Academic Staff Directory

Shanyu Tang

Professor Shanyu Tang

Chair Professor of Information Security
Job title:
Chair Professor of Information Security
Higher qualifications:

 

BSc (Wuhan University), PGCert (University of North London), PhD (Imperial College London)

Professional organisations:
(SIEEE) Senior Member, Institute of Electrical and Electronics Engineers
IEEE Admission and Advancement Committee
IEEE Communications and Information Security Technical Committee
Membership, Institute for Learning and Teaching in Higher Education
Biography:

 

Shanyu Tang is Professor of Information Security at the University of West London and leads the Information Security Research Group.

Prior to joining UWL in 2017, he was Distinguished Professor of Information Security and Director of Secure Communication Institute at China University of Geosciences. He joined CUG in 2012 from London Metropolitan University, where he was Senior Lecturer in Informatics and Multimedia since 2002, having joined academia in 2000 as a Lecturer in Informatics and Multimedia Technology at the University of North London, United Kingdom.

During his career he has contributed to 99 scientific publications—60 refereed journal papers including IEEE/ACM TRANSACTIONS and IEE/IET journal papers, 37 conference papers, and two books. As PI and lead academic, he has been awarded eight externally funded research grants worth £281K and 2.22M CNY, including three grants from the British Government, since 2007.

He serves/served on editorial boards of international journals in computer science, and has held reviewing roles with a large number of recognised international journals. He served as section co-chairs of international conferences on information security, sat on technical program committees of 12 international conferences, and has four invited lectures. He has been serving as a technical expert to the Ministry of Education of China since 2012. He sat on the IEEE Admission and Advancement Committee Panel 2011 in London.

He has supervised five PhDs in Information Security to completion and has been involved in seven external PhD examinations.

His major research interests lie in covert communications, multimedia security, and digital steganography, most notably the use of Fractal Computing to these areas.

Research and scholarly output:

 

Recent publications (Refereed journal papers on Information Security):

 

Liping Zhang, Yixin Zhang, Shanyu Tang, and He Luo, “Privacy protection for e-health systems using dynamic authentication and three-factor key agreement,” IEEE Transactions on Industrial Electronics, published online, 14 August 2017. (doi: 10.1109/TIE.2017.2739683) (impact factor: 7.168)

Yijing Jiang, and Shanyu Tang*, “An efficient and secure VoIP communication system with chaotic mapping and message digest,” Multimedia Systems, published online, 31 July 2017. (doi: 10.1007/s00530-017-0565-6)

Y. Jiang, S. Tang*, L. Zhang, M. Xiong, and Y.J. Yip, “Covert Voice over Internet Protocol communications with packet loss based on fractal interpolation,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 12, no. 4, 54:1-54:20, Aug. 2016. (doi: 10.1145/2961053) 

S. Tang*, Q. Chen, W. Zhang, and Y. Huang, “Universal steganography model for low bit-rate speech codec,” Security and Communication Networks, vol. 9, iss. 8, pp. 747-754, Apr. 2016. (doi: 10.1002/sec.1183)

S. Tang*, Y. Jiang, L. Zhang, and Z. Zhou, “Audio steganography with AES for real-time covert Voice over Internet Protocol communications,” Science China Information Sciences, Springer, vol. 57, no. 3, pp. 1-14, Mar. 2014. (doi: 10.1007/s11432-014-5063-2)

Y. Huang, C. Liu, S. Tang*, and S. Bai, “Steganography Integration into a low-bit rate speech codec,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1865-1875, Dec. 2012. (doi: 10.1109/TIFS.2012.2218599)

Y.F. Huang, S. Tang*, and J. Yuan, “Steganography in inactive frames of VoIP streams encoded by source codec,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 296-306, 2011. (doi: 10.1109/TIFS.2011.2108649)

Y.F. Huang, and S. Tang*, “Covert Voice over Internet Protocol communications based on spatial model,” Science China Technological Sciences, Springer, vol. 59, no. 1, pp. 117-127, 2016. (doi: 10.1007/s11431-015-5955-4)

Jinghui Peng, Shanyu Tang*, Liping Zhang, and Ran Liu, “Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking,” Multimedia Tools and Applications, vol. 76, iss. 2, pp. 2569 - 2589, Jan. 2017. (doi: 10.1007/s11042-015-3224-y)

Ran Liu, Jinghui Peng, and Shanyu Tang*, “Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions,” Engineering Applications of Artificial Intelligence, vol. 62, pp. 350-358, June 2017. (doi:10.1016/j.engappai.2016.06.002)

Liping Zhang *, Shanyu Tang*, and Shaohui Zhu, “Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol,” Wireless Networks, vol. 23, iss. 6, pp. 1901-1916, August 2017. (doi: 10.1007/s11276-016-1267-2)

L. Zhang, S. Tang*, and S. Zhu, “An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks,” Journal of Network and Computer Applications, vol. 59, pp. 126-133, 2016. (doi: 10.1016/j.jnca.2015.06.022)

