• No results found

VITA: DR. YEN-HUNG HU

N/A
N/A
Protected

Academic year: 2021

Share "VITA: DR. YEN-HUNG HU"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

VITA: DR. YEN-HUNG HU

EXPERIENCE

2011 – Present: Director of Information Assurance Center at Hampton University (IAC@HU). http://science.hamptonu.edu/compsci/iac/

 Offer a variety of IA courses.  Conduct IA researches.

 Establish Center of Academic Excellence in Information Assurance (CAE-IA).  Pursue external IA grants.

2005 - Present: Assistant Professor of Computer Science at Hampton University

 Teach a wide range of undergraduate/graduate computer science courses: Intro to Computers, Data Structure and Algorithms, Operating Systems, Database Management, Data Communication and Networks, Information Security, Game Programming, and Research Topics.

 Conduct researches on varied security areas: Computer Security, Network Security, and Information Security.

 Advise and mentor undergraduate/graduate students.  Serve on several school and university committees.

 Serve as review/reader/judge/committee member on a variety of conferences and workshops.

2004 - 2005: Post-doctor Research at GW Center for Networks Research  Conduct researches on Wi-Fi and Ad-Hoc networks.

 Create interactive visualization tools for algorithm courses. 2001 - 2004: Research Assistant at George Washington University

(2)

 Analyze Internet traffic.

 Investigate and identify DDoS attacks.

 Design efficient algorithms to defend Flooding-based DDoS attack. 1997 - 2001: Independent Consultant

 Design and implement varied databases and their interfaces for small business.  Design and implement Internet applications for small business.

 Install and maintain networks and servers for small business.

1997 - 2000: Assistant to the Director, Chinese Culture Service Center, Rockville, MD.  Manage and direct general and cultural affairs.

1994 - 1997: Chemical Engineer, TASCO, Taipei, Taiwan  Design and coordinate new procedures.

 Revamp existing procedures.

1991- 1993: Military Service, Army, Taiwan.  Serve as a platoon leader.

EDUCATION

 1999-2004: Doctor of Science (D.Sc.) in Computer Science, the George Washington University, Washington DC.

 1997-1998: Ms. in computer Science, Southeastern University, Washington DC.  1989-1991: Ms. in Applied Chemistry, National Chiao-Tung University, Taiwan.  1985-1989: Bs. in Chemistry, National Sun Yat-Sen University, Taiwan.

CERTIFICATION

(3)

 CISCO Professor Professional Security Development, 2005.

 Information Assurance Capacity Building Program, CyLab, Information Networking Institute, Carnegie Mellon, 2005.

PUBLICATION

 Yen-Hung Hu, “A Study on the Novel Synthesis and Characterization of High-Tc Bismuth-based Superconductors and Some Superconductor/Polymer Composites,” Master Thesis, National Chiao-Tung University, Taiwan, 1991  Teng-Ming Chen and Y. H. Hu, “Preparation and Characterization of Some

Superconductor/Polymer Composites,” Physica C, 185-189 (1991), 481-482  Teng-Ming Chen and Yen-Hung Hu, “Polymeric Precursor Derived High-Tc

Bismuth Superconductors,” Physica C, 190 (1991), 124-125

 Teng-Ming Chen and Y. H. Hu, “Formation and Characterization of a Superconductor/Polymer Composite,” Material Research Bulletin, 27, 4, page 499-505, 1992

 Teng-Ming Chen and Y. H. Hu, “Polymeric Precursors for the Preparation of Bi1.5Pb0.5Sr2Ca2Cu3Ox,” Journal of Solid State Chemistry, 97, 124-130, 1992

 Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, “Packet Filtering for Congestion Control under DoS Attacks,” in Proceeding of IWIA2004, April 8 – 9, 2004, Charlotte, North Caroline

 Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, “Packet Filtering to Defend Flooding-Based DDoS Attacks,” in Proceeding of IEEE Sarnoff 2004, April 26 – 27, 2004, Nassau Inn, Princeton, New Jersey

 Yen-Hung Hu, “Flooding-Based Distributed Denial-of-Service Attack and Window-Based Packet Filtering,” Doctoral Dissertation, Department of Computer Science, the George Washington University, Washington DC, 2004  Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi, “A Large Scale Simulation

Study: Impact of Unresponsive Malicious Flows,” in Proceeding of ICOMP’05, June 27-30, Las Vegas, USA

(4)

 Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi, “A Study of Traffic Survivability Under Malicious Attack,” in Proceeding of 2006 IEEE Sarnoff  Yen-Hung Hu, Robert Willis, Hyeong-Ah Choi, "A Framework For Managing

Emergent Transmissions In IP Networks," in Proceeding of ICOMP'06

 Yen-Hung Hu, "Network Attacks and Countermeasures", in Proceeding of IEEE SoutheastCon 2007, March 21 ~ March 25, Richmond, Virginia

