Liang Hong

Professor

 

Dr. Liang Hong is a professor in the Department of Electrical and Computer Engineering at Tennessee State University. He received his Ph.D. degree in Electrical Engineering with concentrations in Wireless Communications and Signal Processing from University of Missouri-Columbia in 2002. He was a Research Associate at Siemens Corporate Research, Princeton, New Jersey from February 2003 to July 2003. Since August 2003, he has been with the Department of Electrical and Computer Engineering at Tennessee State University.

 

EDUCATION
EXPERIENCE
RESEARCH
PUBLICATIONS
GUIDED THESES AND DISSERTATION
AWARDS/FELLOWSHIPS/SCHOLARSHIPS/SERVICES

  Hong

Office: 214 E Torrence Hall
Phone :
615-963-5364
Fax: 615-963-2165
Email
:  lhong@tnstate.edu

EDUCATION
Ph.D. Electrical Engineering, University of Missouri-Columbia (MU), USA, 2002.
M.S.  Electrical Engineering, Southeast University (SEU), China, 1997.
B.S.   Electrical Engineering, Southeast University, China, 1994

EXPERIENCES
Professor: (2014-present) Electrical and Computer Engineering, Tennessee State University.
Associate Professor: (2008-2014) Electrical and Computer Engineering, Tennessee State University.
Assistant Professor: (2003-2008) Electrical and Computer Engineering, Tennessee State University.
Visiting Assistant Professor: (2006) Electrical Engineering and Computer Science, Vanderbilt University.
Research Associate, Siemens Corporate Research, Princeton, NJ, February 2003 - July 2003.
Research Intern, Siemens Corporate Research, Princeton, NJ, May 2001 - November 2001.
Hardware Engineer, ZTE Corporate Shanghai R & D Institute, China, June 1997 - July 1998

RESEARCH

  • Principal Investigator (PI), “Embedded System Security Education,” US Office of Naval Research, 2015-2018, $599,800.
  • Co-PI, “Defense and Countermeasures of Jamming Attacks in Wireless Mesh Networks,” US Navy Naval Engineering Education Consortium (NEEC) Program, 2016-2018, $290,000.
  • Graduate student, Md Monzurul Alam, received 1st Place Award for his research work presented in Tennessee State University-Wide Symposium, Apr. 2014.
  • PI, “Unfettered and reliable communication in congested spectrum environments,” US Air Force Research Laboratory Research Collaboration Program (RCP), 2013-2018, $310,000.
  • Co-PI (PI: Dr. L. Keel), “A new protocol for distributed control of wireless control network via cloud computing,” Department of Defense (DoD) Research and Education Program for Historically Black Colleges and Universities and Minority-Serving Institutions (HBCU/MI) Program, 2013-2016, $628,556.
  • PI, “Communication paradigms for cooperative nanonetworks,” US Air Force Research Laboratory Minority Leadership Program (MLP), 2013, $75,000.
  • Undergraduate student, Cornel Zlibut, received 2nd Place Award for his research work presented in Tennessee Academy of Science Centennial Meeting, Nov. 2012.
  • Co-PI (PI: Dr. S. Shetty), “Vertical integration of concepts and laboratory experiences in biometrics across the four year electrical and computer engineering curriculum,” funded by the NSF TUES program (award: 1122344, 2011-2015).
  • Co-PI (PI: Dr. Z. Wu), ”High efficient streaming of police in-car video over unreliable wireless networks,” National Science Foundation (NSF) Small Business Innovation Research and Small Business Technology Transfer (SBIR/STTR) Program, 2006 - 2007, $105,000.
  • Patent: R. Balan, J. Rosca, L. Hong, V. Hamacher and E. Fischer, “System and method for adaptive multi-sensor arrays,” 7,218,741, 2007.

