Post Job Free
Sign in

Technical Support System

Location:
Ruston, LA, 71270
Posted:
December 16, 2014

Contact this candidate

Resume:

Zibo Wang

318-***-**** *****.***@*****.*** **** Benton St. Apt. B, Ruston, LA 71270

EDUCATION

Ph.D. Degree in Computer Science, Feb 2015 Louisiana Tech University

MS. Degree in Mathematics and Statistics, Feb 2015

MS. Degree in Computer Science, August 2012

B.Eng. Degree in Automation, July 2008 Dalian University of Technology

SKILLS AND STRENGTH

Strong skills and experiences on data mining and machine learning. Great knowledge on algorithms and

schemes in data mining and machines learning. Familiar with related tools, such as SAS, Matlab, R, Excel,

and SQL database. Have work on data as big as hundreds of gigabytes.

Great programming skills:

- Over 10 years of programming experience in C++ and Java.

- Great skill and experience on programming MatLab, SAS, R, SQL.

- Familiar with PHP, Python, Hadoop.

- Great skill in algorithm based programming.

Great work ethic. Can work both individually and within a team.

WORK EXPERIENCE

Louisiana Tech University Ruston, LA

September 2009 – Present

Graduate Research Assistant

Participated in two DARPA-funded projects on active authentication:

1. To improve performance of continuous keystroke verification systems, we designed and developed a “scan-

based” authentication system, to authenticate user identity based on segments of 1 to 5 minutes scans of

continuous biometric data. Using keystroke typing data collected and analyzed from over 400 subjects, we

tested 5 state-of-the-art verification algorithms and fusion techniques in keystroke verification, and evaluated

the “scan-based” authentication system, seeing an improved accuracy over regular mechanisms.

2. We designed and developed a real-time biometric authentication system based on sensors on smartphones,

including touch sensor, accelerometer, and gyroscope. The goal of building such system is to provide a

continuous background user verification on Android smartphones. We combined three biometric modalities in

this system: 1) touch screen swiping (based on touch sensor), 2) touch screen typing (based on touch sensor

and keyboard application), and 3) body movement (based on accelerometer and gyroscope). Our system is

able to verify smart phone user identity continuously based on one or several user modalities. The system was

well tuned to provide better performance, using outlier filtering, feature selection, bootstrapping and so on.

The average error rate of the system was lower than 5%.

Additionally, we designed and developed a robotic attack against smartphones. We wanted to show how a

traditional touch stroke verification system (i.e. based on touch sensor) could be easily broken by a robot.

Two robot models were used: a LEGO EV-3 robot, and a NAO robot. The LEGO EV-3 robot was assembled

with LEGO pieces to build an arm, with a stylus attached as a finger. The finger was programed to move in

three dimensions with three motors. The NAO robot, which was a humanoid robot, could hold stylus on one

hand and a smartphone on the other hand, and was programed to swipe on the touch screen with the stylus.

Both robot was shown to well mimic a human’s swiping pattern, and had 40%-50% rate to break a touch

stroke verification system.

1

The authentication system on smartphones and the robotic attack were demoed in a DARPA meeting, and

received great feedback.

For my Ph.D. thesis, I analyzed user templates evolution in behavior biometric, specifically, in keystroke

dynamics, to evaluate how users’ keystroke behavior changes over time, and how these changes affect the

performance of a keystroke verification system. Results of the analysis indicates that over 40% percent of

keystroke templates changes significantly after a year, and the error rate of a keystroke verification system

increases between 200% and 350%. These results provides solid evidence that template updating mechanism

is needed.

With the previous evidence, I designed and developed an adversary template drifting against template

updating mechanisms. Such adversary attack submits a list of well-tuned biometric samples to stealthily

create fake updates to a victim template, and force the template drifting towards a target template which was

selected by the attacker. The attack was shown to increase system error rate for between 200% and 600%, and

change over 40% of well-performed users to ill-performed users.

To further investigate the dangerous of such attack, I tested the attack in various scenarios to analyze how the

attack perform against defensive mechanism and how defensive mechanism limits the benefit reaped from

template updating.

We build a bench mark test for touch stroke verification on smartphones, to fill gaps of previous testing

mechanisms (i.e. missing outlier filtering, or feature selection). We tested and analyzed 11 state-of-the-art

authentication algorithms on touch stroke verification, with data collected from over 200 subjects, and ranked

these algorithms were ranked based on their error rates.

Lecturer/Teaching Assistant September 2012 - November 2013

Lectured data mining and machine learning to classes of 30-40 senior undergraduate students or graduate

students of computer science program.

Assisted in the teaching and grading for artificial intelligence classes for senior undergraduate students and

graduate students of computer science program.

Technical Support July 2014 - Present

Provided technical support for the college which entailed carrying out system and software upgrades and

maintaining and repairing them as well.

September 2009 – June 2010

Committee, Chinese Students and Scholars Association (CSSA)

Organized activities for Chinese Students and Scholars. Applied and managed funds from the Chinese

Embassy and sponsors. Helped and encouraged new Chinese students for their life in the new country.

PUBLICATIONS

Which Verifiers Work?: A Benchmark Evaluation of Touch-based Authentication Algorithms. In The IEEE Sixth

International Conference on Biometrics: Theory, Applications and Systems (BTAS 2013), 2013.

Scan-Based Evaluation of Continuous Keystroke Authentication Systems. IT Professional, vol.15, no.4, pp.20,23,

July-Aug. 2013

Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks. In The IEEE Fifth

International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), 2012. (One of the four

best reviewed papers)

2



Contact this candidate