DAN (Linda) LIN - web.mst.eduweb.mst.edu/~lindan/cv_danlin.pdf · \Leveraging Content Sensitiveness...

13
DAN (Linda) LIN Associate Professor, St. Clair Fellow Associate Chair for Graduate Studies & External Affairs Director of Cybersecurity Laboratory Missouri University of Science and Technology Phone :(765) 337-6112 Email: [email protected] http://web.mst.edu/lindan Research Interests My current research includes cloud security, big data processing, location privacy, se- curity and privacy issues in social networking, security and privacy issues in mobile applications, routing and security issues in Vehicular Ad-hoc Networks (VANETs). Achievement Highlights Secured nearly $6M funding and my share is close to $3M More than 80 publications including 28 journals (h-index=29, citations=2953) Graduated 2 PhD students and 4 MS thesis students Currently advising 6 PhD students and 3 MS thesis students Missouri S&T Woman of the Year Award, Faculty Research Award, Outstanding Achievement Award Associate Editor of IEEE TDSC journal Program director of NSA/NSF GenCyber Teacher Camp in 2015, 2016 and 2017 Education National University of Singapore Computer Science Ph.D 2007 PhD Advisor: Prof. Beng Chin Ooi Fudan University, Shanghai, China Computer Science B.S. 2002 Professional Experience Missouri University of Science and Technology, Rolla, MO, USA Associate Chair for Graduate Studies, Computer Science Jan. 2018 - now Associate Professor, Computer Science Sep. 2015 - now Director of Cybersecurity Laboratory Jun. 2015 - now Assistant Professor, Computer Science Aug. 2008 - Aug. 2015 Purdue University, West Lafayette, USA Post Doctoral Research Associate, Computer Science Nov 2006 - Jul. 2008 Advisor: Prof. Elisa Bertino 1

Transcript of DAN (Linda) LIN - web.mst.eduweb.mst.edu/~lindan/cv_danlin.pdf · \Leveraging Content Sensitiveness...

DAN (Linda) LIN

Associate Professor, St. Clair FellowAssociate Chair for Graduate Studies & External AffairsDirector of Cybersecurity LaboratoryMissouri University of Science and TechnologyPhone :(765) 337-6112Email: [email protected]://web.mst.edu/∼lindan

Research Interests

My current research includes cloud security, big data processing, location privacy, se-curity and privacy issues in social networking, security and privacy issues in mobileapplications, routing and security issues in Vehicular Ad-hoc Networks (VANETs).

Achievement Highlights• Secured nearly $6M funding and my share is close to $3M• More than 80 publications including 28 journals (h-index=29, citations=2953)• Graduated 2 PhD students and 4 MS thesis students• Currently advising 6 PhD students and 3 MS thesis students• Missouri S&T Woman of the Year Award, Faculty Research Award, OutstandingAchievement Award• Associate Editor of IEEE TDSC journal• Program director of NSA/NSF GenCyber Teacher Camp in 2015, 2016 and 2017

Education

National University of Singapore Computer Science Ph.D 2007PhD Advisor: Prof. Beng Chin Ooi

Fudan University, Shanghai, China Computer Science B.S. 2002

Professional Experience

Missouri University of Science and Technology, Rolla, MO, USA

• Associate Chair for Graduate Studies, Computer Science Jan. 2018 - now

• Associate Professor, Computer Science Sep. 2015 - now

• Director of Cybersecurity Laboratory Jun. 2015 - now

• Assistant Professor, Computer Science Aug. 2008 - Aug. 2015

Purdue University, West Lafayette, USA

• Post Doctoral Research Associate, Computer Science Nov 2006 - Jul. 2008Advisor: Prof. Elisa Bertino

1

Research Funding(Total: $5,874,626, Shared credit: $2,768,415)

External Grants

1. PI, “Inspire Next Generation of Cyber Stars”, National Security Agency (NSA),04/15/2018–04/14/2019, $100,000. (Shared credit: 60%)

2. PI, “iPrivacy: Automatic Recommendation of Personalized Privacy Settings forImage Sharing ”, National Science Foundation (NSF), 09/1/2016–08/31/2019,$315,000. (Missouri S&T is the lead institution, Shared credit: $159,924)