PUBLICATIONS

  1. L. Almutairi, S. Shetty, L. Hong, “Security analysis of multiple SDN controllers based on stochastic Petri nets,” to appear in Proc. 2019 Spring Simulation Conference (SpringSim 19), Tucson, AZ, Apr. 29-May 2, 2019.
  2. K. Wehbi, L. Hong, T. Al-Salah, and A. A. Bhutta, “A survey on machine learning based detection on DDoS attacks for IoT systems,” in Proc. IEEE SoutheastCon, Huntsville, AL, Apr. 2019.
  3. W. Chen, L. Hong, S. Bhattarai, T. Sanchez, E. Ijieh, S. Severyn, and L. Lightfoot, “Joint design of cooperative protocols and distributed beamforming for multi-hop cognitive radio networks,” International Journal of Networking and Computing, vol. 9, no. 1, pp. 53-69, Jan. 2019.
  4. P. B. Lamichhane, L. Hong, and S. Shetty, “A quantitative risk analysis model and simulation of enterprise networks,” in Proc. IEEE Annual Information Technology, Electronics & Mobile Communication Conference, University of British Columbia, BC, Canada, Nov. 2018.
  5. A. Muallem, S. Shetty, L. Hong, and J. W. Pan, “TDDEHT: Threat detection using distributed ensembles of Hoeffding trees on streaming cyber datasets,” in Proc. IEEE Military Communications Conference (MILCOM), Los Angeles, CA, Oct. 2018. 
  6. S. Alzahrani and L. Hong, “Detection of distributed denial of service (DDoS) attacks using artificial intelligence on cloud,” in Proc. IEEE Cloud Conference, San Francisco, CA, July 2018.
  7. M. A. Rahman, L. Hong, and L. H. Keel, "Network Resource Management for Cloud based Networked Control Systems via Adaptive Sampling," in Proc. American Control Conference, Milwaukee, WI, June 2018.
  8. W. Chen, L. Hong, S. Bhattarai, T. Sanchez, E. Ijieh, S. Severyn, and L. Lightfoot, “Joint cooperative protocols and distributed beamforming design with efficient secondary user selection for multi-hop cognitive radio networks,” in Proc. IEEE International Parallel & Distributed Processing Symposium, Vancouver, BC, Canada, May 2018.
  9. M. A. Rahman, L. Hong, and L. H. Keel, "Network resource management for cloud based networked control systems via adaptive sampling," in Proc. Tennessee Academy of Science, Martin, TN, Nov. 2017.
  10. T. Al-Salah and L. Hong, “Cost integrated schemes for decoy deployment in virtualized cloud services protection,” in Proc. International Conference on Security and Management (SAM'17), Las Vegas, NV, July 2017.
  11. T. Al-Salah, L. Hong, and S. Shetty, “Attack surface expansion using decoys to protect virtualized infrastructure,” in Proc. IEEE International Conference on Edge Computing, Honolulu, HI, Jun. 2017.
  12. A. Aldarraji, L. Hong, and S. Shetty, “Polarized beamforming for near-field wireless jamming attacks mitigation,” in Proc. IEEE SoutheastCon, Charlotte, NC, Mar. 2017.
  13. L. Hong, W. Chen, S. Shetty, D. Lo, and R. Cooper, “Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks,” International Journal of Networking and Computing, vol. 7, no. 1, pp. 50-68, Jan. 2017.
  14. A. Aldarraji, L. Hong, and S. Shetty “Polarized beamforming for enhanced countermeasure of wireless jamming attacks,” in Proc. IEEE International Performance Computing and Communications Conference, Las Vegas, NV, Dec. 2016.
  15. L. Hong and S. Mao, “Implementation and performance evaluation of cooperative wireless communications with beamforming and software defined radio techniques,” in Proc. ASEE Annual Conference and Exposition, New Orleans, LA, June 2016.
  16. R. P. Ramachandran, S. H. Chin, K. D. Dahm, L. Hong, S. Shetty, R. M. Nickel, R. J. Kozick, Y. Tang, and R. Polikar, “Planning and assessment of a workshop on undergraduate education in biometric systems,” in Proc. ASEE Annual Conference and Exposition, New Orleans, LA, June 2016.
  17. W. Chen, L. Hong, S. Shetty, D. Lo, and R. Cooper, “Cross-layered security approach with compromised nodes detection in cooperative sensor networks,” in Proc. 18th Workshop on Advances in Parallel and Distributed Computational Models, Chicago, IL, May 2016.
