Yong Guan

Professor

 

Department of Electrical and Computer Engineering

Iowa State University, Ames, IA 50011.

 

Associate Director for Research, Information Assurance Center

Cyber Forensics Coordinator, NIST Center of Excellence in Forensic Sciences - CSAFE

 

Office: 309 Durham Center
Phone: (515) 294-8378  Fax: (515) 294-8432

E-mail: yguan (at) iastate.edu

 


News 1: National Institute of Standards and Technology (NIST), "Phase II - NIST Center of Excellence in Forensic Science and Statistics (Center for Statistics and Applications in Forensic Evidence - CSAFE)", $20M, 06/01/2020 - 05/31/2025. Awarded.

News 2: Fellow, American Academy of Forensic Sciences (AAFS), elected in 2022., Photo.

News 3: American Academy of Forensic Sciences (AAFS) - Diversity and Outreach Committee (DOC), 2019 - 2022. Served as D&I Forum Subcommittee Chair, 2021 - 2022, 3 year service. Photo.

News 4: Mobile App Forensic Evidence Project for Law Enforcement Practitioners, 45-minutes talk at the Digital Forensics for National Security Symposium (Conference Program), Mary M. Gates Learning Center, Alexandria, VA, December 10-11, 2019. News on Forensic Focus Link

News 5: AAAS Update on Strengthening Forensic Science in the United States: A Decade of Development, November 12, 2019. A one-day conference commemorating the 10th anniversary of the pathbreaking NASEM report Strengthening Forensic Science in the United States: A Path Forward, a report that challenged the way forensic science is conducted and the way it is presented in the courts.

News 6: EviHinter : Our "EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis" paper has been accepted and will be presented at the 25th ACM Conference on Computer and Communications Security (ACM CCS 2018), Toronto, Canada, October 15-19, 2018. EviHunter will also be presented and demo'ed at Forensics@NIST on November 5-6, 2018.

News 7: QTAB-KE "An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol" presented at the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, June 18 - 20, 2018.

News 8: SADFE Best Paper Award: Zhen Xu, Chen Shi, Chris Cheng, Neil Gong and Yong Guan, "A Dynamic Taint Analysis Tool for Android App Forensics," 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), Held in Conjunction with the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, May 24, 2018.

 

 


 

Research Interests

Computer and distributed systems, with focuses on security issues, including digital forensics, wireless security, privacy-enhancing technologies, blockchain applications, hardware-assisted security, and secure real-time computing for cyber-physical systems.

Academic Background

I am a Professor in Electrical and Computer Engineering at Iowa State University and the Associate Director for Research, Iowa State University's NSA-designated Information Assurance Center. Meanwhile, I am the Cyber Forensics Coordinator for NIST Center of Excellence in Forensic Sciences - CSAFE, and an Ames Lab associate for Midwest Forensics Resource Center at U.S. DoE's Ames Lab. I joined Iowa State in 2002 as an assistant professor, and in 2007, received the National Science Foundation CAREER Award and was honored as the Litton Chair Assistant Professor. Our recent research work have received a 2018 SADFE Best Paper Award and been featured in Science Daily, Technology News Daily, NSF News, NASA Tech Briefs, and Channel 13 News (Who-TV).

 

I received a Ph.D. degree (2002) in Computer Science from Texas A&M University under the advisement of Dr. Wei Zhao, M.S. degree in Computer Science (advised by Prof. Baojue Chen) and B.S. degree in Computer Science (advised by Profs. Shiwei Tang and Dongqing Yang) from Peking University.

Teaching

CprE 536: Computer and Network Forensics, (every Fall, starting in 2002)

CprE 450/550: Distributed Systems and Middleware, (every Spring, starting in 2003)

CprE 308: Operating Systems, (2007F, 2008F, 2010S-2017S)

CprE 440X: Operating System Security, (Spring 2020-2021)

Research Projects

Digital Forensics

Verifiable Computation

Biometrics Security

Accountability and Anonymity

Security Protocol Design and Verification

Secure Network Coding

Online Frauds

Wireless Security (low-cost protocols for RFID, NFC, and mobile platforms, time-advantage-based pairing protocols)

Research Projects while I was at Texas A&M University:

NetCamo: NetCamo (stands for Network Camouflaging) aims to prevent traffic analysis in mission-critical QoS-guaranteed networks. Funded by DARPA ITO Fault Tolerant Networks program.

NetEx: NetEx (stands for Network Express) enables user applications to participate in delay guaranteed communications. Funded by DARPA ITO Quorum program.

Selected Research Supports

National Science Foundation, "CAREER: Practical Scheme Design for Supporting Secure and Resilient Resource-constrained Wireless Networks", Yong Guan (PI), 01/2007-12/2013.

National Institute of Standards and Technology (NIST), "Phase II - NIST Center of Excellence in Forensic Science and Statistics (Center for Statistics and Applications in Forensic Evidence (CSAFE))", $20M, 06/01/2020 - 05/31/2025. PI: Alicia Carriquiry (ISU), Yong Guan is a co-PI, serves as the Cyber Forensics Coordinator for Digital Evidence area, one of the two focused areas in the center project (Pattern Evidence and Digital Evidence).

EviHunter (Mobile App Forensic Analysis): EviHunter (stands for Evil/Evidence Hunter ) aims to develop effective automated app forensic analysis tools using both static and dynamic approaches, and with it, to establish a large mobile app evidence database to assist law enforcement practitioners' mobile device forensic investigations. Yong Guan (PI). Funded by NIST-CSAFE.

StegoDB: StegoDB aims to develop a statistically-designed image dataset for benchmarking stego-detection/steganalysis algorithms. Jennifer Newman (PI), Yong Guan (co-PI) and Roy Maxion (CMU, co-PI). Funded by NIST-CSAFE.

National Institute of Standards and Technology (NIST), "NIST Center of Excellence in Forensic Science and Statistics (Center for Statistics and Applications in Forensic Evidence (CSAFE))", $20M, 06/01/2015 - 05/31/2020. PI: Alicia Carriquiry (ISU), Co-PIs: Karen Kafadar (University of Virginia), Stephen E Fienberg (CMU) and Hal S Stern (UC Irvine). Yong Guan (a budgeted senior personnel), serves as the Cyber Forensics Coordinator for Digital Evidence area, one of the two focused areas in the center project (Pattern Evidence and Digital Evidence).

EviHunter (Mobile App Forensic Analysis): EviHunter (stands for Evil/Evidence Hunter ) aims to develop effective automated app forensic analysis tools using both static and dynamic approaches, and with it, to establish a large mobile app evidence database to assist law enforcement practitioners' mobile device forensic investigations. Yong Guan (PI) and Neil Gong (co-PI). Funded by NIST-CSAFE.

