Boyang Wang

alt text 

Boyang Wang, Ph.D.
Assistant Professor
Department of Electrical Engineering and Computer Science
University of Cincinnati
Cincinnati, Ohio 45221

Office: 806A Rhodes Hall
Phone: 513-556-4785
Email: boyang.wang@uc.edu

Curriculum Vitae     Google Scholar Citations   (Citations: 2,200+, h-index: 17)

Undergraduate Certificate in Cyber Operations

Dr. Boyang Wang serves as the advisor for Undergraduate Certificate in Cyber Operations at UC (Details). If you are an undergraduate student at UC and interested in learning knowledge and skills in cybersecurity, please consider taking this certificate. We offer 4 tracks to cover a broad range of topics in cybersecurity. You can select any track that is suitable for you.

  • Track 1: Cyber Attacks and Security

  • Track 2: Network and Data Security

  • Track 3: Hardware and Cyber-Physical Systems Security

  • Track 4: Industrial Security

If you have any questions, please contact Dr. Wang (boyang.wang@uc.edu) or Teresa Hamad (teresa.hamad@uc.edu)

News

  • 02/2021: The code and datasets of our CODASPY’21 paper are released. (Code & Datasets)

  • 02/2021: Boyang receives a REU supplement for the NSF CRII award. Thanks NSF for the support.

  • 02/2021: One paper is accepted by ACM CODASPY 2021. Congrats to Chenggang and Jimmy!

  • 12/2020: One paper is accepted by IEEE INFOCOM 2021.

  • 10/2020: Our SecureComm’20 paper is selected as one of runner-ups for the best paper award. Congrats to Haipeng!

  • 09/2020: The code and datasets of our SecureComm’20 paper are released. (Code & Datasets)

  • 06/2020: The code, datasets, teaser video and preprint version of our WiSec’20 paper are released. (Code & Datasets, Teaser Video, Preprint Version)

  • 06/2020: Boyang serves as a TPC member of INFOCOM 2021 and ICC 2021.

  • 06/2020: One paper is accepted by SecureComm 2020. Congrats to Haipeng!

  • 05/2020: One paper is accepted by ACM WiSec’20. Congrats to Chenggang, Sean, Haipeng and King!

  • 05/2020: Two posters are accepted by IEEE CNS 2020. Congrats to Shriti and Avinash!

  • 03/2020: Boyang serves as Poster Chair for IEEE CNS 2020 (Poster Deadline: April 20, 2020; please submit your work to CNS!)

  • 03/2020: Boyang receives NSF CRII Award. Thanks NSF for the support! (UC News)

Research Interests

Privacy-enhancing technologies, encrypted traffic analysis, machine learning, blockchain, IoT security, and applied cryptography

Selected Publications (Full List)

  • C. Wang, S. Kennedy, H. Li, K. Hudson, G. Atluri, X. Wei, W. Sun, B. Wang, “Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning,” ACM WiSec, 2020. (The first two authors contribute equally in this paper)

  • S. Kennedy, H. Li, C. Wang, H. Liu, B. Wang and W. Sun, “I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers,” IEEE CNS, 2019 (The first three authors contribute equally in this paper.)

  • H. Liu, B. Wang, N. Niu, S. Wilson and X. Wei, “Vaccine: Obfuscating Access Pattern Against File-Injection Attacks,” IEEE CNS, 2019

  • H. Quan, H. Liu, B. Wang, M. Li and Y. Zhang, “Randex: Mitigating Range Injection Attacks on Searchable Encryption,” IEEE CNS, 2019

  • B. Wang, M. Li and L. Xiong, “FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2017

  • B. Wang, M. Li and H. Wang, “Geometric Range Search on Encrypted Spatial Data,” IEEE Transactions on Information Forensics and Security (TIFS), 2016

  • B. Wang, Y. Hou, and M. Li, “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data,” IEEE INFOCOM, 2016

  • B. Wang, Y. Hou, M. Li, H. Wang and H. Li, “Maple: Scalable Multi- Dimensional Range Search over Encrypted Cloud Data with Tree-based Index,” ACM ASIACCS, 2014

  • B. Wang, S. Chow, M. Li and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” IEEE ICDCS, 2013

  • B. Wang, B. Li and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” IEEE INFOCOM, 2013

  • B. Wang, B. Li and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” IEEE Cloud, 2012.