Peer-reviewed Conference Proceeding Papers
- H. Ge, S. Y. Chau, V. E. Gonsalves, H. Li, T. Wang, X. Zou, and N. Li, Koinonia: Verifiable E-Voting with Long-term Privacy, The 2019 Annual Computer Security Applications
Conference (ACSAC 2019), San Juan, Puerto Rico, December 9-13, 2019 (Accepted).
- T. Phillips, X. Yu, B. Haakenson and X. Zou, Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-based Hierarchical Access Control, The First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS'19), December 12 - 14, 2019. Los Angeles, California, USA (Accepted).
- T. Phillips, X. Zou, F. Li and N. Li, Enhancing Biometric-Capsule-based Authentication
and Facial Recognition Via Deep Learning, The ACM Symposium on Access Control Models
and Technologies (SACMAT'19), Toronto, Canada, June 4 to 6, 2019,, pp. 141-146.
- T. Phillips, K. E. Byrd, and X. Zou, Reexamine the identities of soldiers in an iconic
image using deep-learning-based facial recognition techniques, Military Images, Spring 2019,
pp. 60-64.
- T. Gaoy, F. Li, Y. Chen, and X. Zou, Preserving Local Dierential Privacy in Online
Social Networks, International Conference on Wireless Algorithms, Systems, and Applications
(WASA 2017), LNCS Vol. 10251, pp. 393-405.
- T. Phillips, X. Zou, and F. Li, A Cancelable and Privacy-Preserving Facial Biometric
Authentication Scheme, IEEE 14th International Conference on Mobile Ad Hoc and Sensor
Systems (MASS 2017), pp. 545 - 549.
- T. Dugan and X. Zou, A Survey of Secure Multiparty Computation Protocols for Privacy
Preserving Genetic Tests, 2016 the IEEE 1st International Conference on Connected Health:
Applications, Systems and Engineering Technologies (CHASE 2016), Washington D.C, USA,
June 27-29, pp. 173 - 182, 2016.
- K. Butterfield, H. Li, X. Zou, and F. Li, Enhancing and Implementing Fully Transparent
Internet Voting, ICCCN'15, August 3 to 6, 2015, pp. 1-6.
- W. Peng, F. Li and X. Zou, Temporal Coverage Based Content Distribution in Heterogeneous Smart Device Networks, ICC 2015, pp. 3477 - 3482.
- H. Li, A. R. Kankanala, X. Zou, A Taxonomy and Comparison of Remote Voting Schemes, ICCCN'2014, pp. 666--673.
- M. Rangwala, Z. Liang, W. Peng, X. Zou and F. Li, A Signature based Mutual Agreement Scheme for Secure Data Provenance, ICCCN'2014. pp. 726--733.
- X. Zou, H. Li, Y. Sui, W. Peng, and F. Li Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties, INFOCOM'2014, pp. 136--144.
- W. Peng, F. Li, C. T. Huang, X. Zou A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces, ICC'2014 (Accepted)
- W. Peng, F. Li, X. Zou, J. Wu, Offloading Topical Cellular Content through Opportunistic Links, The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013) , October 14-16, in HangZhou, 2013, ZheJiang Province, P.R.China.
- H. Li, Y. Sui, W. Peng, X. Zou, and F. Li, A Viewable E-voting Scheme for Environments with Conflict of Interest, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
- W. Peng, F. Li, K. J. Han, X. Zou, and J.Wu, T -dominance: Prioritized Defense Deployment for BYOD Security, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
- Feng Li, Wei Peng, Chin-Tser Huang, and Xukai Zou, Smartphone Strategic Sampling in Defending Enterprise Network Security, ICC 2013.
- Y. Sui, X. Zou, Y. Du and F. Li, Secure and Privacy-preserving Biometrics based Active Authentication, The 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), pp.1291 - 1296.
- Y. Sui, X. Zou, F. Li and E. Y. Du, Active User Authentication for Mobile Devices, WASA 2012,
- W. Peng, F. Li, X. Zou, and J. Wu, Seed and Grow: An Attack Against Anonymized Social Networks, IEEE International Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'12),
- W. Peng, F. Li, X. Zou, and J. Wu, A Privacy-Preserving Social-Aware Incentive System for Word-of-Mouth Advertisement Dissemination on Smart Mobile Devices, IEEE International Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'12).
