Wei Jiang


Department of Computer Science
Missouri University of Science and Technology
333 Computer Science Building, 500 W. 15th St.
Rolla, MO 65409-0350

http://web.mst.edu/~wjiang/
Office: 573-341-4989
Fax: 573-341-4501


Research Interests

Privacy-preserving data analytics, secure multi-party computation and applied cryptography


Education

      Purdue University

  • Ph.D., Computer Science, Aug. 2008.
  • M.S., Computer Science, Dec. 2004.
        University of Iowa
  •  B.S., Computer Science and Mathematics, May 2002.

Professional Experience

      Missouri University of Science and Technology

  • Associate Professor (September 2014 - present)
  • Associate Chair for Graduate Studies & External Affairs (June 2015 - December 2017)
  • Assistant Professor (August 2008 - August 2014)

Current and Past Projects

  1. Co-PI,  "Inspire Next Generation of Cyber Stars", NSA, 04/15/2018 - 04/14/2019, $100,000. (Shared credit: $40,000)
  2. Co-PI, "Promoting Cybersecurity and Inspiring Next Generation Cyber Warriors", NSA, 04/12/2017 - 04/11/2018, $100,000. (Shared credit: $40,000)
  3. Lead PI, "Building a Privacy-Preserving Social Networking Platform from a Technological and Sociological Perspective", NSF, 09/1/2016-08/31/2019, $667,218. (Shared credit: $206,228)
  4. Co-PI, "Security Camp for K-12 Teachers", NSA, 05/1/2016-04/30/2017, $100,000. (Shared credit: $40,000)
  5. PI, "I-Corps: An Outsourced and Completely Private Social Network", NSF, 01/11/2015 - 07/10/2015, $50,000.
  6. Co-PI, "Research and Training Experience for Undergraduates in the area of Secure Cloud Computing", NSF, 01/01/2015 - 12/31/2017, $360,000. (Shared credit: $72,000)
  7. Co-PI, "Missouri Advanced Security Training, Education and Research", NSF, 08/15/2014 - 07/31/2019, $3,319,494. (Shared credit: $331,949)
  8. PI, "Friend and Product Recommendations in Outsourced Privacy-Preserving Online Social Network", Google, May 2014 - April 2015, $34,230.
  9. PI, "A Secure and Content-based Framework to Identify and Share Needed Information", ONR, January 2011 - December 2013, $286,570.
  10. PI, "Anonymizing Textual Data and its Impact on Utility", NSF, September 2010 - August 2015, $2,480,300. (Shared credit: $356,964)
  11. Co-PI, "Common Correctness for Protecting Confidentiality Critical Infrastructure Systems", NSA, September 28, 2012 - September 27, 2013, $41,788. (Shared credit: $4,178)
  12. Co-PI, "Earthquake Information System Based on Sensors in Mobile Phones'', UMRB, August 2009 - July 2010, $38,000. (Shared credit: $16,340)
  13. PI, "Semantic Preserving Text Sanitization", UMRB, July 2009 - June 2010, $28,000.

Current and Former Students

        Current Students

  • Ali Al-Lami, Ph.D. student
  • Jizhe Du, Ph.D. student
  • Ken Goss, Ph.D. student
  • Douglas J. Steiert, Ph.D. student (co-advised with Dr. Dan Lin)
  • Christian Storer, Ph.D. student (co-advised with Dr. Hurson)
  • Nitish M. Uplavikar, Ph.D. student

Former Students

  • Nicholas Hilbert (M.S. thesis, Summer 2017, co-advised with Dr. Dan Lin)
  • Chun Hu (Ph.D., Fall 2015)
  • Yousef Elmehdwi (Ph.D, Fall 2015)
  • Li Feng (Ph.D., Summer 2015, co-advised with Dr. Xiaoqing (Frank) Liu)
  • Bharath Samanthula (Ph.D., Fall 2013)
  • Wenquan Wang (M.S. thesis, Spring 2013)
  • Prakash Kumar (M.S. thesis, Fall 2012)
  • Michael Howard (M.S. thesis, Fall 2012)
  • Nian Liu (M.S. thesis, Fall 2012, co-advised with Dr. Xiaoqing (Frank) Liu)