  1. S. Bhattarai, G. Naik and L. Hong, “A computationally efficient node selection scheme for cooperative beamforming in cognitive radio enabled 5G systems,” in Proc. IEEE International Conference on Computer Communications (INFOCOM) 5G & Beyond Workshop, San Francisco, CA, Apr. 2016.
  2. M. M. Alam, S. Bhattarai, L. Hong and S. Shetty, “Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks,” in Proc. IEEE Consumer Communications and Networking Conference, Las Vegas, NV, Jan. 2016.
  3. K. Ma, Q. Zheng, Y. Ma, K. Qian and L. Hong, “Using mobile technology to enhance self-efficacy in underrepresented students for engineering education,” in Proc. IEEE International Conference on Teaching, Assessment and Learning for Engineering, Zhuhai, China, Dec. 2015.
  4. K. Ma, K. Qian and L. Hong, “Innovative mobile tool for engineering embedded design and security educations,” in Proc. ASEE/IEEE Frontiers in Education Conference, El Paso, TX, Oct. 2015.
  5. R. P. Ramachandran, L. Hong, S. Shetty, K. D. Dahm, R. J. Kozick, R. M. Nickel, R. Polikar, Y. Tang and S. H. Chin, “Design and performance evaluation of a biometric iris verification system,” in ASEE Annual Conference & Exposition, Seattle, WA, June, 2015.
  6. K. Ma, L. Hong, K. Qian and D. Lo, “Learning embedded smartphone sensing technology on a novel strategy (LESSONS): A novel learning labware design, development and implementation,” in Proc. ASEE Annual Conference & Exposition, Indianapolis, IN, Jun. 2014.
  7. S. K. Mukkavilli, S. Shetty and L. Hong, “Generation of realistic datasets to evaluate impact of attacks on cloud data center,” in Proc. Intl. Conf. Next Generation Computing and Communication Technologies, Apr. 2015, Dubai, UAE.
  8. R. P. Ramachandran, K. D. Dahm, R. M. Nickel, R. J. Kozick, S. Shetty, L. Hong, S. H. Chin, R. Polikar and Y. Tang, “Vertical integration of biometrics across the curriculum: case study of speaker, face and iris recognition,” IEEE Circuits and Systems Magazine, vol. 14, no. 3, pp. 55-69, 2014.
  9. L. Hong, W. Chen and F. Liu, “Cooperative molecular communication for nanonetwork,” in Proc. IEEE International Conference on Ubiquitous and Future Networks, July 2014, Shanghai, China.
  10. M. M. Alam, S. Bhattarai, L. Hong and S. Shetty, “Robust transmit beamforming against steering vector uncertainty in cognitive radio networks,” in Proc. IEEE INFOCOM14 Green Cognitive Communications and Computer Networking Workshop, Toronto, Canada, Apr. 2014.
  11. L. Hong and W. Chen, “Information theory and cryptography based secured communication scheme for cooperative MIMO networks,” Ad Hoc Networks Journal (Elsevier), vol. 14, pp. 95-105, Mar. 2014.
  12. W. Chen, L. Hong and X. Chen, “Efficient cooperative MIMO paradigms for cognitive radio networks,” International Journal of Networking and Computing, vol. 4, no. 1, pp. 53-69, Jan. 2014.
  13. M. Alam, S. Bhattarai, L. Hong and S. Shetty, “Robust beamforming for cognitive radio based vehicular communication”, in Proc. IEEE International Conference on Connected Vehicles and Expo, Las Vegas, NV, Dec. 2013.
  14. L. Hong and J. Wu, “Graph modulations for massive MIMO systems,” in IEEE Global Communications Conference, Atlanta, GA, Dec. 2013.
  15. L. Hong, S. Sathananthan and L. H. Keel, "Robust stochastic flow management for TCP/AQM system," in Proc. IEEE IFAC, Aug. 2011.
  16. L. Hong, M. McNeal, W. Chen, “Secure cooperative MIMO communications under active compromised nodes,” in Seventh IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing, March, 2011.
  17. Wei Chen, Heh Miao, L. Hong, “Cross Layer Design of Heterogeneous Virtual MIMO Radio Networks with Multi-Optimization,” Journal IJCN.
  18. Wei Chen, Samuel Hargrove, Heh Miao, L. Hong, "Dynamic and decentralized approaches for optimal allocation of multiple resources in virtualized data centers," in Proc. PDPTA 2011.
  19. W. Chen, H. Miao and L. Hong, "Cross-layer Design for Cooperative Wireless Sensor Networks with Multiple Optimizations," International Journal of Networking and Computing, vol. 1, no. 1, pp. 63-81, 2010.