3. Co-PI, “Building a Privacy-Preserving Social Networking Platform from a Techno-logical and Sociological Perspective”, National Science Foundation (NSF), 09/1/2016–08/31/2019, $682,219. (Missouri S&T is the lead institution, Shared credit: $143,486)

4. PI, “Promoting Cybersecurity and Inspiring Next Generation Cyber Warriors”,National Security Agency (NSA), 04/12/2017–04/11/2018, $100,000. (Sharedcredit: 60%)

5. PI, “MASTER: Missouri Advanced Security Training, Education and Research”,National Science Foundation (NSF), 08/15/2014–07/31/2020, $3,319,494. (Sharedcredit: 60%)

6. PI, “GenCyber: Security Camp for K-12 Teachers”, National Security Agency(NSA), 05/1/2016–04/30/2017, $100,000. (Shared credit: 60%)

7. Co-PI, “Research and Training Experience for Undergraduates in the area of SecureCloud Computing”, National Science Foundation (NSF), 03/01/2015–02/28/2018,$360,000. (shared credit: 20%)

8. PI, “Brokerage Services for the Next Generation Cloud”, National Science Foun-dation (NSF), 09/01/2012–08/31/2014, $285,565. (Missouri S&T is the lead insti-tution, Shared credit: $140,335)

9. PI, National Science Foundation (NSF), REU supplement, 09/01/2013–08/31/2014,$14,400. (Shared credit: 100%)

10. Co-PI, “A Doctoral Program in Security and Privacy in Mobile Social NetworkSpace”, US Department of Education (DOE), 08/16/2012–08/15/2017, $544,420.(Shared credit: 16%)

11. Co-PI, “Peer to Peer Infrastructure Security, National Security Agency (NSA),09/11/2013–09/10/2014, $2,669. (Shared credit: 10%)

Internal Grants

12. Dan Lin, Daniel St. Clair Faculty Fellow Award, Department of Computer Science,Missouri University of Science and Technology, 07/31/2015-06/30/2017, $10,000.(Shared credit: 100%)

13. Dan Lin (PI), “Efficient Processing of Keyword Search in Spatial Databases”,University of Missouri Research Board, 02/2012- 01/2013, $12,000. (Shared credit:100%)

2

14. Dan Lin (PI), “Preserving Location Privacy in Pervasive Environments”, Uni-versity of Missouri Research Board, 06/2009- 05/2010, $29,200. (Shared credit:100%)

Publications (h-index=29, citations=2953)(Students that I advised or co-advised are marked by *)

Refereed Journals

1. Jian Kang*, Dan Lin, Wei Jiang, Elisa Bertino, “Highly Efficient RandomizedAuthentication in VANETs”, Pervasive and Mobile Computing, 2018.

2. Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, Jianping Fan,“Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing”, IEEE Transactions on Infor-mation Forensics & Security, 2018.

3. Dan Lin, Nicholas Hilbert*, Christian Storer, Wei Jiang, Jianping Fan, “UFace:Your Universal Password That No One Can See”, Computers & Security, 2017.

4. Jingwei Li, Adam Bowers*, Dan Lin, Peng Jiang, Wei Jiang, “PAS: Policy-basedAssistance in Sensor Networks”, Computing, 2017.

5. Jianping Fan, Zhenzhong Kuang, Baopeng Zhang, Jun Yu, Dan Lin, “iPrivacy:Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-TaskLearning”, IEEE Transactions on Information Forensics and Security, 2016.

6. Dan Lin, Anna Cinzia Squicciarini, Venkata Nagarjuna Dondapati*, Smitha Sun-dareswaran*, “A Cloud Brokerage Architecture for Efficient Cloud Service Selec-tion”, IEEE Transactions on Services Computing (TSC), 2016.

7. Dan Lin, Jian Kang*, Anna Squicciarini, Yingjie Wu, Sashi Gurung*, and OzanTonguz, “MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Com-munication in VANETs”, IEEE Transactions on Mobile Computing (TMC), 2016.

8. Jingwei Li*, Dan Lin, Anna Squicciarini, Jin Li and Chunfu Jia, “Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds”, IEEE Transactions on CloudComputing (TCC), 2016.

9. Jingwei Li*, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Chunfu Jia,“MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection”,IEEE Transactions on Dependable and Secure Computing (TDSC), 2016.