Publications

Journal Articles

  1. Hu Chun, Kui Ren, Wei Jiang, "Privacy-Preserving Power Usage and Supply Control in Smart Grid", Computers & Security, Elsevier. To appear.
  2. Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino, "Highly Efficient Randomized Authentication in VANETs", Pervasive and Mobile Computing, 2018.
  3. Dan Lin, Nicholas Hilbert, Christian Storer, Wei Jiang, Jianping Fan, "UFace: Your Universal Password That No One Can See", Computers & Security, Elsevier. 2018.
  4. Ravi S Arvapally, Xiaoqing Frank Liu, Fiona Fui and Wei Jiang, "Identifying Outlier Opinions in an Online Intelligent Argumentation System", Concurrency and Computation: Practice and Experience, Wiley, 2017.
  5. Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang and Wei Jiang, "PAS: Policy-based Assistance in Sensor Networks", Computing, Springer, 2017.
  6. Bharath K. Samanthula, Lei Cen, Wei Jiang and Luo Si, "Privacy-Preserving and Efficient Friend Recommendation in Social Networks", Transactions on Data Privacy, (8) 141-171, 2015.
  7. Bharath K. Samanthula, Yousef Elmehdwi and Wei Jiang, "k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data", IEEE Transactions on Knowledge and Data Engineering, Issue 05, Vol. 27, pages 1261-1273, May 2015.
  8. Bharath K. Samanthula and Wei Jiang, "Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient", IEEE Transactions on Dependable and Secure Computing, Issue 99, March 23, 2015.
  9. Dan Lin, Sashi Gurung, Wei Jiang, Ali Hurson and Rui Zhang, "Traffic Information Publication with Privacy Preservation", ACM Transactions on Intelligent Systems and Technology (TIST), September 2014.
  10. Bharath K. Samanthula and Wei Jiang, "A Randomized Approach for Structural and Message based Private Friend Recommendation in Online Social Networks", State of the Art Applications of Social Network Analysis, Lecture Notes in Social Networks, Springer, 2014.
  11. Bharath K. Samanthula, Hu Chun, Wei Jiang, and Bruce McMillin, "Secure and Threshold-based Power Usage Control in Smart Grid Environments", International Journal of Parallel, Emergent and Distributed Systems (IJPEDS). November 2013.
  12. Bharath K. Samanthula and Wei Jiang, "Interest-Driven Private Friend Recommendation", Knowledge and Information Systems. October 2013.
  13. Balamurgan Anandan, Chris Clifton, Wei Jiang, Mummoorthy Murugesan, Pedro Pastrana-Camacho, and Luo Si, "t-Plausibility: Generalizing Words to Desensitize Text", Transactions on Data Privacy, 5(3):505-534, December 2012.
  14. Murat Kantarcioglu and Wei Jiang, “Incentive Compatible Privacy-Preserving Data Analysis”, IEEE Transactions on Knowledge and Data Engineering, March 9, 2012.
  15. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi, "Privacy-Preserving Updates to Anonymous and Confidential Databases", IEEE Transactions on Dependable and Secure Computing, July-Aug, 2011.
  16. Mummoorthy Murugesan, Wei Jiang, Chris Clifton, Luo Si and Jaideep Vaidya, "Efficient Privacy-Preserving Similar Document Detection", the VLDB Journal, January 16, 2010.
  17. Murat Kantarcioglu, Ali Inan, Wei Jiang and Bradley Malin, "Formal Anonymity Models for Efficient Privacy-Preserving Joins", Data & Knowledge Engineering (DKE), Elsevier, November 2009.
  18. Chris Clifton, Ananth Iyer, Richard Cho, Wei Jiang, Murat Kantarcioglu and Jaideep Vaidya, "An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems", Manufacturing & Service Operations Management (M&SOM), INFORMS, Linthicum, Maryland, Winter 2008.
  19. Murat Kantarcioglu, Wei Jiang, Ying Liu and Bradley Malin, "A Cryptographic Approach to Securely Share and Query Genomic Sequences", IEEE Transactions on Information Technology in Biomedicine (TITB), September 2008.
  20. Wei Jiang, Chris Clifton and Murat Kantarcioglu, "Transforming Semi-Honest Protocols to Ensure Accountability", Data and Knowledge Engineering (DKE), an Elsevier journal, July 26, 2007.
  21. Wei Jiang and Chris Clifton, "A Secure Distributed Framework for Achieving k-Anonymity", Special Issue of the VLDB Journal on "Privacy-Preserving Data Management", Aug. 5, 2006.

