CINXE.COM
Shangqing Zhao's homepage @ University of Oklahoma
<!DOCTYPE HTML> <META charset="utf-8"> <TITLE>Shangqing Zhao's homepage @ University of Oklahoma</TITLE> <META name="viewport" content="width=device-width, initial-scale=1"> <LINK href="res/main.css" rel="stylesheet" type="text/css"> <style> .alert { border-radius: 5px; padding: 20px; background-color: #f8e4e4; color: #020202; } </style> <BODY><!-- Static navbar --> <DIV class="navbar navbar-default navbar-fixed-top" role="navigation"> <DIV class="container"> <DIV class="navbar-collapse collapse"> <UL class="nav navbar-nav"> <LI><A class="first-title" href="https://www.ou.edu/">University of Oklahoma</A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title"> </A></LI> <LI><A class="post-title">               </A></LI> <LI ><A class="post-title" href="#">Homepage</A></LI> <LI><A class="post-title" href="#research">Research</A></LI> <LI><A class="post-title" href="#pub">Publications</A></LI> </UL></DIV><!--/.nav-collapse --> </DIV></DIV> <DIV class="container" id="main"> <DIV class="row"> <DIV class="col-md-13"> <img src='./image/webphoto.jpg' class="taoimg" style="width:210px; float:left; margin-right:100px; margin-left:20px; margin-top:5px; margin-bottom:0px; " /> <br><h4><strong><font style="font-size:35px;padding-bottom:200px;">Shangqing Zhao</font></strong> <div style='margin-top: 25px'></div> Ph.D., Assistant Professor<br><div style='margin-top: 5px'></div> School of Computer Science<br><div style='margin-top: 5px'></div> University of Oklahoma<br><div style='margin-top: 5px'></div> Norman Campus: 110 W. Boyd St., DEH 210D, Norman, OK 73019 <br><div style='margin-top: 5px'></div> Tulsa Campus: 4502 E 41st St, 4303, Tulsa, OK 74135<br><div style='margin-top: 5px'> Email: shangqing@ou.edu | Phone: (918) 660-3292<br><br><h4> <br> <!-- Position --> <table> <tbody> <tr> <div class="alert"> <b>Multiple Ph.D. openings are available in our group. Self-motivated students who have strong interests in mobile system design, network security, wireless security, IoT design, machine learning, are always welcome to join us.</b> </div> </tr> </tbody> </table> <HR> <DIV> <HR> <section id="ShortBio" style="padding-bottom:0px;"> </section> <H3>Short Bio</H3> <BLOCKQUOTE> Shangqing Zhao is an Assistant Professor in <a href="https://www.ou.edu/coe/cs"> School of Computer Science</a>, <a href="https://www.ou.edu/"> University of Oklahoma</a>. He received his Ph.D. degree under <a href="http://csa.eng.usf.edu/">Dr. Zhuo Lu</a> at <a href="https://www.usf.edu/">University of South Florida</a> in 2021. Shangqing Zhao's research primarily focuses on the network and mobile system design and security. His research results have been published in top-tier conferences and journals. He also served as a reviewer for multiple top academic journals and conferences. </BLOCKQUOTE> <HR> <section id="ShortBio" style="padding-bottom:0px;"> </section> <H3>News</H3> <BLOCKQUOTE> <li>[Dec 2024] Our paper on RFID attack has been accepcted by INFOCOM 2025</li> <li>[Apr 2024] Our proposal on Capsule Forensics has been funded by OU DISC. Thanks DISC!</li> <li>[Dec 2023] Our paper on defending adversary machine learning on spectrum attack has been accepcted by INFOCOM 2024</li> <li>[Oct 2023] Our proposal on adversal driven physical layer security has been funded by NSF SaTC. Thanks to NSF!</li> <li>[Aug 2023] Our education proposal on AI related 5G security has been funded by NSF. Thanks to NSF!</li> <li>[Aug 2023] Our paper on the efficient attacks of physical layer authentication has been accepted by IEEE S&P 2024.</li> <li>[July 2023] Our paper on adaptive mmWave AP design won IEEE ICCCN 2023 Best Paper Award.