Liang Hong

Professor

Dr. Liang Hong is a professor in the Department of Electrical and Computer Engineering at Tennessee 福利影院最新网址. He received his Ph.D. degree in Electrical Engineering with concentrations in Wireless Communications and Signal Processing from University of Missouri-Columbia in 2002. He was a Research Associate at Siemens Corporate Research, Princeton, New Jersey from February 2003 to July 2003. Since August 2003, he has been with the Department of Electrical and Computer Engineering at Tennessee 福利影院最新网址.

EDUCATION
EXPERIENCE
RESEARCH
PUBLICATIONS
GUIDED THESES AND DISSERTATION
AWARDS/FELLOWSHIPS/SCHOLARSHIPS/SERVICES

Hong

Office: 214听E Torrence Hall
Phone :
615-963-5364
Fax: 615-963-2165
Email
: lhong@tnstate.edu

EDUCATION
Ph.D. Electrical Engineering, University of Missouri-Columbia (MU), USA, 2002.
M.S.听 Electrical Engineering, Southeast University (SEU), China, 1997.
B.S. 听听Electrical Engineering, Southeast University, China, 1994

EXPERIENCES
Professor: (2014-present) Electrical and Computer Engineering, Tennessee 福利影院最新网址.
Associate Professor: (2008-2014) Electrical and Computer Engineering, Tennessee 福利影院最新网址.
Assistant Professor: (2003-2008) Electrical and Computer Engineering, Tennessee 福利影院最新网址.
Visiting Assistant Professor: (2006) Electrical Engineering and Computer Science, Vanderbilt University.
Research Associate, Siemens Corporate Research, Princeton, NJ, February 2003 - July 2003.
Research Intern, Siemens Corporate Research, Princeton, NJ, May 2001 - November 2001.
Hardware Engineer, ZTE Corporate Shanghai R & D Institute, China, June 1997 - July 1998

RESEARCH

  • Principal Investigator (PI), 鈥淓mbedded System Security Education,鈥 US Office of Naval Research, 2015-2018, $599,800.
  • Co-PI, 鈥淒efense and Countermeasures of Jamming Attacks in Wireless Mesh Networks,鈥 US Navy Naval Engineering Education Consortium (NEEC) Program, 2016-2018, $290,000.
  • Graduate student, Md Monzurul Alam, received 1st Place Award for his research work presented in Tennessee 福利影院最新网址-Wide Symposium, Apr. 2014.
  • PI, 鈥淯nfettered and reliable communication in congested spectrum environments,鈥 US Air Force Research Laboratory Research Collaboration Program (RCP), 2013-2018, $310,000.
  • Co-PI (PI: Dr. L. Keel), 鈥淎 new protocol for distributed control of wireless control network via cloud computing,鈥 Department of Defense (DoD) Research and Education Program for Historically Black Colleges and Universities and Minority-Serving Institutions (HBCU/MI) Program, 2013-2016, $628,556.
  • PI, 鈥淐ommunication paradigms for cooperative nanonetworks,鈥 US Air Force Research Laboratory Minority Leadership Program (MLP), 2013, $75,000.
  • Undergraduate student, Cornel Zlibut, received 2nd Place Award for his research work presented in Tennessee Academy of Science Centennial Meeting, Nov. 2012.
  • Co-PI (PI: Dr. S. Shetty), 鈥淰ertical integration of concepts and laboratory experiences in biometrics across the four year electrical and computer engineering curriculum,鈥 funded by the NSF TUES program (award: 1122344, 2011-2015).
  • Co-PI (PI: Dr. Z. Wu), 鈥滺igh efficient streaming of police in-car video over unreliable wireless networks,鈥 National Science Foundation (NSF) Small Business Innovation Research and Small Business Technology Transfer (SBIR/STTR) Program, 2006 - 2007, $105,000.
  • Patent: R. Balan, J. Rosca, L. Hong, V. Hamacher and E. Fischer, 鈥淪ystem and method for adaptive multi-sensor arrays,鈥 7,218,741, 2007.

