👨🏻🔬 About Me
Postdoctoral Researcher in Computer Science at Indiana University Bloomington
I am a postdoctoral researcher at the Luddy School of Informatics, Computing, and Engineering, advised by Prof. XiaoFeng Wang and Prof. Haixu Tang.
I received my Ph.D. in Computer Science from Indiana University Bloomington, under the supervision of Prof. XiaoFeng Wang
My research centers on systems security, with focuses on AI security and cybercrime.
In my research career, I had the privilege of working with Prof. Xiaojing Liao from University of Illinois Urbana-Champaign, Prof. Yuan Tian from University of California, Los Angeles, Prof. Kai Chen from Chinese Academy of Science, Prof. Yuhong Nan from Sun Yat-sen University, and Prof. Wei Wang from Xi'an Jiaotong University.
Beyond research, I enjoy fishing , snowboarding and cooking.
Cyber Threat Intelligence: [CCS'24-4], [IEEE S&P'22-1]
Mobile Security: [NDSS'22], [IEEE S&P'19], [CCS'17]
5G Security: [USENIX Security'2023], [USENIX Security'2022]
Oct 2025: Our paper (with Jian Cui, Prof. Xiaojing Liao, and Prof. XiaoFeng Wang) received the ACM CCS 2025 Distinguished Paper Award. Thank you, ACM CCS! 🎉
Oct 2025: Honored to receive the ACM CCS 2025 Distinguished Artifact Reviewer Award. Thank you, ACM CCS, for the recognition! 🎉
Sept 2025: I will serve as a member of the Program Committee for ACM CCS'26, welcome to submit your papers!
July 2025: I will serve as a member of the Artifact Evaluation Committee for IEEE S&P'26, welcome to submit your artifact!
July 2025: I will serve as a member of the Program Committee for USENIX Security'26, welcome to submit your papers!
July 2025: I will serve as a member of the Artifact Evaluation Committee for NDSS'26, welcome to submit your artifact!
May 2025: I will serve as a member of the Artifact Evaluation Committee for ACM CCS'25, welcome to submit your artifact!
Oct 2024: Honored to be awarded a student conference grant to attend ACM CCS‘24. Thanks ACM CCS!
Mar 2022: Zoom acknowledged our reported vulnerability on Zoom and also gives us a bounty.
Jul 2021: Slack awarded us $1,000 for discovering vulnerabilities in Slack.
Jul 2021: Rocket.Chat acknowledged our reported vulnerability on Rocket.Chat.
May 2021: Cliq acknowledged our reported vulnerability and also gives us a bounty.
Oct 2017: Facebook and Twitter have confirmed our findings. Facebook will award us $9,500 ($7,500+$2,000) and Twitter will award us $1,120, which is an evidence of XAWI’s high impacts.