</li> </BLOCKQUOTE> <HR> <section id="research" style="padding-bottom:0px;"> </section> <H3>Research Interests</H3> <BLOCKQUOTE> <UL> <LI class="space">Novel data-driven mobile/IoT system design </LI> <LI class="space">Mobile and network security </LI> <LI class="space">Machine learning for mobile network and security applications  </LI> </UL> </BLOCKQUOTE> <HR> <section id="pub" style="padding-bottom:0px;"> </section> <H3>Publications</H3> <BLOCKQUOTE> <LI class="space"> <b><u>Full Conference Papers: </u></b></LI> <article> <p> <ol start = "25"> <li>Jiaohao Xue, Xiao Han, Shangqing Zhao, Yao Liu, and Zhuo Lu, "An Active Identification Overriding Attack against RFID: Attack Strategy and Defense Design," <span style="font-style: italic">in Proc. of IEEE Conference on Computer Communications (<span style="font-weight:bold">INFOCOM</span>), Accepted. </li> </ol> </p> </article> <article> <p> <ol start = "24"> <li>Hamidah Alanazi, Shengping Bi, Tao Wang, Tao Hou and Shangqing Zhao, "Adaptive Feature Engineering Against Adversarial Learning," <span style="font-style: italic">in Proc. of IEEE Secure Development Conference (Poster) (<span style="font-weight:bold">SecDev</span>), Oct 2024. </li> </ol> </p> </article> <article> <p> <ol start = "23"> <li>Xinyu Cao, Shangqing Zhao, Yanjun Pan, Yuchen Liu, "Secure Parameter Sharing in Federated Learning via Over-the-Air Computing," <span style="font-style: italic">in Proc. of IEEE Secure Development Conference (Poster) (<span style="font-weight:bold">SecDev</span>), Oct 2024. <a style="border:1px solid gray" href="res/24secdev/secdev24-poster.pdf">Poster </a> </li> </ol> </p> </article> <article> <p> <ol start = "22"> <li>Zhengping Jay Luo, Tyler Stewart, Mourya Narasareddygari, Rui Duan, Shangqing Zhao, "Quantum Machine Learning: Performance and Security Implications in Real-World Applications," <span style="font-style: italic">in Proc. of IEEE Secure Development Conference (Poster) (<span style="font-weight:bold">SecDev</span>), Oct 2024. <a style="border:1px solid gray" href="res/24secdev/2408.04543v1.pdf">Paper </a> <a style="border:1px solid gray" href="res/24secdev/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "21"> <li>Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, and Zhuo Lu, "Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics," <span style="font-style: italic">in Proc. of IEEE Conference on Computer Communications (<span style="font-weight:bold">INFOCOM</span>), May 2024. <a style="border:1px solid gray" href="res/24infocom/24zlz-info.pdf">Paper </a> <a style="border:1px solid gray" href="res/24infocom/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "20"> <li>Jinmiao Chen, Zhengping Luo, Yuchen Liu, and Shangqing Zhao "MMP: A Dynamic Routing Protocol Design to Proactively Defend against Wireless Network Inference Attacks," <span style="font-style: italic">in Proc. of ACM Workshop on Moving Target Defense (<span style="font-weight:bold">MTD</span>), Nov. 2023. <a style="border:1px solid gray" href="res/23mtd/23mtd.pdf">Paper </a> <a style="border:1px solid gray" href="res/23mtd/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "19"> <li>Zhe Qu, Rui Duan, Xiao Han, Shanqing Zhao, Yao Liu, and Zhuo Lu, "Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information," <span style="font-style: italic">in Proc. of IEEE Symposium on Security and Privacy (<span style="font-weight:bold">S&P</span>), May 2024. <a style="border:1px solid gray" href="res/24sp/24qdh-sp.pdf">Paper </a> <a style="border:1px solid gray" href="res/24sp/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "18"> <li>Yuchen Liu, Mingzhe Chen, Donghuan Xu, Shangqing Zhao, "E-App: Adaptive mmWave Access Point Planning with Environmental Awareness in Wireless LANs," <span style="font-style: italic">in Proc. of IEEE International Conference on Computer Communications and Networks (<span style="font-weight:bold">ICCCN</span>), July 2023. (<span style="font-weight:bold">Best Paper</span>) <a style="border:1px solid gray" href="res/23icccn/23yuchen-icccn.pdf">Paper </a> <a style="border:1px solid gray" href="res/23icccn/bibtex2.