PUBLICATIONS

  1. L. Almutairi, S. Shetty, L. Hong, 鈥淪ecurity analysis of multiple SDN controllers based on stochastic Petri nets,鈥 to appear in Proc. 2019 Spring Simulation Conference (SpringSim 19), Tucson, AZ, Apr. 29-May 2, 2019.
  2. K. Wehbi, L. Hong, T. Al-Salah, and A. A. Bhutta, 鈥淎 survey on machine learning based detection on DDoS attacks for IoT systems,鈥 in Proc. IEEE SoutheastCon, Huntsville, AL, Apr. 2019.
  3. W. Chen, L. Hong, S. Bhattarai, T. Sanchez, E. Ijieh, S. Severyn, and L. Lightfoot, 鈥淛oint design of cooperative protocols and distributed beamforming for multi-hop cognitive radio networks,鈥 International Journal of Networking and Computing, vol. 9, no. 1, pp. 53-69, Jan. 2019.
  4. P. B. Lamichhane, L. Hong, and S. Shetty, 鈥淎 quantitative risk analysis model and simulation of enterprise networks,鈥 in Proc. IEEE Annual Information Technology, Electronics & Mobile Communication Conference, University of British Columbia, BC, Canada, Nov. 2018.
  5. A. Muallem, S. Shetty, L. Hong, and J. W. Pan, 鈥淭DDEHT: Threat detection using distributed ensembles of Hoeffding trees on streaming cyber datasets,鈥 in Proc. IEEE Military Communications Conference (MILCOM), Los Angeles, CA, Oct. 2018.听
  6. S. Alzahrani and L. Hong, 鈥淒etection of distributed denial of service (DDoS) attacks using artificial intelligence on cloud,鈥 in Proc. IEEE Cloud Conference, San Francisco, CA, July 2018.
  7. M. A. Rahman, L. Hong, and L. H. Keel, "Network Resource Management for Cloud based Networked Control Systems via Adaptive Sampling," in Proc. American Control Conference, Milwaukee, WI, June 2018.
  8. W. Chen, L. Hong, S. Bhattarai, T. Sanchez, E. Ijieh, S. Severyn, and L. Lightfoot, 鈥淛oint cooperative protocols and distributed beamforming design with efficient secondary user selection for multi-hop cognitive radio networks,鈥 in Proc. IEEE International Parallel & Distributed Processing Symposium, Vancouver, BC, Canada, May 2018.
  9. M. A. Rahman, L. Hong, and L. H. Keel, "Network resource management for cloud based networked control systems via adaptive sampling," in Proc. Tennessee Academy of Science, Martin, TN, Nov. 2017.
  10. T. Al-Salah and L. Hong, 鈥淐ost integrated schemes for decoy deployment in virtualized cloud services protection,鈥 in Proc. International Conference on Security and Management (SAM'17), Las Vegas, NV, July 2017.
  11. T. Al-Salah, L. Hong, and S. Shetty, 鈥淎ttack surface expansion using decoys to protect virtualized infrastructure,鈥 in Proc. IEEE International Conference on Edge Computing, Honolulu, HI, Jun. 2017.
  12. A. Aldarraji, L. Hong, and S. Shetty, 鈥淧olarized beamforming for near-field wireless jamming attacks mitigation,鈥 in Proc. IEEE SoutheastCon, Charlotte, NC, Mar. 2017.
  13. L. Hong, W. Chen, S. Shetty, D. Lo, and R. Cooper, 鈥淪trong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks,鈥 International Journal of Networking and Computing, vol. 7, no. 1, pp. 50-68, Jan. 2017.
  14. A. Aldarraji, L. Hong, and S. Shetty 鈥淧olarized beamforming for enhanced countermeasure of wireless jamming attacks,鈥 in Proc. IEEE International Performance Computing and Communications Conference, Las Vegas, NV, Dec. 2016.