StegoDB: StegoDB aims to develop a statistically-designed image dataset for benchmarking stego-detection/steganalysis algorithms. Jennifer Newman (PI), Yong Guan (co-PI) and Min Wu (UMD, co-PI). Funded by NIST-CSAFE.

National Science Foundation (NSF), "Collaborative Research: SWIFT: LARGE: Dynamics and Security Aware Predictive Spectrum Sharing with Active and Passive Users", Goce Trajcevski (PI), Yong Guan, and Ashfaq Khokhar, 01/01/2021-12/31/2024.

National Science Foundation (NSF), "CNH2-S: Sustainable Field-to-market Supply Chains Enabled by Blockchain Networks", Mark Mba Wright (PI), Yong Guan, Lisa Schulte, Chaoqun Lu, and Yu Wang, 08/15/2019-01/31/2022.

National Science Foundation (NSF), "SBE: Small: Continuous Human-User Authentication by Induced Procedural Visual-Motor Biometrics", Yong Guan (PI), Daji Qiao, George Amariucai, and Ann Smiley-Oyen, 09/01/2016 - 08/31/2019.

National Science Foundation (NSF), "TWC:Small: Time Advantage-based Key Agreement Protocols for Low-cost Wireless Systems", Yong Guan (PI) and George Amariucai, 09/01/2015 - 08/31/2019.

Iowa State University, ERP Program, "A Wearable Patient Monitoring System Based on Noninvasive Epidermal Biosensors, Multi-Sensor Data Fusion, and Predictive Decision Making", Meng Lu (PI) and Yong Guan, 12/15/2016 - 08/31/2017.

National Science Foundation (NSF), "II-EN: IoT Event Emulation Environment (IoTE^3) based on Cyber-Physical Integration", Daji Qiao (PI), Yong Guan, and Doug Jacobson, 08/2017-08/2020.

BBN/GENI, "APRA-GENI: Applying a Project-Based Approach to Understanding Multiple GENI Resources for Networking Research and Education", Kaiqi Xiong (RIT), Yin Pan (RIT), Yong Guan(ISU), and Bing Wang (University of Connecticut), 11/2011-10/2014.

Boeing, "Mission Assurance Modeling and Performance Impact Analysis", Yong Guan (PI), Jennifer Davidson, Johnny Wong, and Sang Kim, 01/2012 - 05/2013.

National Science Foundation (NSF), "Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks", Yong Guan (PI), 09/2008-08/2012.

National Science Foundation, "Secure Network Coding and Cooperative Relaying", Yong Guan (PI), Ahmed Kamal and Sang Kim, 10/2006-9/2010.

Intelligence Advanced Research Projects Activity (IARPA) (formerly, Disruptive Technology Office (DTO) / Advanced Research and Development Activity (ARDA)), "Advanced Attack Attribution", Yong Guan (PI), Julie Dickerson and Tom Daniels, 10/2003-8/2007.

National Science Foundation, "Cyberspace Forensics: Research, Course Development, and Laboratory Development", Yong Guan (PI), Jim Davis and Doug Jacobson, 7/2003-8/2007.

Carver Trust Foundation, "Adaptive Reputation-based Access Control and Resource Scheduling for Distributed Computing Systems", Yong Guan (PI), 4/2003-7/2004.

Honors and Awards

Fellow, American Academy of Forensic Sciences (AAFS), elected in 2022.

SADFE Best Paper Award: "A Dynamic Taint Analysis Tool for Android App Forensics," 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), Held in Conjunction with the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, May 24, 2018.

Outstanding Community Service Award, IEEE Technical Committee on Security and Privacy, May 2008. (for the joint work with Patrick McDaniel, Avi Rubin, David Du, David Shambroom, and Deborah Shands in organizing the 2008 Oakland Conference. We had 3 award papers and a record high number (292) of attendees.)

The Litton Industries Professorship, 2007.

Iowa State University Award for Early Achievement in Research, 2007. (One at ISU per year. Photo with Iowa State President Gregory Geoffroy at ISU 2007 Fall Convocation)

NSF Career Award, 2007.

Second Place Graduate Winner, 10th ACM International Student Research Contest,  Northern Kentucky/Cincinnati, OH, March 1, 2002. See the photo of the top 3 winners.

Best Student Paper Award, IEEE National Aerospace and Electronics Conference, Dayton, OH, 1998.

Professional Activities and Services

Member of IFIP TC-11 WG 11.9: Digital Forensics.

Cipher Associate Editor, IEEE Computer Society's Technical Committee on Security and Privacy.

Treasurer, IEEE Computer Society's Technical Committee on Security and Privacy, 2013 - present.

Editor, IEEE/AVM Transactions on Networking (ToN), 2016 - present.

Editor, IEEE Transactions on Wireless Communication (TWC), 2009 - 2017.

Editor, IEEE Transactions on Information Forensics and Security (TIFS), 2009 - 2013.

Editorial Board Member, International Journal of Security and Networks (IJSN), 2008 - 2015.

Steering Committee Member, IEEE International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE), 2008-present.

American Academy of Forensic Sciences (AAFS) - Diversity and Outreach Committee (DOC), 2019 - 2022. Served as D&I Forum Subcommittee Chair, 2021 - 2022.

Award Committee Co-Chair, American Academy of Forensic Sciences (AAFS) - Digital and Multimedia Forensics Section (DMS), 2021 - present.

Planning Committee for American Academy of Forensic Sciences (AAFS) - Digital and Multimedia Forensics Section (DMS), 2017 - 2018.

Security and Privacy Chair Emeritus, IEEE Computer Society's Technical Committee on Security and Privacy, 2008-2009.

General Chair, 29th IEEE Symposium on Security and Privacy (SP 2008, a.k.a., the Oakland Conference), Berkeley, California, May 18-22, 2008.

Vice Chair and Registration Chair, 28th IEEE Symposium on Security and Privacy (SP 2007), Berkeley, California, May 20-23, 2007.

Co-organizer, NIST Digital Forensics Workshop, Arlington, VA, USA, May 8-9, 2017.

Co-organizer, ARO Workshop on Device Fingerprinting, Salt Lake City, Utah, USA, November 30 - December 2, 2011.

Coordinator, Digital Forensics Working Group, Annual NSA/DHS CAE Principals Meeting, 2009-2012.

Co-organizer, ARO Workshop on Digital Forensics, Arlington, VA, USA, September 10-11, 2009.

Program co-Vice Chair for the area of Security and Privacy, 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008.

TPC Area Chair, 2nd IEEE International Conference on Conference on Communications and Network Security (CNS 2014), San Francisco, CA, USA, October 29-31, 2014.

