KMap
Loukas Lazos joined the University of Arizona Department of Electrical and Computer Engineering in August 2007, following receipt of his PhD from the University of Washington. His research interests are in the areas of information and network security, wireless security, user privacy, wireless communications, and protocol design. In 2009, Lazos received the National Science Foundation Career Award for his research on the security and fairness of multichannel wireless networks. He served as the technical program co-chair for IEEE Communications and Network Security, or CNS, 2018; the IEEE GLOBECOM Symposium on Communications and Information Systems Security 2013; and the IEEE Data Security and Privacy in Wireless Networks, or D-SPAN, Workshop 2013. He was also the general co-chair for the ACM Conference on Security and Privacy in Wireless and Mobile Networks, or WiSec, in 2012 . He is currently an associate editor for IEEE Transactions on Information Forensics and Security and IEEE Transactions on Mobile Computing.

VOSviewer

Courses
  • FCN
    Fundamentals of Computer Networks

  • CPEA
    Computer Programming for Engineering Applications

Grants
  • Funding agency logo
    REU Site: CAT Vehicle: The Cognitive and Autonomous Test Vehicle

    Principal Investigator (PI)

    2020

    $415.0K
    Active
  • Funding agency logo
    SaTC: CORE: Small: Secure Cloud Storage Verification Methods

    Principal Investigator (PI)

    2018

    $500.0K
    Active
  • Funding agency logo
    A Millimeter-Wave Communication System for Wireless Security and Networking Research and Education

    Co-Investigator (COI)

    2021

    $249.9K
  • Funding agency logo
    In-band Wireless Trust Establishment Resistant to Advanced Signal Manipulations

    Co-Investigator (COI)

    2018

    $515.0K
  • Funding agency logo
    SpecEES: Secure and Fair Spectrum Sharing for Heterogeneous Coexistent Systems

    Principal Investigator (PI)

    2017

    $600.0K
  • Funding agency logo
    TWC: Medium: Leakage of Communications Signatures: Analysis of Eavesdropping Attacks and Proactive Countermeasures

    Co-Investigator (COI)

    2014

    $660.0K
  • Funding agency logo
    CAREER: Domain-Specific Modeling Techniques for Cyber-Physical Systems

    Principal Investigator (PI)

    2013

    $541.4K
  • Funding agency logo
    Blinding Eve: Methods for Concealing Wireless Communications in Mobile Coalitions

    Co-Investigator (COI)

    2013

    $460.0K
  • Funding agency logo
    EAGER: Human-Centric Predictive Analytics of Cyber-Threats: a Temporal Dynamics Approach

    Co-Investigator (COI)

    2013

    $200.0K
  • Funding agency logo
    Putting Network Security on the Map (Phase II)

    Co-Investigator (COI)

    2012

    $3.6M
News
  • UA Engineers Aim to Secure Wi-Fi, Shut Out Snoops

    2014

  • The Social Science of Cyberattacks

    2013

  • UA Faculty Member Earns Humboldt Fellowship

    2011

  • New Lecture Series Centers on Security Issues

    2009

Publications (43)
Recent
  • Energy-efficient LTE/Wi-Fi Coexistence

    2020

  • “Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users

    2020

  • Privacy-utility tradeoff in dynamic spectrum sharing with non-cooperative incumbent users

    2020

  • ART: Automatic Recovery of Trust for Mobile Devices

    2020

  • Proofs of Physical Reliability for Cloud Storage Systems

    2019

  • Repair Strategies for Mobile Storage Systems

    2019

  • On the Capacity of Leaky Private Information Retrieval

    2019

  • Optimum Priority Class Selection under Wi-Fi/LTE Coexistence

    2019

  • Proofs of Storage Reliability

    2019

  • Multimodal Graph Analysis of Cyber Attacks

    2019

  • Latent-variable Private Information Retrieval

    2019

  • Trading Privacy for Utility in Database-assisted Dynamic Spectrum Access

    2019

  • In-band Secret-Free Pairing Protocol for COTS Wireless Devices

    2019

  • SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices

    2018

  • On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access

    2018

  • Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks

    2018

  • Secure Physical Layer Voting

    2018

  • LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard

    2018

  • Multi-channel Medium Access Without Control Channels: A Full Duplex MAC Design

    2017

  • HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation

    2017

  • Traffic Decorrelation Techniques for Countering Colluding Eavesdroppers in WSNs

    2017

  • Threshold-based File Maintenance Strategies for Mobile Cloud Storage Systems

    2016

  • Repair Strategies for Storage on Mobile Clouds

    2016

  • AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks

    2016

  • Misbehavior in Multi-channel MAC Protocols

    2016

  • FEAL: Fine-Grained Evaluation of Active Learning in Collaborative Learning Spaces

    2016

  • Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM Systems

    2015

  • PHYVOS: Physical Layer Voting for Secure and Fast Cooperation

    2015

  • Time-Delayed Broadcasting for Defeating Inside Jammers

    2014

  • Collusion-Resistant Query Anonymization for Location-Based Services

    2014

  • FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single Transceiver

    2014

  • Network Anomaly Detection Using Autonomous System Flow Aggregates

    2014

  • IMap: Visualizing Network Activity over Internet Maps

    2014

  • Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a Systems

    2014

  • Vulnerabilities of cognitive radio MAC protocols and countermeasures

    2013

  • Countering Selfish Misbehavior in Multi-channel MAC Protocols

    2013

  • Perfect Contextual Information Privacy in WSN under Colluding Eavesdroppers

    2013

  • Hiding contextual information in WSNs

    2012

  • Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks

    2012

  • Packet Hiding Methods for Preventing Selective jamming Attacks

    2012

  • Thwarting Control-Channel Jamming Attacks from Inside Jammers

    2012

  • Graph-based Criteria for Spectrum-aware Clustering in Cognitive Radio Networks

    2012

Grants
Citations
H-Index
Patents
News
Books
Opportunities