Shucheng Yu

ASSOCIATE PROFESSOR
Building: Burchard
Room: 412
Phone: 201.216.8057
Fax: 201.216.8246
Email: shucheng.yu@stevens.edu
Website
Education

Ph.D. (2010), Worcester Polytechnic Institute, Electrical and Computer Engineering

M.S. (2004), Tsinghua University, Computer Science and Technology

B.S. (1999), Nanjing University of Posts & Telecommunications, Computer Science and Technology

Research

Dr. Yu's research interests include information security, applied cryptography, wireless networking and sensing, distributed trust, and applied machine learning. He is also interested in practical security and privacy machenisms in smart and autonomous systems.

Please refer to his Google Scholar Profile for details.

General Information

Dr. Yu joined Stevens Institute of Technology in August 2017 as an associate professor in the Electrical & Computer Engineering Department. Before his tenure at Stevens, Dr. Yu had been an associate professor in Computer Science at the University of Arkansas at Little Rock, where he also served as the interim chair of the CS department and the director of the Computational Research Center of the university. He has published over 60 impactful research articles which have received more than 8000 citations according to Google Scholar. He has been awarded over 10 research grants and contracts, primarily as Principal Investigator.

Honors & Awards

1. Faculty Excellence in Research Award, University of Arkansas at Little Rock, 2016.

2. US Air Force Visiting Faculty Research Program Fellowship (VFRP), 2018

Professional Societies

IEEE, ACM, ASEE

Selected Publications
Conference Proceedings
  1. J. Zhou, X. Liu, Y. Tao, and S. Yu (2019). "Salient Object Detection with Neural Network Approximation", IFIP/IEEE International Symposium on Integrated Network Management (IM 2019) (accepted).
  2. L. Kandel and S. Yu (2019). "Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges", International Conference on Computing, Networking and Communications (ICNC 2019) (accepted).
  3. Y. Tao and S. Yu. (2019). "kFHCO: Optimal VM Consolidation via k-Factor Horizontal Checkpoint Oversubscription", International Conference on Computing, Networking and Communications (ICNC 2019) (accepted).
  4. Y. Tao, S. Yu, and J. Zhou. (2018). "Information Flow Queue Optimization in EC Cloud, International Conference on Computing", International Conference on Computing, Networking and Communications (ICNC 2018).
  5. Z. King and S. Yu. (2017). "Investigating and Securing Communications in the Controller Area Network (CAN)", National Workshop for REU Research in Networking and Systems.
  6. Y. Tian, J. Yuan, and S. Yu. (2016). "SBPA: Social Behavior Based Cross Social Network Phishing Attacks", IEEE Conference on Communications and Network Security (IEEE CNS 2016), Poster Paper.
  7. J. Yuan, S. Yu, and L. Guo. (2015). "SEISA: Secure and Efficient Encrypted Image Search with Access Control", IEEE International Conference on Computer Communication (IEEE INFOCOM 2015).
  8. J. Yuan and S. Yu. (2014). "Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification", IEEE International Conference on Computer Communication (INFOCOM 2014).
  9. B. Wang, S. Yu, W. Lou, and T. Y. Hou. (2014). "Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud", IEEE International Conference on Computer Communication (INFOCOM 2014).
  10. W. Sun, S. Yu, W. Lou, T. Y. Hou, and H. Li. (2014). "Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud", IEEE International Conference on Computer Communication (INFOCOM 2014).
  11. J. Yuan and S. Yu. (2013). "Secure and Constant Cost Public Cloud Storage Auditing with Deduplication", IEEE Conference on Communications and Network Security (CNS 2013).
  12. Y. Hou, M. Li and S. Yu. (2013). "Surviving the RF Smog: Making Body Area Networks Robust to Cross-Technology Interference", IEEE International Conference on Sensing, Communication and Networking (SECON 2013).
  13. L. Shi, J. Yuan, S. Yu, and M. Li. (2013). "ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks", ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013).
  14. J. Yuan and S. Yu. (2013). "Efficient Privacy-Preserving Biometric Identification in Cloud Computing", IEEE International Conference on Computer Communication (INFOCOM 2013).
  15. L. Shi, S. Yu, W. Lou, and T. Y. Hou. (2013). "SybilShield: An Agent-Aided Social Network-Based Sybil Defense among Multiple Communities", IEEE International Conference on Computer Communication (INFOCOM 2013).
Journals
  1. Y. Hou, M. Li and S. Yu. (2017). "Making Body Area Networks Robust against Cross-Technology Interference", IEEE Transactions on Wireless Communications.
  2. W. Sun, S. Yu, W. Lou, T. Y. Hou, and H. Li. (2016). "Protecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud", IEEE Transactions on Parallel and Distributed Systems.
  3. L. Shi, J. Yuan, S. Yu, and M. Li. (2015). "MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks", IEEE Internet of Things Journal.
  4. J. Yuan and S. Yu. (2015). "Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification", IEEE Transactions on Information Forensics & Security.
  5. J. Yuan and S. Yu. (2015). "PCPOR: Public and Constant-Cost Proofs of Retrievability in Cloud", Journal of Computer Security.
  6. J. Yuan and S. Yu. (2014). "Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing", IEEE Transactions on Parallel and Distributed Systems.
  7. L. Shi, M. Li, S. Yu and J. Yuan. (2013). "BANA: Body Area Network Authentication Exploiting Channel Characteristics", IEEE Journal on Selected Areas in Communications.
  8. M. Li, S. Yu, K. Ren, W. Lou, and T. Y. Hou. (2013). "Toward Privacy-Assured Searchable Cloud Data Storage Services", IEEE Network.
  9. M. Li, S. Yu, N. Cao, and W. Lou. (2013). "Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks", IEEE Transactions on Wireless Communications.
  10. M. Li, S. Yu, J. D. Guttman, W. Lou, and K. Ren. (2013). "Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks", ACM Transactions on Sensor Networks.
  11. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou. (2013). "Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption", IEEE Transactions on Parallel and Distributed Systems.
Courses
  • CPE 695 Applied Machine Learning
  • EE 695 Applied Machine Learning