Xukai Zou, Ph.D.

Professor, Computer & Information Science

Office:
SL 280F
Phone:
(317) 278-8576
Email:
xzou@iupui.edu
Website:
http://cs.iupui.edu/~xkzou/
Research Areas:
Networking & Security Research Group

Research

Cryptography, Communication networks and security, Biometrics and authentication, Security and reliability for Grid/Cloud/Fog Computing, Security in wireless, delay tolerant, and mobile networks, Secret sharing, Health and personal genomic security and privacy, Design & analysis of algorithms, Image and data compression.

Current research topics

Secure electronic voting

  1. X. Zou, H. Li, Y. Sui, W. Peng, and F. Li Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties, INFOCOM'2014, pp. 136--144.
  2. H. Li, Y. Sui, W. Peng, X. Zou, and F. Li, A Viewable E-voting Scheme for Environments with Conflict of Interest, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
  3. H. Li, A. R. Kankanala, X. Zou, A Taxonomy and Comparison of Remote Voting Schemes, ICCCN'2014, pp. 666--673.
  4. K. Butterfield and X. Zou, Analysis and Implementation of Internet Based Remote Voting, Proceedings of First National Workshop for REU Research in Networking and Systems 2014.

Biometrics and authentication

  1. Y. Sui, X. Zou, Y. Du, and F. Li, Design and Analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method, IEEE Transactions on Computers, 63(4), pp. 902--916, 2014.
  2. Y. Sui$^*$, X. Zou and Y. Du, Cancellable Biometrics, (book chapter), pp. 233--252, in Biometrics: from Fiction to Practice, Pan Stanford Publishing Pte. Ltd.,2013.
  3. Y. Sui, X. Zou, Y. Du and F. Li, Secure and Privacy-preserving Biometrics based Active Authentication, The 2012 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2012), pp.1291 - 1296.
  4. Y. Sui, X. Zou, F. Li and E. Y. Du, Active User Authentication for Mobile Devices,The 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2012), pp. 540 - 548.
  5. Y. Sui, X. Zou, and Y. Du, Biometrics-based Authentication: a New Approach, ICCCN 2011, July 31 - August 4, Hawaii, USA.

Mobile, social, delay tolerant, and mobile security

  1. W. Peng, F. Li, X. Zou, and J. Wu, Behavioral Malware Detection in Delay Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, 25 (1), pp. 53--63, 2014.
  2. W. Peng, F. Li, X. Zou, and J. Wu, A Two-stage Deanonymization Attack Against Anonymized Social Networks, IEEE Transactions on Computers, 63(2), pp. 290--303, 2014.
  3. M. Rangwala, P. Zhang, X. Zou and F. Li, A Taxonomy of Privilege Escalation Attacks in Android Applications, International Journal of Security and Networks, 9(1), pp. 40--55, 2014.
  4. W. Peng, F. Li, X. Zou, J. Wu, Offloading Topical Cellular Content through Opportunistic Links, The Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013) , October 14-16, in HangZhou, 2013, ZheJiang Province, P.R.China.
  5. W. Peng, F. Li, K. J. Han, X. Zou, and J.Wu, T -dominance: Prioritized Defense Deployment for BYOD Security, IEEE Conference on Communications and Network Security, Oct. 14--16, 2013 Washington, D.C., USA.
  6. Feng Li, Wei Peng, Chin-Tser Huang, and Xukai Zou, Smartphone Strategic Sampling in Defending Enterprise Network Security, ICC 2013.
  7. F. Li, Y. Yang, J.Wu and X. Zou, Fuzzy Closeness-based Delegation Forwarding in Delay Tolerant Networks, Proceedings of the 5th IEEE International Conference on Networking, Architecture, and Storage (NAS 2010).