- W. Peng, F. Li, X. Zou and J. Wu, Behavioral Detection and Containment of Proximity Malware
in Delay Tolerant Networks, MASS 2011, Pages 411-420.
- Y. Sui, X. Zou and Y. Du, Biometrics-based Authentication: a New Approach, ICCCN'2011, Maui, Hawaii, July 31 -- August 4, 2011.
- X. Zou, F. Maino, E. Bertino, Y. Sui, K. Wang, and F. Li, A New Approach to Weighted Multi-Secret Sharing, ICCCN'2011, Maui, Hawaii, July 31 -- August 4, 2011.
- X. Zou, M. Qi, Y. Sui, and F. Li, A New Scheme for Anonymous Secure Group Communication, 44th Hawaii International Conference on System Sciences (HICSS-44), January 4--7, 2011.
- F. Li, Y. Chen, X. Zou and P. Liu, New Privacy Threats in Healthcare Informatics:
When Medical Records Join the Web, Proceedings of BIOKDD 2010, Washington DC, USA.
- F. Li, Y. Yang, J.Wu and X. Zou, Fuzzy Closeness-based Delegation Forwarding in Delay
Tolerant Networks, Proceedings of the 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010).
- Y. Sui, K. Yang, Y. Du, S. Orr, and X. Zou, A novel key management scheme using bio-
metrics, Proceedings of Mobile Multimedia/Image Processing, Security, and Applications
2010 conference, 5--9 April 2010, Orlando, Florida, USA, Vol. 7708, 77080C (2010).
- K. Yang, Y. Sui, Z. Zhou, Y. Du, and X. Zou, A new approach for cancelable iris recogni-
tion, Proceedings of Mobile Multimedia/Image Processing, Security, and Applications 2010
conference, 5--9 April 2010, Orlando, Florida, USA, Vol. 7708, 77080A (2010).
- Y. Sui, F. Mabio, Y. Guo, K. Wang and X. Zou, An Efficient Time-bound Access
Control Scheme for Dynamic Access Hierarchy, in Proceedings of The Fifth International
Conference on Mobile Ad-hoc and Sensor Networks (MSN 2009), 14-16 December 2009,
Wu Yi Mountain, China, pp.279 - 286.
- K. Wang, X. Zou, and Y. Sui, A Multiple Secret Sharing Scheme based on Matrix Projection. COMPSAC'09, Seattle, WA, USA, July 20 -- 24, 2009, pp. 400-405.
- X. Zou, Y. Dai and E. Bertino A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. IEEE INFOCOM'08, April 2008, pp. 1211--1219.
- X. Zou, Y.S. Dai, B. Doebbeling, M. Qi@, Dependability and security in medical information system, Lecture Notes of Computer Science (LNCS), vol. 4553, pp. 316-326.
- Y. Wang@, B. Ramamurthy, and X. Zou, KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks, Proceedings of IEEE ICC'07, 24-27 June 2007, Glasgow, Scotland, pp.1260 - 1265.
- X. Zou, A. Thukral@, and B. Ramamurthy, An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks, LNCS, Springer, Vol. 4325, pp. 509--520.
- X. Zou and Y. Dai, A Robust and Stateless Self-Healing Group Key Management Scheme, Proceedings of The 2006 IEEE International Conference on Communication Technology, Guilin, China, Nov. 28--30, 2006, pp. 455--459.
- O. Tilak@, R. Raje, and X. Zou, Composing Access Control in Distributed Systems, The 2nd IEEE International Symposium on Dependable, Autonomic, and Secure Computing (DASC), Indianapolis, IN, USA, Sept. 29 - Oct. 1, 2006, pp. 301--307.
- Y. Wang@, B. Ramamurthy, and X. Zou, The Performance of Elliptic Curve Based Group Diffe-Hellman Protocols for Secure Group Communication over Ad Hoc Networks, the Proceedings of IEEE ICC 2006, 11-15 June 2006, Istanbul, TURKEY, Vol.5, pp.2243 - 2248.
- S. Deshpande@, A. Todimala@, R. K Balachandran@, B. Ramamurthy, X. Zou, and N. V. Vinodchandran, A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks, the Proceedings of IEEE ICC 2006, 11-15 June 2006, Istanbul, TURKEY, vol. 5, pp.2310 - 2315.