  15. L. Hong and S. Mao, 鈥淚mplementation and performance evaluation of cooperative wireless communications with beamforming and software defined radio techniques,鈥 in Proc. ASEE Annual Conference and Exposition, New Orleans, LA, June 2016.
  16. R. P. Ramachandran, S. H. Chin, K. D. Dahm, L. Hong, S. Shetty, R. M. Nickel, R. J. Kozick, Y. Tang, and R. Polikar, 鈥淧lanning and assessment of a workshop on undergraduate education in biometric systems,鈥 in Proc. ASEE Annual Conference and Exposition, New Orleans, LA, June 2016.
  17. W. Chen, L. Hong, S. Shetty, D. Lo, and R. Cooper, 鈥淐ross-layered security approach with compromised nodes detection in cooperative sensor networks,鈥 in Proc. 18th Workshop on Advances in Parallel and Distributed Computational Models, Chicago, IL, May 2016.
  1. S. Bhattarai, G. Naik and L. Hong, 鈥淎 computationally efficient node selection scheme for cooperative beamforming in cognitive radio enabled 5G systems,鈥 in Proc. IEEE International Conference on Computer Communications (INFOCOM) 5G & Beyond Workshop, San Francisco, CA, Apr. 2016.
  2. M. M. Alam, S. Bhattarai, L. Hong and S. Shetty, 鈥淩obust cooperative beamforming against steering vector uncertainty in cognitive radio networks,鈥 in Proc. IEEE Consumer Communications and Networking Conference, Las Vegas, NV, Jan. 2016.
  3. K. Ma, Q. Zheng, Y. Ma, K. Qian and L. Hong, 鈥淯sing mobile technology to enhance self-efficacy in underrepresented students for engineering education,鈥 in Proc. IEEE International Conference on Teaching, Assessment and Learning for Engineering, Zhuhai, China, Dec. 2015.
  4. K. Ma, K. Qian and L. Hong, 鈥淚nnovative mobile tool for engineering embedded design and security educations,鈥 in Proc. ASEE/IEEE Frontiers in Education Conference, El Paso, TX, Oct. 2015.
  5. R. P. Ramachandran, L. Hong, S. Shetty, K. D. Dahm, R. J. Kozick, R. M. Nickel, R. Polikar, Y. Tang and S. H. Chin, 鈥淒esign and performance evaluation of a biometric iris verification system,鈥 in ASEE Annual Conference & Exposition, Seattle, WA, June, 2015.
  6. K. Ma, L. Hong, K. Qian and D. Lo, 鈥淟earning embedded smartphone sensing technology on a novel strategy (LESSONS): A novel learning labware design, development and implementation,鈥 in Proc. ASEE Annual Conference & Exposition, Indianapolis, IN, Jun. 2014.
  7. S. K. Mukkavilli, S. Shetty and L. Hong, 鈥淕eneration of realistic datasets to evaluate impact of attacks on cloud data center,鈥 in Proc. Intl. Conf. Next Generation Computing and Communication Technologies, Apr. 2015, Dubai, UAE.
  8. R. P. Ramachandran, K. D. Dahm, R. M. Nickel, R. J. Kozick, S. Shetty, L. Hong, S. H. Chin, R. Polikar and Y. Tang, 鈥淰ertical integration of biometrics across the curriculum: case study of speaker, face and iris recognition,鈥 IEEE Circuits and Systems Magazine, vol. 14, no. 3, pp. 55-69, 2014.
  9. L. Hong, W. Chen and F. Liu, 鈥淐ooperative molecular communication for nanonetwork,鈥 in Proc. IEEE International Conference on Ubiquitous and Future Networks, July 2014, Shanghai, China.
  10. M. M. Alam, S. Bhattarai, L. Hong and S. Shetty, 鈥淩obust transmit beamforming against steering vector uncertainty in cognitive radio networks,鈥 in Proc. IEEE INFOCOM14 Green Cognitive Communications and Computer Networking Workshop, Toronto, Canada, Apr. 2014.
