Long Zhang's Home Page

                Long Zhang (张龙)

                Department of Computer Science,
                University of British Columbia,
                Vancouver, BC, Canada
                 Contact Info: 
                 Email: zhlong73 (at) cs.ubc.ca (preffered)
                     Mail Address: 201-2366 Main Mall, UBC, Vancouver, Canada, V6T 1Z4
                 Office: ICCS, X410D
                 Office Fax: 604-822-5485
                 Free/Busy Info                                                    My Album

Short Bio :  Long Zhang is a master student in Department of Computer Science, University of British Columbia, under careful supervision of Prof. Bill Aiello. He is conducting academic research in Networks, System and Security Lab. Previous to joining UBC, Long got his bachelor degree from Department of Computer Science, School of Electronics Engineering and Computer Science, Peking University, supervisored by Prof. Zhong Chen. His research interests cover Networks, Operating Systems and Security.
Long worked as a research assistant in Information Security Lab, Peking University, since he was a second year undergraduate student. Soon after that, he joined Peer-to-Peer Research Group. He worked as a research assistant in Distributed Data and Intensive System Lab, Georgia Institute of Technology, after finishing his third year undergraduate study in Peking University, under the supervision of Professor Ling Liu. Long joined System Research Group, Microsoft Research Asia on early 2009, and worked there until July, 2009. His mentors were Dr. Mao Yang and Dr. Lidong Zhou. During the summer of 2010, he spent 3 months in Autopilot Team, Bing Infrastructure Group at Microsoft Redmond. Followed by, he spent 3 months as a visiting student in Networked System Group, Max Planck Institute for Software Systems, Germany, working with Dr. Krishna Gummadi. 
He is always planning to be a DG in a night club after finishing his master or PH.D.

          B.S. (2005 - 2009) in Computer Science, School of Electronics Engineering and Computer Science, Peking University, Beijing, China. 
          MSc (since fall 2009) in Computer Science, University of British Columbia, Vancouver, Canada.

Intern and Working Experiences
            Research Assistant in Network Security Lab, Peking University. (2007.08 ~ 2009.07)
            Research Assistant in Distributed Data and Intensive System Lab, Georgia Institute of Technology. (2008.06 ~ 2008. 08)
            Intern in System Research Group, Microsoft Research Asia. (2009.03 ~ 2009.07)
            Research Assistant in Networks, System and Security Lab, University of British Columbia. (2009.09 ~ now)
            SDE Intern in Autopilot Team, Bing Infrastructure Group, Microsoft Redmond. (2010.05 ~ 2010.08)  
            Research intern in Max Planck Institute for Software System, Germany. (2010.09 ~ 2010. 12)

Past and On-going Research Projects
[1] Identity-based encryption (IBE) cooperated with Stanford University   
Information Security Lab, Peking University. Aug. 2007 ~ May 2008
Used Boneh-Franklin (BF) and Boneh-Boyen (BB1) identity-based encryption public-key algorithms in the Cryptographic Message Syntax (CMS). Presented WebIBC, which integrated public key cryptography into web applications without any browser plugins. Demonstrated WebIBC was secure and efficient both in theory and practice by implementation and performance evaluation.
[2] Pseudo-randomness Inside Web Browsers   
Infomation Security Lab, Peking University. Mar. 2008 ~ Jun. 2008
Designed and implemented Pseudo-Random Number Generator only rely on ubiquitous Web browser abilities- JavaScript, HTML and AJAX, etc. Provided Pseudo-cookie for JavaScript programs to access operating system services for retrieving random or entropy values without changing Web browser security policies.
[3] Redwood, Towards a Reliable Vote Aggregation Scheme in P2P Networks   
Peer-to-Peer Research Group, Peking University. Sep.2008 ~ Jul. 2009
Presented Redwood, a vote aggregation scheme that leverages social networks to address the basic vote aggregation problem. Used social networks to enlarge evaluation history among peers in anonymous, distributed peer-to-peer networks. Effectively addressed the cold start problem and inactive participant challenge of current reputation models. Also created a shortcut path to directly evaluate a target object’s reputation by exploiting social networks. By stimulation, Redwood remarkably improved the performance of two existed reputation model, Credence and Scrubber.
[4] Sorcery, Combating Deceivers in P2P Networks   
Peer-to-Peer Research Group, Peking University. Sep.2008 ~ Apr.2009
Presented Sorcery, a novel active challenge-response mechanism based on the notion that one side of transaction with preponderant knowledge can detect whether the other side is telling a lie. Used social networks to establish asymmetrical information among peers.  Demonstrated that Sorcery is robust to the collusive deceivers and cold start problem, and also invulnerable to Tricky Attack, Sybil Attack, and Man-in-the-Middle Attack.
[5] TLA: The Temporal Logic of Actions   
Microsoft Research Asia, Sigma Building, Beijing, China. Mar. 2009 ~  Jul. 2009
Try to design model checking tools in Logic Layer of System Specification, and automaticly translate TLA+ specified program into executable C++ program. Cooperating with Dr. Mao Yang, Dr. lidong Zhou, Dr. Leslie Lamport and Dr. Ivan Beschastnikh.

