CV
ACADEMIC EXPERIENCE
- Assistant Professor, King Saud University, KSA (05.2013-Current)
- Research Assistant, Kyung Hee University, Korea (2011-2012)
PROFESSIONAL PREPARATION
Ph.D. & Master in Computer Engineering, Kyung Hee University, Global Campus, South Korea (2008 – 2012) Supervisor: Prof. Eui-Nam Huh
- Thesis: A Three-layered Privacy Preserving Mechanism for Cloud-based Information System
· Course Work Completed with CGPA: CGPA: 4.025/4.30 (92/100)
· First Class Scholarship in KyungHee University (2008-2012)
B.Sc. in Computer Science, HeBei Normal University, HeBei, China (2004-2008), Supervisor: Prof. Zhiwei Wang
· Thesis: A Study on Multicast Tree Generation
· Course Work Completed with CGPA: 4.1/4.30
· First Class Scholarship in HeBei Normal University (2004 – 2008)
RESEARCH INTERESTS
- Information Security, Multimedia Security, Privacy Protection, Biometrics, Security Management, Location based Service, Cloud Computing Security
GRANTS
- "Cryptgraphically Privacy Preserving Mechanism for Cloud-based Healthcare Systems in KSA", Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, $ 425,600, Role: Co-PI.
- “Threat-based Evaluation for Context-aware Multimedia Surveillance System”, Funded by Research Center, $12,000, Role: Co-PI.
- “Remote Display Protocol for Cloud based Video Surveillance System”, Funded by Research Center, $12,000, Role: Co-PI.
PARTICIPATED PROJECTS
- “Terminal Independent Personal Cloud System”. Funded by Korea Evaluation Institute of Industrial Technology (KEIT) Role: Research Team Member (Mar. 2010 – Feb.2014)
- “IP-USN management and security mechanism for dementia silver care system”. Funded by National Research Foundation of Korea. Role: Research Team Member (May. 2009 –Apr.2012)
- “The measurement of service delivery network efficiency using Cloud computing”. Funded by Electronic and Telecommunication Research Institute (ETRI) Role: Research Team Member (Jun 2009 – Nov 2009)
- ULCRC. Support program supervised by the NIPA(National IT Industry Promotion Agency) Role: Research Team Member (Jan.2009 – Jul. 2012)
- “A study on East-West Neo Medical u-life care technology”. Funded by National IT Industry Promotion Agency. Role: Research Team Member (Jan. 2009 – Nov. 2012)
- “3rd party IPTV service delivery using network virtualization”. Funded by National IT Industry Promotion Agency. Role: Research Team Member (Jun 2010 – Nov 2010)
STUDENT ADVISING
Ph.D. Thesis Supervision: 2
M.S. Student Advising: 5(current), 2(completed)
Ph.D Students:
- Anees Ara Ahamed, “An End-End Security Framework for Cyber-Physical Cloud Computing Systems –A secure insight”, on going
- Alia Al-Abdulkarim,on going
Master Students:
- Ibtisam ALdawood, Master Project, “Location-aware Privacy Preserving System with Probability Infusion Model”, ongoing
- Areej Abdu, Master Project, ongoing
- Maha Bakalla, Master Thesis, ongoing
- Miada Murad, Master Thesis, “A Novel CUBE Access Control Model with Constant Ciphertext”, Ongoing
- Mariya Muneeb, Master Thesis, “Multimedia Cloud-based System for Location Privacy”, Ongoing
- Reem Al-Salih, "Privacy in E-Health in Local Health Care Domain." Graduated, 2014
- Maram Al-Shablan, "Secure Multi-owner based Cloud Computing Framework for Big Data." Graduated, 2014
Experience
Ph.D Course:
- CSC619 Selected Topics in Computer Security, in 2015, King Saud University
- CSC696 Independent Research Study1, in 2015, King Saud University
- CSC697 Independent Research Study2, in 2015, King Saud University
Master Course:
- CSC519 Computer Security, in 2013、2014、2015、2016,King Saud University
- CSC520 Internetworking With TCP/IP Environment, in 2013, King Saud University
- Communication Special Lecture, 2012, Kyung Hee University
Bachelor Course:
- CSC220 Computer Organization (two sections), in 2015, King Saud University
- CSC281 Discrete mathematics for Computer Science (Course coordinator, two sections), in 2015, King Saud University
- CSC361 Artificial Intelligence (Course coordinator, two sections), in 2016, King Saud University
PROFESSIONAL SERVICE
- Network and Security Research Group (NetSec), http://netsec.ksu.edu.sa/en
- Conference Technical Programme Committee in IEEE International Symposium on Biometrics & Security Technologies
DEPARTMENTAL SERVICE
- Serving on ABET Committee in 2015