10. Sushama Karumanchi*, Anna Squicciarini, and Dan Lin, “Attribute-Based Ac-cess Control in Vehicular Ad-hoc Networks”, Telecommunication Systems Journal,Springer, 2015.

11. Tao Jiang, Bing Zhang, Dan Lin, Yunjun Gao and Qing Li, “Incremental eval-uation of top-k combinatorial metric skyline query”, Knowledge-Based Systems,volume 74, pages 89-105, 2015.

3

12. Anna Squicciarini, Dan Lin, Smitha Sundareswaran*, and Josh Wede, “PrivacyPolicy Inference of User-Uploaded Images on Content Sharing Sites”, IEEE Trans-actions on Knowledge and Data Engineering (TKDE), Volumn PP, Issue 99, Pages1, April, 2015.

13. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Continuous Predictive LineQueries for On-the-go Traffic Estimation”, Transactions on Large-Scale Data andKnowledge-Centered Systems, Springer, 2015.

14. Sashi Gurung*, Dan Lin, Wei Jiang, Ali Hurson, and Rui Zhang, “Traffic Infor-mation Publication with Privacy Preservation”, ACM Transactions on IntelligentSystems and Technology (TIST), Volume 5 Issue 3, September 2014.

15. Tao Jiang, Yunjun Gao, Bin Zhang, Dan Lin, and Qing Li, “Monochromatic andBichromatic Mutual Skyline Queries”, Expert Systems with Applications, Pages1885–1900, 2014. (Impact Factor = 2.981)

16. Anna Squicciarini, Sushama Karumanchi*, Dan Lin, and Nicole Desisto, “Iden-tifying Hidden Social Circles for Advanced Privacy Configuration”, Volume 41,Pages 40–51, Computers & Security journal, Pages 40–51, 2014.

17. Dan Lin, Prathima Rao*, Rodolfo Ferrini, Elisa Bertino, and Jorge Lobo, “A Simi-larity Measure for Comparing XACML Policies”, IEEE Transactions on Knowledgeand Data Engineering (TKDE), volume 25(9), pages 1946-1959, 2013.

18. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Predictive Line Queries forTraffic Forecasting”, Transactions on Large-Scale Data and Knowledge-CenteredSystems, Volume 6, Pages 106-133, 2012.

19. Anna Squicciarini, Smitha Sundareswaran*, and Dan Lin, “Ensuring DistributedAccountability for Data Sharing in the Cloud”, IEEE Transactions on Dependableand Secure Computing (TDSC), Volume 9(4), pages 556-568, 2012.

20. Rui Zhang, Jiangzhong Qi*, Dan Lin, Wei Wang, and Raymond Wong, “A HighlyOptimized Algorithm for Continuous Intersection Join Queries over Moving Ob-jects”, The VLDB Journal, Volume 21(4), pages 561-586, 2012.

21. Prathima Rao*, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo “Fine-GrainedIntegration of Access Control Policies”, Computers & Security, Volume 30, Issues2C3, Pages 91–107, March, 2011.

22. Alex Hindle, Jie Shao, Dan Lin, Jiaheng Lu, and Rui Zhang. “Clustering WebVideo Search Results based on Integration of Multiple Features”. World WideWeb Journal (WWWJ), Volume 14, Number 1, pages: 53-73, 2011.

23. Dan Lin, Prathima Rao*, Elisa Bertino, Ninghui Li, and Jorge Lobo, “EXAM- A Comprehensive Environment for the Analysis of Access Control Policies”,International Journal of Information Security, Volume 9, Issue 4, August 2010.

24. Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar, “Location Privacyin Moving-Object Environments”, Transactions on Data Privacy, Volume 2 Issue1, April 2009.

4

25. Elisa Bertino, Carolyn Brodie, Seraphin Calo, Lorrie Cranor, Clare-Marie Karat,John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni*, Prathima Rao*, andXiping Wang, “Analysis of Privacy and Security Policies”, IBM journal, Volume53, Issue 2, pages: 3:1–3:18, March, 2009.

26. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Continuous Clustering of Mov-ing Objects”, IEEE Transactions on Knowledge and Data Engineering (TKDE),(19)9:1161-1174, 2007.