General Chair, 7th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2012), Vancouver, Canada, September 28, 2012.

Program Chair, 6th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011), Held in conjunction with the IEEE Symposium on Security and Privacy (Oakland 2011), The Claremont Resort, Oakland, CA, USA, May 26, 2011.

Sponsorship Co-Chair, 18th ACM Conference on Computer and Communications Security (CCS 2011), Chicago, IL, USA, October 17-21, 2011.

Program co-Chair, 2nd ACM Northeast Forensics Exchange (NeFX 2010), Georgetown University, Washington DC., September 13-14, 2010.

Program co-Chair, Computer Network Forensics Research Workshop (CNFR 2005), held in conjunction with the 1st IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (SECURECOMM 2005), Athens, Greece, September 5-9, 2005.

Serves/served as technical program committee (TPC) and/or organizing committee (OC) member for over a hundred conferences/workshops in security, digital forensics, networking and distributed systems, including ACM CCS, DFRWS, IFIP 11.9 Digital Forensics, SADFE, eCrime, ICDF2C, INFOCOM, ICDCS, ICNP, AsiaCCS, CNS, Securecomm, WISTP, SafeConfig, GLOBECOM, ICC, etc., including the most recent ones:

TPC member, 26th ACM Conference on Computer and Communications Security (CCS 2019), London, United Kingdom, November 11-15, 2019.

TPC member, IEEE International Conference on Computer Communications (INFOCOM 2019), Paris, France, April 29 - May 2, 2019.

Tutorials Co-chair, SecureComm 2019.

TPC member, 14th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS 2019), Auckland, new Zealand, July 7-12, 2019.

TPC member, 7th IEEE Conference on Communications and Network Security (CNS 2019), Washington DC, USA, June 5-7, 2019.

TPC member, 15th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2019.

Students

Current Ph.D. Students:

Zhonghao Liao

Dong Qin (co-advised by Daji Qiao and Yong Guan)

Shahnewaz Sakib

Kaihang Fu

Chen Shi

Mukaram Shahid (co-advised by Hongwei Zhang and Yong Guan)

Current MS. Students:

Sunantha Rini Chandramoorthy, Spoorthy Chiranjeevi, Kaihang Fu, Jordan Heim, Zhonghao Liao, Chen Shi.

Graduated Ph.D. Students:

Wenhao Chen (Co-advised by Yong Guan and Jennifer Newman), Ph.D., Dissertation: "Automatic Detection of Android Steganography apps", degree granted May 2021. Now at Micro Focus, "Fortify Application Security" team as mobile security researcher.

Chris Cheng, Ph.D., Dissertation: "EviHunter: Identifying Digital Forensic Artifacts in Android Devices via Static and Dynamic Program Analysis", degree granted December 2020. Now at Facebook.

Stephanie Reinders (Co-advised by Jennifer Newman and Yong Guan), Ph.D., Dissertation: "A Statistical Method for Digital Image Forensics", degree granted August 2020. Now at Iowa State University.

Li Lin (Co-advised by Jennifer Newman and Yong Guan), Ph.D., Dissertation: "Hunting wild stego images, a domain adaptation problem in digital image forensics", degree granted May 2020. Now at Overstock.

Payas R. Awadhutkar (Co-advised by Suraj Kothari and Yong Guan), Ph.D., Dissertation: "Human-Centric Verification for Software Safety and Security", degree granted May 2020. Received ISU Graduate Student Research Excellence Award. Now at EnSoft.

Ben Robert Holland (Co-advised by Suraj Kothari and Yong Guan), Ph.D., Dissertation: "Computing homomorphic program invariants", degree granted December 2018. Received ISU Graduate Student Research Excellence Award. Now at Apogee Research (A defense contractor).

Wenji Chen, Ph.D., September 2009-December 2016, Dissertation: "Data Streaming Designs for Forensic Investigation of Large Data", degree granted December 2016. Received ISU Graduate Student Research Excellence Award. First job at Google (Federated Identity Management)

Gang Xu, Ph.D., September 2009-December 2014, Dissertation: "Towards practical verifiable computation: verification outsourcing, linear arguments without linearity tests, and repeated structures", degree granted December 2014. Received ISU Graduate Student Research Excellence Award. First job at VMWare.

Yang Liu, Ph.D., September 2007-May 2013, Dissertation: "Data Streaming Algorithms for Rapid Cyber Attack Detection", Received ISU Graduate Student Research Excellence Award. degree granted May 2013. First job at Facebook.

Ramzi Saifan (Ahmed Kamal, co-major professor), Ph.D., January 2009-December 2012, Dissertation: "Sensing Strategies in Cognitive Radio Networks: Optimization and Ramifications on Routing", degree granted December 2012. First job Assistant Professor at University of Jordan, Jordan.

Bibudh Lahiri (Srikanta Tirthapura, co-major professor), Ph.D., April 2009-May 2012, Dissertation: "Detecting exploit patterns from network packet streams", degree granted May 2012. First job at Siemens Corporate Research.

Yawen Wei, Ph.D., September 2004-May 2011, Dissertation: "Design for Secure Location-aware Communications in Resource-constrained Wireless Networks", degree granted May 2011, First job at LinkedIn.

Zhen Yu, Ph.D., September 2003 - May 2009, Dissertation: "Practical Security Scheme Design for Resource-constrained Wireless Networks", degree granted May 2009. Received ISU Graduate Student Research Excellence Award. First job at Ericsson, Boulder, Colorado.

Linfeng Zhang, Ph.D., January 2004 - December 2008, Dissertation: "Techniques for Monitoring and Attributing Complicated Attacks in Real-world Networks", degree granted December 2008. Received ISU Graduate Student Research Excellence Award. First job, a Senior Algorithm Engineer at Vidyo, Inc. Hackensack, New Jersey.

Graduated MS. Students:

Abdelrahman Baz, MS, Thesis: "Android apps call graph construction and obfuscation investigation", degree granted May 2021. Now a Ph.D. student at UT Austin.

Grant Reade Foudree, MS, Thesis: ""Regsym" - Dataflow Analysis of Linear x86 Code", degree granted December 2019. Now at Rockwell Collins.

Jesse Bryan Crawford, MS, Thesis: "Knowing your Bitcoin Customer: A Survey of Bitcoin Money Laundering Services and Technical Solutions for Anti-Money Laundering Compliance", degree granted December 2019. Now at US DoE Sandia Lab.

Andrew Halterman, MS, Creative Component: "Storming the Kasa? Security Analysis of TP-Link Kasa Smart Home Devices", degree granted December 2019. Now at Waukee High.

Chenliang Xu, MS, Thesis: "Android Ransomware Trends and Case Studies: A Reverse Engineering Approach", degree granted December 2019. Now at Amazon.

Shivika Garg, MS, Thesis: "Malicious URL Detection", degree granted May 2019. Now at Wokiva.

Brett Weiss, MS, Creative Component: "An Investigative Study on Android Verified Boot Process", degree granted May 2019. Now at Wokiva.

Brody J. Concannon, MS, Thesis: "Android Third-Party Library Detection", degree granted May 2019. Now at Rockwell Collins.

Ziji Guo, MS, January 2015 - May 2018, Thesis: "Passive DNS Traffic Analysis for Fast-Fluxing Domain Detection", granted May 2018. First job at Aurfy Inc., a FinTech Company, San Jose, CA.

Sanchita Barman, January 2016 - December 2017, Thesis: "An Algebraic Time-Advantage-Based Key Establishment Protocol", degree granted December 2017. First job at a startup company, San Jose, CA.

Zhen Xu, January 2016 - December 2017, Thesis: "Dynamic taint analysis tool for forensic analysis", granted December 2017. First job at Biotechnology High Performance Computing Software Applications Institute (BHSAI), Frederick, MD.

Anvesh Katukuri, January 2015 - December 2017, Create Component: "Analysis of Android Applications using FlowDroid: Fundamental Limitations and Possible Improvements", degree granted December 2017. First job at an insurance company, Boston, MA.

Darius Mohammadi, November 2016 - May 2017, Create Component: "An Investigation of Bitcoin Mixer Services", degree granted May 2017. Continued his PhD study in Data Science at Kingston University London.

Ahmed Shaik, May 2015 - May 2017, Thesis: "Secure Data Sharing with Restricting User to One-time Access", degree granted May 2017. First job at Cerner Corporation, Kansas City, MO.

Sarat Chandra Velijala, MS, October 2014 - August 2016, Thesis: "Forwarding Loop Attacks in Content Centric Networking", degree granted August 2016. First job at a start-up company, California.

Jialue Fang, MS August 2014 - August 2016, Thesis: "Voice Traffic Pattern Hiding in VoIP Communication", degree granted August 2016. First job at a startup company, New Jersey.

Mouhamadou Diallo, Co-advised by George Amariucai and Yong Guan, January 2015 - - August 2016, Creative Component: "Multi-modal biometric authentication using Bayesian networks", degree granted August 2016. First job at Federal Communications Commission (FCC), Washington DC.

Chee Kang Tan, MS, January 2014-December 2015, Thesis: "Memoryless Authentication Key and Random Number Generation Schemes Using SRAM Power-On State Randomness", degree granted December 2015. First job at Maytag.

Xuantong Zhang, October 2014 - May 2015, Thesis: "Human User Authentication Based on Mouse Dynamics: A Feasibility Study", degree granted May 2015. First job at Medtronics.

Tsolmon Otgonbold, MS, January 2014 - December 2014, Thesis: "ADAPT: Anonymous, distributed, active probing technique (ADAPT) for detecting malicious fast-flux domains", degree granted December 2014. First job at Thinix. Fullbright Scholar from Mongolia.

Chen Zhao, MS, September 2013 - December 2014, Thesis: "Graph-based Forensic Investigation of Bitcoin Transactions", degree expected December 2014, continue Ph.D. study in Japan.

Pengqing Xie, MS, January 2013 - December 2014, Thesis: "Facial Movement Based Person Authentication", degree granted December 2014. First job at Intersil Corporation.

Shelby Kobes, MS, September 2012 - May 2014, Thesis: "Security implications of implantable medical devices", degree granted May 2014. First job at QMed.

Andrew Schmitz, ME, January 2013 - present, Project: "Cloud Security", degree granted May 2014. First job at Hormel Foods, Rochester, MN.

Jeff Kramer, MS, November 2012 - August 2013, Thesis: "DROIDSPOTTER: A Forensic Tool for Android Location Data Collection and Analysis", degree granted August 2013. First job at Federal Research Board, Washington DC.

Jin-Ning Tioh, MS, September 2011 - August 2013, Thesis: "FishEye: A Forensic Tool for the Visualization of the Change-Over-Time in Windows VSS", degree granted December 2013. First job at Malaysia, and then continued his Ph.D. study at Iowa State University.

Kenneth Johnson, MS, September 2011-August 2013, Thesis: "Windows 8 Forensics: Journey through the Impact of the Recovery Artifacts in Windows 8", degree granted August 2013. First job at KPMG (Forensics and Incident Response Team) in Chicago, Illinois.

Ellen Hartstack, MS, January 2012 - May 2013, Thesis: "VMIFF - Visualization Metrics for the Identification of File Fragments", degree granted May 2013. First job at DoD.

Jingzhou Luo, MS, January 2012 - December 2012, Creative Component: "A Location Privacy Protocol for Mobile Applications", degree granted December 2012. First job at Amazon (Web Service Team).

Ben Holland, MS, September 2010 - May 2012, Thesis: "Enabling Open Source Intelligence (OSINT) in private social networks", degree granted May 2012. First job at EnSoft.

Ben Kallal, MS, September 2008 - May 2012, Thesis: "First Responder Assistance Tool for Mobile Device Forensics", degree granted May 2012. First job at DoD.

Teja Myneedu, MS, August 2010 - December 2011, Thesis: "Evidence Collection for Forensic Investigation in Peer to Peer Systems", granted December 2011. First job at Union Pacific.

Leonardo Aguilera, MS, September 2010 - December 2011, Thesis: "An Implementation of Accountable Anonymity", degree granted December 2011. First job at Rockwell Collins

Timothy Meyer, MS, December 2010 - August 2011, Thesis: "A Study on Trading Scams in Massively Multiplayer Online Role-Playing Games and Risk Mitigation Techniques", granted August 2011. First job at Lockheed Martin.

Oliverio Covarrubias, MS, September 2008 - December 2009, Creative Component: "A Cursor Movement-based Embedded Tag Tracking Method for Online Click Fraud Detection", granted December 2009, First job at Rockwell Collins.

Chunwang Gao, MS, (Steven Russell, co-major professor),September 2006 - December 2009, Thesis: "A Statistical Indoor Localization Method for Supporting Location-based Access Control", granted December 2009. First job at Virginia Commonwealth University.

Mike Blasi, MS, January 2008 - August 2009, Thesis: "Techniques for detecting zero day phishing websites", granted August 2009. First job at Ames Engineering.

Lars Kulseng, MS, September 2007 - May 2009, Thesis: "Lightweight Mutual Authentication, Ownership Transfer and Secure Searchfor Low-cost RFID Systems", granted May 2009, First job at Wireless Trondheim, Trondheim, Norway.