Moving target defense and Secure Digital Provenance

  1. M. Rangwala, Z. Liang, W. Peng, X. Zou and F. Li, A Signature based Mutual Agreement Scheme for Secure Data Provenance, ICCCN'2014. pp. 726--733.
  2. W. Peng, F. Li, K. Hand and X. Zou, Moving-target Defense for Cloud Infrastructure: Lessons from Botnets, High performance semantic cloud auditing and applications, New York: Springer Verlag, Book chapter, (accepted).
  3. W. Peng, F. Li, C. T. Huang, X. Zou A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces, ICC'2014 (Accepted)
  4. Y. Dai, X. Li, X. Zou, and L. Xing, Rebound Wall: A Novel Technology against DoS Attacks, Special Issue on System Survivability and Defense against External Impacts, International Journal of Performability Engineering, Vol. 5, No. 1, pp. 55-70, January 2009.

Secure Group Communications (SGC)

  1. X. Zou, Y. Dai and E. Bertino A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. IEEE INFOCOM'08, April 2008, pp. 1211--1219.
  2. G. Hao@, N. V. Vinodchandran, B. Ramamurthy and X. Zou, A Balanced Key Tree Approach for Dynamic Secure Group Communication, Accepted by ICCCN 2005 FOURTEENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, October 17-19, 2005, CA, USA.
  3. P. Adusumilli@, X. Zou and B. Ramamurthy, DGKD: Distributed Group Key Distribution with Authentication Capability, Proceedings of the 2005 IEEE Workshop on Information Assurance (IAW), United States Military Academy, West Point, NY, 15-17 June 2005, pp. 286--293.X. Zou and A. Thukral, Key management, The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief, to be published by John Wiley \& Sons, Inc, October 2005.
  4. X. Zou and A. Thukral, Key management, The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief, to be published by John Wiley \& Sons, Inc, October 2005.
  5. X. Zou, A. Thukral, and Y. Karandikar Secure Group Communication, Parallel and Distributed Computing: Evaluation, Improvement and Applications, Editors, Y. Dai, Y. Pan, and R. Raje, to be published by Nova Science Publishers, Sept., 2005.
  6. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182
  7. X. Zou and B. Ramamurthy, A simple group Diffie-Hellman key agreement protocol without member serialization, Lecture Notes in Computer Science (LNCS), Springer-Verlag, Vol. 3314 (2004), pp. \ 725-731.
  8. X. Zou, B. Ramamurthy, and S. S. Magliveras, A GCD attack resistant CRTHACS for secure group communications, Proceedings of International Conference on Information Technology, ITCC 2004 (Poster), April 5 -7, 2004, Las Vegas, NV, USA, pp. \ 153--154.
  9. X. Zou and B. Ramamurthy, A block-free tree based group Diffie-Hellman key agreement protocol for secure group communication, Proceedings of International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Austria, February 17-19, 2004, pp. \ 288--293.
  10. X. Zou, B. Ramamurthy and S. Magliveras, Efficient key management for secure group communication with bursty behavior, Proceedings of International Conference on Communication, Internet, and Information Technology, Virgin Islands, USA, November 2002, pp.\ 148--153.

Secure Dynamic Conferencing (SDC)

  1. X. Zou and Y. Karandikar A Novel Conference Key Management Solution for Secure Dynamic Conferencing, International Journal of Security and Networks, 3(1), 2008, pp. 47--53.
  2. P. Adusumilli and X. Zou, Symmetric Polynomial based Hierarchical Conference Key Management, Submitted to International Conference on Information and Communication Security (ICICS'05).
  3. P. Adusumilli@ and X. Zou, KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing, Proceedings of THE TENTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), Cartagena, Spain, June 27-30, 2005, pp. 476--481.
  4. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182.
  5. X. Zou, S. Magliveras and B. Ramamurthy, Key Tree based Scalable Secure Dynamic Conferencing Schemes, Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), MIT Cambridge, MA, USA, November 2004, pp. \ 61--65.
  6. X. Zou, S. Magliveras and B. Ramamurthy, A dynamic conference scheme extension with efficient burst operation, Congressus Numerantium, Vol. 158, 2002, pp.\ 83--92.