27. Dan Lin, Rui Zhang, and Aoying Zhou, “Indexing Fast Moving Objects for KNNQueries Based on Nearest Landmarks”, GeoInformatica, (10)4:423-445, 2006.

28. Bin Cui, Dan Lin, and Kian-Lee Tan, “IMPACT: A Twin-index Framework for Ef-ficient Moving Object Query Processing”, Data & Knowledge Engineering (DKE),(59)1:63-85, 2006.

Refereed Conferences

29. Jian Kang*, Yousef Elmehdwi and Dan Lin, “SLIM: Secure and Lightweight Iden-tity Management in VANETs with Minimum Infrastructure Reliance”, 13th In-ternational Conference on Security and Privacy in Communication Networks (Se-cureComm), 2017.

30. Anna Squicciarini, Andrea Novelli, Dan Lin, Haoti Zhong, and Cornelia Caragea“From Tag to Protect: A Tag-Driven Policy Recommender System for Image Shar-ing”, Privacy, Security and Trust (PST), 2017.

31. Zhenzhong Kuang, Zongmin Li, Dan Lin, Jianping Fan, “Automatic Privacy Pre-diction to Accelerate Social Image Sharing”. IEEE International Conference onMultimedia Big Data (BigMM), 2017.

32. Katrina Ward*, Dan Lin and Sanjay Madria, “MELT: Mapreduce-based EfficientLarge-scale Trajectory Anonymization”, 29th International Conference on Scien-tific and Statistical Database Management (SSDBM), 2017.

33. Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, Jianping Fan, “Privacy Setting Rec-ommendation for Image Sharing”, 16th IEEE International Conference on MachineLearning and Applications (ICMLA), 2017.

34. Douglas Steiert*, Dan Lin, Quincy Conduff, Wei Jiang, “A Location-Privacy Ap-proach for Continuous Queries” (Poster), 22th ACM symposium on access controlmodels and technologies (SACMAT), 2017.

35. Adam Bowers*, Dan Lin, Anna Squicciarini, Ali Hurson, “Real-time Detection ofIllegal File Transfers in the Cloud” (Poster), IEEE International Conference onDistributed Computing Systems (ICDCS), 2017.

36. Wei Jiang, Dan Lin, Feng Li*, Elisa Bertino, “No One Can Track You: RandomizedAuthentication in Vehicular Ad-hoc Networks”, IEEE International Conference onPervasive Computing and Communications (PerCom), 2017.

5

37. Cong Liao*, Anna Squicciarini, Dan Lin, “LAST-HDFS: Location-Aware StorageTechnique for Hadoop Distributed File System”, IEEE International Conferenceon Cloud Computing (CLOUD), (acceptance rate=16.7%), 2016.

38. Douglas McGeehan*, Dan Lin, Sanjay Madria, “ChitChat: An Effective MessageDelivery Method in Sparse Pocket-Switched Networks”, 36th IEEE InternationalConference on Distributed Computing Systems (ICDCS), 2016.

39. Lasanthi Heendaliya*, Michael Wisely*, Dan Lin, Sahra Sedigh, and Ali Hurson,“Influence-aware Predictive Density Queries Under Road-network Constraints”,14th International Symposium on Spatial and Temporal Databases (SSTD), 2015.

40. Jingwei Li*, Anna Squicciarini, Dan Lin, Shuang Liang, and Chunfu Jia, “SecLoc:Securing Location-Sensitive Storage in the Cloud”, In Proceedings of 20th ACMsymposium on access control models and technologies (SACMAT), 2015.

41. Anna Squicciarini, Dan Lin, Smitha Sundareswaran*, and Jingwei Li*, “PolicyDriven Node Selection in MapReduce”, 10th International Conference on Securityand Privacy in Communication Networks (SecureComm), 2014.

42. Jingwei Li*, Dan Lin, Anna Squicciarini, and Chunfu Jia, “STRE: Privacy-PreservingStorage and Retrieval over Multiple Clouds”, 10th International Conference on Se-curity and Privacy in Communication Networks (SecureComm), 2014.

43. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Continuous Predictive LineQueries under Road-network Constraints”, In Proceedings of the 24th Interna-tional Conference on Database and Expert Systems Applications (DEXA), pages228–242, 2013.

44. Sashi Gurung*, Dan Lin, Anna Squicciarini, and Elisa Bertino, “Information-oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks”, the 7th Inter-national Conference on Network and System Security (NSS), pages 94–108, 2013.