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "17"> <li>Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu, "Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security," <span style="font-style: italic">in Proc. of IEEE International Conference on Computer Communications and Networks (<span style="font-weight:bold">ICCCN</span>), July 2023. <a style="border:1px solid gray" href="res/23icccn/23xqz-icccn.pdf">Paper </a> <a style="border:1px solid gray" href="res/23icccn/bibtex1.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "16"> <li>Jinmiao Chen, Zhaohe Zhang, Shangqing Zhao, Song Fang, Thomas M. Peters, Evan L. Floyd, Changjie Cai, "Short: A Data-Driven Respirator Fit Test Model via Human Speech Signal," <span style="font-style: italic">in Proc. of IEEE Conference on Connected Health: Applications, Systems and Engineering Technologies (<span style="font-weight:bold">CHASE</span>), June 2023. <a style="border:1px solid gray" href="res/23chase/paper.pdf">Paper </a> <a style="border:1px solid gray" href="res/23chase/paperbibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "15"> <li>Jinmiao Chen, Zhaohe Zhang, Shangqing Zhao, Song Fang, Thomas M. Peters, Evan L. Floyd, Changjie Cai, "Noninvasive Respirator Fit Factor Inference by Semi-Supervised Learning," <span style="font-style: italic">in Proc. of IEEE Conference on Connected Health: Applications, Systems and Engineering Technologies (Poster) (<span style="font-weight:bold">CHASE</span>), June 2023. <a style="border:1px solid gray" href="res/poster.pdf">Paper </a> <a style="border:1px solid gray" href="res/23chase/posterbibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "14"> <li>Zhengping Luo, Will A. Pitera, Shangqing Zhao, Zhuo Lu, Yalin Sagduyu, "How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks?" <span style="font-style: italic">in Proc. of ACM Workshop on Wireless Security and Machine Learning (<span style="font-weight:bold">WiseML</span>), May 2023. <a style="border:1px solid gray" href="res/23wiseML/23lpz-wiseml.pdf">Paper </a> <a style="border:1px solid gray" href="res/23wiseML/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "13"> <li>Qiuye He, Edwin Yang, Song Fang, Shangqing Zhao, "Honey Breath: An Ambush Tactic Against Wireless Breath Inference" <span style="font-style: italic">in Proc. of EAI Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (<span style="font-weight:bold">MobiQuitous</span>), Nov 2022 (<span style="font-weight:bold">Best Paper</span>). <a style="border:1px solid gray" href="res/22mobiquitous/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "12"> <li>Rui Duan, Zhe Qu, Shanqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu, "Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception," <span style="font-style: italic">in Proc. of ACM Conference on Computer and Communications Security (<span style="font-weight:bold">CCS</span>), Nov 2022. <a style="border:1px solid gray" href="res/22ccs/22dqz-ccs">Paper </a> <a style="border:1px solid gray" href="res/22ccs/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "11"> <li>Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han and Junjie Xiong, "Smartphone Location Spoofing Attack in Wireless Networks," <span style="font-style: italic">in Proc. of EAI International Conference on Security and Privacy in Communication Networks (<span style="font-weight:bold">SecureComm</span>), Sept, 2021. <a style="border:1px solid gray" href="res/21SecureComm/21hll-securecomm.pdf">Paper </a> <a style="border:1px solid gray" href="res/21SecureComm/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "10"> <li>Zhengping Luo, Shangqing Zhao, Rui Duan, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu, "Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing," <span style="font-style: italic">in Proc. of ACM Workshop on Wireless Security and Machine Learning (<span style="font-weight:bold">WiSec-WiseML</span>), July, 2021. <a style="border:1px solid gray" href="res/20wisec/21lzl-wiseml.pdf">Paper </a> <a style="border:1px solid