Hello!
In my current role, I am responsible for the development of AI quality frameworks and AI system assessments. My primary objective is to facilitate the trustworthy adoption of Artificial Intelligence, ensuring that organizations can leverage emerging technologies to meet their strategic goals securely and efficiently. I have developed a robust understanding of the complex landscape in this domain and take pride in helping businesses navigate these challenges with confidence.
Experiences
- Design and develop solutions for safe AI procurement for enterprises.
- Communicate complex technical concepts to non-technical stakeholders, ensuring seamless collaboration and understanding across organizational level.
- TÜV SÜD AI quality framework development, considering upcoming regulations, standards, and best practice.
- AI system in-depth quality assessments, in both qualitative and quatitative manners.
- Trainer for AI Quality Certification Program (AIQCP).
- Research on technologies for improving trustworthy AI.
- AI model fairness testing.
- DNN poisoning/backdoor attacks, model-level backdoor detection, and sample-level trigger detection.
- Adversarial machine learning attacks and defenses.
- Malware detection for Huawei high-end mobile products.
- Power demand forecasting and anomaly detection in smart grids using LSTM.
- Blockchain-based secure intelligent transportation systems.
- Mobile system/application security and privacy analysis.
- User authentication on wearable devices.
- Usable security solutions.
Selected Publications
Proceedings of the ACM on Software Engineering 1, no. FSE (2024), 2005-2027.
IEEE Transactions on Dependable and Secure Computing (2024).
Computers & Security 135 (2023), 103504.
In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 785-799. 2022.
In Proceedings of the 44th International Conference on Software Engineering (ICSE 2022).
In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 1, pp. 77-90, 1 Jan.-Feb. 2022.
In 2020 IEEE International Conference on Blockchain (Blockchain), pp. 9-16. IEEE, 2020.
IEEE Transactions on Information Forensics and Security, 16, pp.307-321.
ET Smart Cities, 2(4), pp.199-207.
In Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security (CCS workshop AISec'20).
In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (AsiaCCS), pp. 458-470. 2020.
In International Conference on Network and System Security (NSS), pp. 632-645. Springer, Cham, 2019.
In International Conference on Smart Blockchain, pp. 109-119. Springer, Cham, 2019.
IEEE Network 34, no. 1 (2019): 116-121.
IEEE Wireless Communications 26, no. 4 (2019): 110-116.
Computers & Security 80 (2019): 120-133.
Computers & Security 76 (2018): 71-91.
ICT Express 4, no. 1 (2018): 35-41.
In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 299-306. ACM, 2018.
IEEE Transactions on Information Forensics and Security 13, no. 3 (2018): 745-757.
In 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1-8. IEEE, 2018.
Computers & Security 72 (2018): 163-174.
In International Conference on Advanced Data Mining and Applications, pp. 727-740. Springer, Cham, 2017.
In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 327-333. ACM, 2017.
Journal of Computer Security 25, no. 3 (2017): 231-253.
In MALWARE 2016: Proceedings of the 11th International Conference on Malicious and Unwanted Software: Fajardo, Puerto Rico, October 18, vol. 21, pp. 10-19.
In International Conference on Security and Privacy in Communication Systems, pp. 44-62. Springer, Cham, 2016.
In Australasian Conference on Information Security and Privacy, pp. 481-489. Springer, Cham, 2016.
In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 759-770. ACM, 2016.
In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 18-26. IEEE, 2014.
In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 335-340. ACM, 2013.
Journal of computer research and development 51, no. 7 (2014): 1446-1457.
Chinese Journal of Computers 37, no. 1 (2014): 87-100.
Chinese Patent No. CN102999719 B, August 26, 2015.
Chinese Patent No. CN102594783 B, October 22, 2014.