• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Profiles
  • Home
  • /Profiles

Yuhong Liu

2022–2024 Distinguished Visitor

Featured ImageFeatured Image

Yuhong Liu, Associate Professor at Department of Computer Engineering Santa Clara University, received her B.S. and M.S. degree from Beijing University of Posts and Telecommunications in 2004 and 2007 respectively, and the Ph.D. degree from University of Rhode Island in 2012. She is the recipient of the 2019 Researcher of the Year Award at School of Engineering, Santa Clara University, and the 2013 University of Rhode Island Graduate School Excellence in Doctoral Research Award. Her research interests include trustworthy computing and cyber security of emerging applications, such as Internet-of-things, blockchain and online social media. She has published over 60 papers on prestigious journals and peer reviewed conferences. Her papers have been selected as the best paper at the IEEE International Conference on Social Computing 2010 (acceptance rate = 13%) and the 9th International Conference on Ubi-Media Computing (UMEDIA 2016). She is actively contributing to professional societies including IEEE and Asia-Pacific Signal and Information Processing Association (APSIPA). She has contributed as an organizing committee member for over 10 international conferences and a TPC member for over 20 conferences. She is currently serving as the IEEE Computer Society Region 6 Area 4 coordinator, a member of the IEEE Computer Society Technical Meeting Request Committee, a member of the Multimedia Security and Forensics (MSF) TC for APSIPA, and an APSIPA Distinguished Lecturer (2021-2022).

Email: yhliu@scu.edu

DVP term expires December 2024


Presentations

Facilitating Security and Trust among Multiple Parties through Blockchain Techniques

A blockchain consists of a list of blocks that are linked based on cryptography hash and maintained by distributed network nodes, so that the information recorded in these blocks is non-repudiated. After its first conceptualization by Nakamoto in 2008, blockchain has attracted broad attention and been considered as a promising solution to establish a decentralized architecture with security. In this talk, we will discuss some key characteristics of blockchain and a few promising applications of blockchain that can facilitate security and trust among multiple parties. Some examples include applying blockchain to secure software updates for resource-constrained IoT networks; designing a secure and efficient multi-signature scheme to facilitate multi-party approval process on Fabric, an enterprise blockchain platform; and facilitating fair trading of digital-goods via a blockchain based proxy re-encryption scheme.

Trust and Privacy Vulnerabilities of Today's Online Social Networks

As we move further into the big data era, people are motivated in numerous ways to proactively generate, share and exchange diverse digital contents online every day. While the increasing amount of information greatly facilitates people’s decision makings, it also brings great challenges. For example, driven by the huge profits behind the big data economy, malicious attacks are emerging rapidly to mislead normal users’ decision-making process by providing carefully crafted false information. In addition, retrieving tremendous amount of user private information has become a popular attack target. This talk will discuss the security, trust and privacy issues in online social networks, the trend and challenges, particularly focusing on several sample attacks.

Recent Volunteer Positions

Presentations

Facilitating Security and Trust among Multiple Parties through Blockchain Techniques

Trust and Privacy Vulnerabilities of Today’s Online Social Networks

Read the abstracts for each of these presentations

LATEST NEWS
The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators
The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators
Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization
Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization
The Road Ahead: Preparing for 2030’s Digital Oil & Gas
The Road Ahead: Preparing for 2030’s Digital Oil & Gas
Celebrating Innovation at TechX Florida 2025
Celebrating Innovation at TechX Florida 2025
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Read Next

The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators

Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization

The Road Ahead: Preparing for 2030’s Digital Oil & Gas

Celebrating Innovation at TechX Florida 2025

Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team

Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families

From Legacy to Cloud-Native: Engineering for Reliability at Scale

Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter