KMap
❝
Loukas Lazos joined the University of Arizona Department of Electrical and Computer Engineering in August 2007, following receipt of his PhD from the University of Washington. His research interests are in the areas of information and network security, wireless security, user privacy, wireless communications, and protocol design.
In 2009, Lazos received the National Science Foundation Career Award for his research on the security and fairness of multichannel wireless networks.
He served as the technical program co-chair for IEEE Communications and Network Security, or CNS, 2018; the IEEE GLOBECOM Symposium on Communications and Information Systems Security 2013; and the IEEE Data Security and Privacy in Wireless Networks, or D-SPAN, Workshop 2013. He was also the general co-chair for the ACM Conference on Security and Privacy in Wireless and Mobile Networks, or WiSec, in 2012 . He is currently an associate editor for IEEE Transactions on Information Forensics and Security and IEEE Transactions on Mobile Computing.Show Less
VOSviewer
Courses
- FCNFundamentals of Computer Networks
- CPEAComputer Programming for Engineering Applications
Grants
- REU Site: CAT Vehicle: The Cognitive and Autonomous Test Vehicle
Principal Investigator (PI)
2020
$415.0K
Active - SaTC: CORE: Small: Secure Cloud Storage Verification Methods
Principal Investigator (PI)
2018
$500.0K
Active - A Millimeter-Wave Communication System for Wireless Security and Networking Research and Education
Co-Investigator (COI)
2021
$249.9K
- In-band Wireless Trust Establishment Resistant to Advanced Signal Manipulations
Co-Investigator (COI)
2018
$515.0K
- SpecEES: Secure and Fair Spectrum Sharing for Heterogeneous Coexistent Systems
Principal Investigator (PI)
2017
$600.0K
- TWC: Medium: Leakage of Communications Signatures: Analysis of Eavesdropping Attacks and Proactive Countermeasures
Co-Investigator (COI)
2014
$660.0K
- CAREER: Domain-Specific Modeling Techniques for Cyber-Physical Systems
Principal Investigator (PI)
2013
$541.4K
- Blinding Eve: Methods for Concealing Wireless Communications in Mobile Coalitions
Co-Investigator (COI)
2013
$460.0K
- EAGER: Human-Centric Predictive Analytics of Cyber-Threats: a Temporal Dynamics Approach
Co-Investigator (COI)
2013
$200.0K
- Putting Network Security on the Map (Phase II)
Co-Investigator (COI)
2012
$3.6M
News
- UA Engineers Aim to Secure Wi-Fi, Shut Out Snoops
2014
- The Social Science of Cyberattacks
2013
- UA Faculty Member Earns Humboldt Fellowship
2011
- New Lecture Series Centers on Security Issues
2009
Publications (43)
Recent
- Energy-efficient LTE/Wi-Fi Coexistence
2020
- “Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users
2020
- Privacy-utility tradeoff in dynamic spectrum sharing with non-cooperative incumbent users
2020
- ART: Automatic Recovery of Trust for Mobile Devices
2020
- Proofs of Physical Reliability for Cloud Storage Systems
2019
- Repair Strategies for Mobile Storage Systems
2019
- On the Capacity of Leaky Private Information Retrieval
2019
- Optimum Priority Class Selection under Wi-Fi/LTE Coexistence
2019
- Proofs of Storage Reliability
2019
- Multimodal Graph Analysis of Cyber Attacks
2019
- Latent-variable Private Information Retrieval
2019
- Trading Privacy for Utility in Database-assisted Dynamic Spectrum Access
2019
- In-band Secret-Free Pairing Protocol for COTS Wireless Devices
2019
- SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices
2018
- On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access
2018
- Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks
2018
- Secure Physical Layer Voting
2018
- LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard
2018
- Multi-channel Medium Access Without Control Channels: A Full Duplex MAC Design
2017
- HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation
2017
- Traffic Decorrelation Techniques for Countering Colluding Eavesdroppers in WSNs
2017
- Threshold-based File Maintenance Strategies for Mobile Cloud Storage Systems
2016
- Repair Strategies for Storage on Mobile Clouds
2016
- AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks
2016
- Misbehavior in Multi-channel MAC Protocols
2016
- FEAL: Fine-Grained Evaluation of Active Learning in Collaborative Learning Spaces
2016
- Verifying ADS-B Navigation Information Through Doppler Shift Measurements (2nd place best graduate student paper award)
2015
- Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM Systems
2015
- PHYVOS: Physical Layer Voting for Secure and Fast Cooperation
2015
- Time-Delayed Broadcasting for Defeating Inside Jammers
2014
- Collusion-Resistant Query Anonymization for Location-Based Services
2014
- FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single Transceiver
2014
- Network Anomaly Detection Using Autonomous System Flow Aggregates
2014
- IMap: Visualizing Network Activity over Internet Maps
2014
- Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a Systems
2014
- Vulnerabilities of cognitive radio MAC protocols and countermeasures
2013
- Countering Selfish Misbehavior in Multi-channel MAC Protocols
2013
- Perfect Contextual Information Privacy in WSN under Colluding Eavesdroppers
2013
- Hiding contextual information in WSNs
2012
- Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks
2012
- Packet Hiding Methods for Preventing Selective jamming Attacks
2012
- Thwarting Control-Channel Jamming Attacks from Inside Jammers
2012
- Graph-based Criteria for Spectrum-aware Clustering in Cognitive Radio Networks
2012
Grants
Citations
H-Index
Patents
News
Books
Opportunities