Mengjun Xie's Photo

Mengjun Xie, Ph.D.

Associate Professor
Department of Computer Science
University of Arkansas at Little Rock

About Me

I am an Associate Professor in the Department of Computer Science at University of Arkansas at Little Rock. I received my Ph.D. in Computer Science from College of William and Mary under the supervision of Prof. Haining Wang.

At ULAR, I lead the Networked and Complex Systems Security Research (NEXUS) Lab. My work has been funded by the National Science Foundation and Amazon AWS in Education. My research interests lie in cyber security, information assurance, mobile healthcare, and network systems.

I am looking for highly motivated students (current or prospective) to work with me on mobile computing and cyber security research. If you are interested, please stop by my office or drop me email.

News

Research

Refereed Journal Papers

  1. Yue Zhao, Kenji Yoshigoe, Jiang Bian, Mengjun Xie, Zhe Xue, and Yong Feng, A Distributed Graph-Parallel Computing System with Lightweight Communication Overhead, in IEEE Transactions on Big Data, volume 2, issue 3, pp. 204-218. doi: 10.1109/TBDATA.2016.2532907, 2016.
  2. Jiang Bian, Kenji Yoshigoe, Amanda Hicks, Jiawei Yuan, Zhe He, Mengjun Xie, Yi Guo, Mattia Prosperi, Ramzi Salloum, François Modave, Mining Twitter to Assess the Public Perception of the "Internet of Things", in PLoS ONE, volume 11, issue 7, e0158450, doi:10.1371/journal.pone.0158450, 2016.
  3. Jiang Bian, Mengjun Xie, Teresa J. Hudson, Hari Eswaran, Mathias Brochhausen, Josh Hanna, and William R. Hogan, CollaborationViz: Interactive visual exploration of biomedical research collaboration networks, in PLoS ONE, volume 9, issue 11, e111928, doi: 10.1371/journal.pone.0111928, 2014.
  4. Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Sujian Zhou, Remzi Seker, and Jiang Bian, Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks, in Journal of Cyber Security and Mobility, volume 3, issue 3, pp. 289-316, doi: 10.13052/jcsm2245-1439.333, 2014.
  5. Jiang Bian, Mengjun Xie, William Hogan, Laura Huchins, Umit Topaloglu, Cheryl Lane, Jennifer Holland, and Thomas Wells, CLARA: An Integrated Clinical Research Administration System, in Journal of the American Medical Informatics Association (JAMIA), volume 21, issue e2, pp. e369-373, doi:10.1136/amiajnl-2013-002616, PMID: 24778201, 2014.
  6. Jiang Bian, Mengjun Xie, Umit Topaloglu, Teresa Hudson, Hari Eswaran, and William Hogan, Social Network Analysis of Biomedical Research Collaboration Networks in a CTSA Institution, in Journal of Biomedical Informatics (JBI), doi: 10.1016/j.jbi.2014.01.015, PMID: 24560679, Feb., 2014.
  7. Yue Zhao, Kenji Yoshigoe, and Mengjun Xie, Pre-execution Data Prefetching with I/O Scheduling, in The Journal of Supercomputing, Springer, pp. 1-20, December, 2013.
  8. Zhenyu Wu, Mengjun Xie, and Haining Wang, On Energy Security of Server Systems, in IEEE Transactions on Dependable and Secure Computing (TDSC), volume 9, issue 6, pp. 865–876, 2012.
  9. Mengjun Xie, Zhenyu Wu, and Haining Wang, Secure Instant Messaging in Enterprise-like Networks, in International Journal of Computer and Telecommunications Networking (Computer Networks), volume 56, issue 1, pp. 448–461, 2012.
  10. Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang, Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification, in IEEE/ACM Transactions on Networking (TON), volume 19, issue 5, pp. 1557–1571, 2011.
  11. Zhenyu Wu, Mengjun Xie, and Haining Wang, Design and Implementation of a Fast Dynamic Packet Filter, in IEEE/ACM Transactions on Networking (TON), volume 19, issue 5, pp. 1405–1419, 2011.
  12. Chuan Yue, Mengjun Xie, and Haining Wang, An Automatic HTTP Cookie Management System, in International Journal of Computer and Telecommunications Networking (Computer Networks), volume 54, issue 13, article 7, pp. 2182–2198, 2010.
  13. Mengjun Xie, Heng Yin, and Haining Wang, Thwarting E-mail Spam Laundering, in ACM Transactions on Information and System Security (TISSEC), volume 12, issue 2, article 13, pp. 1–32, 2008. This is the extended version of CCS'06 paper invited for publication in ACM TISSEC.