gray" href="res/20wisec/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "9"> <li>Zhengping Luo, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu, "Adversarial Machine Learning based Partial-model Attack in IoT," <span style="font-style: italic">in Proc. of ACM Workshop on Wireless Security and Machine Learning</span> (<span style="font-weight:bold">WiSec-WiseML</span>), July. 2020. <a style="border:1px solid gray" href="res/20wisec/20lzl-wiseml.pdf">Paper </a> <a style="border:1px solid gray" href="res/20wisec/WiseML.pptx">Slide </a> <a style="border:1px solid gray" href="res/20wisec/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "8"> <li>Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu, Yao Liu "Comb Decoding towards Collision-Free WiFi," <span style="font-style: italic">in Proc. of USENIX Symposium on Networked Systems Design and Implementation</span> (<span style="font-weight:bold">NSDI</span>), Feb. 2020. (<u>Acceptance Rate: 17.45%</u>) <a style="border:1px solid gray" href="res/20nsdi/20zl-nsdi-final.pdf">Paper </a> <a style="border:1px solid gray" href="res/20nsdi/nsdi.pptx">Slide </a> <a style="border:1px solid gray" href="res/20nsdi/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "7"> <li>Shangqing Zhao, Zhe Qu, Zhuo Lu, Cliff Wang "Vulnerability Analysis, Attack Strategies and Countermeasures Design in Network Tomography," <span style="font-style: italic">in Proc. of Annual Computer Security Applications Conference</span> (<span style="font-weight:bold">ACSAC</span>) (Poster), Dec. 2019. <a style="border:1px solid gray" href="res/19acsac/19zlw-acsac-poster.pdf">Paper </a> <a style="border:1px solid gray" href="res/19acsac/Poster_Shangqing.pdf">Poster </a> <a style="border:1px solid gray" href="res/19acsac/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "6"> <li>Shangqing Zhao, Zhe Qu, Zhuo Lu, Tao Wang "Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems," <span style="font-style: italic">in Proc. of IEEE International Symposium on Dynamic Spectrum Access Networks</span> (<span style="font-weight:bold">DySPAN</span>) (Poster), Nov. 2019. <a style="border:1px solid gray" href="res/19dyspan/19zlw-dyspan-poster.pdf">Paper </a> <a style="border:1px solid gray" href="res/19dyspan/Dyspan_poster.pdf">Poster </a> <a style="border:1px solid gray" href="res/19dyspan/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "5"> <li>Shangqing Zhao, Zhuo Lu, Zhengping Luo, Yao Liu, "Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks," <span style="font-style: italic">in Proc. of IEEE Conference on Computer Communications</span> (<span style="font-weight:bold">INFOCOM</span>), Apr. 2019. (<u>Acceptance Rate: 19.7%</u>) <a style="border:1px solid gray" href="res/19infocom/zhao/19zll-info.pdf">Paper </a> <a style="border:1px solid gray" href="res/19infocom/zhao/19zll-info-slides.pdf">Slide </a> <a style="border:1px solid gray" href="res/19infocom/zhao/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "4"> <li>Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu, "Entrapment for Wireless Eavesdroppers," <span style="font-style: italic">in Proc. of IEEE Conference on Computer Communications</span> (<span style="font-weight:bold">INFOCOM</span>), Apr. 2019. (<u>Acceptance Rate: 19.7%</u>) <a style="border:1px solid gray" href="res/19infocom/fang/19flz-info.pdf">Paper </a> <a style="border:1px solid gray" href="res/19infocom/fang/19flz-info-slides.pdf">Slide </a> <a style="border:1px solid gray" href="res/19infocom/fang/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "3"> <li>Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, "No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing," <span style="font-style: italic">in Proc. of ACM Conference on Computer and Communications Security</span> (<span style="font-weight:bold">CCS</span>), Oct. 2018. (<u>Acceptance Rate: 16.6%</u>) <a style="border:1px solid gray" href="res/18ccs/18fml-ccs.pdf">Paper </a> <a style="border:1px solid