Publications

file

Visible to the public The Healthtech Declaration

Healthcare technology--sometimes called "healthtech" or "healthsec"--is enmeshed with security and privacy via usability, performance, and cost-effectiveness issues. It is multidisciplinary, distributed, and complex--nd it also involves many competing stakeholders and interests.

file

Visible to the public Characterizing Smartphone Usage Patterns from Millions of Android Users

The prevalence of smart devices has promoted the popularity of mobile applications (a.k.a. apps) in recent years. A number of interesting and important questions remain unanswered, such as why a user likes/dislikes an app, how an app becomes popular or eventually perishes, how a user selects apps to install and interacts with them, how frequently an app is used and how much trac it generates, etc. This paper presents an empirical analysis of app usage behaviors collected from millions of users of Wandoujia, a leading Android app marketplace in China.

file

Visible to the public Game Theory with Learning for Cyber Security Monitoring

Abstract--Recent attacks show that threats to cyber infrastructure are not only increasing in volume, but are getting more sophisticated. The attacks may comprise multiple actions that are hard to differentiate from benign activity, and therefore common detection techniques have to deal with high false positive rates. Because of the imperfect performance of automated detection techniques, responses to such attacks are highly dependent on human-driven decision-making processes.

file

Visible to the public Reliability Analysis with Dynamic Reliability Block Diagrams in the Mobius Modeling Tool

Reliability block diagram (RBD) models are a commonly used reliability analysis method. For static RBD models, combinatorial solution techniques are easy and ecient. However, static RBDs are limited in their ability to express varying system state, dependent events, and non-series-parallel topologies. A recent extension to RBDs, called Dynamic Reliability Block Diagrams (DRBD), has eliminated those limitations.

file

Visible to the public Controller Synthesis for Linear Time-varying Systems with Adversaries

We present a controller synthesis algorithm for a discrete time reach-avoid problem in the presence of adversaries. Our model of the adversary captures typical malicious attacks envisioned on cyber-physical systems such as sensor spoong, controller corruption, and actuator intrusion. After formulating the problem in a general setting, we present a sound and complete algorithm for the case with linear dynamics and an adversary with a budget on the total L2-norm of its actions.

file

Visible to the public L2-gain Analysis for a Class of Hybrid Systems with Applications to Reset and Event-triggered Control A Lifting Approach

Abstract: In this paper we study the stability and L2-gain properties of a class of hybrid systems that exhibit linear flow dynamics, periodic time-triggered jumps and arbitrary nonlinear jump maps. This class of hybrid systems is relevant for a broad range of applications including periodic event-triggered control, sampled-data reset control, sampled-data saturated control, and certain networked control systems with scheduling protocols.

event

Visible to the public  BigData2016
Jul 21, 2016 8:00 am - Jul 23, 2016 5:00 pm EDT

The Third International Conference on Data Mining, Internet Computing, and Big Data (BigData2016)

You are invited to participate in The Third International Conference on Data Mining, Internet Computing, and Big Data (BigData2016) that will be held in Mevlana University, Konya, Turkey on July 21 - 23, 2016, which aims to enable researchers build connections between different digital applications.

event

Visible to the public  The Second International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC2015)
Dec 16, 2015 8:00 am - Dec 18, 2015 5:00 pm +03

You are invited to participate in The Second International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC2015) that will be held in Islamic Azad University, Academic City, Dubai, UAE, on December 3-5, 2015, which aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

event

Visible to the public  The Second International Conference on Digital Security and Forensics (DigitalSec2015)
Nov 15, 2015 9:00 am - Nov 17, 2015 10:00 am SAST

Paper Submission is open until October 15, 2015! Submit your papers now!
=======================================================================================

The Second International Conference on Digital Security and Forensics (DigitalSec2015)
http://sdiwc.net/conferences/digitalsec2015/

The proposed conference on the above title will be held at University of Cape Town, South Africa from November 15-17, 2015 which aims to enable researchers build connections between different issues of Security for Web-based Applications and other Services.