45. Anna Squicciarini, Sushama Karumanchi*, Dan Lin, and Nicole Desisto, “Auto-matic Social Group Organization and Privacy Management”, the 8th IEEE Inter-national Conference on Collaborative Computing: Networking, Applications andWorksharing (CollaborateCom), pages 89–96, 2012.

46. Sushama Karumanchi*, Anna Squicciarini, and Dan Lin, “Selective and Confi-dential Message Exchange in Vehicular Ad Hoc Networks”, The 6th InternationalConference on Network and System Security (NSS), pages 445–461, 2012.

47. Arej Muhammed*, Dan Lin, and Anna Squicciarini, “Location Privacy Policy Man-agement System”, The 14th International Conference on Information and Com-munications Security (ICICS), pages 427–434, 2012.

48. Sashi Gurung*, Dan Lin, Anna Squicciarini, and Ozan Tonguz, “A Moving ZoneBased Architecture for Message Dissemination in VANETs”, The 8th InternationalConference on Network and Service Management (CNSM), pages: 184-188, 2012.

49. Smitha Sundareswaran*, Anna Squicciarini, and Dan Lin, “A Brokerage-BasedApproach for Cloud Service Selection”, In Proceedings of IEEE International Con-ference on Cloud Computing, pages 558–565, 2012.

6

50. Jianzhong Qi*, Rui Zhang, Lars Kulik, Dan Lin, and Yuan Xue, “The Min-distLocation Selection Query”, International Conference on Data Engineering (ICDE),pages 366-377, 2012.

51. Dan Lin, Christian S. Jensen, Rui Zhang, Lu Xiao, and Jiaheng Lu, “A Moving-Object Index for Efficient Query Processing with Peer-Wise Location Privacy”,International Conference on Very Large Data Bases (VLDB), pages 37-48, Sep,2012.

52. Lasanthi Heendaliya*, Dan Lin, and Ali Hurson, “Optimizing Predictive Querieson Moving Objects under Road-network Constraints”, In Proceedings of the 22ndInternational Conference on Database and Expert Systems Applications (DEXA),pages 247–261, 2011.

53. Smitha Sundareswaran*, Anna Squicciarini, Dan Lin, and Shuo Huang, “Promot-ing Distributed Accountability in the Cloud”, In Proceedings of IEEE InternationalConference on Cloud Computing, pages 113–120, 2011.

54. Anna Squicciarini, Dan Lin, and Alessandro Mancarella, “PAIM: Peer-based Au-tomobile Identity Management in Vehicular Ad-hoc Network”, In Proceedings ofthe 35th IEEE Computer Software and Applications Conference (COMPSAC),pages 263–272, 2011.

55. Anna Squicciarini, Smitha Sundareswaran*, Dan Lin, and Josh Wede, “A3P:Adaptive Policy Prediction for Shared Images on Content Sharing Sites”(bestpaper award), In Proceedings of 22nd ACM Conference on Hypertext and Hy-permedia, pages 261–270, 2011.

56. Anna Squicciarini, Smitha Sundareswaran*, and Dan Lin, “Preventing Informa-tion Leakage from Indexing in the Cloud”, In Proceedings of IEEE InternationalConference on Cloud Computing, pages 188–195, 2010.

57. Dan Lin and Anna Squicciarini, “Data Protection Models for Service Provisioningin the Cloud”, In Proceedings of ACM symposium on access control models andtechnologies (SACMAT), pages 183–192, 2010.

58. Dan Lin, Sashi Gurung*, Wei Jiang, and Ali Hurson, “Privacy-Preserving LocationPublishing under Road-Network Constraints”, In Proceedings of 15th InternationalConference on Database Systems for Advanced Applications (DASFAA), pages 17–31, 2010.

59. Chenyun Dai*, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, andBhavani Thuraisingham, “Query Processing Techniques for Compliance with DataConfidence Policies”, In Proceedings of the 6th VLDB Workshop on Secure DataManagement, pages 49–67, 2009.

60. Prathima Rao*, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo, “An Alge-bra for Fine-Grained Integration of XACML Policies”, In Proceedings of ACMsymposium on access control models and technologies (SACMAT), pages 63–72,2009.