L. Zhang*, S. Tang, and H. Luo, “Elliptic curve cryptography-based authentication with identity protection for smart grids,” PLoS ONE, vol. 11, no. 3, pp. 1-15, Mar. 2016. (doi: 10.1371/journal.pone.0151253)

L. Zhang, S. Tang*, and S. Zhu, “A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP,” Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 108-126, 2016. (doi: 10.1007/s12083-014-0317-8)

L. Zhang, S. Zhu, and S. Tang*, “Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme,” IEEE Journal of Biomedical and Health Informatics, vol. 21, iss. 2, pp. 465-475, Mar. 2017. (doi: 10.1109/JBHI.2016.2517146)

H. Li, and S. Tang*, “An improved authentication mechanism based on dynamic game behavior in cloud computing,” Journal of Computational and Theoretical Nanoscience, vol. 13, no. 2, pp. 1211-1219, May 2016. (doi: 10.1166/jctn.2016.5033)

H. Li, and S. Tang*, “Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment,” International Journal of Simulation: Systems, Science & Technology, vol. 17, no. 36, pp. 58.1-58.13, 2016. (doi: 10.5013/ IJSSST.a.17.36.58)

W. Yang, and S. Tang*, “Steganalysis of LSB speech with low embedding rates based on histogram moments in frequency domain,” ACTA Electronica Sinica, in press, 2016.

W. Zhang, S. Tang*, L. Zhang, Z. Ma, and J. Song, “Chaotic stream cipher-based secure data communications over intelligent transportation network,” International Journal of Antennas and Propagation, vol. 2015, pp. 1-10, Mar. 2015. (doi: 10.1155/2015/315721)

R. Liu, J. Peng, and S. Tang*, “An efficient approximation method for calculating confidence level of negative survey,” Mathematical Problems in Engineering, vol. 2015, pp. 1-9, Article ID 958154, 2015. (doi:10.1155/2015/958154)

L. Zhang*, S. Tang*, J. Chen, and S. Zhu, “Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography,” Wireless Personal Communications, vol. 81, no. 1, pp. 53-75, 2015. (doi: 10.1007/s11277-014-2117-0)

L. Zhang, S. Tang*, and Z. Cai, “Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards,” Security and Communication Networks, vol. 7, no. 12, pp. 2405-2411, 2014. (doi: 10.1002/sec.951)

L. Zhang, S. Tang*, and Z. Cai, “Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card,” International Journal of Communication Systems, vol. 27, no. 11, pp. 2691-2702, 2014. (doi: 10.1002/dac.2499)

L. Zhang, S. Tang*, and Z. Cai, “Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications,” IET Communications, vol. 8, iss. 1, pp. 83-91, 2014. (doi: 10.1049/iet-com.2012.0783)

J. Song, C. He, L. Zhang, S. Tang, and H. Zhang, “Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs,” China Communications, vol. 9, pp. 93-103, 2014.

M. Xiong, and S. Tang, “A motion planning method for simulating virtual crowd,” Journal of Simulation, vol. 8, pp. 37-49, 2014. (doi: 10.1057/jos.2013.11)

M. Xiong, S. Tang*, and D. Zhao, “A hybrid model for simulating crowd evacuation,” New Generation Computing, vol. 31, iss. 3, pp. 211-235, Jul. 2013.

Y. Huang, S. Tang*, and W. Yang, “An information - theoretical model for streaming media based stegosystems,” Computing and Informatics, vol. 32, no. 1, pp. 47-62, Feb. 2013.

Y.F. Huang, L. Ying, J. Yuan, and S. Tang*, “Network service registration based on role-goal-process-service meta-model in a P2P network,” IET Communications, vol. 6, iss. 12, pp. 1632-1639, 2012. (doi: 10.1049/iet-com.2011.0404)

Y.F. Huang, S. Tang*, and Y. Zhang, “Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis,” IET Communications, vol. 5, iss. 7, pp. 929-936, 2011. (doi: 10.1049/iet-com.2010.0348)

Y. Huang, S. Tang*, C. Bao, and Y.J. Yip, “Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels,” IET Information Security, vol. 5, iss. 1, pp. 26-32, 2011. (doi: 10.1049/iet-ifs.2010.0032)

S. Ahmed, P. Pan, and S. Tang*, “Clustering websites using a MapReduce programming model,” Journal of Communication and Computer, vol. 7, no. 9, pp. 18-26, Sep. 2010.

S. Tang*, Y. Huang, and Y.J. Yip, “Performance of database driven network applications from the user perspective,” KSII Transactions on Internet and Information Systems, vol. 3, no. 3, pp. 235-250, 2009. (doi: 10.3837/tiis.2009.03.002)

Y. Huang, S. Tang*, and J. Yip, “A new security architecture for SIP-based P2P computer networks,” Journal of Computer Science, Informatics and Electrical Engineering, vol. 2, iss. 1, pp. 1-11, 2008.

Conferences:

 

He served as section co-chairs of international conferences on information security, sat on technical program committees of 12 international conferences, and has four invited lectures.

Research degree supervision:

 

He has supervised five PhDs in Information Security to completion and has been involved in seven external PhD examinations.