Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2 
publications
GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
Published in IEEE SNPD 2019
Kai Fan, Chaoyu Zhang, Ruiwen Shan, Hexuan Yu and Hai Jiang.
Recommended citation: Kai Fan, Chaoyu Zhang, Ruiwen Shan, Hexuan Yu and Hai Jiang. "GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption." IEEE SNPD 2019.
Optimization of GPU Kernels for Sparse Matrix Computations in Hypre
Published in SC 2019
Chaoyu Zhang, Ruipeng Li, Hai Jiang. Poster.
Recommended citation: Chaoyu Zhang, Ruipeng Li, Hai Jiang. "Optimization of GPU Kernels for Sparse Matrix Computations in Hypre." SC 2019 (Poster).
High-Performance and Energy-Efficient FPGA-GPU-CPU Heterogeneous System Implementation
Published in PDPTA 2020
Chaoyu Zhang, Hexuan Yu, Yuchen Zhou, Hai Jiang.
Recommended citation: Chaoyu Zhang, Hexuan Yu, Yuchen Zhou, Hai Jiang. "High-Performance and Energy-Efficient FPGA-GPU-CPU Heterogeneous System Implementation." PDPTA 2020.
A FPGA-based Heterogeneous Implementation of NTRUEncrypt
Published in PDPTA 2020
Hexuan Yu, Chaoyu Zhang, Hai Jiang.
Recommended citation: Hexuan Yu, Chaoyu Zhang, Hai Jiang. "A FPGA-based Heterogeneous Implementation of NTRUEncrypt." PDPTA 2020.
Efficient parallel implementations of sparse triangular solves for GPU architectures
Published in SIAM PP 2020
Ruipeng Li, Chaoyu Zhang.
Recommended citation: Ruipeng Li, Chaoyu Zhang. "Efficient parallel implementations of sparse triangular solves for GPU architectures." SIAM PP 2020.
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Published in ESORICS 2023
Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou, Wenjing Lou.
Recommended citation: Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou, Wenjing Lou. "Bijack: Breaking Bitcoin Network with TCP Vulnerabilities." ESORICS 2023.
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection
Published in IEEE MILCOM 2023
Chaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, Y. Thomas Hou.
Recommended citation: Chaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, Y. Thomas Hou. "MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection." IEEE MILCOM 2023.
ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Published in IEEE CNS 2024
Heng Jin, Chaoyu Zhang, Shanghao Shi, Thomas Hou, Wenjing Lou. Best Paper Award, CNS 2024.
Recommended citation: Heng Jin, Chaoyu Zhang, Shanghao Shi, Thomas Hou, Wenjing Lou. "ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models." IEEE CNS 2024.
Hermes: Boosting the Performance of Machine-Learning-based Intrusion Detection System through Geometric Feature Learning
Published in ACM MobiHoc 2024
Chaoyu Zhang, Shanghao Shi, Ning Wang, Xiangxiang Xu, Shaoyu Li, L. Zheng, R. Marchany, M. Gardner, Wenjing Lou, Y. Thomas Hou.
Recommended citation: Chaoyu Zhang, Shanghao Shi, Ning Wang, Xiangxiang Xu, Shaoyu Li, L. Zheng, R. Marchany, M. Gardner, Wenjing Lou, Y. Thomas Hou. "Hermes: Boosting the Performance of Machine-Learning-based Intrusion Detection System through Geometric Feature Learning." ACM MobiHoc 2024.
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction
Published in NDSS 2025
Shanghao Shi, Ning Wang, Y. Xiao, Chaoyu Zhang, Y. Shi, Y. Thomas Hou, Wenjing Lou.
Recommended citation: Shanghao Shi, Ning Wang, Y. Xiao, Chaoyu Zhang, Y. Shi, Y. Thomas Hou, Wenjing Lou. "Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction." NDSS 2025.
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
Published in IEEE TDSC
Ning Wang, Chaoyu Zhang, Y. Xiao, Y. Chen, Wenjing Lou, Y. Thomas Hou.
Recommended citation: Ning Wang, Chaoyu Zhang, Y. Xiao, Y. Chen, Wenjing Lou, Y. Thomas Hou. "FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations." IEEE TDSC.
MedLeak: Harvesting Multimodal Medical Data in Secure Federated Learning with Crafted Models
Published in IEEE/ACM CHASE 2025
Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius Linguraru, Chaoyu Zhang, Y. Thomas Hou, Syed Anwar, and Wenjing Lou.
Recommended citation: Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius Linguraru, Chaoyu Zhang, Y. Thomas Hou, Syed Anwar, and Wenjing Lou. "MedLeak: Harvesting Multimodal Medical Data in Secure Federated Learning with Crafted Models." IEEE/ACM CHASE 2025.
StarCast: Securing Multicast Communications in LEO Satellite Networks
Published in IEEE DySPAN 2025
Chaoyu Zhang, Hexuan Yu, Shanghao Shi, Shaoyu Li, Yi Shi, Eric Burger, Y. Thomas Hou, Wenjing Lou.
Recommended citation: Chaoyu Zhang, Hexuan Yu, Shanghao Shi, Shaoyu Li, Yi Shi, Eric Burger, Y. Thomas Hou, Wenjing Lou. "StarCast: Securing Multicast Communications in LEO Satellite Networks." IEEE DySPAN 2025.
Enabling Trustworthy Federated Learning via Remote Attestation for Mitigating Byzantine Threats
Published in IEEE MILCOM 2025
Chaoyu Zhang, Heng Jin, Shanghao Shi, Hexuan Yu, Sydney Johns, Y. Thomas Hou, Wenjing Lou.
Recommended citation: Chaoyu Zhang, Heng Jin, Shanghao Shi, Hexuan Yu, Sydney Johns, Y. Thomas Hou, Wenjing Lou. "Enabling Trustworthy Federated Learning via Remote Attestation for Mitigating Byzantine Threats." IEEE MILCOM 2025.
AnonyCall: Enabling Native Private Calling in Mobile Networks
Published in NDSS 2026
Hexuan Yu, Chaoyu Zhang, Yang Xiao, Angelos D. Keromytis, Y. Thomas Hou, Wenjing Lou.
Recommended citation: Hexuan Yu, Chaoyu Zhang, Yang Xiao, Angelos D. Keromytis, Y. Thomas Hou, Wenjing Lou. "AnonyCall: Enabling Native Private Calling in Mobile Networks." NDSS 2026.
Machine Learning-Based Intrusion Detection Systems: Capabilities, Methodologies, and Open Research Challenges
Published in AI for Cybersecurity: Research and Practice (IEEE Press-Wiley)
Chaoyu Zhang, Ning Wang, Y. Thomas Hou, Wenjing Lou.
Recommended citation: Chaoyu Zhang, Ning Wang, Y. Thomas Hou, Wenjing Lou. "Machine Learning-Based Intrusion Detection Systems: Capabilities, Methodologies, and Open Research Challenges." In AI for Cybersecurity: Research and Practice. IEEE Press-Wiley, 2025. [PDF]
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
CS 6253 Heterogeneous Computing
Graduate course, Arkansas State University, Computer Science, 2020
Graduate Teaching Assistant for Heterogeneous Computing.
CS5560 Fundamentals of Information Security
Graduate course, Virginia Tech, Computer Science, 2023
Graduate Teaching Assistant for Fundamentals of Information Security.