7

61. Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao*, JorgeLobo, and Dan Lin, “Access Control Policy Combining: Theory Meets Practice”,In Proceedings of ACM symposium on access control models and technologies(SACMAT), pages 135–144, 2009.

62. Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar, “Position Transfor-mation: A Location Privacy Protection Method for Moving Objects”, In Proceed-ings of ACM GIS Workshop on Security and Privacy, pages 62–71, 2008.

63. Su Chen, Christain S. Jensen, and Dan Lin, “A Benchmark for Evaluating MovingObject Indexes”, In Proceedings of International Conference on Very Large DataBases (VLDB), volume 1, number 2, pages: 1574–1585, 2008.

64. Chenyun Dai*, Dan Lin, Elisa Bertino, and Murat Kantarcioglu, “An Approachto Evaluate Data Trustworthiness Based on Data Provenance”, In Proceedings ofVLDB Workshop on Secure Data Management (SDM), pages 82-98, 2008.

65. Dan Lin, Prathima Rao*, Elisa Bertino, Ninghui Li, and Jorge Lobo, “PolicyDecomposition for Collaborative Access Control”, In Proceedings of ACM Sym-posium on Access Control Models and Technologies (SACMAT), pages 103–112,2008.

66. Prathima Rao*, Dan Lin, Elisa Bertino, Jorge Lobo, and Ninghui Li, “EXAM- AComprehensive Environment for XACML Policy Analysis and Management”(Demo),In Proceedings of IEEE Workshop on Policies for Distributed Systems and Net-works, pages 238–240, 2008.

67. Lorenzo D. Martino, Qun Ni*, Dan Lin, and Elisa Bertino, “Multi-domain andPrivacy-aware Role Based Access Control in eHealth”, In Proceedings of the In-ternational Conference on Pervasive Computing Technologies for Healthcare, pages131–134, 2008.

68. Rui Zhang, Dan Lin, Ramamohanarao Kotagiri, and Elisa Bertino, “ContinuousIntersection Joins Over Moving Objects”, In proceedings of the International Con-ference on Data Engineering (ICDE), pages 863–872, 2008.

69. Qun Ni*, Dan Lin, Elisa Bertino, and Jorge Lobo, “Conditional Privacy-AwareRole Based Access Control”, In Proceedings of European Symposium on ResearchIn Computer Security (ESORICS), pages 72–89, 2007.

70. Dan Lin, Hicham G. Elmongui, Elisa Bertino, and Beng Chin Ooi, “Data Man-agement in RFID Applications”, In Proceedings of International Conference onDatabase and Expert Systems Applications (DEXA), pages 434–444, 2007.

71. Dan Lin, Prathima Rao*, Elisa Bertino, and Jorge Lobo, “An Approach to Evalu-ate Policy Similarity”, In Proceedings of ACM symposium on access control modelsand technologies (SACMAT), pages 1–10, 2007.

72. Prathima Rao*, Dan Lin, and Elisa Bertino, “ XACML Function Annotations”(beststudent position paper), In Proceedings of the 8th IEEE Workshop on Policies forDistributed Systems and Networks, pages 178–182, 2007.

8

73. Dan Lin, Bin Cui, and Dongqing Yang, “Optimizing Moving Queries Over MovingObject Data Streams”, In Proceedings of the International Conference on DatabaseSystems for Advanced Applications (DASFAA), pages 600–611, 2007.

74. Beng Chin Ooi, Zhiyong Huang, Dan Lin, Hua Lu, and Linhao Xu, “Adapting Re-lational Database Engine to Accommodate Moving Objects”(Demo), In proceed-ings of the International Conference on Data Engineering (ICDE), page 1505-1506,2007.

75. Christian S. Jensen, Dan Lin, Beng Chin Ooi, and Rui Zhang, “Effective DensityQueries on Continuously Moving Objects”, In Proceedings of the InternationalConference on Data Engineering (ICDE), article 71, 2006.

76. Dan Lin, Christian S. Jensen, Beng Chin Ooi, and Simonas Saltenis, “EfficientIndexing of the Historical, Present, and Future Positions of Moving Objects”, InProceedings of the International Conference on Mobile Data Management (MDM),pages 59–66, 2005.