Refereed Conference Papers

  1. Yanyan Li, Mengjun Xie, and Jiang Bian, SegAuth: A Segment-based Approach to Behavioral Biometric Authentication, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 15--23, Philadelphia, PA, USA, 2016.
  2. Yanyan Li and Mengjun Xie, Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and Exercises, in The 17th ACM Annual Conference on IT Education (SIGITE'16), pp. 20--25, Boston, MA, USA, 2016.
  3. Grady Xiao, Mariofanna Milanova, and Mengjun Xie, Secure Behavioral Biometric Authentication with Leap Motion, in Proceedings of the 4th IEEE International Symposium on Digital Forensics and Security (ISDFS'16), pp. 112-118, Little Rock, AR, USA, 2016.
  4. Yanyan Li, Junshuang Yang, and Mengjun Xie, Dylan Carlson, Han Gil Jang, and Jiang Bian, Comparison of PIN- and Pattern-based Behavioral Biometric Authentication on Mobile Devices, in Proceedings of the IEEE Military Communications Conference 2015 (Milcom'15), pp. 1317--1322, Tampa, Florida, USA, 2015.
  5. Amanda Hicks, William R. Hogan, Michael Rutherford, Bradley Malin, Mengjun Xie, Christiane Fellbaum, Zhijun Yin, Daniel Fabbri, Josh Hanna, and Jiang Bian, Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms, in Proceedings of the American Medical Informatics Association (AMIA) 2015 Annual Symposium, pp. 1--10, San Francisco, CA, USA, 2015.
  6. Mengjun Xie, Yanyan Li, Kenji Yoshigoe, Remzi Seker, and Jiang Bian, CamAuth: Securing Web Authentication with Camera, in Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering (HASE'15), pp. 232--239, Daytona Beach, Florida, USA, 2015.
  7. Jingmin Shi, Chao Peng, Qin Zhu, Pengfei Duan, Yu Bao, and Mengjun Xie, There is a Will, There is a Way: A New Mechanism for Traffic Control based on VTL and VANET, in Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering (HASE'15), pp. 240--246, Daytona Beach, Florida, USA, 2015.
  8. Yanyan Li, Mengjun Xie, and Jiang Bian, USign--A Security Enhanced Electronic Consent Model, in Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC'14), pp. 4487--4490, Chicago, IL, USA, 2014.
  9. Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Suijian Zhou, Remzi Seker, and Jiang Bian, LightGraph: Lighten Communication in Distributed Graph-Parallel Processing, in Proceedings of the 3rd IEEE International Congress on Big Data (BigData Congress'14), pp. 717--724, Anchorage, Alaska, USA, 2014.
  10. Mengjun Xie, Liang Hao, Kenji Yoshigoe, and Jiang Bian, CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones, in Proceedings of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm'13), LNICST 127, pp. 35–52, Sydney, Australia, 2013.
  11. Yue Zhao, Kenji Yoshigoe, and Mengjun Xie, Pre-execution Data Prefetching with Interthread I/O Scheduling, in Proceedings of the 2013 International Supercomputing Conference (ISC'13), pp. 395--407, LNCS, volume 7905, 2013.
  12. Jiang Bian, Remzi Seker, and Mengjun Xie, A Secure Communication Framework for Large-scale Unmanned Aircraft Systems, in Proceedings of the 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS'13) , Herndon, VA, USA, 2013