- A. Thukral@ and X. Zou, Secure Group Instant Messaging based on Cryptographic Primitives, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Vol. 3619, pp. 1002-1011, August, 2005.
- Y. Dai, X. Zou and Y. Guo@, Grid-Based Information System with Fault Tolerance, Self-Healing and High-Performance, the Proceedings of 10th Annual International Conference on Industrial Engineering Theory, Applications and Practice, Florida, December 4-7, 2005, pp. 455-460.
- G. Hao@, N. V. Vinodchandran, B. Ramamurthy and X. Zou, A Balanced Key Tree Approach for Dynamic Secure Group Communication, Proceedings of ICCCN 2005 Fourteenth International Conference on Computer Communications and Networks (ICCCN), October 17-19, 2005, CA, USA, pp.345--350.
- P. Adusumilli@, X. Zou and B. Ramamurthy, DGKD: Distributed Group Key Distribution with Authentication Capability, Proceedings of the 2005 IEEE Workshop on Information Assurance (IAW), United States Military Academy, West Point, NY, 15-17 June 2005, pp. 286--293.
- Y. Karandikar@, X. Zou and Y. Dai, Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments, The 1st IEEE Workshop on Reliability and Autonomic Management In Parallel and Distributed Systems (RAMPDS-2005), 2005, pp. 448--453.
- P. Adusumilli@ and X. Zou, KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing, Proceedings of THE TENTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), Cartagena, Spain, June 27-30, 2005, pp. 476--481.
- R. K. Balachandran@, B. Ramamurthy, X. Zou, and N. V. Vinodchandran, CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad-Hoc Networks, Proceedings of IEEE International Conference on Communication (ICC) 2005, pp. 1123--1127.
- X. Zou and B. Ramamurthy, A simple group Diffie-Hellman key agreement protocol without member serialization, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Vol. 3314, pp. 725-731, December 2004.
- X. Zou, S. Magliveras and B. Ramamurthy, Key Tree based Scalable Secure Dynamic Conferencing Schemes, Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), MIT Cambridge, MA, USA, November 2004, pp. 61--65.
- X. Zou, B. Ramamurthy, and S. S. Magliveras, A GCD attack resistant CRTHACS for secure group communications, Proceedings of International Conference on Information Technology, ITCC 2004 (Poster), April 5 -7, 2004, Las Vegas, NV, USA, pp. 153--154.
- X. Zou and B. Ramamurthy, A block-free tree based group Diffie-Hellman key agreement protocol for secure group communication, Proceedings of International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Austria, February 17-19, 2004, pp. 288--293.
- X. Zou, B. Ramamurthy, V. Variyam and R. K. Balachandran@, Algorithms for unied hierarchy based access control, Proceedings of International Conference on Communications, Internet, & Information Technology (CIIT 2003), Scottsdale, AZ, USA, November 17-19, 2003, pp. 31--36.
- X. Zou, B. Ramamurthy and S. Magliveras, Efficient key management for secure group communication with bursty behavior, Proceedings of International Conference on Communication, Internet, and Information Technology, Virgin Islands, USA, November 2002, pp. 148--153.
- X. Zou, B. Ramamurthy and S. Magliveras, Chinese Remainder Theorem based hierarchical access control for secure group communications, Lecture Notes in Computer Science (LNCS), Springer-Verlag, vol. 2229 (2001), pp. 381--385.
Teaching -- Three time University Trustees' Teaching Awards (2008, 2013, 2021)
CSCI 30000, System Software and Programming
CSCI 58000, Design and Analysis of Algorithms
CSCI 43600, Principles of Computer Networks
CSCI 55500, Cryptography (and Network Security)
CSCI 62600, Advanced Information Assurance
Trusted Electronics and Grid Obfuscation
(TEGO) Research and Education Center
TEGO stands for
Trusted Electronics and Grid Obfuscation and means Shield in Latin.
TEGO protects the system/network/information not only from outside
malicious attacks but also from inside bugs/faults. The purpose of
TEGO is actually to build trusted collaborative computing environments
and applications which are highly secure and dependable by combining Security and Reliability using secure group communication and
grid computing technologies.
