{"id":833,"date":"2020-07-28T17:03:39","date_gmt":"2020-07-28T21:03:39","guid":{"rendered":"https:\/\/web.uri.edu\/decps\/?page_id=833"},"modified":"2025-07-30T21:17:38","modified_gmt":"2025-07-31T01:17:38","slug":"academia","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/decps\/academia\/","title":{"rendered":"Academia"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><em><strong>Presentations, Posters, &amp; Demos<\/strong><\/em><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\"><ul class=\"display-posts-listing\"><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, &#8220;DefRec: Physical Function Virtualization to Disrupt Reconnaissance of Power Grids,&#8221;\u00a0<em>Network and Distributed System Security (NDSS) Symposium<\/em>, February 25th, 2020.<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, &#8220;Detection and Prevention of Intrusions in Power Systems&#8217; Cyber-Physical Infrastructure,&#8221; invited talks at Link Lab at the University of Virginia, April 10th, 2018.<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, Ravishankar K. Iyer, Zbigniew Kalbarczyk, &#8220;RAINCOAT: Randomization of Network Connectivity in Industrial COnTrol Systems to Mitigate Cyber-Attacks,&#8221; Workshop on Science of Security through Software-Defined Networking (SoSSDN), June 16-17th, 2016 (invited presentation).<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer, &#8220;Safety-critical Cyber-physical Attacks: Analysis, Detection, and Mitigation,&#8221; Symposium and Bootcamp on the Science of Security (HotSos &#8217;16).<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, Adam Slagell, Zbigniew Kalbarczyk, and Ravishankar K. Iyer, &#8220;Specification-based IDS for the DNP3 Protocol,&#8221; 2014 TCIPG Industry Workshop, November 2014 (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Ftcipg.org%2Fsites%2Fdefault%2Ffiles%2Fposters%2Fposter_iw2014_idsfordnp3.pdf&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNFkmGN2m1J4ETwvcaCGs-zdCdbhhg\" target=\"_blank\">Poster<\/a>)<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, &#8220;Specification-Based IDS for the DNP3 Protocol,&#8221; 2014 TCIPG Industry Workshop, November 12-13th, 2014 (One of four selected student presentation) (<a rel=\"noreferrer noopener\" href=\"https:\/\/youtu.be\/J9OMzhbgNjA\" target=\"_blank\">video recording<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Ftcipg.org%2Fsites%2Fdefault%2Ffiles%2Fslides%2F09_tcipg-iw2014_tcipg-featured-activity-idsfordnp3-final.pdf&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGvnqUpt58SFkyi5G5aje1zBqtTsw\" target=\"_blank\">slides<\/a>)<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, Adam Slagell, Zbigniew Kalbarczyk, and Ravishankar K. Iyer, &#8220;Specification-based IDS for the DNP3 Protocol,&#8221; 2013 TCIPG Industry Workshop, November 2013 (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Ftcipg.org%2Fsites%2Fdefault%2Ffiles%2Fposters%2FPoster_IW2013_IDSforDNP3.pdf&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNERinjhfWOeKHgBrT7JM1d5pc_iqQ\" target=\"_blank\">Poster<\/a>)<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, &#8220;Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids,&#8221; presented in the Smart Energy Grid Security Workshop, held in conjunction with ACM CCS, Berlin, Germany, November, 2013<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, &#8220;Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol,&#8221; presented in 8th Cyber Security &amp; Information Intelligence Research Workshop, Oak Ridge National Lab, January 2013.<\/p>\n<\/div><\/li><li class=\"listing-item\"><div class=\"content\">\n<p><strong>Hui Lin<\/strong>, &#8220;Detection of a Man-in-the-middle Attack in SCADA Network,&#8221; 2012 TCIPG Industry Workshop, October 2012 (Selected research demo) (<a rel=\"noreferrer noopener\" href=\"https:\/\/youtu.be\/unb7b8myNvA\" target=\"_blank\">video recording<\/a>)<\/p>\n<\/div><\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><div class=\"embed-responsive embed-responsive-4x3\">\n<!-- iframe plugin v.6.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe width=\"100%\" height src=\"https:\/\/www.youtube.com\/embed\/KOAlC5J3C6E\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" 0=\"allowfullscreen\" scrolling=\"yes\" class=\"iframe-class\"><\/iframe>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\">2020 NDSS<\/p>\n\n\n<div class=\"embed-responsive embed-responsive-4x3\">\n<!-- iframe plugin v.6.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe width=\"100%\" height src=\"https:\/\/www.youtube.com\/embed\/J9OMzhbgNjA\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" 0=\"allowfullscreen\" scrolling=\"yes\" class=\"iframe-class\"><\/iframe>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\">2014 TCIPG<\/p>\n\n\n<div class=\"embed-responsive embed-responsive-4x3\">\n<!-- iframe plugin v.6.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe width=\"100%\" height src=\"https:\/\/www.youtube.com\/embed\/unb7b8myNvA\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" 0=\"allowfullscreen\" scrolling=\"yes\" class=\"iframe-class\"><\/iframe>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\">2012 TCIPG<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Paper Review:<\/h2>\n\n\n\n<p>I have been involved in reviewing publications from the following conferences and journals:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>IEEE Transactions on Smart Grid<\/li><li>the Journal of Modern Power Systems and Clean Energy<\/li><li>Proceedings of the IEEE<\/li><li>IEEE Access<\/li><li>Computers &amp; Security (COSE)<\/li><li>IEEE\/ACM Transactions on Networking<\/li><li>IEEE Internet Computing<\/li><li>IEEE Control Systems Society Conference (CDC 2018)<\/li><li>IEEE PES-Letter<\/li><li>International Workshop on Communication, Computing, and Networking in Cyber-Physical Systems (CCN-CPS 2016, 2017, 2018)<\/li><li>IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012, 2015, 2016, 2018)<\/li><li>Network and Distributed System Security Symposium (NDSS 2014)<\/li><li>IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2015)<\/li><li>IEEE International Conference on Smart Grid Communication (SmartGridComm 2015 and 2018)<\/li><li>IEEE Global Communication Conference (Globecom 2015)<\/li><li>IEEE International on-Line Testing Symposium (IOLTS 2013)<\/li><li>International Conference on Computer Safety, Reliability &amp; Security (SafeComp 2012)<\/li><li>Cyber Security and Information Intelligence Research Workshop (CSIIRW2012)<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Presentations, Posters, &amp; Demos 2020 NDSS 2014 TCIPG 2012 TCIPG Paper Review: I have been involved in reviewing publications from the following conferences and journals: IEEE Transactions on Smart Grid the Journal of Modern Power Systems and Clean Energy Proceedings of the IEEE IEEE Access Computers &amp; Security (COSE) IEEE\/ACM Transactions on Networking IEEE Internet [&hellip;]<\/p>\n","protected":false},"author":3827,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-833","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/users\/3827"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/comments?post=833"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/833\/revisions"}],"predecessor-version":[{"id":1464,"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/pages\/833\/revisions\/1464"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/decps\/wp-json\/wp\/v2\/media?parent=833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}