Shangqing Zhao
Ph.D. candidate (will be an Assistant Professor at the University of Oklahoma)
Department of Electrical Engineering/Florida Center for Cybersecurity
University of South Florida
Phone: +1 (901)608-2579      
Email: shangqing@usf.edu


Multiple Ph. D. openings are available in our group (Fall 2021 - Spring/Fall 2022). Self-motivated students who have strong interests in mobile system design, network security, wireless security, IoT design, machine learning, are alway welcome to join us.


Short Bio

Shangqing Zhao is currently a Ph.D. candidate of Systems and Security in the Department of Electrical Engineering and Florida Center for Cybersecurity at the University of South Florida. He will become an Assistant Professor in School of Computer Science, University of Oklahoma in fall 2021. In his Ph. D. study, he is supervised by Dr. Zhuo Lu in the Communications, Security and Analytics (CSA) Lab. Shangqing Zhao's research primarily focuses on the network and mobile system design and security. His research results have been published in top-tier conferences and journals. He also served as a reviewer for multiple top academic journals and conferences. He is a student member of IEEE and ACM.

Research Interests

  • Novel data-driven mobile/IoT system design
  • Mobile and network security
  • Machine learning for mobile network and security applications  

Publications

  • Full Conference Papers:
    1. Zhengping Luo, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu, "Adversarial Machine Learning based Partial-model Attack in IoT," in Proc. of ACM Workshop on Wireless Security and Machine Learning (WiSec-WiseML), July. 2020. Paper  Slide  BibTex

    1. Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu, Yao Liu "Comb Decoding towards Collision-Free WiFi," in Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020. (Acceptance Rate: 17.45%) Paper  Slide  BibTex

    1. Shangqing Zhao, Zhe Qu, Zhuo Lu, Cliff Wang "Vulnerability Analysis, Attack Strategies and Countermeasures Design in Network Tomography," in Proc. of Annual Computer Security Applications Conference (ACSAC) (Poster), Dec. 2019. Paper  Poster  BibTex

    1. Shangqing Zhao, Zhe Qu, Zhuo Lu, Tao Wang "Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems," in Proc. of IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN) (Poster), Nov. 2019. Paper  Poster  BibTex

    1. Shangqing Zhao, Zhuo Lu, Zhengping Luo, Yao Liu, "Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks," in Proc. of IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. (Acceptance Rate: 19.7%) Paper  Slide  BibTex

    1. Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu, "Entrapment for Wireless Eavesdroppers," in Proc. of IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. (Acceptance Rate: 19.7%) Paper  Slide  BibTex

    1. Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, "No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing," in Proc. of ACM Conference on Computer and Communications Security (CCS), Oct. 2018. (Acceptance Rate: 16.6%) Paper  BibTex

    1. Shangqing Zhao, Zhengpin Luo, Zhuo Lu, Xiang Lu, and Yao Liu, "Stateful inter-packet signal processing for wireless networking," in Proc. of ACM Conference on Mobile Computing and Networking (MobiCom), Oct. 2017 . (Acceptance Rate: 18.83%) Paper  Slide  BibTex

    1. Shangqing Zhao, Zhuo Lu and Cliff Wang, "When seeing isn't believing: on feasibility and detectability of scapegoating in network tomography," in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), Jun. 2017. (Acceptance Rate: 16.9%) Paper  Slide  BibTex

  • Full Journal Papers:
    1. Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin E Sagduyu, "When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing" IEEE Transactions on Mobile Computing, To Appear.

    1. Shangqing Zhao, Zhuo Lu, Cliff Wang, "How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks," IEEE Transactions on Wireless Communications, To Appear.

    1. Shangqing Zhao, Zhuo Lu, Cliff Wang, "Measurement Integrity Attacks against Network Tomography: Feasibility and Defense," IEEE Transactions on Dependable and Secure Computing, To Appear.

    1. Zhuo Lu, Cliff Wang, Shangqing Zhao "Cyber Deception for Computer and Network Security: Survey and Challenges," arXiv:2007.14497,

    1. Hui Guo, Shangqing Zhao, Juan Xing, Zhen Wang, "Performance analysis of cognitive cooperative communication system with multiple antennas," Computer Engineering and Applications, vol. 51, no. 8, pp. 92-95, Apr. 2015.

    1. Shangqing Zhao, Hui Guo, Juan Xing, and Shilong Ji, "Performance Analysis of Cognitive Cooperative Communication System Based on Optimal Relay Selection Scheme," Journal of Communications, vol. 9, no. 7, pp. 548-555, July 2014.

    1. Hui Guo, Lihong Wang, and Shangqing Zhao, "Supplementary Proof of Upper and Lower Bounds of Two-Way Opportunistic Amplify-and-Forward Relaying Channels," IEEE Commun. Lett., vol. 18, no. 3, pp. 401-402, Mar. 2014.

    1. Shangqing Zhao, Hui Guo, Juan Xing, Zhen Wang, "Performance analysis of cognitive cooperative communication system based on multiuser," Computer Systems and Applications, vol. 23, no. 1, pp. 53-56, Jan. 2014.