 Yen-Hung Hu, "A Filtering Algorithm for Controlling High Rate Unresponsive Flows", in Proceeding of ICOMP 07, June 25 ~ June 28, Las Vegas, Nevada

 Yen-Hung Hu, "Developing a Framework for Defending Against Network Attacks", in Proceeding of CIC07, June 25 ~ June 28, Las Vegas, Nevada  Yen-Hung Hu, "A Distributed Framework for Defending Against Denial of

Service Attacks", in Proceeding of ICOMP 07, June 25 ~ June 28, Las Vegas, Nevada

 Yen-Hung Hu, "Towards Capturing Representative Attack Patterns", in Proceeding of Virginia Academic of Science (VAS) 2007, Summer 2007, Page 86, Vol 59, No. 2

 Yen-Hung Hu & Robert Willis, "A Framework for Developing Visualization Tools for Learning Cryptography Algorithm", in Proceeding of ADMI 2008, April 3, 2008 - April 6, 2008, Virginia Beach, VA

 Yen-Hung Hu and Jean Muhammad, "Towards the Balance of Computer Science Curriculum", in Proceeding of the 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'08), July 14, 2008 - July 17, 2008, Las Vegas, NV, USA

 Yen-Hung Hu, "Self Similarity and Computer Security", in Proceeding of Virginia Academic of Science (VAS) 2008, Hampton University, Hampton, Virginia

 Yen-Hung Hu and Jean Muhammad, "A Strategy of Integrating Game Programming into Computer Science Curriculum, "in Proceeding of Frontiers in Education: Computer Science and Computer Engineering (FECS'9), July 13-16, 2009, Las Vegas, NV, USA

(5)

PRESENTATION

 “Packet Filtering for Congestion Control under DoS Attacks,” IWIA2004, April 8 – 9, 2004, Charlotte, North Caroline

 “Packet Filtering to Defend Flooding-Based DDoS Attacks,” IEEE Sarnoff 2004, April 26 – 27, 2004, Nassau Inn, Princeton, New Jersey

 “A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows,” ICOMP’05, June 27-30, Las Vegas, USA

 “IACBP Information Assurance and Curriculum Development,” 2005 IACBP Participant Presentation/Curriculum, CMU, PA

 “QoS Assurance For Emergent Messages During Network Congestion,” 2005 IACBP Research Presentation, CMU, PA

 “A Study of Traffic Survivability Under Malicious Attacks”, IEEE Sarnoff 2006, March 26, 2006 - March 28, 2006, Princeton, New Jersey

 “A Framework For Managing Emergent Transmissions In IP Networks,” ICOMP' 06, June 27, 2006 - June 29, 2006, Las Vegas, USA

 "Towards Capturing Representative Attack Patterns", 3rd Annual Information Assurance (Computer Security) Symposium, April ,9, 2007, Hampton University

 "Towards Capturing Representative Attack Patterns", Virginia Academic of Science, May, 23, 2007 - May 26, 2007, James Madison, Harrisonburg, Virginia

 "IACBP: Information Assurance and Curriculum Development", Information Assurance Capacity Building Program, June 14, 2007 - June 15, 2007, San Jose State University, CA

 "A Filtering Algorithm for Controlling High Rate Unresponsive Flows", ICOMP 07, June 25, 2007 - June 28, 2007, Las Vegas, Nevada

 "Developing a Framework for Defending Against Network Attacks", CIC07, June 25, 2007 - June 28, 2007, Las Vegas, Nevada

 "A Distributed Framework for Defending Against Denial of Service", ICOMP 07, June 25, 2007 - June 28, 2007, Las Vegas, Nevada

(6)

 "A Framework for Developing Visualization Tools for Learning Cryptography Algorithm", ADMI 2008, April 3, 2008 - April 6, 2008, Virginia Beach, Virginia

 "Self Similarity and Compute Security", Virginia Academic of Science, 86th Annual Meeting, May 20, 2008 - May 23, 2008, Hampton University, Hampton, Virginia

 "IA Initiative at Hampton University", IACBP at SJSU, June 12-13, San Jose, CA

 "A Penetration Testing Example", 4th Annual Information Assurance (Computer Security) Symposium, Jan. ,21, 2009, Hampton University

 “IA Capacity and Expertise Building”, 2009 RIT SFS Workshop, June 22 – June 25, Rochester Institute of Technology, NY

 "A Strategy of Integrating Game Programming into Computer Science Curriculum,” Frontiers in Education: Computer Science and Computer Engineering (FECS'9), July 13-16, 2009, Las Vegas, NV, USA

GRANT AWARDED

 PI, “Research and Education in Network Security Through Traffic Modeling and Monitoring”, 2006 Hampton University Research Funds, $5000

 Co-PI,”A Cooperative Proposal for Building of Information Security Expertise and Capacity”, NSF DUE-0723794, $249, 917, Oct. 1, 2007 – Sept. 30, 2009, PI: Mr. Robert Willis

