Hello, I am the Director of Software and System Security (SSS) Lab and an Assistant Professor of Computer Science at Texas A&M University - Corpus Christi (TAMUCC). Prior to joining TAMUCC, I was an associate professor at Park University. I received my Ph.D. degree from the School of Computing and Information Sciences at Florida International University and received my M.S. and B.E. degrees in computer science at Xidian University.
My research interests include software security, system security, cloud computing, edge computing. I have published over 40 peer-reviewed research articles in premium journals and conferences, such as IEEE Transactions on Computers(TC), INFOCOM, TIFS, Computers & Security, etc. My recent research interests include confidential computing, database, federated learning, etc.
I am currently recuiting computer science PhD students, who will be fully-funded. If you are self-motivated, hard-working, and want to pursue something big, please reach out.
Journal Publications
[1]
Yongzhi Wang, X. Zhang, Y. Wu and Y. Shen, "Enhancing Leakage Prevention
for MapReduce," in IEEE Transactions on Information Forensics and
Security (TIFS), vol. 17, pp. 1558-1572, 2022, doi:
10.1109/TIFS.2022.3166641.
[2]
Yongzhi Wang, Y. Zou, Y. Shen and Y. Liu, "CFHider: Protecting Control Flow Confidentiality with Intel
SGX" in IEEE Transactions on Computers (TC), vol.
, no. 01, pp. 1-1, 5555. doi:
10.1109/TC.2021.3122903
[3]
Yongzhi Wang, Yulong Shen, Cuicui
Su, Jiawen Ma, Lingtong Liu, Xuewen Dong, “CryptSQLite: SQLite with High Data Security” in IEEE Transactions on Computers (TC), vol.
69, no. 5, pp. 666-678, 1 May 2020.
[4]
Yongzhi Wang, Yulong Shen and Xiaohong
Jiang, "Practical Verifiable Computation–A MapReduce Case Study," in IEEE Transactions on Information
Forensics and Security (TIFS), vol. 13, no. 6, pp. 1376-1391, June 2018.
[5]
Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang, MtMR: Ensuring MapReduce Computation Integrity with Merkle
Tree-based Verifications. IEEE Transactions on Big Data. Vol. 4, No. 3, pp 418-431,
Sep, 2018
[6]
Yongzhi Wang, Yulong Shen, Xiaopeng
Jiao, Tao Zhang, Xu Si, Ahmed Salem, Jia Liu, Exploiting Content Delivery
Networks for Covert Channel Communications, Elsevier Journal of Computer
Communications, 2017, Vol. 99:pp 84-92.
[7]
Yongzhi Wang, Jinpeng
Wei, Shaolei Ren, Yulong Shen, Toward integrity
assurance of outsourced computing - a game theoretic perspective, Elsevier
Journal of Future Generation Computer Systems (FGCS), 2016, 55:87-100.
[8]
Yongzhi Wang, Jinpeng
Wei. “Towards Protecting Control Flow Confidentiality on Cloud Based
Computation.” Elsevier Journal of
Computers and Security (Computers & Security). Vol. 52, pp.106-127, July 2015. doi:10.1016/j.cose.2015.04.005.
Conference
Publications (Full Papers)
[9]
Yongzhi Wang, Wen-Jung Hsin,
Manish Lamsal, EdGENI:
Making GENI User-Friendly for General Computer Education, The 53rd
ACM Technical Symposium on Computer Science Education (SIGCSE2022), March 2
- March 5, Providence, Rhode Island, USA.
[10]
Ke Cheng, Liangmin Wang, Yulong Shen, Yangyang
Liu, Yongzhi Wang, Lele Zheng, A Lightweight Auction
Framework for Spectrum Allocation with Strong Security Guarantees, IEEE Conference on Computer Communications
(INFOCOM’20), July 6- July 9. 2020, Virtual Conference (Due to COVID-19).
[11]
Yongzhi Wang, Yulong Shen, Cuicui
Su, Ke Cheng, Yibo Yang, Anter Faree, and Yao Liu, “CFHider:
Control Flow Obfuscation with Intel SGX”, IEEE
Conference on Computer Communications (INFOCOM’19), Apr 29- May 2. 2019,
Paris, France.