Bhuvaneswari Ramkumar, MS, September 2006 - August 2008, Thesis: "Encrypted Malware Detection", granted August 2008, First job at Cisco.

Paul Miller, MS, (Johnny Wong, co-advisor), September 2007 - May 2008, Thesis: "Visualization for Network Forensic Analyses: Extending the Forensic Log Investigator (FLI)", granted May 2008, First job at FBI.

Thieu Pham, MS, September 2005 - December 2007, Thesis: "Forensic Log Investigator (FLI) - A Log Analysis and Visualization Tool", granted December 2007, First job at Cisco.

Anthony Persaud, MS, September 2004 - May 2006, Thesis: "The Use of Wavelet Watermarking and Statistical Classification Techniques for Collusion Detection and Identification in Multimedia Forensics", granted May 2006, continued his PhD study at Carnegie Mellon University.

Douglas Houghton, MS, (Doug Jacobson, co-advisor), September 2004 - December 2005, Thesis: "Design and Development of Network Traffic Simulator", granted December 2005, First job at Mitre.

William Sears, MS, (Tom Daniels, co-advisor), May 2003 - August 2005, Thesis: "PeerCredential: A Support Reputation-based Trust Framework for Peer-to-Peer Applications", granted Augutst 2005, First job at U.S. DoE's Ames Lab.

Wale Martins, MS, (Tom Daniels, co-advisor), September 2003 - August 2005, Thesis: "Affecting IP Traceback with Recent Internet Topology Maps", granted August 2005, First job at Microsoft.

Graduated Undergraduate RA Students:

Tyler Rebischke, BS, Undergraduate RA, September 2018 - May 2019; September 2021 - May 2022. Boeing Fellow, September 2019 - May 2020.

Joel Cardo, BS, Undergraduate RA, September 2003 - December 2004, Lightweight Statistical Authentication Protocol for Access Control in Wireless LANs, First job at Rockwell Collins.

Alan Johnson, BS, Undergraduate RA, Stepping Stone Attack Attribution, September 2003 - May 2006, continued his PhD study at Princeton University.

Selected Recent Publications

Shahnewaz Karim Sakib, George Amariucai, and Yong Guan, "Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information," in Proceedings of the 36th IEEE Computer Security Foundations Symposium (CSF 2023), Dubrovnik, Croatia, July 7-10, 2023.

Chen Shi and Yong Guan, "Forensic Analysis on Android Cryptocurrency Wallet Applications," in Proceedings of the 19th Annual IFIPWG 11.9 International Conference on Digital Forensics, SRI International, Arlington, Virginia, USA, January 30-31, 2023.

Chris Chao-Chun Cheng, Li Lin, Chen Shi, and Yong Guan, "AFuzzShield: Anti-Fuzzing Approach for Android Apps," in Proceedings of the 19th Annual IFIPWG 11.9 International Conference on Digital Forensics, SRI International, Arlington, Virginia, USA, January 30-31, 2023.

Shahnewaz Karim Sakib, George Amariucai, and Yong Guan, "ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications," in IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted in August 2022.

Sean Caldwell, Ye Zhu, Yong Guan, and Riccardo Bettati, "On Account Association with Assistance from Mobile Networks," in IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted in July 2022.

Chen Shi, Chris Cheng, and Yong Guan, "LibDroid: Summarizing information flow of Android Native Libraries via Static Analysis," in Proceedings of the Digital Forensics Research Conference (DFRWS-USA 2022), virtual, July 11-14, 2022.

Shen Fu, Dong Qin, George Amariucai, Daji Qiao, Ann Smiley, and Yong Guan, "Artificial IntelligenceMeets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning," in Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022), Nagasaki, Japan, May 30 - June 3, 2022.

Stephanie Reinders, Yong Guan, Danica Ommen, and Jennifer Newman, "Source-anchored, trace-anchored, and general match score-based likelihood ratios for camera device identification," in Journal of Forensic Sciences, February 6, 2022.

Zhonghao Liao and Yong Guan, "RUDBA: Reusable User-Device Biometric Authentication Scheme for Multi-service Systems," in 14th IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2021), Washington DC, USA, December 12-15, 2021. Presented at HOST 2022, Washington DC, USA, June 27-30, 2022.

Chen Shi, Chris Cheng, and Yong Guan, "Forensic Analysis on Joker Family Android Malware," in 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2021), virtual, October 11-13, 2021.

Wenhao Chen, Li Lin, Jennifer Newman, and Yong Guan, "Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching," in 9th IEEE Conference on Communications and Network Security (CNS 2021), virtual, October 4-6, 2021

Chris Chao-Chun Cheng, Chen Shi, Neil Gong and Yong Guan, "LogExtractor: Extracting Digital Evidence from Android Log Messages via String and Taint Analysis," in Elsevier Forensic Science International: Digital Investigation, Vol. 37, pp. 1-13, July 2021. (Digital Forensics Research Conference (DFRWS-USA 2021), virtual, July 12-14, 2021.)

Ye Zhu, Nicholas Ruffing, Jonathan Gurary, Yong Guan, and Riccardo Bettati, "Towards Smartphone Operating System Identification," in IEEE Transactions on Dependable and Secure Computing (TDSC), Volume: 18, Issue 1, pp. 411-425, Jan/Feb. 2021.

X. Jin, M. Li, Z. Wang, C. Guo, H. Ding and Y. Guan, "EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network," in IEEE Transactions on Computational Social Systems, Early Access, pp. 1-15, January 21, 2021.

Shahnewaz Karim Sakib, George Amariucai, and Yong Guan, "Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism," in IEEE 2021 IEEE International Conference on Communications (ICC 2021): Communication and Information Systems Security Symposium, virtual, Montreal, Canada, June 14-23, 2021.

Sean W. Caldwell, Ye Zhu, Yong Guan, and Riccardo Bettati, "Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks," in IEEE 2021 IEEE International Conference on Communications (ICC 2021): Communication and Information Systems Security Symposium, virtual, Montreal, Canada, June 14-23, 2021.

Dong Qin, Shen Fu, George Amariuca, Daji Qiao, and Yong Guan, "MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW," in 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Guangzhou, China, December 29, 2020 - January 1, 2021.

Jesse Crawford and Yong Guan, "Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy," in 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE 2020), New York, NY, USA, 2020.

Stephanie Reinders, Li Lin, Wenhao Chen, Yong Guan, and Jennifer Newman, "Score-based likelihood ratios for camera device identification," in IS&T International Symposium on Electronic Imaging (EI 2020), Media Watermarking, Security, and Forensics Conference, Burlingame, California, USA, January 26 - 30, 2020.

Saikrishna Gumudavally, Ye Zhu, Huirong Fu, and Yong Guan, "HECTor: Homomorphic Encryption Enabled Onion Routing," in 53rd IEEE International Conference on Communications (ICC 2019): Communication and Information Systems Security Symposium (CISS 2019), Shanghai, China, May 20-24, 2019.

Jennifer Newman, Li Lin, Wenhao Chen, Stephanie Reinders, Yangxiao Wang, Yong Guan, and Min Wu, "StegoAppDB: A steganography apps forensics image database," in IS&T International Symposium on Electronic Imaging (EI 2019), Media Watermarking, Security, and Forensics Conference, Burlingame, California, USA, January 13 - 17, 2019.

Stephanie Reinders, Li Lin, Yong Guan, Min Wu, and Jennifer Newman, "Algorithm Mismatch in Spatial Steganalysis," in IS&T International Symposium on Electronic Imaging (EI 2019), Media Watermarking, Security, and Forensics Conference, Burlingame, California, USA, January 13 - 17, 2019.

Xudong Liu, Sang Wu Kim, and Yong Guan, "Bayesian Test for Detecting Relay Misbehavior in Wireless Relay Networks," in IEEE Communications Letters, Volume: 22, Issue: 2, pp. 380-383, Feb. 2018.

Zhonghao Liao and Yong Guan, "The Cell Dependency Analysis on Learning SRAM Power-Up States," in Proceedings of Asian Hardware Oriented Security and Trust Symposium (AsianHOST 2018), Hong Kong, December 17-18, 2018.

Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, and Yong Guan, "EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis," in Proceedings of the 25th ACM Conference on Computer and Communications Security (ACM CCS 2018), Toronto, Canada, October 15-19, 2018.

Li Lin, Wenhao Chen, Yangxiao Wang, Stephanie Reinder, Min Wu, Yong Guan, and Jennifer Newman, "The Impact of Exposure Settings in Digital Image Forensics," in Proceedings of the 25th IEEE International Conference on Image Processing (ICIP 2018), Athens, Greece, October 7-10, 2018.

Sanchita Barman, George Amariucai, and Yong Guan, "An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol," in Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, June 18 - 20, 2018.

Zhen Xu, Chen Shi, Chris Cheng, Neil Gong and Yong Guan, "A Dynamic Taint Analysis Tool for Android App Forensics," in Proceedings of the 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2018), Held in Conjunction with the 39th IEEE Symposium on Security and Privacy (SP 2018), San Francisco, CA, USA, May 24, 2018 (Best Paper Award).

Li Lin, Jennifer Newman, Stephanie Reinders, Yong Guan, and Min Wu, "Domain Adaptation in Steganalysis," in Proceedings of IS&T International Symposium on Electronic Imaging (EI 2018), Media Watermarking, Security, and Forensics Conference, Burlingame, California, USA, January 28 - February 1, 2018.

Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, and Stephanie Reinders, "Forensic Analysis of Steganography Apps on Android", in Proceedings of the 13th IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 3 - 5, 2018.

Gang Xu, George Amariucai, and Yong Guan, "Delegation of Computation with Verification Outsourcing: Curious Verifiers", in IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume: 28, Issue: 3, pp. 717-730, March 2017.

Zhonghao Liao, George T. Amariucai, Raymond K. W. Wong, and Yong Guan, "The Impact of Discharge Inversion Effect on Learning SRAM Power-Up Statistics," in Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST 2017), Beijing, China, October 19-20, 2017.

Wenji Chen, Yang Liu, and Yong Guan, "Identifying High-Cardinality Hosts from Network-wide Traffic Measurements," in IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 13, No. 5, pp. 547-558, September/October, 2016.

Jialue Fang, Ye Zhu, and Yong Guan, "Voice Pattern Hiding for VoIP Communications," in Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN 2016), Waikoloa, Hawaii, USA, August 1-4, 2016.

Nicholas Ruffing, Ye Zhu, Rudy Libertini, Yong Guan, and Riccardo Bettati, "Smartphone Reconnaissance: Operating System Identification", in Proceedings of the 13th Annual IEEE Consumer Communications and Networking Conference (CCNC 2016), Las Vegas, NV, USA, January 9-12, 2016.

Wenji Chen and Yong Guan, "Distinct Element Counting in Distributed Dynamic Data Streams," in Proceedings of the 34th Annual IEEE International Conference on Computer Communications (INFOCOM 2015), Hong Kong, April 27-30, 2015.

Gang Xu, George Amariucai, and Yong Guan, "Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures," in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2015), Singapore, April 14-17, 2015.

Chen Zhao and Yong Guan, "Graph-based Forensic Investigation of Bitcoin Transactions," in Proceedings of the IFIP 11.9 Digital Forensics Conference, Orlando, FL, USA, January 26-28, 2015.

Ye Zhu, Anil Vikram, Huirong Fu, and Yong Guan, "On Non-Cooperative Multiple-Target Tracking with Wireless Sensor Networks," IEEE Transactions on Wireless Communications, Vol. 13, Issue 11, Pages: 6496 - 6510, Nov. 2014.

Wenji Chen and Yong Guan, "Identifying Global Hot Items in Distributed Dynamic Data Streams," in Proceedings of the IEEE Conference on Communications and Network Security (CNS 2014), San Franscisco, CA, USA, October 29-31, 2014.

Gang Xu, George Amariucai, and Yong Guan, "Verifiable Computation with Reduced Informational Costs and Computational Costs," in Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014), Wroclaw, Poland, September 7-11 2014.

Pengqing Xie, Yang Liu, and Yong Guan, "Facial Movement Based Person Authentication," Who are you?! Adventures in Authentication: WAY Workshop, held in conjunction with the 10th Symposium On Usable Privacy and Security (SOUPS 2014), Facebook Headquarters in Menlo Park, California, USA, July 9-11, 2014.

Gang Xu, George Amariucai, and Yong Guan, "Delegation of Computation with Verification Outsourcing using GENI Infrastructure," in Proceedings of the 3rd GENI Research and Educational Experiment Workshop (GREE 2014), held in conjunction with GEC19, Atlanta, GA, USA, March 19-20, 2014.

Jin-Ning Tioh and Yong Guan, "FishEYE: A Forensic Tool for the Visualization of Change-Over-Time in Windows VSS," in Proceedings of the 8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2013), Hong Kong, November 21-22, 2013.

Gang Xu, George Amariucai, and Yong Guan, "A Lightweight Argument System with Efficient Verifier," in Proceedings of the IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 14-16, 2013.

Yang Liu, Wenji Chen, and Yong Guan, "Identifying High-Cardinality Hosts from Network-wide Traffic Measurements," in Proceedings of the IEEE Conference on Communications and Network Security (CNS 2013), Washington, D.C., USA, October 14-16, 2013.