  13. Jiang Bian, Mengjun Xie, and Umit Topaloglu, A Probabilistic Model of Functional Brain Connectivity Network for Discovering Novel Biomarkers, in Proceedings of the AMIA Summit on Translational Bioinformatics 2013, pp. 21--25, PMCID: PMC3814494, San Francisco, CA, USA, 2013.
  14. Mengjun Xie, Indra Widjaja, and Haining Wang, Enhancing Cache Robustness for Content-Centric Networking, in Proceedings of the 31th IEEE Conference on Computer Communications (INFOCOM'12), pp. 2426--2434, Orlando, FL, USA, 2012.
  15. Douglas Serfass and Mengjun Xie, Secure Intelligence Gathering Using Smartphones, in Proceedings of the 2012 IEEE SoutheastCon, Orlando, FL, USA, 2012.
  16. Jiang Bian, Josh M. Cisler, Mengjun Xie, George A. James, Remzi Seker, and Clinton D. Kilts, A Methodology for Empirical Analysis of Brain Connectivity through Graph Mining, in Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC'11) - Cybernetics Track, pp. 2963--2969, Anchorage, AL, USA, 2011.
  17. Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, and Haining Wang, Mimimorphism: A New Approach to Binary Code Obfuscation, in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), pp. 536--546, Chicago, IL, USA, 2010.
  18. Mengjun Xie and Haining Wang, A Collaboration-based Autonomous Reputation System for Email Services, in Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM'10), San Diego, CA, USA, 2010.
  19. Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang, Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs, in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), pp. 256--268, Chicago, IL, USA, 2009.
  20. Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang, Measurement and Classification of Humans and Bots in Internet Chat, in Proceedings of the 17th USENIX Security Symposium (Security'08), pp. 155--169, San Jose, CA, USA, 2008.
  21. Zhenyu Wu, Mengjun Xie, and Haining Wang, Swift: A Fast Dynamic Packet Filter, in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), pp. 279--292, San Francisco, CA, USA, 2008.
  22. Mengjun Xie, Zhenyu Wu, and Haining Wang, HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-like Networks, in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC'07), pp. 64--73, Miami Beach, FL, USA, 2007.
  23. Chuan Yue, Mengjun Xie, and Haining Wang, Automatic Cookie Usage Setting with CookiePicker, in Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), pp. 460--470, Edinburgh, UK, 2007.
  24. Mengjun Xie, Heng Yin, and Haining Wang, An Effective Defense Against Email Spam Laundering, in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06), pp. 179--190, Alexandria, VA, USA, 2006.
  25. Mengjun Xie, Keywan Tabatabai, and Haining Wang, Identifying Low-Profile Web Server's IP Fingerprint, in Proceedings of the 3rd International Conference on the Quantitative Evaluation of Systems (QEST'06), pp. 365--374, Riverside, California, USA, 2006.