  11. L. Hong and W. Chen, 鈥淚nformation theory and cryptography based secured communication scheme for cooperative MIMO networks,鈥 Ad Hoc Networks Journal (Elsevier), vol. 14, pp. 95-105, Mar. 2014.
  12. W. Chen, L. Hong and X. Chen, 鈥淓fficient cooperative MIMO paradigms for cognitive radio networks,鈥 International Journal of Networking and Computing, vol. 4, no. 1, pp. 53-69, Jan. 2014.
  13. M. Alam, S. Bhattarai, L. Hong and S. Shetty, 鈥淩obust beamforming for cognitive radio based vehicular communication鈥, in Proc. IEEE International Conference on Connected Vehicles and Expo, Las Vegas, NV, Dec. 2013.
  14. L. Hong and J. Wu, 鈥淕raph modulations for massive MIMO systems,鈥 in IEEE Global Communications Conference, Atlanta, GA, Dec. 2013.
  15. L. Hong, S. Sathananthan and L. H. Keel, "Robust stochastic flow management for TCP/AQM system," in Proc. IEEE IFAC, Aug. 2011.
  16. L. Hong, M. McNeal, W. Chen, 鈥淪ecure cooperative MIMO communications under active compromised nodes,鈥 in Seventh IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing, March, 2011.
  17. Wei Chen, Heh Miao, L. Hong, 鈥淐ross Layer Design of Heterogeneous Virtual MIMO Radio Networks with Multi-Optimization,鈥 Journal IJCN.
  18. Wei Chen, Samuel Hargrove, Heh Miao, L. Hong, "Dynamic and decentralized approaches for optimal allocation of multiple resources in virtualized data centers," in Proc. PDPTA 2011.
  19. W. Chen, H. Miao and L. Hong, "Cross-layer Design for Cooperative Wireless Sensor Networks with Multiple Optimizations," International Journal of Networking and Computing, vol. 1, no. 1, pp. 63-81, 2010.
  20. W. Chen, M. McNeal, L. Hong, 鈥淐ross-Layered Design of Security Scheme for Cooperative MIMO Sensor Networks,鈥 in Proc. IEEE International Conference on Wireless Information Technology and Systems, 2010.
  21. Wei Chen, Heh Miao, L. Hong, Jim Savage, Husam Adas, 鈥 Cross Layer Design of Heterogeneous Virtual MIMO Radio Networks with Multi-Optimization,鈥漣n Proc. 12th Workshop on Advances in Parallel and Distributed Computational Models, April 19-23, 2010.
  22. Wei Chen, Heh Miao, L. Hong, Saleh Zein-Sabatto, Husam A. Adas, Karaman Suzan, " Distributed Resource Management and Parallel Routing for Data Acquisition in Heterogeneous Sensor Networks ," in Proc. The International Conference on Sensor Networks and Applications ( SNA-2009 ), November, 2009.
  23. L. Hong, 鈥淟ow-complexity identifier for M-ary QAM signals,鈥 in Proc. IEEE SoutheastCon, Atlanta, GA, March 2009.
  24. L. Hong and Z. Wu, Efficient error control scheme for video streaming over wireless networks, in Proc. IEEE Wireless Telecommunications Symposium, Pomona, CA, April 2008.
  25. M. Hasanuzzaman and L. Hong, 鈥漇tudent-Centered Online Courseware Development Using Adaptive Learning Environment,鈥 ASEE SE section Annual Conference, Memphis, TN, April 2008.
  26. L. Hong and M. Hasanuzzaman, 鈥漊ndergraduate embedded system education using adaptive learning technology,鈥 in Proc. ASEE Annual Conference and Exposition, Honolulu, Hi, June 2007.