  20. W. Chen, M. McNeal, L. Hong, “Cross-Layered Design of Security Scheme for Cooperative MIMO Sensor Networks,” in Proc. IEEE International Conference on Wireless Information Technology and Systems, 2010.
  21. Wei Chen, Heh Miao, L. Hong, Jim Savage, Husam Adas, “ Cross Layer Design of Heterogeneous Virtual MIMO Radio Networks with Multi-Optimization,”in Proc. 12th Workshop on Advances in Parallel and Distributed Computational Models, April 19-23, 2010.
  22. Wei Chen, Heh Miao, L. Hong, Saleh Zein-Sabatto, Husam A. Adas, Karaman Suzan, " Distributed Resource Management and Parallel Routing for Data Acquisition in Heterogeneous Sensor Networks ," in Proc. The International Conference on Sensor Networks and Applications ( SNA-2009 ), November, 2009.
  23. L. Hong, “Low-complexity identifier for M-ary QAM signals,” in Proc. IEEE SoutheastCon, Atlanta, GA, March 2009.
  24. L. Hong and Z. Wu, Efficient error control scheme for video streaming over wireless networks, in Proc. IEEE Wireless Telecommunications Symposium, Pomona, CA, April 2008.
  25. M. Hasanuzzaman and L. Hong, ”Student-Centered Online Courseware Development Using Adaptive Learning Environment,” ASEE SE section Annual Conference, Memphis, TN, April 2008.
  26. L. Hong and M. Hasanuzzaman, ”Undergraduate embedded system education using adaptive learning technology,” in Proc. ASEE Annual Conference and Exposition, Honolulu, Hi, June 2007.
  27. L. Hong, ”Maximum likelihood BPSK and QPSK classifier in fading environment using the EM algorithm,” in Proc. Southeastern Symposium on System Theory (SSST), Cookeville, TN, Mar., 2006, pp. 313-317.
  28. L. Hong and K. C. Ho, ” Classification of BPSK and QPSK signals using an antenna array,” in Journal of Circuit, Systems & Signal Processing, vol. 24, no. 4, 2005, pp. 343-361.
  29. L. Hong, ”Classification of BPSK and QPSK signals in fading environment using the ICA technique,” in Proc. Southeastern Symposium on System Theory (SSST), Tuskegee, AL, Mar., 2005, pp. 491-494.
  30. L. Hong, J. Rosca and R. Balan, ”Bayesian Single Channel Speech Enhancement Exploiting Sparseness in the ICA Domain,” in Proc. European Signal Processing Conference (EUSIPCO), Vienna, Austria, Sept., 2004, pp. 1713-1716.
  31. L. Hong, J. Rosca and R. Balan, ”Independent component analysis based single channel speech enhancement,” in Proc. IEEE Symposium on Signal Processing and Information Technology (ISSPIT), Darmstdt, Germany, December 2003, pp. 522-525.
  32. L. Hong and K. C. Ho, ” Classification of BPSK and QPSK signals with unknown signal level using the Bayes technique,” in Proc. IEEE International Symposium. on Circuits and Systems (ISCAS), Bangkok, Thailand, May 2003, vol. 4, pp. IV-1-IV-4.
  33. L. Hong and K. C. Ho, ” An antenna array likelihood modulation classifier for BPSK and QPSK signals,” in Proc. IEEE Military Communications Conference (MILCOM), Anaheim, CA, Oct. 2002, vol. 1, pp. 647-651.
  34. L. Hong and K. C. Ho, “Modulation classification of BPSK and QPSK signals using a two element antenna array receiver,” in Proc. IEEE MILCOM, Washington, DC, Oct. 2001, vol. 1, pp. 118-122.
  35. K. C. Ho and L. Hong, “Likelihood Method for BPSK and Unbalanced QPSK Modulation Classification,” in Proc. SPIE’s 15th Annual International Symp. on Aerosense, Simulation, and Controls, Orlando, FL, Apr. 2001, vol. 4395, pp. 155-162.
  36. L. Hong and K. C. Ho, ”Modified CRLB on the modulation parameters of QAM signal,” in Proc. SPIE’s 15th Annual International Symp. on Aerosense, Simulation, and Controls, Orlando, FL, Apr. 2001, vol. 4395, pp. 163-170.
  37. L. Hong and K. C. Ho, ”BPSK and QPSK modulation classification with unknown signal level,” in Proc. IEEE MILCOM, Los Angeles, CA, Oct. 2000, vol. 2, pp. 976- 980.
  38. L. Hong and K. C. Ho, ”Modified CRLB on the modulation parameters of OQPSK signal and MSK signal,” in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Chicago, IL, Sept. 2000, vol. 3, pp. 1536-1540.