[6] IQ: Whole System Instrumentation via Demand Emulation   
NSS Lab, UBC, Vancouver, Canada. Working with 2 other excellent graduate students, Wenhao Xu and Quan Zhang. Jan. 2010 ~  May. 2010
Propose IQ(instrumenting QEMU), a new instrumentation framework based on binary translation technique which can instrument the whole OS in fine granularity. IQ provides rich APIs speific to whole system instrumentation, e.g. reading register, segment and memory state. In order to instrument long running sytems, IQ makes use of two concepts to reduce the overhead: Demand Instrumentation and Demand Emulation. The former one means the tool can instrument any code regions of the system without influencing the rest code of the OS. The later one means only running instrumented code in emulator (QEMU) and leaving the rest of code running in virtual machine (KVM). Several fancy tools have been built based on this framework. 

Teaching Experiences
          Teaching Assistant, CPSC 310, Introduction to Software Engineering.    Fall 2009
          Teaching Assistant, APSC 160, Introduction to Computation in Engneering Design.   Spring 2010
          Teaching Assistant, CPSC 313, Computer Hardware and Operating Systems.    Spring 2011
Courses Taken
          Fall 2009:  CPSC 504, Data Management 
                              CPSC 508, Operating Systems
                              CPSC 521, Parallel Algorithms and Arthitectures
          Spring 2010: CPSC 527, Computer Comunication Protocols
                                  CPSC 538K, Cloud Computing
                                  CPSC 538W, Execution Mining

Selected Personal Awards
          Top 10 (among 330) Undergraduate student thesis in School of Electronics Engineering and Computer Science, Peking University.    Jun. 2009  
          Dean’s Award For Study Excellence, Peking University.    Sep. 2007~Sep. 2008
          Excellent Member in 2008 IEEE Peking University Student Branch Hong Kong Visit.    May, 2008
          First Prize in The Fourth “Jiang Ze Han” Cup Mathematical Contest in Modeling and Computer Application, Peking University.    May, 2007    
          Second Prize in National Olympiad Mathematics Competition for High School Students.    Sep. 2004

Publications (full list)
[4] Long Zhang, "Design and Implementation of an Active Challenge Response mechanism for Peer-to-Peer Networks" (in Chinese), Bachelor Degree Thesis. (Best Dissertation Award, School of Electronics Engineering and Computer Science, Peking university) [Full Paper] [Slides]
[3] Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua, Huiping Sun, Sihan Qing, Liyong Tang and Zhong Chen, "Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?", in Proc. of the 9th International Conference on Peer-to-Peer Computing(P2P' 09), Seattle, Washington, USA. (Nominated best paper, conference acceptence rate: 19%[Full Paper][Slides]
[2] Ennan Zhai, Ruichuan Chen, Eng Keong Lua, Long Zhang, Huiping Sun, Sihan Qing, and Zhong Chen, "SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam", in Proc. of IEEE Global Communications Conference (GLOBECOM' 09), Hawaii, USA . [Full Paper]
[1] Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan "Pseudo-randomness Inside Web Browsers", in Proc. of the 10th International Conference on Information and Communications Security (ICICS' 08), Birmingham, UK. (Acceptence rate: 22.5%)  [Full Paper]


          2nd Annual NSERC ISSNET Workshop, Ottawa, ON, Canada, April 26~30, 2010
          NSERC ISSNET Summer School, Calgary, AB, Canada, July 11~15, 2011
          20th USENIX Security Symposium, San Francisco, CA, USA, August 8~12

          Basketball, soccer, swimming, tennis and body building.
             Traveling, Hiking, Mountaining and Boating.
          Clubs and Bars.
          Wine and Beers.....

Conferences focused 
          ACM SIGCOMM, SOSP, PLDI, CoNext, CCS, etc
          USENIX NSDI, OSDI, ATC, Security, etc 
          IEEE S&P.
                                                                                                                                                                                Last Update: Feb 9th, 2011. Created by Long Zhang. All rights reserved. Check PageRank
Long Zhang,
2009年8月13日 下午11:29
Long Zhang,
2009年8月13日 下午11:28
Long Zhang,
2009年9月5日 下午11:40
Long Zhang,
2009年8月13日 下午11:08