- Serving on TA support Committee in 2013, 2014, 2015
- Serving on Load Committee in 2013, 2014, 2015, 2016
- Serving as the Examination Committee for master thesis defence in 2013, 2014, 2015, 2016
JOURNAL & CONFERENCE REVIEWER
- 2015: Multimedia tools and applications
- 2014: National Symposium on Information Technology: Towards New Smart World 2015
- 2014: Security and Communication Networks
- 2014: ISBAST 2014
- 2014: Multimedia tools and applications
- 2014: International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)
- 2013: Journal of King Saud University
- 2013: Journal of Sensors
- 2013: Security and Communication Networks
- 2013: Multimedia tools and applications
- 2012: ETRI Journal, Korea
- 2012: KSII Transactions on Internet and Information System, South Korea
- 2011: International Conference on Computational Science and Its Application (ICCSA), LNCS
- 2011: 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2011), ACM
PUBLICATIONS
- Yinghua Lv, Tinghuai Ma, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan An efficient and scalable density-based clustering algorithm for datasets with complex structures, Neurocomputing, Neurocomputing,171: 9-22, 2016 [ISI-Indexed]
- Wei Tian, Tinghuai Ma, Yuhui Zheng, Xin Wang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Weighted Curvature-Preserving PDE Image Filtering Method, Computers & Mathematics with Applications, 70(6), 1336–1344, 2015 [ISI-Indexed]
- Tinghuai MA, Jinjuan ZHOU, Meili TANG, Yuan TIAN, Abdullah AL-DHELAAN, MZNAH AL-RODHAAN, and SUNGYOUNG LEE, “Social network and tag sources based augmenting collaborative recommender system”, IEICE transaction on Information and Systems, Vol.E98-D,No.4,pp.-,Apr. 2015 [ISI-Indexed]
- Tinghuai Ma, Chuanxin Jing , Rongtao Hou, Meili Tang, Jie Cao, Yuan Tian, Chi-square statistics feature selection based on term frequency and distribution for text categorization, IETE J RES, , 2015 [ISI-Indexed]
- Tinghuai Ma, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan,and Mznah Al-Rodhaan. Detect structural-connected communities based on BSCHEF in C-DBLP, Concurrency Computat.: Pract. Exper. (2014). [ISI-Indexed]
- Tinghuai Ma, Lu Li, Sai Ji, Xin Wang, Yuan Tian, Abdullah Al-Dhelaan , Mznah Al-Rodhaan, Optimized Laplacian Image Sharpening Algorithm Based on Graphic Processing Unit, Physica A: Statistical Mechanics and its Applications 20 (2014) 1–12, Volume 416, 15 December 2014, Pages 400–410. [ISI-Indexed]
- Shuiming Zhong, Yu Xue, Yunhao Jiang, Yuanfeng Jin, Jing Yang, Ping Yang, Yuan Tian, and Mznah Al-Rodhaan, A Sensitivity-Based Improving Learning Algorithm for Madaline Rule II, Mathematical Problems in Engineering, Volume 2014, Article ID 219679, 8 pages. [ISI-Indexed]
- Biao Song, Mohammad Mehedi Hassan, Atif Alamri, Abdulhameed Alelaiwi, Yuan Tian, Mukaddim Pathan, Ahmad Almogren, A two-stage approach for task and resource management in multimedia cloud environment, Computing, springer, 6/4/2014. [ISI-Indexed]
- Yuan Tian, Biao Song, M.M.Hassan, and Eui-Nam Huh, “An Efficient Privacy Preserving Pub-Sub System for Ubiquitous Computing”, International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 12, issue 1, Jan.2013, pp. 23-33. [ISI-Indexed]
- Yuan Tian, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh, The Distributed Pub-Sub System with Privacy Protection in Smart Home Environments, Information Journal, 2013, vol.16, no.1, pp.663-667. [ISI-Indexed]
- Yuan Tian, Biao Song, M.Mehedi.Hassan, Eui-Nam Huh, A Privacy-aware Graph-based Access Control System for the Healthcare Domain, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 20121029, vol.6, no.10, pp.2708-2730. [ISI-Indexed]
- Yuan Tian, Biao Song, and Eui-Nam Huh: “A Novel Threat Evaluation Method for privacy-aware system in RFID”. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 8, No.4, (2011):230-240. [ISI-Indexed]
- Maram AL-Shablan, Yuan Tian, Mznah Al-Rodhaan, Secure Multi-owner Based Cloud Computing Scheme for Big Data, International Journal of Big Data Intelligence, in press, 2015
- Anees Ara, Mznah Al-Rodhaan,Yuan Tian, Abdullah Al-Dhelaan, King Saud University, Saudi Arabia, "A Secure Service Provisioning Framework for Cyber Physical Cloud Computing Systems",International journal of Distributed and Parallel Systems (IJDPS), Jan.2015 Vol.6, No.1.
