Boyang Wang

alt text 

Boyang Wang, Ph.D.
Assistant Professor
Department of Electrical Engineering and Computer Science
University of Cincinnati
Cincinnati, Ohio 45221

Office: 806A Rhodes Hall
Phone: 513-556-4785
Email: boyang.wang@uc.edu

Curriculum Vitae     Google Scholar Citations   (Citations: 2,200+, h-index: 17)

Undergraduate Certificate in Cyber Operations

Dr. Boyang Wang serves as the advisor for Undergraduate Certificate in Cyber Operations at UC (Details). If you are an undergraduate student at UC and interested in learning knowledge and skills in cybersecurity, please consider taking this certificate. We offer 4 tracks to cover a broad range of topics in cybersecurity. You can select any track that is suitable for you.

  • Track 1: Cyber Attacks and Security

  • Track 2: Network and Data Security

  • Track 3: Hardware and Cyber-Physical Systems Security

  • Track 4: Industrial Security

If you have any questions, please contact Dr. Wang (boyang.wang@uc.edu) or Teresa Hamad (teresa.hamad@uc.edu)

News

  • 06/2021: Our project submitted to NSF IUCRC CHEST is selected for funding. Thanks CHEST and its industrial partners for the support!

  • 06/2021: Avinash successfully passes his thesis defense and will join FIS Global as a Data Engineer.

  • 06/2021: The code and datasets of our IRI’21 paper are released. (Code & Datasets)

  • 06/2021: One paper is accepted by IEEE IRI 2021. Congrats to Jimmy!

  • 06/2021: The code, datasets and videos of our WiSec’21 poster are released. (Code & Datasets)

  • 05/2021: Our poster is acceted by ACM WiSec 2021. Congrats to Haipeng and Chenggang!

  • 05/2021: Boyang serves as a TPC member of INFOCOM 2022 and ICC 2022.

  • 04/2021: Boyang receives William E. Restemeyer Teaching Excellence Award from Dept. of EECS.

  • 04/2021: Chenggang, Hao and Haipeng will take research internship positions at Amazon this summer. Congrats to all!

  • 02/2021: The code and datasets of our CODASPY’21 paper are released. (Code & Datasets)

  • 02/2021: Boyang receives a REU supplement for the NSF CRII award. Thanks NSF for the support.

  • 02/2021: One paper is accepted by ACM CODASPY 2021. Congrats to Chenggang and Jimmy!

  • 12/2020: One paper is accepted by IEEE INFOCOM 2021.

  • 10/2020: Our SecureComm’20 paper is selected as one of runner-ups for the best paper award. Congrats to Haipeng!

  • 09/2020: The code and datasets of our SecureComm’20 paper are released. (Code & Datasets)

Research Interests

Privacy-enhancing technologies, encrypted traffic analysis, machine learning, blockchain, IoT security, and applied cryptography

Selected Publications (Full List)

  • Chenggang Wang, Jimmy Dani, Xiang Li, Xiaodong Jia and Boyang Wang, “Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic,” (ACM CODASPY 2021), Virtual, April 26–28, 2021.

  • C. Wang, S. Kennedy, H. Li, K. Hudson, G. Atluri, X. Wei, W. Sun, B. Wang, “Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning,” ACM WiSec, 2020. (The first two authors contribute equally in this paper)

  • S. Kennedy, H. Li, C. Wang, H. Liu, B. Wang and W. Sun, “I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers,” IEEE CNS, 2019 (The first three authors contribute equally in this paper.)

  • H. Liu, B. Wang, N. Niu, S. Wilson and X. Wei, “Vaccine: Obfuscating Access Pattern Against File-Injection Attacks,” IEEE CNS, 2019

  • H. Quan, H. Liu, B. Wang, M. Li and Y. Zhang, “Randex: Mitigating Range Injection Attacks on Searchable Encryption,” IEEE CNS, 2019

  • B. Wang, M. Li and L. Xiong, “FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2017

  • B. Wang, M. Li and H. Wang, “Geometric Range Search on Encrypted Spatial Data,” IEEE Transactions on Information Forensics and Security (TIFS), 2016

  • B. Wang, Y. Hou, and M. Li, “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data,” IEEE INFOCOM, 2016

  • B. Wang, Y. Hou, M. Li, H. Wang and H. Li, “Maple: Scalable Multi- Dimensional Range Search over Encrypted Cloud Data with Tree-based Index,” ACM ASIACCS, 2014

  • B. Wang, S. Chow, M. Li and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” IEEE ICDCS, 2013

  • B. Wang, B. Li and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” IEEE INFOCOM, 2013

  • B. Wang, B. Li and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” IEEE Cloud, 2012.