gray" href="res/18ccs/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "2"> <li>Shangqing Zhao, Zhengpin Luo, Zhuo Lu, Xiang Lu, and Yao Liu, "Stateful inter-packet signal processing for wireless networking," <span style="font-style: italic"> in Proc. of ACM Conference on Mobile Computing and Networking</span> (<span style="font-weight:bold">MobiCom</span>), Oct. 2017 . (<u>Acceptance Rate: 18.83%</u>) <a style="border:1px solid gray" href="res/17mobicom/17zll-mobicom.pdf">Paper </a> <a style="border:1px solid gray" href="res/17mobicom/17zll-mobicom-slides.pptx">Slide </a> <a style="border:1px solid gray" href="res/17mobicom/bibtex.html">BibTex</a> </li> </ol> </p> </article> <article> <p> <ol start = "1"> <li>Shangqing Zhao, Zhuo Lu and Cliff Wang, "When seeing isn't believing: on feasibility and detectability of scapegoating in network tomography," <span style="font-style: italic">in Proc. of IEEE International Conference on Distributed Computing Systems</span> (<span style="font-weight:bold">ICDCS</span>), Jun. 2017. (<u>Acceptance Rate: 16.9%</u>) <a style="border:1px solid gray" href="res/17icdcs/17zlw-icdcs.pdf">Paper </a> <a style="border:1px solid gray" href="res/17icdcs/17zlw-icdcs-slides.pdf">Slide </a> <a style="border:1px solid gray" href="res/17icdcs/bibtex.html">BibTex</a> </li> </ol> </p> </article> <!-- ############################################## --> <LI class="space"><b><u>Full Journal Papers:</u></b></LI> <!-- ############################################## --> <article> <p> <ol start = "18"> <li>Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu "Perception-Aware Attack Against Music Copyright Detection: Impacts and Defenses," <span style="font-style: italic">IEEE Transactions on Dependable and Secure Computing</span>, Early Access.</li> </ol> </p> </article> <article> <p> <ol start = "17"> <li>Qiuye He, Edwin Yang, Song Fang, Shangqing Zhao "Revisiting Wireless Breath and Crowd Inference Attacks With Defensive Deception," <span style="font-style: italic">IEEE Transactions on Networking</span>, vol. 32, pp. 4976 - 4988, Sep. 2024.</li> </ol> </p> </article> <article> <p> <ol start = "16"> <li>Dong Han, Reza Babaei, Shangqing Zhao, Samuel Cheng, "Exploring the Efficacy of Learning Techniques in Model Extraction Attacks on Image Classifiers: A Comparative Study," <span style="font-style: italic">Applied Sciences</span>, vol. 14, pp. 3785, Apr. 2024.</li> </ol> </p> </article> <article> <p> <ol start = "15"> <li>Reza Babaei, Samuel Cheng, Theresa Thai, Shangqing Zhao, "Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models," <span style="font-style: italic">Arxiv</span>.</li> </ol> </p> </article> <article> <p> <ol start = "14"> <li>Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, and Yao Liu, "The Perils of Wi-Fi Spoofing Attack Via Geolocation API and its Defense," <span style="font-style: italic">IEEE Transactions on Dependable and Secure Computing</span>, vol. 21, pp. 4343 - 4359, Jan. 2024.</li> </ol> </p> </article> <article> <p> <ol start = "13"> <li>Zhihao Zhao, Shangqing Zhao, Samuel Cheng, "Group ensemble block: subspace diversity improves coarse-to-fine image retrieval," <span style="font-style: italic">IEEE/ACM Transactions on Artificial Intelligence</span>, vol. 4, pp. 60-70, Feb. 2023.</li> </ol> </p> </article> <article> <p> <ol start = "12"> <li>Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, "Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks," <span style="font-style: italic">IEEE Transactions on Dependable and Secure Computing</span>, vol. 20, pp. 637-649, Jan. 2023.</li> </ol> </p> </article> <article> <p> <ol start = "11"> <li>Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu (The first two authors are co-primary authors), "LoMar: A Local Defense Against Poisoning Attack on Federated Learning," <span style="font-style: italic">IEEE Transactions on Dependable and Secure Computing</span>, vol. 20, pp. 437-450, Jan. 2023.