- Yuliang Zhang, Tinghuai Ma, Jie Cao, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, K-anonymization of Social Network by Vertex and Edge Modification, International Journal of Embedded Systems, accepted, Nov. 2014.
- Yuan Tian, Biao Song, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Eui-Nam Huh: Threat-based evaluation for context-aware multimedia surveillance system. ICUIMC 2014: 48.
- Biao Song, Yuan Tian and Bingyin Zhou, Design and Evaluation of Remote Video Surveillance System on Private Cloud, IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia.
- Yuan Tian, Mznah Al Rodhaan, Abdullah Al Dhelaan, Biao Song and Ma Tinghuai, Somewhat Homomorphic Cryptography for Matrix Multiplication using GPU Acceleration, IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia.
- Yuan Tian, Biao Song, Eui-Nam Huh, Location Privacy Pre-protection through Markov Chain for Wireless Sensor Networks, Proceeding of the International Conference on Advanced IT, Engineering and Management for Industrial Technology, KR, 2012, pp.99-100.
- Yuan Tian, Biao Song, Eui-Nam Huh, A Privacy-preserving Protocol to Improve the Quality of Location-based Services, Proceeding of the Third International Conference Ubiquitous Computing and Multimedia Applications, 2012, pp.48-53.
- Nguyen Doan Man, Jun-Young Park, Sang-Ho Na, Tian Yuan and Eui-Nam Huh, Attack Strategies Construction and Exchange Model in a Collaborative Cloud Computing Environment, Proceeding of the International Conference on Advanced IT, Engineering and Management for Industrial Technology, KR, 2012, pp.103-104.
- Yuan Tian, Biao Song, and Eui-Nam Huh, “Towards a Secure Personal Cloud Computing for Mobile Thin-Clients”, E-Letter of Multimedia Communications Technical Committee (MMTC), IEEE Communications Society, pp.49-53, 2011.
- Yuan Tian, Biao Song, Eui-Nam Huh, Towards the Development of Personal Cloud Computing for Mobile Thin-Clients, Proceeding of the International Conference on Information Science and Applications, KR, 2011, pp.1-5.
- Yuan Tian, Biao Song and Eui-Nam Huh, “A Flexible Cost-based Privacy-aware Data Integration System in Cloud”, FutureTech 2011, Communications in Computer and Information Science, 2011, Springer, Volume 185, Part 5, pp.387-396.
- Yuan Tian, Biao Song and Eui-nam Huh: “A Parameterized Privacy-Aware Pub-sub System in Smart Work”, FGIT : Future Generation Information Technology 2011 -FGCN (2) 2011, pp.204-214.
- Yuan Tian, Biao Song, Eui-Nam Huh: “Dynamic content-based cloud data integration system with privacy and cost concern”. 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2011), pp. 193-199.
- Yuan Tian, Biao Song, Jun Young Park, and Eui-Nam Huh, “Inter-cloud Data Integration System Considering Privacy and Cost”, Lecture Notes in Computer Science, 2010, Volume 6421/2010, pp.195-204.
- Yuan Tian, Biao Song and Eui-Nam Huh, “A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments”, Communications in Computer and Information Science, 2009, Volume 58, pp.193-200.
- Yuan Tian, Biao Song, Eui-Nam Huh, “Relationship Based Privacy Management for Ubiquitous Society”, Lecture Notes in Computer Science, ICCSA(2009), Volume 5592/2009, pp.853-867.
- Yuan Tian, Biao Song and Eui-Nam Huh, “A threat-based privacy preservation system in untrusted environment”. ICHIT 2009, Vol. 321ACM (2009), pp.102-107.
- Yuan Tian, Biao Song, Eui-Nam Huh, “A Purpose-based Privacy-aware System using Privacy Data Graph”, The 7th International Conference on Advances in Mobile Computing & Multimedia (MoMM2009-iiWAS), pp.412-416.
- Yuan Tian, Biao Song, Eui-Nam Huh, “A Novel Graph-Based Privacy Policy Management System, Management and Service Science”, 2009. MASS '09.International Conference, pp.1-4.
- Biao Song, Mohammad Mehedi Hassan, Yuan Tian and Eui-Nam Huh. “A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing”. In Proceedings of the International Conference on Grid and Distributed Computing (GDC), part of the Future Generation Information Technology Conference (FGIT),vol. 63, pp.57-64, Jeju Island, Korea, 2009.