Shanyu Tang

Professor Shanyu Tang

Chair Professor of Information Security
School of Medicine and Biosciences

Shanyu Tang is Professor of Information Security at the University of West London, having joined academia in 2000 as a Lecturer in Informatics and Multimedia Technology in the School of Informatics and Multimedia Technology at the University of North London, United Kingdom. He is a Fellow of the British Computer Society (FBCS) and a Fellow of the Higher Education Academy (FHEA).

He is the lead/corresponding author of 106 scientific publications: 66 peer-reviewed journal papers, including IEEE/ACM Transactions, IET journals and IEEE Journal of Biomedical and Health Informatics, 38 conference papers and two books. He, as a principal investigator, is a recipient of 11 external research grants, including seven national research grants. He filed an Internet of Things security patent.

As first supervisor, he has successfully supervised to completion nine PhDs in computer science and informatics and has been involved in seven external PhD examinations. He is on editorial boards of international journals in computer science and informatics.

He was a scientific adviser to several universities and organisations, sitting on the university’s research committee from 2007 to 2017 and the IEEE Admission and Advancement Committee Panel 2011. He chaired international conferences, served on conference program committees and gave numerous invited research seminars.

His research interests include bioinformatics, health data security, secure communication and social media analytics, most notably the use of machine learning and chaos theory to these areas.

He has supervised five PhDs in Information Security to completion and has been involved in seven external PhD examinations.
  • Qualifications

    BSc (Wuhan University), PGCert (University of North London), PhD (Imperial College London)

  • Memberships

    (SIEEE) Senior Member
    Institute of Electrical and Electronics Engineers
    IEEE Admission and Advancement Committee
    IEEE Communications and Information Security Technical Committee
    Membership
    Institute for Learning and Teaching in Higher Education
  • Research and publications

    Recent publications (Refereed journal papers on Information Security):

    J. Peng, S. Tang*, “Covert communication over VoIP streaming media with dynamic key distribution and authentication,” IEEE Transactions on Industrial Electronics, vol. 68, iss. 4, pp. 3619-3628, Apr. 2021. (doi: 10.1109/TIE.2020.2979567) (impact factor: 7.503)

    J. Peng, Y. Jiang, S. Tang*, F. Meziane, “Security of streaming media communications with logistic map and self-adaptive detection-based steganography,” IEEE Transactions on Dependable and Secure Computing, in Press, 2020. (doi: 10.1109/TDSC.2019.2946138) (impact factor: 6.404)

    L. Zhang, Y. Zhang, S. Tang*, H. Luo, “Privacy protection for e-health systems using dynamic authentication and three-factor key agreement,” IEEE Transactions on Industrial Electronics, vol. 65, iss. 3, pp. 2795-2805, Mar. 2018. (doi: 10.1109/TIE.2017.2739683) (impact factor: 7.168)

    L. Zhang, S. Zhu, S. Tang*, “Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme,” IEEE Journal of Biomedical and Health Informatics, vol. 21, iss. 2, pp. 465-475, Mar. 2017. (doi: 10.1109/JBHI.2016.2517146) (impact factor: 4.217)

    W. Yang, S. Tang*, M. Li, B. Zhou, Y. Jiang “Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates,” Multimedia Tools and Applications, vol. 77, no. 14, pp. 17937-17952, Aug. 2018. (doi: 10.1007/s11042-017-5505- 0) (impact factor: 2.101)

    Y. Liu, S. Tang*, R. Liu, L. Zhang, Z. Ma, “Secure and robust digital image watermarking scheme using logistic and RSA encryption,” Expert Systems With Applications, vol. 97, pp. 95-105, May 2018. (doi: 10.1016/j.eswa.2017.12.003) (impact factor: 4.577)

    R. Liu, J. Peng, S. Tang*, “Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions,” Engineering Applications of Artificial Intelligence, vol. 62, pp. 350-358, Jun. 2017. (doi:10.1016/j.engappai.2016.06.002) (impact factor: 3.526)

    Yijing Jiang, and Shanyu Tang*, “An efficient and secure VoIP communication system with chaotic mapping and message digest,” Multimedia Systems, published online, 31 July 2017. (doi: 10.1007/s00530-017-0565-6)

