Yanzhi Ren is currently pursuing Ph.D studies in Electrical and Computer Enginnering under the supervision of Professor Yingying Chen from Stevens Institute of Technology. He received his Master's Degree in University of Electronic and Science of Technology of China, in 2008.
Research News, Media Coverage and Awards
· Smart Healthcare Leveraging Mobile Phones. (Research News: , , , , , .)
o Presented a fine-grained sleep monitoring system which is capable of detecting the breathing rate by leveraging smartphones. Our system exploits the readily available smartphone earphone placed close to the user to reliably capture the human breathing sound.
o Developed a user verification scheme leveraging gait patterns derived from acceleration readings in a smart phone enabled mobile healthcare system to detect any user spoofing attacks that may be launched to disrupt the normal operations of such system.
o Investigated the feasibility and effectiveness of using human contact traces collected from mobile phones to derive social community information to control the disease propagation rate in the healthcare domain.
o Developed a social closeness based method in a smart phone enabled mobile healthcare system to detect any clone attacks that may be launched to disrupt the normal operations of such system.
o Proposed and evaluated a distributed community detection approach that allows individual users to detect their own communities based on local observations.
o Proposed a light-weight search approach that supports efficient multi-keyword ranked search in cloud computing system.
o Derived a fuzzy keyword search scheme to address the problem of multi-keyword search over encrypted cloud data by establishing a variety of privacy requirements.
o Developed a flexible while efficient encryption and decryption scheme for cloud computing: the encryption of data is only related to the number of predefined attributes of users and only the users with the predefined attribute set can decrypt the data.
· Intrusion Detection in Delay-Tolerant Networks (DTNs)
o Studied the problem of wormhole attack and black hole attack in DTNs.
o Proposed a mutual correlation detection scheme (MUTON) for addressing the black hole attack.
o Derived a method to secure the history records of packet delivery information so that other nodes can detect black hole attacks by analyzing these packet delivery records.
o Proposed a detection mechanism that exploits the existence of a forbidden topology in the network to detect the presence of the wormhole attack.
Yanzhi Ren, Yingying Chen,Mooi Choo Chuah, Jie Yang，"User Verification Leveraging Gait Recognition For Smartphone Enabled Mobile Healthcare Systems," IEEE Transactions on Mobile Computing (IEEE TMC), 2014. (To appear)
Yanzhi Ren, Jie Yang, Mooi Choo Chuah, and Yingying Chen, "Social Community Extraction for Disease Propagation Control Leveraging Mobile Phones," Ad Hoc & Sensor Wireless Networks (AHSWN), 2013.
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, "Detecting Wormhole Attacks in Delay Tolerant Networks", in IEEE Wireless Communications Magazine (IEEE WCM), special issue on Security & Privacy, vol.17, no.5, pp.36-42, October 2010.
Jie Yang, Yanzhi Ren, Yingying Chen and Mooi Choo Chuah, "A Social Community Based Approach for Reducing the Propagation of Infectious Diseases in Healthcare ", ACM SIGMOBILE Mobile Computing and Communications Review (ACM MC2R), 2010.
Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen, Fine-grained Sleep Monitoring: Hearing Your Breathing with Smartphones, in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM 2015),Hong Kong, China, April 2015.
Yanzhi Ren, Chen Wang, Yingying Chen, Jie Yang, Hearing Your Breathing: Fine-grained Sleep Monitoring Using Smartphones, in Proceedings of ACM Conference on Mobile Computing and Networking (ACM MobiCom), Poster Session, 2014.
Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie, Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing, in Proceedings of the IEEE Global Communications Conference (IEEE Globecom 2014), Austin, Texas, 2014.
Shubham Jain, Carlo Borgiattino, Yanzhi Ren, Marco Gruteser, Yingying Chen, ”On the Limits of Positioning-based Pedestrian Risk Awareness”, in Proceedings of Workshop on Mobile Augmented Reality and Robotic Technology-based Systems (MARS) at Mobisys, 2014.
Yanzhi Ren, Yingying Chen,Mooi Choo Chuah, Jie Yang，"Smartphone Based User Verification Leveraging Gait Recognition For Mobile Healthcare Systems," in Proceedings of the Tenth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 2013).
Yanzhi Ren, Yingying Chen,Mooi Choo Chuah，"Social Closeness Based Clone Attack Detection for Mobile Healthcare System," in Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS), 2012.
Yanzhi Ren, Jie Yang, Mooi Choo Chuah, Yingying Chen,"Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare," in Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS), concise paper,Valencia, Spain, 2011.
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen,"Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching," in Proceedings of the IEEE Global Communications Conference 2009 Wireless Networking Symposium (IEEE Globecom), Houston, Texas, 2011.
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, "MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks," in IEEE WCNC, Sydney, Australia, April 2010.
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, “Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording,” in Proceedings of the First International Workshop on Data Security and PrivAcy in wireless Networks (IEEE D-SPAN), held in conjunction with WoWMoM, page(s): 1 – 6, Montreal, QC, Canada, June 2010.
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen, “Discovering Wormhole Attacks in Delay Tolerant Networks via Forbidden Topology Structure Identification,” ACM Conference on Wireless Network Security (WiSec), Poster Session, Hoboken, NJ, March 2010.
Teaching Assistant in Department of ECE, Stevens Institute of Technology
Microprocessor (CPE 390, Undergraduate Level) – Summer 2013, Fall 2013, Spring 2014, Summer 2014, Fall 2014
Awards and Honors