

Shushan Zhao received his BSc degree in Computer Science and Engineering from Shandong University, and MSc degree in Computer Science and Engineering from Helsinki University of Technology. He completed his PhD degree in Computer Science from School of Computer Science, University of Windsor in 2012.
Before joining 91精品 Connecticut State University, he taught at Vanier College, Bishop鈥檚 University and University of Pittsburgh (Bradford Campus). Also having worked as a software developer at VMWare, Mavenir, Ericsson, and Nuance, he has rich experience in telecommunication and software industry.
Network and Information Security.
Courses taught:
- Computer System Administration
- Applied Network Security
- Network Forensics
- Ethical Hacking
- Web Application Security
- Blockchain Technology
- Computer Hardware & Architecture
- Linux Operating System
- Intrusion Detection & Response
- Systems Analysis & Design
- Web Programming
- Cryptography
- Fundamentals of Programming
- Object Oriented Programming
- Principles of Operating Systems
- Database Design Using Oracle
Journal Papers
J17. Shushan Zhao, 鈥淎 High-efficiency Secure Communication Scheme in Vehicle Ad-hoc Networks", under review
J16. Shushan Zhao, 鈥淨uality improvement on minimum-storage-overhead image processing scheme in encrypted domain鈥, Int. J. Cont. Engineering Education and Life-Long Learning, Vol. 34, No. 6, 2024, pp 600-617
J15. Shushan Zhao, 鈥淪ecurity Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy", Journal of Network & Information Security, Vol. 11 Issue 1, 2023, pp 20-27
J14. Adam Motowidlo, Timothy Adatsi, Alvin Jackson, Shushan Zhao (Corresponding Author), 鈥淎 Study on Security of IP Cameras and Its Awareness鈥, Indian Journal of Computer Science, Volume 7, Issue 1, January-February 2022, pp 45-70
J13. Shushan Zhao, 鈥淎n improved scheme for image scaling, cropping and colour correction in encrypted domain鈥, International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1, 2022, pp 86-99
J12. Shushan Zhao, Wes C.H. Chiang, 鈥淪MADS 鈥 A Novel Smart Logistics Network Framework鈥, Journal of Network and Information Security, Vol. 9 No.2 2021, pp. 29-40
J11. Wes C.H. Chiang, Shushan Zhao and Duane E. Mitchell, 鈥淢arketing mistakes or unethical marketing in higher education? Two case studies in Ontario Colleges鈥, Journal of Education and Social Development (JESD), Vol.4 No.2 2020, pp. 9-16
J10. Shushan Zhao, Ken Wang 鈥淎 Framework for a Decentralized and Self-Organized Mail Service Network鈥, Procedia Computer Science, Elsevier, Volume 155, 2019, pp. 327-335
J9. Shushan Zhao, Wenhui Hu 鈥淚mprovement on OTP Authentication and Application in a General-purpose Possession-based Authentication Framework鈥, International Journal of Multimedia Intelligence and Security, Vol. 3, No. 2, 2018, pp. 187-202
J8. Shushan Zhao 鈥淰iable Email Attacks and a Simple End-to-End Security Solution鈥, Indian Journal of Computer Science, Volume 3, Issue 4, July 2018, pp. 22-31
J7. Shushan Zhao, Robert D. Kent and Akshai Aggarwal 鈥淎 Key Management and Secure Routing Integrated Framework
for Mobile Ad-hoc Networks鈥, Ad Hoc Networks, Elsevier, , May 2013, pp. 1046鈥1061
J6. Shushan Zhao, Akshai Aggarwal, Richard Frost and Xiaole Bai 鈥淎 Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks鈥, Communications Surveys & Tutorials, IEEE, Volume PP Issue 99, March 2011, pp. 1-21
J5. Shuping Liu, Shushan Zhao and Weirong Jiang 鈥淎 Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks鈥, Int鈥檒 J. of Communications Network and System Sciences, Volume 4 Issue 7, pp. 456-463, July 2011
J4. Shushan Zhao and Akshai Aggarwal 鈥淧APA-UIC: A Design Approach and a Framework for Secure Mobile Ad-hoc Metworks鈥, Security and Communication Networks, Special Issue: Security in Ad Hoc Networks and Pervasive Computing, John Wiley and Sons, Volume 3 Issue 5, pp. 371-383, September-October 2010
J3. Shushan Zhao and Jian Zhou 鈥淭he Realization of SFT3 in NOVELL Netware鈥, J. New Tide in Information Technology (China), pp. 32-39, 1994-Jun
J2. Jian Zhou and Shushan Zhao 鈥淲INDOWS and Multi-task Operating Systems鈥, J. New Tide in Information Technology (China), pp. 26-33, 1994-May
J1. Shushan Zhao, 鈥淎 Foresight on Future Technological Developments of Radio Paging Systems鈥, J. China Communications, pp. 3-9, 1999-Nov
Book Chapter
Shushan Zhao, 鈥淚mprovement on Security of SMS Verification Codes鈥, Software Engineering Research, Management and Applications. 2019. Studies in Computational Intelligence book series, Volume 845. Springer (ISBN: 978-3-030-24343-2), pp. 189-203
Conference Papers
C16. Shushan Zhao and Wes Chiang, "Privacy-preserving, Low-storage, and High-quality Image Processing in IoT and Clouds", 2023 International Conference on Intelligent Communication and Computer Engineering (ICICCE)
C15. Shushan Zhao and Xiaobing Hou, 鈥淪ecurity Improvement on HMAC-based One-time Password (HOTP)鈥, 2021 International Conference on Security and Management (SAM'21), 2021
C14. C. Chiang, D. E. Mitchell and Shushan Zhao. 鈥淢arketing Mistakes or Unethical Marketing - Two Case Studies in the Era of Commercialization of Higher Education鈥, International Conference on Management, Leadership and Business Intelligence, 2020
C13. Shushan Zhao, Shuping Liu, "An Add-on End-to-end Secure Email Solution in Mobile Communications", 10th EAI International Conference on Mobile Multimedia Communications, 2017.