  27. L. Hong, 鈥滿aximum likelihood BPSK and QPSK classifier in fading environment using the EM algorithm,鈥 in Proc. Southeastern Symposium on System Theory (SSST), Cookeville, TN, Mar., 2006, pp. 313-317.
  28. L. Hong and K. C. Ho, 鈥 Classification of BPSK and QPSK signals using an antenna array,鈥 in Journal of Circuit, Systems & Signal Processing, vol. 24, no. 4, 2005, pp. 343-361.
  29. L. Hong, 鈥滳lassification of BPSK and QPSK signals in fading environment using the ICA technique,鈥 in Proc. Southeastern Symposium on System Theory (SSST), Tuskegee, AL, Mar., 2005, pp. 491-494.
  30. L. Hong, J. Rosca and R. Balan, 鈥滲ayesian Single Channel Speech Enhancement Exploiting Sparseness in the ICA Domain,鈥 in Proc. European Signal Processing Conference (EUSIPCO), Vienna, Austria, Sept., 2004, pp. 1713-1716.
  31. L. Hong, J. Rosca and R. Balan, 鈥滻ndependent component analysis based single channel speech enhancement,鈥 in Proc. IEEE Symposium on Signal Processing and Information Technology (ISSPIT), Darmstdt, Germany, December 2003, pp. 522-525.
  32. L. Hong and K. C. Ho, 鈥 Classification of BPSK and QPSK signals with unknown signal level using the Bayes technique,鈥 in Proc. IEEE International Symposium. on Circuits and Systems (ISCAS), Bangkok, Thailand, May 2003, vol. 4, pp. IV-1-IV-4.
  33. L. Hong and K. C. Ho, 鈥 An antenna array likelihood modulation classifier for BPSK and QPSK signals,鈥 in Proc. IEEE Military Communications Conference (MILCOM), Anaheim, CA, Oct. 2002, vol. 1, pp. 647-651.
  34. L. Hong and K. C. Ho, 鈥淢odulation classification of BPSK and QPSK signals using a two element antenna array receiver,鈥 in Proc. IEEE MILCOM, Washington, DC, Oct. 2001, vol. 1, pp. 118-122.
  35. K. C. Ho and L. Hong, 鈥淟ikelihood Method for BPSK and Unbalanced QPSK Modulation Classification,鈥 in Proc. SPIE鈥檚 15th Annual International Symp. on Aerosense, Simulation, and Controls, Orlando, FL, Apr. 2001, vol. 4395, pp. 155-162.
  36. L. Hong and K. C. Ho, 鈥滿odified CRLB on the modulation parameters of QAM signal,鈥 in Proc. SPIE鈥檚 15th Annual International Symp. on Aerosense, Simulation, and Controls, Orlando, FL, Apr. 2001, vol. 4395, pp. 163-170.
  37. L. Hong and K. C. Ho, 鈥滲PSK and QPSK modulation classification with unknown signal level,鈥 in Proc. IEEE MILCOM, Los Angeles, CA, Oct. 2000, vol. 2, pp. 976- 980.
  38. L. Hong and K. C. Ho, 鈥滿odified CRLB on the modulation parameters of OQPSK signal and MSK signal,鈥 in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Chicago, IL, Sept. 2000, vol. 3, pp. 1536-1540.
  39. L. Hong and K. C. Ho, 鈥滻dentification of digital modulation types using the wavelet transform,鈥 in Proc. IEEE MILCOM, Atlantic City, NJ, Oct. 1999, pp. 427-431.
  40. K. C. Ho, H. Liu and L. Hong, 鈥漁n improving the accuracy of a wavelet based identifier to classify CDMA signal and GSM signal,鈥 in Proc. IEEE ISCAS, Orlando, FL, May 1999, vol. 4, pp. 564-567.
  1. L. Hong, K. Qian, G. Quan and K. Ma, 鈥淟ow-cost and portable labware for computing curriculum using scalable android-based mobile sensory platform,鈥 in Proc. ASEE/IEEE Frontiers in Education Conference, Oklahoma City, OK, Oct. 2013.
  2. M. Guo, K. Qian, G. Quan and L. Hong, 鈥淎ndroid-based mobile sensory labware for embedded system education,鈥 in Proc. IEEE Intl. Conf. Advanced Learning Technologies(ICALT), Beijing, China, July 2013.