 PI, “Education Improvement Program – Integrating an Open Source Platform with Computer Science Curriculum”, Sun Workstation equipment donation, 2009, PD: Dr. Jean Muhammad

GRANT PROPOSAL PARTICIPATED

 Senior Personnel, “A Proposal for the Building of Information Security Expertise and Capacity”, NSF-05-507, Jan. 2005, PI: Robert Willis

(7)

 Senior Personnel, “A Joint Proposal For The Building of Information Security Expertise And Capacity”, NSF-06-507, January 2006, PI: Mr. Robert Willis.  PI, “Research and Education in Network Security Through Traffic Modeling

and Monitoring”, 2006 Hampton University Research Funds, $5000

 PI, “CSR-SMA Designing an Advanced Computer System for Defending Denial of Service Attacks”, NSF, $493106, PI: Yen-Hung Hu, Co-PI: Stephen Providence, Senior Personnel: Robert Willis, 2006

 PI, Modeling and Detecting Denial of Service Attacks, Hampton University Research Funds, $8000, 2007

 Co-PI,” A Cooperative Proposal for Building of Information Security Expertise and Capacity”, DUE-0723794, $249, 917, Oct. 1, 2007 – Sept. 30, 2009, PI: Robert Willis

 Senior Personnel, "DGE - IGERT PREPROPOSALS", NSF 07-540, PI: John Anderson

 PI, "CI-TEAM Demonstration, Secure Cyberinfrastructure, Information Assurance for Cyberinfrastructure, NSF 07-564, 6/1/2008-5/31/2010, $229,559

 PI, White Paper, "Resource Monitoring for Defending Against Malicious Attacks", ONR, 2008, $250,000

 PI, “Modeling and Detecting Denial of Service Attacks”, 2008 Spring Hampton University Research Funds, $6000

 PI, Education Improvement Program – Integrating an Open Source Platform with Computer Science Curriculum, Sun Workstation equipment donation, 2009, PD: Dr. Jean Muhammad

 PI, "II-NEW, Secure Cyberinfrastructure - Enhancing Information Assurance Education and Research Capacity for Historically Black Colleges and Universities", NSF 08-570, $305,960, 2008 Fall

 PI, " AF:Small: Information Assurance For Networking - Activity Monitoring for Defending Against Malicious Attacks", NSF 08-577, $414,409, 2008 Fall  Co-PI, Exploring Integration of Robotics, Games, and Virtual World in CS0

(8)

 PI, Subcontract of NSF MRI-R2: Development Proposal: Ubiquitous Cyber ANalytics (U-CAN), Aug. 2009

 PI, TC:Small: Trustworthy Computing for Cyberinfrastructure – An Integrated Research and Education Program for Hampton University”, NSF 09-558, $375,232, Dec. 2009

 Co-PI, Collaborative Project: A Capacity Building Model for Minority Serving Institutions Supporting Research and Pedagogy, NSF, ($295,823), Feb. 2010, PI: Mr. Robert Willis

 PI: TC:Small: An Integrated IA Research and Education Plan for Hampton University, NSF, ($284,344), Dec. 2010, Co-PI: Mr. Robert Willis

THESIS ADVISORY COMMITTEE

 Spring 2006, Carol A. Armisted, “Online Analytical Processing (OLAP) for More Accurate Predictive Decision Support”

 Fall 2008, Gregory Wilson, "An Adaptive System Administration Decision Support Tool"

 Fall 2009, Carl Arrington, “Improving Software Testing Through Code Parsing”

 Spring 2010, Govindarajan Lalitha, “Using Latent Semantic Analysis And Word Matching To Semantically Identify Elaboration Reading Strategy”  Fall 2010, Philip Donald, “An Iterative Cluster Correction Enhancement For

The Bisecting K-Means Algorithm”

 Fall 2010, Martha Brhane

, “

Using Latent Semantic Analysis And Word Matching To Enhance Bridging Reading Strategy Identification

PROFESSIONAL AFFILIATION

 Association of Computing Machinery (ACM)  Virginia Academic of Science (VAS)

References

Related documents

Due to “locking in” a finance source, if the dealer wished to assign an eContract to another (different) finance source, the eC system required the eContract to be converted into

1) Determine if PAHs associated with CMs deposited with lake sediments are lost to the water column and/or redistribute to more strongly sorbing CMs over time.

quadrant scaling on the remaining three quadrants using OraClix and schedules the patient for follow-up with the dentist..  How do you bill

While the sample used for this study was subset to include only those who taught credit classes and whose principle activity was teaching, it is important to note that public

Approximate journey times from Nine Elms on the South Bank: Heathrow Airport 58 mins (via heathrow Express from Paddington) Gatwick Airport 44 mins (via Gatwick Express from

attainment of those specific goals, first, within the rehabilitation unit, and subsequently, in real life. The VADO approach comprises five components: 1) assessment of 28

(2001) reported that the market reacted more strongly to ERP implementation announcements from large/unhealthy firms (standardized cumulative abnormal returns=0.272), as compared