Ramzi Saifan, Ahmed Kamal, and Yong Guan, "A Cross-Layer Routing Protocol (CLRP) for Cognitive Radio Network," in Proceedings of the Globecom 2013 - Cognitive Radio and Networks Symposium (GLOBECOM 2013), Atlanta, GA, USA, December 9-13, 2013.

Gang Xu, George Amariucai, and Yong Guan, "Delegation of Computation with Verification Outsourcing: Curious Verifiers," ACM Symposium on Principles of Distributed Computing (PODC 2013), Montreal, Quebec, Canada, July 22-24, 2013.

Wenji Chen, Yang Liu, and Yong Guan, "Cardinality Change-based Early Detection of Large-scale Cyber-Attacks," in Proceedings of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14-19, 2013.

Yang Liu, Wenji Chen, and Yong Guan, "Near-optimal Approximate Membership Query over Time-decaying Windows," in Proceedings of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14-19, 2013.

Gang Xu, Leonardo Aguilera, and Yong Guan, "Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System," in Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2012), Singapore, December 17-19, 2012.

Gang Xu, Leonardo Aguilera, and Yong Guan, "Pecan: A Circuit-less P2P Design for Anonymity," in Proceedings of the IEEE 2012 Global Communications Conference (GLOBECOM 2012), Communication and Information System Security Symposium, Anaheim, California, USA, December 3-7, 2012.

Yang Liu, Wenji Chen, and Yong Guan, "Monitoring Traffic Activity Graphs with Low-rank Matrix Approximation," in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, USA, October 22-25, 2012.

Ramzi Saifan, Ahmed Kamal, and Yong Guan, "Spectrum Decision for Efficient Routing in Cognitive Radio Network," in Proceedings of the 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2012), Las Vegas, Nevada, USA, October 8-11, 2012.

Yang Liu, Wenji Chen, and Yong Guan, "A Fast Sketch for Aggregate Queries over High-Speed Network Traffic," in Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM 2012), Mini-Conference, Orlando, Florida, USA, March 25-30, 2012.

Kai Zhu, Yong Guan, and Lei Ying, "Detecting Hidden Communities in Online Auction Networks," in Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS 2012), Princeton, NJ, USA, March 21-23, 2012.

Teja Myneedu and Yong Guan, "Evidence Collection for Forensic Investigation in Peer to Peer Systems," 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, University of Pretoria, Pretoria, South Africa, January 3-5, 2012.

Ramzi Saifan, Ahmed Kamal, and Yong Guan, "Efficient Spectrum Searching and Monitoring in Cognitive Radio Network", in the Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2011), Valencia, Spain, October 17-22, 2011.

George Amariucai, Clifford Bergman, and Yong Guan, "Adopted-Pet (AP): An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID", in Proceedings of RFIDSec 2011, Northampton, Massachusetts, June 26-28, 2011.

Yawen Wei, Zhen Yu, and Yong Guan, "Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks," in Proceedings of the IEEE International Symposium on Network Coding (NetCod 2010), Toronto, Canada, June 9-11, 2010.

Yang Liu, Linfeng Zhang and Yong Guan, "Sketch-based Streaming PCA Algorithm for Network-wide Traffic Anomaly Detection," in Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21-25, 2010.

Lars Kulseng, Zhen Yu, Yawen Wei, and Yong Guan, "Lightweight Mutual Authentication and Ownership Transfer for RFID Systems," in Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2010), mini-conference, San Diego, CA, USA, March 15-19, 2010.

Yanlin Peng, Linfeng Zhang, Morris Chang, and Yong Guan, "An Effective Method for Combating Malicious Scripts Clickbots," in Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, September 21-23, 2009.

Yawen Wei, Zhen Yu, and Yong Guan, "A Novel Architecture for Secure and Scalable Multicast over IP Network," in Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009), Athens, Greece, September 14-18, 2009.

Lars Kulseng, Zhen Yu, Yawen Wei, and Yong Guan, "Lightweight Secure Search Protocols for Low-cost RFID Systems," in Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada, June 22-26, 2009.

Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, and Yong Guan, "An Efficient Signature Scheme for Securing XOR Network Coding against Pollution Attacks," in Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro, Brazil, April 19-25, 2009.

Yanlin Peng, Linfeng Zhang, and Yong Guan, "Detecting Fraud in Internet Auction Systems," in 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, January 25 - 28, 2009.

Chunwang Gao, Zhen Yu, Yawen Wei, Steve Russell, and Yong Guan, "A Statistical Indoor Localization Method for Supporting Location-based Access Control," ACM/Springer Mobile Networks and Applications (MONET), Vol. 14, Issue 2, pp. 253-263, 2009.

Xinwen Fu, Steve Graham, Shu Jiang, and Yong Guan, "On TCP Performance in Flow Based Anonymous Communication Networks," IEEE Transactions on Parallel and Distributed Systems, to appear.

Linfeng Zhang and Yong Guan, "Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks," in Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008.

Linfeng Zhang and Yong Guan, "Frequency Estimation over Sliding Windows," in Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE 2008), poster paper, Cancun, Mexico, April 7-12, 2008. 

Yawen Wei, Zhen Yu, and Yong Guan, "Location Verification Algorithms for Wireless Sensor Networks," in Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, Canada, June 25-29, 2007.

Linfeng Zhang and Yong Guan, "Variance Estimation over Sliding Windows," in Proceedings of the 26th ACM Symposium on Principles of Database Systems (PODS 2007), Beijing, China, June 11-14, 2007.

Zhen Yu, Yawen Wei, and Yong Guan, "Key Management for Wireless Sensor Networks," Handbook of Wireless Mesh & Sensor Networking, G. Aggelou (ed.), McGraw-Hill International, Accepted in February 2007.

Linfeng Zhang and Yong Guan, "TOPO: A Topology-aware Single Packet Attack Traceback Scheme," in Proceedings of IEEE International Conference on Security and Privacy in Communication Networks (SecureComm 2006), Baltimore, Maryland, USA, August 28-September 1, 2006.

Yawen Wei, Zhen Yu, and Yong Guan, "COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks," in Proceedings of IEEE/ACM International Conference on Distributed Computing in Sensor Systems (DCOSS 2006), San Francisco, California, USA, June 18-20, 2006.

Zhen Yu and Yong Guan, "A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks," in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, April 23-27, 2006.

Linfeng Zhang, Anthony Persaud, Alan Johnson, and Yong Guan, "Stepping Stone Attack Attribution in Non-cooperative IP Networks," in Proceedings of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), Phoenix, Arizona, USA, April 10-12, 2006.