  3. S. Bhattarai, L. Hong, S. Shetty, 鈥淥ptimum Transmit Beamforming Scheme for Underlay Cognitive Radio Networks鈥, in听Proc. of Global Wireless Summit, Atlantic City, June 24-27, 2013.
  4. W. Chen and L. Hong, 鈥淐ooperative MIMO paradigms for cognitive radio networks,鈥 in Proc. 12th Workshop on Advances in Parallel and Distributed Computational Models, Boston, MA, May 2013.
  5. K. Qian, D. Lo, Y. Pan, Y. Zhang, X. Hu and L. Hong, 鈥淭he Cross-curriculum mobile computing labware for CS,鈥 Computer Education, vol. 1672-5913, pp.72-75, 2012.
  6. L. Hong, K. Qian and C. Hung, 鈥淢ulti-faceted penetration of fast Fourier transform by interactively analyzing real-world objects via mobile technology,鈥 in Proc. ASEE/IEEE Frontiers in Education Conference, Seattle WA, Oct. 2012.
  7. K. Qian, D. Lo, Y. Pan, Y. Zhang, X. Hu and L. Hong, 鈥淩eal-world relevant learning with Android smartphones,鈥 in Proc. IEEE Intl. Conf. Advanced Learning Technologies(ICALT), Rome. Italy, July, 2012.
  8. D. C. Lo, K. Qian and L. Hong, 鈥淭he use of low cost portable microcontrollers in teaching undergraduate computer architecture and organization,鈥 in Proc. Integrated STEM Education Conference, Ewing, NJ, pp. 1-4, Mar. 2012.
  9. K. Qian, D. Lo, Y. Pan, Y. Zhang, X. Hu and L. Hong, 鈥淭he Cross-curriculum mobile computing labware for CS,鈥 in Proc. ACM SIGCSE, Feb. 2012, pp. 664-664.
  10. L. Hong, S. Sathananthan and L. H. Keel, "Design of robust stochastic controller for stabilizing queues of TCP/AQM system," in Journal of Stochastic Analysis and Applications, vol. 30, no. 1, Jan. 2012, pp. 146-159
  11. K. Qian, X. Hu and L. Hong, 鈥淓xperience on teaching multiple CS courses with portable embedded system labware in a box,鈥 in Proc. World Congress on Engineering and Computer Science, vol. I, San Francisco, CA, Oct. 2011, pp. 257-259.
  12. K. Qian, X. Hu and L. Hong, 鈥淓valuation on Teaching Embedded System with Portable Labs in a Box,鈥 WorldComp conference, 07/2011.

AWARDS/FELLOWSHIPS/SCHOLARSHIPS/SERVICES

  • Publication Chair, IEEE SoutheastCon, 2011.
  • College of Engineering nominee for TSU "Teacher of the Year", 2010.
  • Member, Technical Program Committee, IEEE International Conference on Communications (ICC),听 IEEE Global Communications Conference (GlobeCom), IEEE Wireless Communications and Networking Conference (WCNC), IEEE World Congress on Computer Science and Information Engineering (CSIE), IEEE WiMob, etc.
  • Session Chair, IEEE Wireless Telecommunications Symposium (WTS), 2008.
  • Undergraduate students, Donovan McClain and Brooke, were Winner of Senior Group Design Presentations of College of Engineering, Technology and Computer Science,Tennessee 福利影院最新网址, Spring 2007.
  • Co-Chair, IEEE Southeastern Symposium on System Theory (SSST), Cookeville, March 2006, session on Wireless Systems.
  • Undergraduate students, Robert Love and Matthew McCartney, were awarded Outstanding Capstone Research Presentations of College of Engineering, Technologyand Computer Science, Tennessee 福利影院最新网址, 2006.
  • Faculty Research Award, Tennessee 福利影院最新网址, 2005.






webpage contact:
Electrical and Computer Engineering