C12. Shushan Zhao, Robert D. Kent, and Akshai Aggarwal 鈥淎n integrated key management and secure routing solution for Mobile Ad-Hoc Networks鈥, In Proc. Privacy, Security and Trust (2012), IEEE
C11. Shushan Zhao and Akshai Aggarwal 鈥淎gainst mobile attacks in Mobile Ad-hoc Networks鈥, In Proc. Information Theory and Information Security (2010), IEEE
C10. Shushan Zhao and Akshai Aggarwal 鈥淕eneral-purpose Identity Hiding Schemes for Ad-hoc Networks鈥, In Proc. International Symposium on Intelligent Ubiquitous Computing (2009), IEEE
C9. Shuping Liu, Jianwei Chen, Shushan Zhao and Fan Na, 鈥淧eer-to-Peer Application in Mobile Cellular Systems鈥, In Proc. 5th International Conference on Information Technology: New Generations (2008), IEEE
C8. Shushan Zhao, Akshai Aggarwal, Shuping Liu and Huapeng Wu 鈥淎 Secure Routing Protocol in Proactive Security Approach forMobile Ad-hoc Networks鈥, In Proc. Wireless Communications & Networking Conference (2008), IEEE
C7. Shushan Zhao, Akshai Aggarwal and Robert D. Kent 鈥淎 Framework for Revocation of Proxy Certificates in a Grid鈥, In Proc. 8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (2007), IEEE
C6. Shushan Zhao, Akshai Aggarwal and Robert D. Kent 鈥淧KI-Based Authentication Mechanisms in Grid Systems鈥, In Proc. International Conterence on Networking, Architecture, and Storage (2007), IEEE
C5. Shushan Zhao, Akshai Aggarwal and Shuping Liu 鈥淏uilding Secure User-to-user Messaging Channels in Mobile Telecommunication Networks鈥, In Proc. 7th Wireless Telecommunications Symposium (2007), IEEE
C4. Shushan Zhao, Daniel Jaskiewicz and Jouni Karvo 鈥淎 Deployment Tool for Public Safety Ad-hoc Networks鈥, In Proc. 1st Communication System Software and Middleware (2006), IEEE
C3. Shushan Zhao, Jouni Karvo and Henri Koskinen 鈥淐onnectivity Enhancement in Deployable Ad-Hoc Networks with Moving Nodes鈥, 15th IST Mobile & Wireless Communications Summit (2006), IST
C2. Shushan Zhao, Ronja Addams-Moring and Markku Kekkonen 鈥淏uilding Mobile Emergency Announcement Systems in 3G Networks鈥, In Porc. IASTED Computer &Communication Networks (2005).
C1. Ronja Addams-Moring, Markku Kekkonen and Shushan Zhao 鈥淎 simple taxonomy for mobile emergency announcement systems鈥, In Proc. 2nd ISCRAM (2005)
Technical Reports
- H. A茂ache, J. M. Barcel贸, C. Blondia, A. Boukalov, L. Cerd脿, P. D. Cleyn, J. Delaigle, J. Garc铆a, X. Gonzalez, R. Guimaraes, D. Jaskiewicz, J. Karvo, E. Lara, J. Meessen, J. Morillo, A. Pascual, C. Parisot, A. P茅rez-Neira, M. Realp, S. Romaszko, E. Santos, M. Voorhaen and S. Zhao, Specification of IP Stack for Advanced Ad Hoc Network, EU FP6-507572 Widens project, D3.1, 2004
- H. A茂ache, J. M. Barcel贸, C. Blondia, A. Boukalov, L. Cerd脿, P. D. Cleyn, J. Delaigle, J. Garc铆a, X. Gonzalez, R. Guimaraes, D. Jaskiewicz, J. Karvo, E. Lara, J. Meessen, J. Morillo, A. Pascual, C. Parisot, A. P茅rez-Neira, M. Realp, S. Romaszko, E. Santos, M. Voorhaen and S. Zhao, Specification of Low Layer Interface - IP/MAC Mapping, EU FP6-507572 Widens project, D3.2, 2004