77. Bin Cui, Dan Lin, and Kian-Lee Tan, “Towards Optimal Utilization of Main Mem-ory for Moving Object Indexing”, In Proceedings of the International Conferenceon Database Systems for Advanced Applications (DASFAA), pages 600-611, 2005.

78. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Query and Update EfficientB+-Tree Based Indexing of Moving Objects”, In Proceedings of the InternationalConference on Very Large Data Bases (VLDB), pages 768–779, 2004.

79. Bo Huang, Zhiyong Huang, Hongga Li, Dan Lin, Hua Lu and Yaxiao Song, “ITQS:An Integrated Transport Query System”(Demo), In Proceedings of the ACM SIG-MOD International Conference on Management of Data (SIGMOD), pages 951–952, 2004.

Book Chapter

80. Lasanthi Heendaliya*, Michael Wisely*, Dan Lin, Sarah Sedigh Sarvestani, and AliHurson “Indexing and Querying Techniques for Moving Objects in Both EuclideanSpace and Road Network”, Advance in Computers, Volume 102, Chapter 4, Pages111–169, 2016.

81. Elisa Bertino, Chenyun Dai*, Hsu-Sang Lim, and Dan Lin, ”High-Assurance In-tegrity Techniques for Databases”, British National Conference on Database (BN-COD) by Springer in the Lecture Notes in Computer Science (LNCS) series, Vol-ume: 5071 LNCS, Pages 244–256, 2008.

82. Elisa Bertino, Dan Lin, and Wei Jiang, “A Survey of Quantification of PrivacyPreserving Data Mining Algorithms”, in Privacy-Preserving Data Mining (Modelsand Algorithms), Charu C. Aggarwaland Philip S. Yu (Eds.), Springer-Verlag,Pages 183–205, 2008.

83. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Indexing of Moving Objects”,in Encyclopedia of Geographic Information Science, Shashi Shekha and Hui Xiong(Eds.), Springer-Verlag, pages 512–518, 2008.

9

84. Christian S. Jensen, Dan Lin, and Beng Chin Ooi, “Maximum Update Intervalin Moving Objects Databases”, Encyclopedia of Geographic Information Science,page 651, 2008.

Courses Taught

1. CS2300 Introduction to Database Systems

2. CS3300 Advanced Database Systems

3. CS6303 Pervasive Computing

4. CS6304 Cloud Computing and Big Data Analysis

Department and University Services

• Member of the hiring committee for Dean for Graduate Study, 2018.

• Member of the hiring committee for Associate Dean for Research, 2018.

• Member of Faculty Research Award committee from 2016

• Member of Woman of the Year committee from 2016

• Member of personnel committee in the university from 2016 to 2018

• Member of honorary degree committee in the university 2014

• Member of Student Scholastic Appeals committee 2013

• Member of Peer Teaching Evaluation committee since Spring 2014

• Diversity Committee Chair in the Department since Spring 2011

• Member of Strategic Committee in the Department between Fall 2008 and Fall2013

• Member of Faculty Hiring Committee in the Department in 2011, 2014 and 2015,2018.

• Founder and Faculty advisor of IEEE-CS student chapter from Fall 2009 to Fall2013

• Faculty advisor of ACM-W (Women in Computing) student chapter from Fall 2009to Fall 2014

• Organize workshops for University EYH (Expand Your Horizon) program everyyear since 2009

Professional Activities

• NSF panelist, 2011, 2014, 2015, 2016.

• Program Co-Chair, ACM Symposium on Access Control Models and Technologies(SACMAT), 2018.

• Program committee member, ACM SIGMOD Conference, 2018.

• Associate Editor, IEEE Transactions on Dependable and Secure Computing (TDSC),since 2017.

10

• Poster Co-Chair, ACM Symposium on Access Control Models and Technologies(SACMAT), 2017.

• Program committee member, Emerging Advances in Technology & Applications(EATA) symposium, 2018

• Program committee member, The 3rd International Conference on Big Data Com-puting and Communications (BigCom), 2017.

• Program committee member, The Fifth International Workshop on Security inCloud Computing, AsiaCCS-SCC, 2017.

• Program committee member, IEEE International Conference on Collaboration andInternet Computing (CIC), 2015,2016,2017,2018.

• Program committee member, International Conference on Distributed ComputingSystems (ICDCS), 2017.