Other Refereed Publications

  1. Jonathan Ming and Mengjun Xie, Remote Live Forensics for Android Devices, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 437--438, Philadelphia, PA, USA, 2016.
  2. Diana Anguiano, Ghouri Mohammad Saaduddin, Yanyan Li, and Mengjun Xie, Comparison between Fingerprint and Behavioral Biometric Authentication using 2D and 3D Gestures, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 435--436, Philadelphia, PA, USA, 2016.
  3. Antwane Lewis, Yanyan Li, and Mengjun Xie, Real Time Motion-Based Authentication for Smartwatch, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 478--479, Philadelphia, PA, USA, 2016. (Best Poster Award)
  4. Samiuddin Mohammed and Mengjun Xie, A Measurement Study on Media Streaming over Wi-Fi in Named Data Networking, in Proceedings of the IEEE MASS 2015 Workshop on Content Centric Networking, pp. 543--548, Dallas, TX, USA, 2015.
  5. Junshuang Yang, Yanyan Li, and Mengjun Xie, MotionAuth: Motion-based Authentication for Wrist Worn Smart Devices, in Proceedings of the IEEE PERCOM 2015 Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices, pp. 550--555, St. Louis, MO, USA, 2015.
  6. Han Gil Jang, Dylan Carlson, and Mengjun Xie, Enhancing Mobile Device Authentication with Behavioral Biometrics, in The 4th Research Experiences for Undergraduates Symposium, Arlington, VA, USA, 2014.
  7. Han Gil Jang, Dylan Carlson, and Mengjun Xie, Enhancing Mobile Device Authentication with Behavioral Biometrics, in Grace Hopper Conference REU Site Poster Session, Phoenix, AZ, USA, 2014.
  8. Mengjun Xie, Umit Topaloglu, Thomas Powell, Chao Peng, and Jiang Bian, SIM: A Smartphone-based Identity Management Framework and Its application to Arkansas Trauma Image Repository, in Proceedings of the 2013 International Workshop on Biomedical and Health Informatics, pp. 53--60, Shanghai, China, 2013.
  9. Jiang Bian, Mengjun Xie, Umit Topaloglu, Teresa Hudson, and William Hogan, Understanding Biomedical Research Collaborations through Social Network Analysis: A Case Study, in Proceedings of the 2013 International Symposium on Network Analysis and Mining for Health Informatics, Biomedicine and Bioinformatics, pp. 9--16, Shanghai, China, 2013.
  10. Jiang Bian, Mengjun Xie, Umit Topaloglu, Teresa Hudson, and William Hogan, Interactive Visualization for Understanding and Analyzing Biomedical Research Collaboration Networks – a Pilot Study, in Proceedings of the 2013 Workshop on Visual Analytics in Healthcare (Poster Session), Washington, DC, USA, 2013.
  11. Mengjun Xie, Jiang Bian, and Umit Topaloglu, Topic Modeling for Discovering Drug-related Adverse Events from Social Media, in Proceedings of the AMIA Summit on Translational Bioinformatics 2013 (Poster).
  12. Zhenyu Wu, Mengjun Xie, and Haining Wang, Energy Attack on Server Systems, in Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), pp. 1--9, San Francisco, CA, USA, 2011.

Co-authors and Research Collaborators

Software and Tools

  • AE-LDA: Discovering Drug-related Adverse Events from Tweets Using Topic Models.
  • Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and Exercises.

Teaching

Current Courses at UALR

  • Computer Security (CPSC 4360/5360)
  • Special Topic: Mobile Forensics (CPSC 4399/5399)

Courses Previously Offered at UALR

  • Analysis of Algorithms (CPSC 7385): 2010 fall, 2011 fall, 2012 fall, 2013 fall, 2014 fall, 2015 fall
    • Core course for MS in CS and PhD in Integrated Computing programs
    • The average of overall performance rated by students in the latest offering: 4.27 (out of 5)
  • Data Structures and Algorithms (CPSC 2380): 2011 spring, 2013 spring, 2015 spring
    • The average of overall performance rated by students in the latest offering: 4.48
  • Mobile Application Development (CPSC 4367/5367): 2011 fall, 2012 fall, 2014 spring, 2015 fall
    • New course developed, initially as a special topic course (CPSC 4399/5399)
    • The average of overall performance rated by students in the latest offering: 4.17 (4367)
  • Computer Security (CPSC 4360/5360): 2010 fall, 2012 spring, 2013 spring, 2014 spring
    • The average of overall performance rated by students in the latest offering: 4.63 (4360) and 4.67 (5360)
  • Software Security Assessment (CPSC 7325): 2012 spring, 2013 fall
    • New course developed
    • The average of overall performance rated by students in the latest offering: 4.67
  • Special Topic: Advanced Network Security (CPSC 7399): 2011 spring, 2014 fall
    • New course developed
    • The average of overall performance rated by students in the latest offering: 4.75
  • Telecommunications and Networking (CPSC 7341): 2015 spring
    • Core course for MS in CS and PhD in Integrated Computing programs
    • The average of overall performance rated by students in the latest offering: 4.15