Refereed Conferences and Workshops

  1. Ali Al-Lami, Mukesh Mohania and Wei Jiang, "Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment", IEEE Conference on Communications and Network Security (CNS), Beijing China, May 30 - June 1, 2018.
  2. Ying Zhang, Lingxiang Wang, Wei Jiang and Zhishan Guo. RWS - A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage. Proceedings of the 24th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), BP Session, Porto, Portugal, April, 2018.
  3. Wei Jiang, Dan Lin, Feng Li and Elisa Bertino, "No One Can Track You: Randomized Authen- tication in Vehicular Ad-hoc Networks", IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, Big Island, Havaii, USA, March 13-17, 2017.
  4. Huchun, Kui Ren and Wei Jiang, "Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid", 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Fairfax, VA, July 13 - 15, 2015.
  5. Bharath Samanthula, Wei Jiang and Elisa Bertino, "Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data", the 19th European Symposium on Research in Computer Security (ESORICS), Wroclaw, Poland, September 7-11, 2014.
  6. Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya and Wei Jiang, "Outsourceable Two-Party Privacy-Preserving Biometric Authentication", the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 4 - 6, 2014.
  7. Yousef Elmehdwi, Bharath K. Samanthula and Wei Jiang, "Secure k-Nearest Neighbor Query over Encrypted Data", the 30th IEEE International Conference on Data Engineering (ICDE), Chicago, IL, USA, March 31 - April 4, 2014.
  8. Wenquan Wang, Marouane Kessentini and  Wei Jiang, "Test Cases Generation for Model Transformations from Structural Information", Proceedings of the First International Workshop on Model-driven Engineering By Example co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), Miami, Florida, USA, September 29, 2013.
  9. Bharath K. Samanthula and Wei Jiang, "Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing", the 6th International Conference on Cloud Computing (IEEE CLOUD 2013), Santa Clara Marriott, CA, USA, June 27-July 2, 2013.
  10. Bharath K. Samanthula, Wei Jiang and Sanjay Madria, "A Probabilistic Encryption based Min/Max Computation in Wireless Sensor Networks", the 14th International Conference on Mobile Data Management (MDM), Milan, Italy, June 3-6 2013.
  11. Feng Li, Nian Liu, Wei Jiang and Xiaoqing (Frank) Liu, "Argument Placement Recommendation and Relevancy Assessment in an Intelligent Argumentation System", The 2013 International Conference on Collaboration Technologies and Systems (CTS 2013), San Diego, California, USA, May 20-24, 2013.
  12. Bharath K. Samanthula, Chun Hu and Wei Jiang, “An Efficient and Probabilistic Secure Bit-Decomposition”, 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hangzhou, China, May 8-10, 2013.
  13. Wenquan Wang, Marouane Kessentini, Wei Jiang and Ali Ouni, “Test Cases Generation for Model Transformations from Structural Information”, 17th European Conference on Software Maintenance and Reengineering, Genova, Italy, March 5-8, 2013.
  14. Bharath K. Samanthula and Wei Jiang, “Structural and Message based Private Friend Recommendation”, the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Kadir Has University, Istanbul, Turkey, August 26 - 29, 2012.
  15. Ravi Santosh Arvapally, Xiaoqing (Frank) Liu and Wei Jiang, “Identification of Faction Groups and Leaders in Web-based Intelligent Argumentation System for Collaborative Decision Support”, the 2012 International Conference on Collaboration Technologies and Systems (CTS 2012), Denver, Colorado, USA, May 21-25, 2012.
  16. Hu Chun, Wei Jiang and Bruce M. McMillin, “Privacy-Preserving Power Usage Control in Smart Grid”, Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Fort McNair, Washington, DC, USA, March 19 - 21, 2012.
  17. Wei Jiang and Bharath K. Samanthula, “A Secure and Distributed Framework to Identify and Share Needed Information”, the Third IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT11), MIT, Boston, USA, October 9-11, 2011.
  18. Wei Jiang and Bharath K. Samanthula, “N-Gram Based Secure Similar Document Detection”, the 25th Annual WG 11.3 Conference on Data and Applications Security, Richmond, Virginia, July 11-13, 2011.