</li> </ol> </p> </article> <article> <p> <ol start = "10"> <li>Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, "Wireless Training-free Keystroke Inference Attack and Defense," <span style="font-style: italic">IEEE/ACM Transactions on Networking, </span>, vol. 30, pp. 1733-1748, Aug. 2022.</li> </ol> </p> </article> <article> <p> <ol start = "9"> <li>Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin E Sagduyu, "When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing" <span style="font-style: italic">IEEE Transactions on Mobile Computing</span>, vol. 21, pp. 1892-1908, May. 2022.</li> </ol> </p> </article> <article> <p> <ol start = "8"> <li>Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu, "How to Test the Randomness from the Wireless Channel for Security?" <span style="font-style: italic">IEEE Transactions on Information Forensics and Security</span>, vol. 16, pp. 3753-3766, June 2021.</li> </ol> </p> </article> <article> <p> <ol start = "7"> <li>Shangqing Zhao, Zhuo Lu, Cliff Wang, "Measurement Integrity Attacks against Network Tomography: Feasibility and Defense," <span style="font-style: italic">IEEE Transactions on Dependable and Secure Computing</span>, vol. 18, no. 6, pp. 2617 - 2630, Nov.-Dec. 1 2021.</li> </ol> </p> </article> <article> <p> <ol start = "6"> <li>Shangqing Zhao, Zhuo Lu, Cliff Wang, "How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks," <span style="font-style: italic">IEEE Transactions on Wireless Communications</span>, vol. 19, pp. 7224-7236, Nov, 2020.</li> </ol> </p> </article> <article> <p> <ol start = "5"> <li>Zhuo Lu, Cliff Wang, Shangqing Zhao "Cyber Deception for Computer and Network Security: Survey and Challenges," <span style="font-style: italic">arXiv:2007.14497</span>, </li> </ol> </p> </article> <article> <p> <ol start = "4"> <li>Hui Guo, Shangqing Zhao, Juan Xing, Zhen Wang, "Performance analysis of cognitive cooperative communication system with multiple antennas," <span style="font-style: italic">Computer Engineering and Applications</span>, vol. 51, no. 8, pp. 92-95, Apr. 2015.</li> </ol> </p> </article> <article> <p> <ol start = "3"> <li>Shangqing Zhao, Hui Guo, Juan Xing, and Shilong Ji, "Performance Analysis of Cognitive Cooperative Communication System Based on Optimal Relay Selection Scheme," <span style="font-style: italic">Journal of Communications</span>, vol. 9, no. 7, pp. 548-555, July 2014.</li> </ol> </p> </article> <article> <p> <ol start = "2"> <li>Hui Guo, Lihong Wang, and Shangqing Zhao, "Supplementary Proof of Upper and Lower Bounds of Two-Way Opportunistic Amplify-and-Forward Relaying Channels," <span style="font-style: italic">IEEE Commun. Lett.</span>, vol. 18, no. 3, pp. 401-402, Mar. 2014.</li> </ol> </p> </article> <article> <p> <ol start = "1"> <li>Shangqing Zhao, Hui Guo, Juan Xing, Zhen Wang, "Performance analysis of cognitive cooperative communication system based on multiuser," <span style="font-style: italic">Computer Systems and Applications</span>, vol. 23, no. 1, pp. 53-56, Jan. 2014.</li> </ol> </p> </article> </div> <div class="clear"></div> </section> </BLOCKQUOTE> <HR> <section id="pub" style="padding-bottom:0px;"> </section> <H3>Teaching</H3> <BLOCKQUOTE> <LI class="space"> <b>CS 4173/5173 Computer Security </b></LI> <LI class="space"> <b>CS 5183 Wireless and Mobile Networks </b></LI> </BLOCKQUOTE> <HR> <section id="award" style="padding-bottom:0px;"> </section> <H3>Current Student</H3> <BLOCKQUOTE> <UL> <LI class="space">Jinmiao Chen; Ph.D. Student; 2022 - Present</LI> <LI class="space">Xinyu Cao; Ph.D. Student; 2024 - Present</LI> <LI class="space">Yu Cai; Ph.D. Student; 2024 - Present</LI> <LI class="space">Reza Babaei (Co-Advised); Ph.D. Student; 2023 - Present</LI> <LI class="space">Yanyan Luo; Master Student; 2024 - Present</LI> </UL> </BLOCKQUOTE> </DIV></DIV></DIV> <HR> <DIV class="footer"> <P style="text-align:center;"> Copyright © 2022 <a href="./">Shangqing Zhao</a>. All rights reserved.<BR> </P> </DIV> </DIV> </BODY> </HTML>