Services

Conference & Workshop TPC

  • IEEE Conf. on Communications and Network Security (CNS): 2015
  • Intl. Conf. on Security and Privacy in Communication Networks (SecureComm): 2011, 2013, 2014, 2015, 2016
  • IEEE Intl. Symposium on High Assurance Systems Engineering (HASE): 2015
  • Intl. Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech): 2015
  • Intl. Conf. on Mobile Systems and Pervasive Computing (MobiSPC): 2014, 2015, 2016
  • Intl. Conf. on Body Area Networks (BODYNETS): 2013, 2014, 2015
  • IEEE Global Communications Conference (GLOBECOM): 2011, 2013, 2014, 2015
  • IEEE Intl. Conf. on Communications (ICC): 2012, 2013, 2014, 2015, 2016, 2017
  • IEEE Intl. Conf. on Networking, Architecture, and Storage (NAS) 2010, 2011, 2012, 2013, 2014, 2015
  • Intl. Conf. on Systems and Networks Communications (ICSNC): 2012, 2013, 2014, 2015
  • Intl. Conf. on Connected Vehicles & Expo (ICCVE): 2012, 2013, 2014
  • The Workshop on Big Data Analytics in Healthcare (BigDAH): 2014
  • Intl. Symposium on Cyberspace Safety and Security (CSS): 2014
  • The First Workshop on Mobile Cloud Computing in Healthcare (WMCCH 2013), Vice Chair

Journal Editorship

  • Security and Communication Networks (SCN): Editorial Board
  • International Journal of Security and Networks (IJSN): Editorial Board
  • Journal of Cyber Security and Mobility: Guest Editor (Special Issue on Big Data Theory and Practice)

Conference & Workshop Review

  • American Medical Informatics Association (AMIA) 2014 Annual Symposium
  • American Medical Informatics Association (AMIA) 2015 Joint Summits

Journal Review

  • IEEE/ACM Transactions on Networking (ToN)
  • IEEE Journal on Selected Areas in Communications (JSAC)
  • International Journal of Computer and Telecommunications Networking (Computer Networks)
  • IEEE IEEE Pervasive Computing
  • International Journal of Security and Networks (IJSN)
  • Security and Communication Networks (SCN)
  • KSII Transactions on Internet and Information Systems
  • Journal of Parallel and Distributed Computing (JPDC)

Academic Services

  • Founder and Advisor of UALR Cyber Security Club and UALR Collegiate Cyber Defense Competition (CCDC) team, since 2013
  • Advisor of UALR Association for Computing Machinery (ACM) Club and ACM UALR Chapter, since 2016
  • Advisor of UALR Chinese Students and Scholars Association (CSSA), since 2013
  • USENIX Campus Representative at UALR, since 2012
  • Member of UALR National Center of Academic Excellence (CAE) in Cyber Defense, since 2010
  • Member of UALR Graduate Council, 2016--2019
  • Member of UALR System Incident Response Team, since 2016
  • Member of Academic Calendar and Schedules Committee of University of Arkansas at Little Rock, 2012--2014
  • Member of Award Committee of Donaghey College of Engineering and Information Technology, 2012--2013
  • Member of Integrated Computing PhD program and Engineering Science and Systems PhD program, since 2011
  • Member of PhD Candidacy Exam Committee of the Integrated Computing PhD program, since 2011

NSF REU Site: CyberSAFE@UALR

I lead the NSF REU Site "CyberSAFE@UALR: Cyber Security and Forensics Research at University of Arkansas at Little Rock."

The Site CyberSAFE@UALR is focused on integration of fundamental security and forensics research with latest technology advances in mobile computing, cloud computing, and social networks. The Site aims to advance basic understanding of cyber attacks, explore novel and practical techniques and methods of collecting and analyzing digital evidence for cyber forensics, and investigate more secure and user friendly approaches to protecting people in using their smartphones, visiting their social networks, and accessing their apps and data in computing clouds. The diverse but closely related research projects will provide opportunities for participants to gain hands-on experiences of cyber security and forensics practices and tackle significant and interesting problems in cyber defense.

Highlights of the Site

  • Eight-week intensive research on cyber security and forensics
  • $4,000 stipend in total for each participant
  • On-campus housing and meals provided as needed
  • Travel expenses to and from the REU site

If you are interested, click the picture on the right for more information.

Contact Information

Mengjun Xie
2801 South University Avenue
EIT 579
University of Arkansas at Little Rock
Little Rock, Arkansas 72204-1099
Office EIT 573
Phone 501-569-8134
Fax 501-569-8144
E-mail mxxie AT ualr DOT edu
WWW www.mengjunxie.org
UALR Logo