  19. Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz and Serkan Uzunbaz, "k-out-of-n Oblivious Transfer based on Homomorphic Encryption and Solvability of Linear Equations", ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2011), San Antonio, TX, February 21-23, 2011.
  20. Dan Lin, Sashi Gurung, Wei Jiang and Ali Hurson, "Privacy-Preserving Location Publishing under Road-Network Constraints", Database Systems for Advanced Applications (DASFAA), Tsukuba, Japan, April 1-4, 2010.
  21. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, "t-Plausibility: Semantic Pre- serving Text Sanitization", The 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT09), Vancouver, Canada, August 29-31, 2009.
  22. Murat Kantarcioglu, Wei Jiang and Bradley Malin, "A Privacy Preserving Framework for Integrating Person-Specific Databases", Lecture Notes in Computer Science: Proceedings of the 2008 Conference on Privacy in Statistical Databases, vol. 5262, 298-314, Istanbul, Turkey, 2008.
  23. Wei Jiang, Mummoorthy Murugesan, Chris Clifton and Luo Si, "Similar Document Detection with Limited Information Disclosure", the 24th IEEE International Conference on Data Engineering (ICDE08), April 7-12, 2008, Cancun, Mexico.
  24. Alberto Trombetta, Wei Jiang, Elisa Bertino and Lorenzo Bossi "Private Updates to Anonymous Databases", the 24th IEEE International Conference on Data Engineering (ICDE08), April 7-12, 2008, Cancun, Mexico. (Poster paper)
  25. Chris Clifton, Wei Jiang, Mummoorthy Murugesan and M. Ercan Nergiz, "Is Privacy Still an Issue for Data Mining?", National Science Foundation Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation (NGDM'07), Baltimore, Oct. 10-12, 2007.
  26. Mingwu Zhang, Wei Jiang, Chris Clifton and Sunil Prabhakar, "Identifying Rare Classes with Sparse Training Data", the 18th International Conference on Database and Expert Systems Applications (DEXA07), Regensburg, Germany, September 3-7, 2007.
  27. Wei Jiang, Luo Si and Jing Li, "Protecting Source Privacy in Federated Search", the 30th Annual International ACM SIGIR Conference (SIGIR07) , Amsterdam, July 23-27, 2007. (Poster paper)
  28. Wei Jiang and Chris Clifton, "AC-Framework for Privacy-Preserving Collaboration", 2007 SIAM International Conference on Data Mining (SDM07), Minneapolis, Minnesota, April 26-28, 2007.
  29. Mummoorthy Murugesan and Wei Jiang, "Secure Content Validation", the 3rd International Workshop on Privacy Data Management in Conjunction with ICDE 2007, Istanbul, Turkey, April 15-20, 2007.
  30. Wei Jiang and Chris Clifton, "Transforming Semi-Honest Protocols to Ensure Accountability", the ICDM workshop on Privacy Aspects of Data Mining (PADM06), Hong Kong, China, Dec. 18-22, 2006.
  31. Wei Jiang and Maurizio Atzori, "Secure Distributed k-Anonymous Pattern Mining", the Sixth IEEE International Conference on Data Mining (ICDM06), Hong Kong, China, Dec. 18-22, 2006.
  32. Wei Jiang and Chris Clifton, "Privacy-Preserving Distributed k-Anonymity", the 19th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Storrs, Connecticut, Aug. 7 - 10, 2005.
  33. Wei Jiang, Jaideep Vaidya, Zahir Balaporia, Chris Clifton and Brett Banich, "Knowledge Discovery from Transportation Network Data", the 21st IEEE International Conference on Data Engineering (ICDE05), Tokyo, Japan, Apr. 5 - 8, 2005. Best paper, Industrial Track.

Book Chapters

  1. Elmehdwi, Yousef, Wei Jiang and Ali Hurson, "Similarity of Private Keyword Search over Encrypted Document Collection", Advances in Computers, Vol 94, pages 71-102, 2014.
  2. Alberto Trombetta, Wei Jiang, and Elisa Bertino, "Advanced Privacy-Preserving Data Management and Analysis", Chapter 2 in Privacy and Anonymity in Information Management Systems, Advanced Information and Knowledge Processing, Volume 0, Part 1, 7-27, Springer, 2010.
  3. Chris Clifton, Wei Jiang, Mummoorthy Murugesan, and M. Ercan Nergiz, "Is Privacy Still an Issue for Data Mining?", Chapter 18 in Next Generation of Data Mining, Hillol Kargupta, Jiawei Han, Philip Yu, Rajeev Motwani, and Vipin Kumar (Eds.), CRC Press, 2008.
  4. Elisa Bertino, Dan Lin and Wei Jiang, "A Survey of Quantification of Privacy Preserving Data Mining Algorithms", in Privacy-Preserving Data Mining (Models and Algorithms), Charu C. Aggarwaland Philip S. Yu (Eds.), Springer-Verlag, 2008.

Last modified: Sun Mar 11 12:33:09 CDT 2018