Jiaming Yuan
📝Biography
Jiaming Yuan is a Ph.D. student in Computer Science at the University of Oregon, where he has been conducting research in applied cryptography since 2021. His work focuses on searchable encryption, attribute-based encryption, and registration-based encryption, aiming to enhance security and efficiency. He has published 12 papers in cyber security.
🎓Education
- Ph.D. of Computer & Information Science
University of Oregon, USA
March 2021 - Now
- Bachelor of Software Engineering
China University of Petroleum, China
September 2011 - June 2015
💼Experience
- Research Assistant
Center for Cyber Security and Privacy, University of Oregon
January 2025 – Now
- Teaching Assistant
University of Oregon
Instructor of lab class: CS 122 Intro to Programming using Python 3
Grader of Class: CS 333 Applied Cryptography
Grader of Class: 436/536 Secure Software Development
Grader of Class: 432/532 Introduction to Networks
September 2023 – December 2024
- Research Assistant
Center for Cyber Security and Privacy, University of Oregon
June 2021 – August 2023
- Research Engineer
Secure Mobile Center, Singapore Management University
November 2016 – March 2021
- Software Engineer
Realtime Invention (Beijing) (RTI), China
March 2016 – October 2016
🪧Projects
- Secure Mobile Center: Participated in designing and implementing secure mobile systems, supported by Singapore National Research Foundation (NRF) with S$6,415,200 (NCR Award Number NRF2014NCR-NCR001-012). [November 2016 – February 2020]
- A new construction for linkable secret handshake: Cooperate in experiment using Jave. The paper was published in Computer Journal, 2020. [March 2020 – June 2020]
- Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud: Cooperate in experiment using C language and SGX. The paper was published in Cybersecurity, 2020. [June 2019 – September 2019]
- Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion: Cooperate in experiment using Java. The paper was published in Cryptology and Network Security: 18th International Conference, CANS 2019. [January 2019 – May 2019]
- Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes: Cooperate in experiment using C. The paper was published in IEEE Transactions on Emerging Topics in Computing, 2019. [September 2018 – February 2019]
- Lightweight Attribute-based Keyword Search with Policy Protection for Cloud-assisted IoT: Cooperate in experiment using Jave. The paper was published in IEEE Conference on Dependable and Secure Computing, 2019. [May 2018 – November 2018]
- A secure cloud sharing system based on outsourced CP-ABE: Designed and implemented a secure cloud file sharing system based on outsourced CP-ABE in C and Python on Ubuntu/Windows/Android. [November 2016 – August 2018]
- A secure messaging system based on outsourced CP-ABE: Designed and implemented a secure message system based on outsourced CP-ABE in C and Java on Ubuntu/Windows/Android. [November 2016 – August 2018]
- SecBook, a secure document real-time collaboration application online: Designed and implemented a secure document real-time collaboration application web application using Java, JavaScript, HTML, and CSS, and worked with AWS EC2. [March 2016 – October 2016]
- Real Time Invention (Beijing) official website: Designed and implemented an official website for RTI in both English and Chinese using HTML, JavaScript, and CSS, deployed by AWS S3. [March 2016 – October 2016]
📄Publications
- Message Control for Blockchain Rewriting, IEEE Transactions on Dependable and Secure Computing. (2024)
- A Privacy-Preserving and Redactable Healthcare Blockchain System, IEEE Transactions on Services Computing. (2024)
- M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption, International Conference on Information Security Practice and Experience. (2022)
- Accountable and Fine-Grained Controllable Rewriting in Blockchains, IEEE Transactions on Information Forensics and Security. (2022)
- SOCI: A toolkit for secure outsourced computation on integers, IEEE Transactions on Information Forensics and Security. (2022)
- LEAP: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset, Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. (2022)
- Fine-grained and controllably redactable blockchain with harmful data forced removal, Security and Communication Networks. (2021)
- Revocable policy-based chameleon hash, Computer Security–ESORICS. (2021)
- Blockchain-based public auditing and secure deduplication with fair arbitration, Information Sciences. (2020)
- Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Information Sciences. (2020)
- A secure flexible and tampering-resistant data sharing system for vehicular social networks, IEEE Transactions on Vehicular Technology. (2020)
- Super payment channel for decentralized cryptocurrencies, IEEE Conference on Dependable and Secure Computing (DSC). (2019)
👤Skills
-
Languages:Chinese, English
-
Programming Languages:C/C++, Java, Python, JavaScript, CSS, SQL, R, Shell Script, PHP
-
Platform/OS:Windows, Linux, Android
-
Database:MySQL, Oracle, SQLite