Cryptography based Access Control

  1. Y. Karandikar@, X. Zou and Y. Dai, An Effective Key Management Approach to Differential Access Control in Dynamic Environments, Journal of Computer Science, 2(6):542--549, 2006.
  2. Y. Karandikar@, X. Zou and Y. Dai, Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments, Accepted by The 1st IEEE Workshop on Reliability and Autonomic Management In Parallel and Distributed Systems (RAMPDS-2005), 2005.
  3. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182.
  4. X. Zou, B. Ramamurthy, V. Variyam and R. K. Balachandran@, Algorithms for unified hierarchy based access control, Proceedings of International Conference on Communications, Internet, \& Information Technology (CIIT 2003), Scottsdale, AZ, USA, November 17-19, 2003, pp.\ 31--36.
  5. X. Zou, B. Ramamurthy and S. Magliveras, Chinese Remainder Theorem based hierarchical access control for secure group communications, Lecture Notes in Computer Science (LNCS), Springer-Verlag, vol. 2229 (2001), pp.\ 381--385.
  6. J.-C. Birget, X. Zou, G. Noubir and B. Ramamurthy, Hierarchy-based access control in distributed environments, Proceedings of IEEE International Conference on Communications, June 2001, Helsinki, Finland, pp.\ 229--233.

SGC in wireless/mobile ad hoc networks (MANET)

  1. R. K. Balachandran@, B. Ramamurthy, X. Zou, and N. V. Vinodchandran, CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad-Hoc Networks, Accepted by IEEE International Conference on Communication (ICC) 2005.
  2. X. Zou, A. Thukral, and B. Ramamurthy, An authenticated key management scheme for mobile ad hoc networks, Accepted by MSN'06.
  3. X. Zou, B. Ramamurthy and S. Magliveras, Secure Group Communication over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X), October 2004, pages 182.

Trusted Collaborative Computing (TCC) and Health/Medical Information System

  1. X. Zou, Y. Dai and E. Bertino A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. IEEE INFOCOM'08, April 2008, pp. 1211--1219.
  2. X. Zou, Y. Dai and Y. Pan, Trust and Security in Collaborative Computing, World Scientific, ISBN-13 978-981-270-368-2, ISBN-10 981-270-368-3.
  3. X. Zou and Y. Dai, Secure Medical Data Repository and Regional Health Information Exchange Networks. In collaboration with Indiana University Medical School and VA Medical Center.
  4. Amandeep Thukral@ and Xukai Zou, Secure Group Instant Messaging based on Cryptographic Primitives, To appear in Lecture Notes in Computer Science (LNCS), Springer-Verlag, (2005).

Education

  • B.S., Computer Science Zhengzhou University, 1983
  • M.S., Computer Science Huazhong University of Science and Technology, 1986
  • Ph.D., Computer Science University of Nebraska Lincoln, 2000

Awards

  • Trustees Teaching Award, IUPUI, 2013
  • Featured on Fox News 59 for a security breach at Anthem, the insurance company based in Indianapolis
  • Fellow of Indiana University' Center for Applied Cybersecurity Research (CACR), 2010
  • Fellow of Indiana University' Center for Applied Cybersecurity Research (CACR), 2009
  • Trustees Teaching Award, IUPUI, 2008
  • Featured by news "IUPUI Computer Scientists Develop Revolutionary Medical Information System"
  • National scientific and technological achievement, awarded by Chinese Science and Technology Committee, 1996
  • Excellent author of scientific and technical articles, by Science and Technology Committee of Henan Province in 1996 and 1998
  • Outstanding teaching achievement award, 1994 and Outstanding young researcher, 1996, by Zhengzhou University
  • Outstanding teaching achievement award, by Zhengzhou University in 1994
  • Outstanding graduate, by Zhengzhou University, 1983