[12]
Ke Cheng, Yulong
Shen, Yongzhi Wang, Liangmin Wang, Xiaohong Jiang, Jian-feng Ma, Cuicui
Su, “Strongly Secure and Efficient Range Queries in
Cloud Databases under Multiple Keys”, IEEE
Conference on Computer Communications (INFOCOM’19), Apr 29- May 2. 2019,
Paris, France.
[13]
Zhu, Feng, Youngtae Yun, Jinpeng Wei, Brent Byunghoon
Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, and
Ruchuan Wang. "A Reflective Covert Channel
Attack Anchored on Trusted Web Services." In International Conference on Web Services (ICWS ’18), pp. 84-99.
Springer, Cham, 2018.
[14]
Yongzhi Wang, Lingtong
Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang,
Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong, "CryptSQLite:
Protecting Data Confidentiality of SQLite with Intel SGX", 2017
International Conference on Networking and Network Applications, Oct 16 – Oct
19, 2017, Katmandu, Nepal. (Best paper
award)
[15]
Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong
Duan, and Wencai Du. "IntegrityMR:
Integrity Assurance Framework for Big Data Analytics and Management
Applications". Proceedings of the IEEE International Conference on Big
Data (IEEE Big Data 2013) Knowledge Management and Big Data Analytics Workshop,
October 6-9, 2013, pages 17-24.
[16]
Yongzhi Wang, Jinpeng Wei, and Mudhakar Srivatsa. "Result
Integrity Check for MapReduce Computation on Hybrid Clouds". Proceedings
of the 6th IEEE International Conference on Cloud Computing (IEEE CLOUD 2013),
IEEE Computer Society, Santa Clara, CA, June 27-July 2, 2013, pages 847-854.
[17]
Yongzhi Wang, Jinpeng Wei. "VIAF: Verification-based Integrity Assurance Framework for
MapReduce". Proceedings of the fourth IEEE International Conference on
Cloud Computing (IEEE CLOUD 2011), IEEE Computer Society, Washington DC, July
4-9, 2011, pages 300-307.
Conference
Publications (Poster Papers)
[18]
Yongzhi Wang, Wen-Jung Hsin,
Improving User Publication for GENI-based Cybersecurity Labs, ACM Special Interest Group on Computer
Science Education Technical Symposium (SIGCSE2020), March 11 - March 14,
Portland, Oregon, USA. Poster paper.
[19]
Xiaoyu Zhang, Yongzhi
Wang, Yu Zou, Reconsidering Leakage Prevention in MapReduce, IEEE Conference on Computer Communications
(INFOCOM’ 20), July 6- July 9. 2020, Virtual Conference (Due to COVID-19),
Poster paper.
[20]
Yu Zou, Yongzhi Wang, Xiaoyu
Zhang, Enforcing Control Flow Confidentiality with SGX, IEEE Conference on Computer Communications (INFOCOM’ 20), July 6-
July 9. 2020, Virtual Conference (Due to COVID-19), Poster paper.
[21]
Yongzhi Wang, Yulong Shen, Ke
Cheng, Yibo Yang, Cuicui Su, and Anter Faree.
2018. Obfuscating program control flow with Intel SGX. In Proceedings of
the 40th International Conference on
Software Engineering: Companion Proceedings (ICSE '18). ACM, New York,
NY, USA, 321-322., Poster Paper.
[22]
Yongzhi Wang, Yulong Shen, “RIA – An Audition-based
Method to Protect the Runtime Integrity of MapReduce Applications”, 23rd ACM Conference on Computer and
Communications Security (ACM CCS 2016), Oct 24-28, 2016, Vienna, Austria.
Poster Paper.
[23]
Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa. "Cross Cloud
MapReduce: an Uncheatable MapReduce". The 33rd IEEE Symposium on Security and
Privacy (IEEE S&P 2012), San Francisco, CA, May 20-23, 2012. Poster
paper.