Adversarial Machine Learning
- focus on adversarial examples on safety applications
Computer and Network Security
- focus on privacy leakage issues on IoT-Cloud architecture and home IoT gateways
Data Privacy and Anonymization
- focus on perturbation-based techniques & differential privacy system implementation