Jianqiang Xin, Linfeng Zhang, Brad Aswegan, Julie Dickerson, Tom Daniels, and Yong Guan, "A Testbed for Evaluation and Analysis of Stepping Stone Attack Attribution Techniques," in Proceedings of the 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2006), Barcelona, Spain, March 1-3, 2006.

Anthony Persaud and Yong Guan, "Collusion Detection and Identification for Multimedia Forensics," in the second Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 29 - February 1, 2006. An extended version in Research Advances in Digital Forensics (Springer).

Haoli Wang, Joel Cardo, and Yong Guan, "Shepherd: A Lightweight Statistical Authentication Protocol for Access Control in Wireless LANs," Elsevier Computer Communications Journal, Special Issue on Applications and Services in Wireless Networks, Vol. 28, No. 14, pp. 1618-1630, September 2005.

William Sears, Zhen Yu, and Yong Guan, "An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications," in Proceedings of the 4th IEEE International Symposium on Network Computing and Applications (NCA 2005), Boston, Massachusetts, USA, July 27-29, 2005.

Zhen Yu and Yong Guan, "A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks," in Proceedings of the 4th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2005), Los Angeles, California, USA, April 25-27, 2005. An extended version will appear in IEEE Transactions on Parallel and Distributed Systems.

Anthony Persaud and Yong Guan, "A Framework for Email Investigations: Automated Information Extraction and Linkage Discovery," First Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, February 13-16, 2005. An extended version in Research Advances in Digital Forensics (Springer).

Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao, "A Quantitative Analysis of Anonymous Communications," IEEE Transactions on Reliability, Vol. 53, No. 1, pp. 103-116, March 2004.

Dan Berleant, M.-P. Cheong, Chris Chu, Yong Guan, Ahmed Kamal, Gerald Sheble, S. Ferson, and J.F. Peters, "Dependable Handling of Uncertainty", Reliable Computing, Special Issue on Dependable Reasoning about Uncertainty, Vol. 9, No. 6, pp. 407-418, 2003.

Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao, "An Optimal Strategy for Anonymous Communication Protocols," in Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS 2002), Vienna, Austria, July 2-5, 2002.

Yong Guan, Xinwen Fu, Dong Xuan, Prashanth Shenoy, Riccardo Bettati, and Wei Zhao, "NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications," IEEE Transactions on System, Man, and Cybernetics, Special Issue on Information Assurance, Vol. 31, No. 4, pp. 253-265, July 2001.

Selected Talks

Tutorial, "Digital Forensics: Research Challenges and Open Problems", 13th ACM Conference on Computer and Communication Security (CCS 2006), Alexandria, VA, October 31, 2006.

Distinguished Lecturer, "Towards Accountable Anonymity, Cyber Crimes: The Transformation of Crime in Information Age," Distinguished Lecture Series, Department of Computer Science, Kansas State University, April 11, 2014.

"An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol for Securing Wireless/SmartX Networks," Hong Kong Polytechnic University, August 6, 2018.

Invited Talk, "Mobile App Forensic Analysis," Network Forensics Workshop, held in conjunction with IEEE Communication and Network Security Conference (CNS 2016), Philadelphia, PA, USA, October 17-19, 2016.

"Algorithmic Design for Large-scale Networked System Monitoring and Forensics," University of Hong Kong, Hong Kong, April 28, 2015.

"Towards Verifiable 3rd-party Computation," Chinese University of Hong Kong, Hong Kong, April 24, 2015.

"Accountable Anonymity," UI 2013 Computing Conference (along with four other invited speakers, Barbara Simons, Daniel Reed, Maria Gini, and Thomas Hornbeck), University of Iowa, Iowa City, Iowa, February 23, 2013.

"Cyber Crimes: The Transformation of Crime in Information Age," Information Systems Audit and Control Association (ISACA), Des Moines, Iowa, February 19, 2013.

" Algorithmic Designs for Rapid Attack Monitoring and Attribution - Digital Forensics: Challenges and Research Problems," Singapore A* (Agency for Science, Technology, and Research), December 21, 2012.

"Algorithmic Designs for Rapid Cyber Attack Detection and Impact Analysis," Army Research Lab, December 12, 2012.

"Fast Algorithms for Security Monitoring and Attribution," Department of Software and Information Systems, University of North Carolina, Charlotte, NC, April 12, 2012.

"Time-based Secure Pairing Protocol for Passive RFID," Department of Electrical and Computer Engineering, University of Waterloo, Canada, January 20, 2012.

"Techniques for Large-scale Network-wide Attack Monitoring and Attribution," Deakin University, Australia, July 13, 2011.

"Fraud Detection in the Internet Auction Systems", eBay, San Jose, CA, May 23, 2008.

"Cyber Crime: The Transformation of Crime in the Information Age", ISU Alumni @ Hamilton Co., Webster City, IA, March 30, 2008. (The title was the same as David S. Wall's book) (Photo with ISU Alumni).

"Digital Forensics: Research Challenges and Open Problems", University of Iowa, Iowa City, IA, December 4, 2007.

"Stepping Stone Attack Attribution in Non-Cooperative IP Networks", John Jay College of Criminal Justice, City University of New York, New York, NY, October 17, 2006.

"Practical Security Scheme Design for Sensor Networks", Telcordia Research, Piscataway, NJ, October 16, 2006.

"Open Source/Closed Source Software in Security Education", Invited panelist at the Annual Conference on Education in Information Security, Ames, IA. September 17-18, 2006.

"A Dynamic En-route Scheme for Filtering False Data Injection inWireless Sensor Networks," Department of Computer Science, Peking University, Beijing, China, June 1, 2006.

"Key Pre-distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks", Department of Computer Science and Engineering, Ohio State University, Columbus, OH, June 8, 2005.

"Topology-aware Single Packet Attack Traceback", Northrop Grumman, Omaha, NE, March 16, 2005.

Keynote Speech, "Cyber Crime Scene Reconstruction", Symposium on Computer Forensics 2004: Research, Education, and Practice, St. Paul, MN, October 15, 2004.

"Stepping Stone Attack Attribution in Non-Cooperative IP Networks", Computer Forensics Working Group Meeting (CFWG), Baltimore, MD, August 9, 2004.

"Keep Kids Safe On-Line", Annual meetings of Iowa Mother of Multiples, Boone, IA, May 1, 2004.

"NetCamo: Camouflaging Traffic Pattern in QoS-guaranteed Mission Critical Networks," IEEE Information Assurance and Security Workshop, West Point, NY, June 5, 2000.

Patents

Yong Guan and Linfeng Zhang, "Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks", US Patent Application, No. 12/187,055, August 6, 2008.