• Program committee member, International Conference on Information Science andApplications (ICISA), 2017.

• Program committee member, International Conference on Cloud Computing, GRIDs,and Virtualization (CLOUD COMPUTING), 2017.

• Program committee member, International Conference on Information Science andSecurity (ICISS), 2016.

• Program committee member, International Conference on Web Information Sys-tem Engineering (WISE), 2016, 2017, 2018.

• Program committee member, The International Workshop on Security in CloudComputing (SCC), 2016.

• Program committee member, International Conference on Smart Systems, Devicesand Technologies (SMART), 2012, 2013, 2014, 2016, 2017.

• Program committee member, International symposium on spatial and temporaldatabases (SSTD), 2013, 2015.

• Program committee member, IEEE International Conference on Mobile Data Man-agement (MDM), 2015.

• Program committee member, IEEE International Conference on Cloud Engineer-ing, 2015.

• Program committee member, IEEE Computer Software and Applications Confer-ence (COMPSAC), 2014,2015, 2017, 2018.

• Program committee member, IEEE International Conference on Engineering (ICDE),2013, 2014.

• Program Committee member, International Conference on Very Large Data Bases(VLDB), 2008, 2014.

• Program committee member, The Second International Conference on Data Ana-lytics, 2013.

11

• Program committee member, the 4th International Workshop on Security andPrivacy in Cloud Computing, 2013

• Track co-chair, The 37th IEEE Computer Software and Applications Conference(COMPSAC), 2013.

• Program committee member, International Workshop on Collaborative Social Com-puting, 2012.

• Editorial committee, Journal of Information Processing, 2012.

• International Liaison Co-Chair, The 12th IEEE/IPSJ Symposium on Applications& the Internet (SAINT), 2012.

• Poster program committee member, International World Wide Web Conference(WWW), 2011, 2012.

• Program committee member, International Conference on Collaborative Comput-ing: Networking, Applications and Worksharing (CollaborateCom), 2008, 2009,2011, 2012, 2013, 2014, 2015.

• Program committee member, IEEE Consumer Communications and NetworkingConference (CCNC), 2011.

• Program committee member, International Congress on Computer Applicationsand Computational Science (CACS), 2011.

• Fast Abstract Chair, The 35th IEEE Computer Software and Applications Con-ference (COMPSAC), 2011.

• Program committee member, The 11th Privacy Enhancing Technologies Sympo-sium (PETSE), 2011.

• Program committee member, IEEE International Conference on Data Engineering,2010.

• Proceeding co-chair, International Conference on Mobile Data Management, 2010.

• Program Committee member, International Conference on Database System forAdvanced Applications (DASFAA), 2010.

• Program committee member, ACM GIS Workshop on Security and Privacy in GISand LBS (SPRINGL), 2008 and 2009.

• Workshop and Tutorial Vice Chair, Joint iTrust and PST Conferences on Privacy,Trust Management and Security(IFIPTM), 2008.

• Program Committee member, International Conference on Database System forAdvanced Applications (DASFAA), 2007.

• Journal Reviewer, Data & Knowledge Engineering (DKE), since 2009.

• Journal Reviewer, ACM Transactions on Database Systems (TODS), since 2009.

• Journal Reviewer, Information Systems, since 2008.

• Journal Reviewer, The International Journal on Very Large Data Bases (VLDBjournal), since 2006.

12

• Journal Reviewer, IEEE Transactions on Knowledge and Data Engineering (TKDE),since 2004.

Honors and Awards

• Faculty Research Award, Missouri S&T, 2015.

• Daniel St. Clair Faculty Fellow Award, Missouri S&T, 2015.

• Woman of the Year, Missouri S&T, 2015.

• Outstanding Achievement Award, Missouri S&T, 2014.

• St. Louis Section of IEEE Certificate of Appreciation, 2011, 2012.

• Ted Nelson Newcomer award (best paper award) at the 22nd ACM Conference onHypertext and Hypermedia, 2011.

• IEEE St. Louis Section Outstanding Branch Counselor, 2009, 2010.

• Grace Hopper Scholarship, 2006.

• President Graduate Fellowship, National University of Singapore, 2004, 2005, 2006.

• Dean’s Graduate Award, National University of Singapore, 2004.

• iDA Fellowship, National University of Singapore, 2003/2004.

13