongxin Hu, “Tripod: Towards a Scalable, Efficient and ResilientCloud Gateway”, IEEE Journal of Selected Areas in Communications (JSAC),Vol.37, No.3, 2019.48. Chen Sun, Jun Bi, Zili Meng, Tong Yang, Xiao Zhang and Hongxin Hu, “Enabling NFV Elasticity Control with Optimized Flow Migration”, IEEE Journalof Selected Areas in Communications (JSAC), Vol.36, No.10, 2018.49. Chen Sun, Jun Bi, Zhilong Zheng and Hongxin Hu, “HYPER: A Hybrid HighPerformance Framework for Network Function Virtualization”, IEEE Journalof Selected Areas in Communications (JSAC), Vol. 35, No. 11, 2017.50. Chen Sun, Jun Bi, Haoxian Chen, Hongxin Hu, Zhilong Zheng, Shuyong Zhuand Chenghui Wu, “SDPA: Towards a Stateful Data Plane in Software-DefinedNetworking”, IEEE/ACM Transactions on Networking (TON), 2017.51. Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, and Ziming Zhao,“TripleMon: A Multi-layer Security Framework for Mediating Inter-ProcessCommunication on Android”, Journal of Computer Security (JCS), Vol. 24,No. 4, 2016.52. Jun Bi, Shuyong Zhu, Guang Yao, Chen Sun and Hongxin Hu, “SupportingVirtualized Network Functions with Stateful Data Plane Abstraction”, IEEENetwork, Vol. 30, No. 3, 2016.53. Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Tom Holt, Yiming Jing andHongxin Hu, “Mules, Seals, and Attacking Tools: Analyzing Twelve OnlineMarketplaces”, IEEE Security & Privacy, Vol. 14, No. 3, 2016.54. Ziming Zhao, Gail-Joon Ahn and Hongxin Hu, “Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation”, ACMTransactions on Information and System Security (TISSEC), Vol. 17, No. 4,April, 2015.55. Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin Hu, “Towards Automated Risk Assessment and Mitigation of Mobile Applications”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 17, No. 4, April,2015. (Selected as the spotlight paper of the issue)56. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Changjun Hu and Di Ma, “Role-BasedCryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy”, IEEE Transactions on Information Forensics & Security (TIFS),Vol. 8, No. 12, December, 2013.57. Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni, “Discovery and Resolution ofAnomalies in Web Access Control Policies”, IEEE Transactions on Dependableand Secure Computing (TDSC), Vol. 10, No. 6, November/December, 2013.(Selected as the spotlight paper of the issue)58. Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen, “Multiparty Access Control for Online Social Networks: Model and Mechanisms”, IEEE Transactionson Knowledge and Data Engineering (TKDE), Vol. 25, No. 7, July, 2013.(Featured by the IEEE Special Technical Community on Social Networking)59. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau and Ho G. An, “Dynamic Audit Services for Outsourced Storages in Clouds”, IEEE Transactionson Services Computing (TSC), Vol. 6, No. 2, April-June, 2013.60. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu and Shimin Chen, “Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud10

Storage”, IEEE Transactions on Parallel and Distributed Systems (TPDS),Vol. 23, No. 12, December, 2012.61. Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni, “Detecting and ResolvingFirewall Policy Anomalies”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 9, No. 3, May/June 2012.62. Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn and Jean-PierreSeifert, “Remote Attestation with Domain-based Integrity Model and PolicyAnalysis”, IEEE Transactions on Dependable and Secure Computing (TDSC),Vol. 9, No. 3, May/June 2012.63. Ziming Zhao, Hongxin Hu, Gail-Joon Ahn and Ruoyu Wu, “Risk-Aware Response for Mitigating MANET Routing Attacks”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vov. 9, No. 2, March/April 2012.64. Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and Xinwen Zhang,“Patient-centric Authorization Framework for Electronic Healthcare Services”,Computers & Security (COSE), Elsevier, Vol. 30, No. 2-3, March-May 2011.65. Hongxin Hu and Gail-Joon Ahn, “Constructing Authorization Systems UsingAssurance Management Framework”, IEEE Transactions on Systems, Man,and Cybernetics (TSMC), Part C, Special Issue on Availability, Reliability,and Security

University Cyber Security Awareness Week (CSAW), 2015 Spotlight Paper, IEEE Transactions on Dependable and Secure Computing . UNCC, 2008 Outstanding Teaching Award, China University of Geosciences, 2004 . the 28th Network and Distributed System Security Symposium (NDSS 2021), February 21-24, 2021. (Under Minor Revisions)