PhD in Information Security, Nanyang Technological University, Singapore
Cluster: Infocomm Technology
PhD in Information Security
Nanyang Technological University, Singapore
Software Engineer Certificate of Computer Engineering
Lecturer, from 2016
Nanyang Technological University Graduate Scholarship, 2009-2013
Best Paper Award, IEEE 11th International Conference on Information Assurance and Security (IAS), 2015
Excellent Graduate Award in Wuhan University, 2006
Member, International Association for Cryptologic Research (IACR).
Reviewer for ProvSec, Networking Science.
Applied cryptography, information and cyber security, network coding.
MOE TIF Grant, $311,167, “EPSILON: E2E Protection for Smart-metering Infrastructure within a Local FAN”, Sep 2016- Sep 2018.
Journal Publications (Selected)
Y. H. Ang, S. L. Keoh, and Z. Tang, “Privacy-preserving spatial and temporal aggregation of smart energy data”. Journal of Information Assurance and Security, 11(4), pp. 214-222, 2016.
Z. Tang, “On link encryption against wiretapping attack in network coding”, Networking Science, Vol. 2, Issue 3-4, pp.81-90, 2013.
Z. Tang, “Homomorphic Authentication Codes for Network Coding”, Concurrency and Computation: Practice and Experience, doi: 10.1002/cpe. 3079, 2013.
Z. Tang, H.W Lim, and H. Wang, “Revisiting a Secret Sharing Approach to Network Codes”, Lecture Notes in Computer Science, Vol. 7496, pp. 300-317, 2012.
Z. Tang, J. Fu, N. Du, “Design and Analysis of Spam-Filtering System Based on Word Segmentation”, Journal of Wuhan University, Science Edition, 2005.
Conference Papers (Selected)
S. L. Keoh, Y. H. Ang, and Z. Tang, “A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data”. IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, December 2015.
S. L. Keoh, K. W. K. Au, and Z. Tang, “Securing Industrial Control System: An End-to-End Integrity Verification Approach”. Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, December 2015.
S. L. Keoh, Z. Tang, “Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification”, 10th International Conference on Information Assurance and Security (IAS), November 2014.