Complex Network Theory: Vulnerability and Optimization
Devise several new metrics for assessing network vulnerability including network fragmented, weakest points detection, QoS, and geographical failures
Study complexity and approximation of those metrics under different network topologies
Investigate how vulnerability propagates under different diffusion models based on network structures
Investigate the hardness complexity and devise constant approximation algorithms for several optimization problems that exploit the power-law distribution
Social-aware Solutions
Investigate several optimization problems of which the underlying topology are social networks, such as worm containment in social networks, routing protocols in DTN or MANETs, viral marketing in social networks, and information propagation in online social networks
Investigate security in online social networks such as contaiment of misinformation spread, identifying the misinformation sources, providing mechanism for safely posting information in online social networks without exposing your sensitive information.
Investigate the complex
network structures such as identifying the community structures and adaptively updating them during the network evolving.
Adaptive Approximation Algorithms
Provide approximation techniques
to adaptively bound the performance of algorithms wrt the changes of networks
DoS Attacks
Provide new approaches against reactive jamming attacks based on the identification of trigger nodes coupled with the group testing theory
Provide new approaches against DoS attacks. Also investigate the Sybil attacks in online social networks
Cloud Phenomenon/Coverage Detection and Monitor
Investigate several in-network detection and tracking techniques for either static or dynamic cloud phenomenon
Devise efficient solutions to provide a full coverage utilizing the mobile sensor devices