  39. L. Hong and K. C. Ho, ”Identification of digital modulation types using the wavelet transform,” in Proc. IEEE MILCOM, Atlantic City, NJ, Oct. 1999, pp. 427-431.
  40. K. C. Ho, H. Liu and L. Hong, ”On improving the accuracy of a wavelet based identifier to classify CDMA signal and GSM signal,” in Proc. IEEE ISCAS, Orlando, FL, May 1999, vol. 4, pp. 564-567.
  1. L. Hong, K. Qian, G. Quan and K. Ma, “Low-cost and portable labware for computing curriculum using scalable android-based mobile sensory platform,” in Proc. ASEE/IEEE Frontiers in Education Conference, Oklahoma City, OK, Oct. 2013.
  2. M. Guo, K. Qian, G. Quan and L. Hong, “Android-based mobile sensory labware for embedded system education,” in Proc. IEEE Intl. Conf. Advanced Learning Technologies(ICALT), Beijing, China, July 2013.
  3. S. Bhattarai, L. Hong, S. Shetty, “Optimum Transmit Beamforming Scheme for Underlay Cognitive Radio Networks”, in Proc. of Global Wireless Summit, Atlantic City, June 24-27, 2013.
  4. W. Chen and L. Hong, “Cooperative MIMO paradigms for cognitive radio networks,” in Proc. 12th Workshop on Advances in Parallel and Distributed Computational Models, Boston, MA, May 2013.
  5. K. Qian, D. Lo, Y. Pan, Y. Zhang, X. Hu and L. Hong, “The Cross-curriculum mobile computing labware for CS,” Computer Education, vol. 1672-5913, pp.72-75, 2012.
  6. L. Hong, K. Qian and C. Hung, “Multi-faceted penetration of fast Fourier transform by interactively analyzing real-world objects via mobile technology,” in Proc. ASEE/IEEE Frontiers in Education Conference, Seattle WA, Oct. 2012.
  7. K. Qian, D. Lo, Y. Pan, Y. Zhang, X. Hu and L. Hong, “Real-world relevant learning with Android smartphones,” in Proc. IEEE Intl. Conf. Advanced Learning Technologies(ICALT), Rome. Italy, July, 2012.
  8. D. C. Lo, K. Qian and L. Hong, “The use of low cost portable microcontrollers in teaching undergraduate computer architecture and organization,” in Proc. Integrated STEM Education Conference, Ewing, NJ, pp. 1-4, Mar. 2012.
  9. K. Qian, D. Lo, Y. Pan, Y. Zhang, X. Hu and L. Hong, “The Cross-curriculum mobile computing labware for CS,” in Proc. ACM SIGCSE, Feb. 2012, pp. 664-664.
  10. L. Hong, S. Sathananthan and L. H. Keel, "Design of robust stochastic controller for stabilizing queues of TCP/AQM system," in Journal of Stochastic Analysis and Applications, vol. 30, no. 1, Jan. 2012, pp. 146-159
  11. K. Qian, X. Hu and L. Hong, “Experience on teaching multiple CS courses with portable embedded system labware in a box,” in Proc. World Congress on Engineering and Computer Science, vol. I, San Francisco, CA, Oct. 2011, pp. 257-259.
  12. K. Qian, X. Hu and L. Hong, “Evaluation on Teaching Embedded System with Portable Labs in a Box,” WorldComp conference, 07/2011.

 

AWARDS/FELLOWSHIPS/SCHOLARSHIPS/SERVICES

  • Publication Chair, IEEE SoutheastCon, 2011.
  • College of Engineering nominee for TSU "Teacher of the Year", 2010.
  • Member, Technical Program Committee, IEEE International Conference on Communications (ICC),  IEEE Global Communications Conference (GlobeCom), IEEE Wireless Communications and Networking Conference (WCNC), IEEE World Congress on Computer Science and Information Engineering (CSIE), IEEE WiMob, etc.
  • Session Chair, IEEE Wireless Telecommunications Symposium (WTS), 2008.
  • Undergraduate students, Donovan McClain and Brooke, were Winner of Senior Group Design Presentations of College of Engineering, Technology and Computer Science,Tennessee State University, Spring 2007.
  • Co-Chair, IEEE Southeastern Symposium on System Theory (SSST), Cookeville, March 2006, session on Wireless Systems.
  • Undergraduate students, Robert Love and Matthew McCartney, were awarded Outstanding Capstone Research Presentations of College of Engineering, Technologyand Computer Science, Tennessee State University, 2006.
  • Faculty Research Award, Tennessee State University, 2005.

 

 






webpage contact:
Electrical and Computer Engineering