The TEGO Center will be a cross-disciplinary and cross-institute research and education center, dedicated to fundamental and application research and higher education for the purpose of building a trusted and collaborative computing environment. More specifically, this topic covers the emerging fields of Cyber Security, Dependability, Grid computing, Autonomic computing, Database, and their applications in Medical Information and Health Care Systems, Tele-medicine, Bioinformatics and Biomedical Engineering.
Our missions are:
- Research innovations: developing cutting-edge technologies for trusted computing in terms of security, attack-resistance, reliability. fault-tolerance, grid systems, and autonomic computing which are able to make various collaborative environments and applications in critical fields that require highly trusted computing environment.
- High-impact applications: developing trusted and mission-critical applications such as secure and dependable health/medical information systems through cross-disciplinary collaborations that can lead to significant social and scientific impacts. Help efficiently solve some complicated computational tasks in Bioinformatics and Medical Data analysis.
- Education: conducting undergraduate/graduate education and professional training in the areas of information/CYBER security, system dependability, communication networks, and grid/distributed computing systems, Autonomic Computing, Bio-Medical, and Bioinformatics. In particular, the TEGO center will engage in education for minority communities such as and African Americans and Women, and further outreach to high school students through the way of Summer College.
Information and communication technologies along with society's drive
for collaboration in the modern world make collaborative
computing and its applications possible and even necessary. One
typical collaborative computing example is digitized health/medical
information systems in which physicians, nurses, researchers, health
insurance personnel, etc. share patients information based on certain
policies and access privileges and perform diagnosis and surgery
collaboratively. President Bush has been calling for digitizing
patients records for most Americans within ten years since April
2004. Another indication for collaborative computing is the recent
wave for Collaborative Virtual IT World (from ACM article "Coming
Soon...a Single, Global, Collaborative Virtual IT World (Phew!)"
http://www.acm.org/technews/current/homepage.html#item9).
Trust in this environment will eventually determine its success and
popularity due to people's desire for privacy and integrity, like what
is called "trust is the currency of the participation age,"
(http://www.acm.org/technews/current/homepage.html#item9). The
current Internet is by design not trust-oriented. Security patches and
enhancement mechanisms result in more security
vulnerabilities. Compared to the two-party interaction model (i.e.,
the client-server service model), group-oriented environments involve
a large number of users and shared resources and are complex, dynamic,
distributed, and heterogeneous, including even hostile
elements. Systems experience failures due to faults and attacks from
hostile entities including CYBER terrorists. More seriously, there are
dangerous attacks from malicious internal members. Consequently,
establishing trust among multiple entities in this environment is
extremely difficult (much harder than establishing mutual trust
between two entities) and is destined to become a grand challenge of
the new century. Taking advantages of our unique combination and
concentration of expertise, the TEGO center aims to establish an
inter-disciplinary and cross-institutional research group on
exploration and building of large-scale trusted collaborative
information and networks systems and practice and promotion of
distance education.
The Unique Features of the TEGO center:
- it is group-oriented (collaborative) and based on secure group
communication and grid computing technologies.
- it integrates
security, attack-resistance, and reliability all together to provide
trusted services.
- it is not only inter-disciplinary but also
cross-institutional to benefit not only Computer Science but also many
other disciplines such as Medical research and practice,
Bioinformatics and Biomedical Engineering.
- it focuses on critical
applications which require high security and dependability. A typical
example is health/medical information systems for which President call
to implement within ten years.
- it supports distant collaborative
research activities and distance education practice.
(Thanks for your interest in and looking at the TEGO center. The formal domain name and website for it will be available soon.)
Education:
PHD, Dec., 2000, Computer Science, GPA: 4.0/4.0
University of Nebraska-Lincoln PhD Thesis: Secure
group communication and hierarchical access control. Advisors:
Prof. Spyros
Magliveras and Prof. Byrav
Ramamurthy.
M.S, June, 1986, Computer Science, GPA: 4.0/4.0 Huazhong University of Science and Technology
B.S, July, 1983, Computer Science, GPA: 4.0/4.0 Zhengzhou University
Contact:
Department of Computer and Information Science
School of Science, Purdue University at IUPUI
723 W. Michigan St., SL280, Indianapolis, IN 46202
Email: xkzou {at} cs {.} iupui {.} edu
Tel: (317) 278-8576
Fax: (317) 274-9742
Please visit my CV for more information.