• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Profiles
  • Home
  • /Profiles

Yuhong Liu

2022–2024 Distinguished Visitor

Featured ImageFeatured Image

Yuhong Liu, Associate Professor at Department of Computer Engineering Santa Clara University, received her B.S. and M.S. degree from Beijing University of Posts and Telecommunications in 2004 and 2007 respectively, and the Ph.D. degree from University of Rhode Island in 2012. She is the recipient of the 2019 Researcher of the Year Award at School of Engineering, Santa Clara University, and the 2013 University of Rhode Island Graduate School Excellence in Doctoral Research Award. Her research interests include trustworthy computing and cyber security of emerging applications, such as Internet-of-things, blockchain and online social media. She has published over 60 papers on prestigious journals and peer reviewed conferences. Her papers have been selected as the best paper at the IEEE International Conference on Social Computing 2010 (acceptance rate = 13%) and the 9th International Conference on Ubi-Media Computing (UMEDIA 2016). She is actively contributing to professional societies including IEEE and Asia-Pacific Signal and Information Processing Association (APSIPA). She has contributed as an organizing committee member for over 10 international conferences and a TPC member for over 20 conferences. She is currently serving as the IEEE Computer Society Region 6 Area 4 coordinator, a member of the IEEE Computer Society Technical Meeting Request Committee, a member of the Multimedia Security and Forensics (MSF) TC for APSIPA, and an APSIPA Distinguished Lecturer (2021-2022).

Email: yhliu@scu.edu

DVP term expires December 2024


Presentations

Facilitating Security and Trust among Multiple Parties through Blockchain Techniques

A blockchain consists of a list of blocks that are linked based on cryptography hash and maintained by distributed network nodes, so that the information recorded in these blocks is non-repudiated. After its first conceptualization by Nakamoto in 2008, blockchain has attracted broad attention and been considered as a promising solution to establish a decentralized architecture with security. In this talk, we will discuss some key characteristics of blockchain and a few promising applications of blockchain that can facilitate security and trust among multiple parties. Some examples include applying blockchain to secure software updates for resource-constrained IoT networks; designing a secure and efficient multi-signature scheme to facilitate multi-party approval process on Fabric, an enterprise blockchain platform; and facilitating fair trading of digital-goods via a blockchain based proxy re-encryption scheme.

Trust and Privacy Vulnerabilities of Today's Online Social Networks

As we move further into the big data era, people are motivated in numerous ways to proactively generate, share and exchange diverse digital contents online every day. While the increasing amount of information greatly facilitates people’s decision makings, it also brings great challenges. For example, driven by the huge profits behind the big data economy, malicious attacks are emerging rapidly to mislead normal users’ decision-making process by providing carefully crafted false information. In addition, retrieving tremendous amount of user private information has become a popular attack target. This talk will discuss the security, trust and privacy issues in online social networks, the trend and challenges, particularly focusing on several sample attacks.

LATEST NEWS
How to Evaluate LLMs and GenAI Workflows Holistically
How to Evaluate LLMs and GenAI Workflows Holistically
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
Read Next

How to Evaluate LLMs and GenAI Workflows Holistically

The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent

Exploring the Elegance and Applications of Complexity and Learning in Computer Science

IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award

IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol

Celebrate IEEE Day 2025 with the IEEE Computer Society

Building Community Through Technology: Sardar Patel Institute of Technology (SPIT) Student Chapter Report

IEEE CS and ACM Announce Recipients of 2025 George Michael Memorial HPC Fellowship

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter