{"id":21,"date":"2023-07-20T01:21:44","date_gmt":"2023-07-20T08:21:44","guid":{"rendered":"https:\/\/labs.engineering.asu.edu\/cnsg\/?page_id=21"},"modified":"2024-08-01T08:40:04","modified_gmt":"2024-08-01T15:40:04","slug":"people","status":"publish","type":"page","link":"https:\/\/labs.engineering.asu.edu\/cnsg\/people\/","title":{"rendered":"People"},"content":{"rendered":"<section  class=\"uds-section alignfull bg network-white \" style=\"\"><div class=\"acf-innerblocks-container\">\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"block-c76c4770-69db-49d6-b1fb-5d89bd77eebb\">Faculty<\/h3>\n\n\n\n<p id=\"block-2c089b71-28e3-44c6-8c6f-d7c99c2f61d8\"><a rel=\"noreferrer noopener\" href=\"https:\/\/faculty.engineering.asu.edu\/yczhang\/\" target=\"_blank\">Prof. Yanchao Zhang<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-e06979a8-40fd-4c3e-b40c-6edc092f60a0\">Current PhD Students<\/h3>\n\n\n\n<ul id=\"block-597cb3b4-0171-40c3-b308-d062277ddc31\" class=\"wp-block-list\">\n<li>Sisi Chen<\/li>\n\n\n\n<li>Mingze Pan<\/li>\n\n\n\n<li>Yizhou Wang<\/li>\n\n\n\n<li>Zhou Yu<\/li>\n\n\n\n<li>Ruobing Li<\/li>\n\n\n\n<li>Abdualrhman Almeajel<\/li>\n\n\n\n<li>Yan (Ian) Zhang<\/li>\n\n\n\n<li>Jiawei Li<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-91bed6d1-8319-42d1-8359-8ef92f81db17\">Alumni<\/h3>\n\n\n\n<ul id=\"block-5c8bde34-ce41-454a-8283-068bdd00a97b\" class=\"wp-block-list\">\n<li><a href=\"http:\/\/www-personal.umd.umich.edu\/~anglial\/\">Ang Li<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 7\/2023<\/li>\n\n\n\n<li>Dissertation: &#8220;Securing Heterogeneous IoT Systems&#8221;<\/li>\n\n\n\n<li>Current employment: tenure-track Assistant Professor,&nbsp;Department of Computer and Information Science, University of Michigan-Dearborn<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/blogs.uakron.edu\/yanzhangyz\/\" target=\"_blank\">Yan (Mia) Zhang<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 7\/2022<\/li>\n\n\n\n<li>Dissertation: &#8220;Trustworthy IoT Sensing-as-a-Service&#8221;<\/li>\n\n\n\n<li>Current employment: tenure-track Assistant Professor,&nbsp;Department of Electrical and Computer Engineering, University of Akron<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/ranger.uta.edu\/~han\/\" target=\"_blank\">Dianqi Han<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 7\/2022<\/li>\n\n\n\n<li>Dissertation: &#8220;IoT Security in the Era of Artificial Intelligence&#8221;<\/li>\n\n\n\n<li>Current employment: tenure-track Assistant Professor,&nbsp;Department of Computer and Science Technology, University of Texas at Arlington<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/taolitxjs.github.io\/\">Tao Li<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 7\/2020<\/li>\n\n\n\n<li>Dissertation: &#8220;Security and Privacy in Mobile and Crowdsourcing Systems: Novel Attacks and Countermeasures&#8221;<\/li>\n\n\n\n<li>Current employment: tenure-track Assistant Professor,&nbsp;Department of Computer and Information Technology, Purdue University<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/ianchen88.github.io\/\" target=\"_blank\">Yimin Chen<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 11\/2018<\/li>\n\n\n\n<li>Dissertation: &#8220;Security and Privacy in Mobile Devices: Novel Attacks and Countermeasures&#8221;<\/li>\n\n\n\n<li>Current employment: tenure-track Assistant Professor, Miner School of Computer &amp; Information Sciences, University of Massachusetts Lowell<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Xin Yao\n<ul class=\"wp-block-list\">\n<li>Visiting PhD student from Hunan University, China, 11\/2015\u201311\/2017<\/li>\n\n\n\n<li>PhD in Hunan University, 4\/2018<\/li>\n\n\n\n<li>Current employment: Associate Professor, School of Software, Central South University, China&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20200928154435\/https:\/\/sites.google.com\/site\/jxcking\/\" target=\"_blank\">Xiaocong Jin<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 5\/2017<\/li>\n\n\n\n<li>Dissertation: \u201cSecure and Privacy in Dynamic Spectrum Access: Challenges and Solutions\u201d<\/li>\n\n\n\n<li>Current employment: Google<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Jingchao Sun\n<ul class=\"wp-block-list\">\n<li>PhD, 3\/2017<\/li>\n\n\n\n<li>Dissertation: \u201cSecure and Privacy in Mobile Computing: Challenges and Solutions\u201d<\/li>\n\n\n\n<li>Current employment: Verizona\/Yahoo! Advertising<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20200928154435\/http:\/\/www.public.asu.edu\/~jzhan179\/\" target=\"_blank\">Jinxue Zhang<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 6\/2016<\/li>\n\n\n\n<li>Dissertation: \u201cSecure and Privacy-Preserving Microblogging Services: Attacks and Defenses\u201d<\/li>\n\n\n\n<li>Employment: Uber&#8211;&gt;Facebook<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20200928154435\/https:\/\/www.eecis.udel.edu\/~ruizhang\/\" target=\"_blank\">Rui Zhang<\/a>\n<ul class=\"wp-block-list\">\n<li>PhD, 8\/2013<\/li>\n\n\n\n<li>Dissertation: \u201cSecure and Secure and Privacy in Heterogeneous Wireless and Mobile Networks: Challenges and Solutions\u201d<\/li>\n\n\n\n<li>Current employment: Associate Professor, Department of Computer and Information Sciences, University of Delaware.<\/li>\n\n\n\n<li>NSF CAREER Awardee&nbsp;in 2017<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Jing Shi\n<ul class=\"wp-block-list\">\n<li>PhD, 8\/2010<\/li>\n\n\n\n<li>Dissertation: \u201cSecure Data Access in Heterogeneous Wireless Sensing Systems\u201d<\/li>\n\n\n\n<li>Current employment: Associate Professor, College of Public Administration, Huazhong University of Science and Technology, China<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-dbfb9ecc-6c7d-4d3d-ac27-5ac3397eb109\">Visiting Scholars<\/h3>\n\n\n\n<ul id=\"block-6f0729af-cb17-46ba-a479-6e2ba9108797\" class=\"wp-block-list\">\n<li>Lian Xue, Associate Professor, Hebei University of Engineering, 6\/2017\u201312\/ 2017.<\/li>\n\n\n\n<li>Junwei Zhang, Associate Professor, Xidian University, 9\/2016\u20138\/2016.<\/li>\n\n\n\n<li>Mande Xie, Associate Professor, Zhejiang Gongshang University, 1\/2013\u20137\/2013.<\/li>\n\n\n\n<li>Xiaogang Qi, Professor, Xidian University, 9\/2012\u20138\/2013.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":274,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/users\/274"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":0,"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"wp:attachment":[{"href":"https:\/\/labs.engineering.asu.edu\/cnsg\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}