Boyang Wang

alt text 

Boyang Wang, Ph.D.
Associate Professor
Program Director in Cybersecurity Engineering
Department of Electrical and Computer Engineering (primary)
Department of Computer Science (secondary)
University of Cincinnati
Cincinnati, Ohio 45221

Office: 806A Rhodes Hall
Phone: 513-556-4785
Email: boyang.wang@uc.edu

Curriculum Vitae     GitHub     Google Scholar Citations   (Citations: 3,300+, h-index: 20)

RA Position Available for Fall 2024

Our lab has one opening for one Ph.D. student starting from Fall 2024. We are looking for candidates who have strong background and/or research experiences in one of the following areas:

  • Side-channel attacks (e.g., FPGA, embedded systems)

  • Wireless communications (e.g., software defined radio)

  • Machine learning

If you are interested, please send your CV/resume, transcripts, GRE and TOFEL scores, and publications (if any) to boyang.wang@uc.edu

News

  • 12/2023: One paper is accepted by IEEE HOST’24. Congrats to Haipeng and Mabon!

  • 09/2023: One paper is accepted by REU Symposium’23 (part of IEEE ICMLA’23). Congrats to Andrew, Jun, and Mabon!

  • 09/2023: Logan receives student travel grant from SmartSP’23.

  • 08/2023: Dr. Wang receives tenure and is promopted to Associate Professor.

  • 08/2023: Two projects submitted to NSF IUCRC CHEST are selected for funding. Thanks CHEST and its industrial partners for the support!

  • 06/2023: Dr. Wang serves as the web co-chair and a TPC member of IEEE INFOCOM 2024. Please consider submitting papers to INFOCOM 2024.

  • 06/2023: Dr. Wang serves as a TPC member of IEEE CNS 2023. Please consider submitting papers to CNS 2023

  • 05/2023: Haipeng passes his Ph.D disertation defense and joins Amazon as a Research Scientist, Congrats to Haipeng!

  • 02/2023: One paper is accepted by ACM WiSec 2023. Congrats to Chenggang, Mabon, Shane, and Joel!

  • 01/2023: Our NSF proposal in wireless security is selected for funding (Award CNS-2225160). This is a collaborative project with Dr. Ghose from University of Nebraska-Lincoln. Thanks NSF for the support!

  • 01/2023: Chenggang passes his Ph.D. dissertation defense and joins Auburn University at Montgomery as a tenure-track Assistant Professor! Congrats!

  • 12/2023: One paper is accepted by IEEE HOST 2023. Congrats to Chenggang, Shane, and Austen!

  • 12/2022: Logan received NSF student travel grant from REU Symposium 2022. Congrats to Logan!

  • 11/2022: One paper is accepted by REU Symposium 2022. Congrats to Logan, Ikran, Shane and Austen!

Research Interests

Data privacy and security, side-channel attacks, privacy-preserving technologies, machine learning, network security, and applied cryptography

B.S. in Cybersecurity Engineering & Undergraduate Certificate in Cyber Operations

Dr. Wang serves as the program director of the new B.S. in Cybersecurity Engineering at UC (Details). If you are interested in learning knowledge and skills in cybersecurity, please consider pursuing this B.S.

Dr. Wang also serves as the technical advisor for Undergraduate Certificate in Cyber Operations at UC (Details), which is designed for UC students who are not majored in Cybersecurity Engineering.

Selected Publications (Full List)

  • C. Wang, M. Ninan, S. Reilly, J. Ward, W. Hawkins, B. Wang, and J. Emmert, “Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies ,” (ACM WiSec 2023), Guildford, Surrey, United Kingdom, May 29-June 01, 2023.

  • C. Wang, J. Dani, S. Reilly, A. Brownfield, B. Wang, and J. Emmert, “TripletPower: Deep-Learning Side-Channel Attacks over Few Traces,” (IEEE HOST 2023), San Jose CA, May 1-4, 2023.

  • H. Li, N. Niu and B. Wang, “Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting,” (ACM CODASPY 2022), Baltimore MD, April 24–27, 2022.

  • C. Wang, J. Dani, X. Li, X. Jia, B. Wang, “Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic,” (ACM CODASPY 2021), Virtual, April 26–28, 2021.

  • C. Wang, S. Kennedy, H. Li, K. Hudson, G. Atluri, X. Wei, W. Sun, B. Wang, “Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning,” ACM WiSec, 2020. (The first two authors contribute equally in this paper)

  • S. Kennedy, H. Li, C. Wang, H. Liu, B. Wang and W. Sun, “I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers,” IEEE CNS, 2019 (The first three authors contribute equally in this paper.)

  • B. Wang, M. Li and L. Xiong, “FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2017

  • B. Wang, M. Li and H. Wang, “Geometric Range Search on Encrypted Spatial Data,” IEEE Transactions on Information Forensics and Security (TIFS), 2016

  • B. Wang, Y. Hou, and M. Li, “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data,” IEEE INFOCOM, 2016

  • B. Wang, Y. Hou, M. Li, H. Wang and H. Li, “Maple: Scalable Multi- Dimensional Range Search over Encrypted Cloud Data with Tree-based Index,” ACM ASIACCS, 2014

  • B. Wang, S. Chow, M. Li and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” IEEE ICDCS, 2013