Data Security

  • Cloud data security

  • Secure multi-party computation

  • Differential privacy

  • Database encryption

System Security

  • Formal verification

  • Operating system security

  • Hardware-software security co-design

  • RISC-V security

Network Security

  • Encrypted traffic analysis

  • Web security

  • Routing security

  • Attack detection and tracing

IoT Security

  • Trusted perception

  • IoT Security

  • Biometric authentication

  • Side-channel security

AI Security

  • Algorithm and model security

  • Adversarial examples attack

  • Provable security

Blockchain Security

  • Smart contracts analysis

  • Consensus algorithm design

  • Digital currencies attack tracing

  • E-wallet security

  • Blockchain supervision