    J. Peng, S. Tang*, L. Zhang, R. Liu, “Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking,” Multimedia Tools and Applications, vol. 76, iss. 2, pp. 2569-2589, Jan. 2017. (doi: 10.1007/s11042-015- 3224-y) (impact factor: 2.101)

    Y. Jiang, S. Tang*, L. Zhang, M. Xiong, and Y.J. Yip, “Covert Voice over Internet Protocol communications with packet loss based on fractal interpolation,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 12, no. 4, 54:1-54:20, Aug. 2016. (doi: 10.1145/2961053) 

    S. Tang*, Q. Chen, W. Zhang, and Y. Huang, “Universal steganography model for low bit-rate speech codec,” Security and Communication Networks, vol. 9, iss. 8, pp. 747-754, Apr. 2016. (doi: 10.1002/sec.1183)

    S. Tang*, Y. Jiang, L. Zhang, and Z. Zhou, “Audio steganography with AES for real-time covert Voice over Internet Protocol communications,” Science China Information Sciences, Springer, vol. 57, no. 3, pp. 1-14, Mar. 2014. (doi: 10.1007/s11432-014-5063-2)

    Y. Huang, C. Liu, S. Tang*, and S. Bai, “Steganography Integration into a low-bit rate speech codec,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1865-1875, Dec. 2012. (doi: 10.1109/TIFS.2012.2218599)

    Y.F. Huang, S. Tang*, and J. Yuan, “Steganography in inactive frames of VoIP streams encoded by source codec,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 296-306, 2011. (doi: 10.1109/TIFS.2011.2108649)

    Y.F. Huang, and S. Tang*, “Covert Voice over Internet Protocol communications based on spatial model,” Science China Technological Sciences, Springer, vol. 59, no. 1, pp. 117-127, 2016. (doi: 10.1007/s11431-015-5955-4)

    Jinghui Peng, Shanyu Tang*, Liping Zhang, and Ran Liu, “Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking,” Multimedia Tools and Applications, vol. 76, iss. 2, pp. 2569 - 2589, Jan. 2017. (doi: 10.1007/s11042-015-3224-y)

    Ran Liu, Jinghui Peng, and Shanyu Tang*, “Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions,” Engineering Applications of Artificial Intelligence, vol. 62, pp. 350-358, June 2017. (doi:10.1016/j.engappai.2016.06.002)

    Liping Zhang *, Shanyu Tang*, and Shaohui Zhu, “Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol,” Wireless Networks, vol. 23, iss. 6, pp. 1901-1916, August 2017. (doi: 10.1007/s11276-016-1267-2)

    L. Zhang, S. Tang*, and S. Zhu, “An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks,” Journal of Network and Computer Applications, vol. 59, pp. 126-133, 2016. (doi: 10.1016/j.jnca.2015.06.022)

    L. Zhang*, S. Tang, and H. Luo, “Elliptic curve cryptography-based authentication with identity protection for smart grids,” PLoS ONE, vol. 11, no. 3, pp. 1-15, Mar. 2016. (doi: 10.1371/journal.pone.0151253)

    L. Zhang, S. Tang*, and S. Zhu, “A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP,” Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 108-126, 2016. (doi: 10.1007/s12083-014-0317-8)

    L. Zhang, S. Zhu, and S. Tang*, “Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme,” IEEE Journal of Biomedical and Health Informatics, vol. 21, iss. 2, pp. 465-475, Mar. 2017. (doi: 10.1109/JBHI.2016.2517146)

    H. Li, and S. Tang*, “An improved authentication mechanism based on dynamic game behavior in cloud computing,” Journal of Computational and Theoretical Nanoscience, vol. 13, no. 2, pp. 1211-1219, May 2016. (doi: 10.1166/jctn.2016.5033)

    H. Li, and S. Tang*, “Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment,” International Journal of Simulation: Systems, Science & Technology, vol. 17, no. 36, pp. 58.1-58.13, 2016. (doi: 10.5013/ IJSSST.a.17.36.58)

    W. Yang, and S. Tang*, “Steganalysis of LSB speech with low embedding rates based on histogram moments in frequency domain,” ACTA Electronica Sinica, in press, 2016.

    W. Zhang, S. Tang*, L. Zhang, Z. Ma, and J. Song, “Chaotic stream cipher-based secure data communications over intelligent transportation network,” International Journal of Antennas and Propagation, vol. 2015, pp. 1-10, Mar. 2015. (doi: 10.1155/2015/315721)

    R. Liu, J. Peng, and S. Tang*, “An efficient approximation method for calculating confidence level of negative survey,” Mathematical Problems in Engineering, vol. 2015, pp. 1-9, Article ID 958154, 2015. (doi:10.1155/2015/958154)

    L. Zhang*, S. Tang*, J. Chen, and S. Zhu, “Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography,” Wireless Personal Communications, vol. 81, no. 1, pp. 53-75, 2015. (doi: 10.1007/s11277-014-2117-0)

    L. Zhang, S. Tang*, and Z. Cai, “Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards,” Security and Communication Networks, vol. 7, no. 12, pp. 2405-2411, 2014. (doi: 10.1002/sec.951)

    L. Zhang, S. Tang*, and Z. Cai, “Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card,” International Journal of Communication Systems, vol. 27, no. 11, pp. 2691-2702, 2014. (doi: 10.1002/dac.2499)

    L. Zhang, S. Tang*, and Z. Cai, “Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications,” IET Communications, vol. 8, iss. 1, pp. 83-91, 2014. (doi: 10.1049/iet-com.2012.0783)

    J. Song, C. He, L. Zhang, S. Tang, and H. Zhang, “Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs,” China Communications, vol. 9, pp. 93-103, 2014.

    M. Xiong, and S. Tang, “A motion planning method for simulating virtual crowd,” Journal of Simulation, vol. 8, pp. 37-49, 2014. (doi: 10.1057/jos.2013.11)

    M. Xiong, S. Tang*, and D. Zhao, “A hybrid model for simulating crowd evacuation,” New Generation Computing, vol. 31, iss. 3, pp. 211-235, Jul. 2013.

    Y. Huang, S. Tang*, and W. Yang, “An information - theoretical model for streaming media based stegosystems,” Computing and Informatics, vol. 32, no. 1, pp. 47-62, Feb. 2013.

    Y.F. Huang, L. Ying, J. Yuan, and S. Tang*, “Network service registration based on role-goal-process-service meta-model in a P2P network,” IET Communications, vol. 6, iss. 12, pp. 1632-1639, 2012. (doi: 10.1049/iet-com.2011.0404)

    Y.F. Huang, S. Tang*, and Y. Zhang, “Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis,” IET Communications, vol. 5, iss. 7, pp. 929-936, 2011. (doi: 10.1049/iet-com.2010.0348)

    Y. Huang, S. Tang*, C. Bao, and Y.J. Yip, “Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels,” IET Information Security, vol. 5, iss. 1, pp. 26-32, 2011. (doi: 10.1049/iet-ifs.2010.0032)

    S. Ahmed, P. Pan, and S. Tang*, “Clustering websites using a MapReduce programming model,” Journal of Communication and Computer, vol. 7, no. 9, pp. 18-26, Sep. 2010.

    S. Tang*, Y. Huang, and Y.J. Yip, “Performance of database driven network applications from the user perspective,” KSII Transactions on Internet and Information Systems, vol. 3, no. 3, pp. 235-250, 2009. (doi: 10.3837/tiis.2009.03.002)

    Y. Huang, S. Tang*, and J. Yip, “A new security architecture for SIP-based P2P computer networks,” Journal of Computer Science, Informatics and Electrical Engineering, vol. 2, iss. 1, pp. 1-11, 2008.

  • Conferences

    He has served on technical program committees of international conferences, chaired international conferences and gave numerous invited research seminars.

  • Research degree supervision

    Principal Supervisor

    Financial authentication system using visual cryptography and QR
    (Ghulam Jaffar)
     
    Detecting cyberstalking from social media platform(s) using data mining analytics
    (Aimee Mirto)
     
    Secure Data Communication Techniques for Smart Healthcare IoT Devices
    (Dellan Morgan)