Associate Professor
Computer Electronics & Graphics Technology
Coordinator
Computer Information Technology, MS
Office
Applied Innovation Hub
413-10
Biography

Shushan Zhao received his BSc degree in Computer Science and Engineering from Shandong University, and MSc degree in Computer Science and Engineering from Helsinki University of Technology. He completed his PhD degree in Computer Science from School of Computer Science, University of Windsor in 2012. 

Before joining Central Connecticut State University, he taught at Vanier College, Bishop’s University and University of Pittsburgh (Bradford Campus). Also having worked as a software developer at VMWare, Mavenir, Ericsson, and Nuance, he has rich experience in telecommunication and software industry. 

Areas of Expertise

Network and Information Security.

Courses taught:

  • Computer System Administration
  • Applied Network Security
  • Network Forensics
  • Ethical Hacking
  • Web Application Security
  • Blockchain Technology
  • Computer Hardware & Architecture
  • Linux Operating System
  • Intrusion Detection & Response
  • Systems Analysis & Design
  • Web Programming
  • Cryptography 
  • Fundamentals of Programming
  • Object Oriented Programming
  • Principles of Operating Systems
  • Database Design Using Oracle
Publications, Research & Presentations

Journal Papers

J17. Shushan Zhao, “A High-efficiency Secure Communication Scheme in Vehicle Ad-hoc Networks", Under review since Jan 2024, International Journal of Networking and Security

J16. Shushan Zhao, “Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy", Journal of Network & Information Security . 2023, Vol. 11 Issue 1, pp 20-27

J15. Shushan Zhao, “Quality improvement on minimum-storage-overhead image processing scheme in encrypted domain”, Entering Publication Schedule in March 2023, International Journal of Multimedia Intelligence and Security.

J14. Adam Motowidlo, Timothy Adatsi, Alvin Jackson, Shushan Zhao (Corresponding Author), “A Study on Security of IP Cameras and Its Awareness”, Indian Journal of Computer Science, Volume 7, Issue 1, January-February 2022, pp 45-70

J13. Shushan Zhao, “An improved scheme for image scaling, cropping and colour correction in encrypted domain”, International Journal of Multimedia Intelligence and Security, Vol. 4, No. 1, 2022, pp 86-99

J12. Shushan Zhao, Wes C.H. Chiang, “SMADS — A Novel Smart Logistics Network Framework”,  Journal of Network and Information Security, Vol. 9 No.2 2021, pp. 29-40

J11. Wes C.H. Chiang, Shushan Zhao and Duane E. Mitchell, “Marketing mistakes or unethical marketing in higher education? Two case studies in Ontario Colleges”, Journal of Education and Social Development (JESD), Vol.4 No.2 2020, pp. 9-16

J10. Shushan Zhao, Ken Wang “A Framework for a Decentralized and Self-Organized Mail Service Network”, Procedia Computer Science, Elsevier, Volume 155, 2019, pp. 327-335

J9. Shushan Zhao, Wenhui Hu “Improvement on OTP Authentication and Application in a General-purpose Possession-based Authentication Framework”, International Journal of Multimedia Intelligence and Security, Vol. 3, No. 2, 2018, pp. 187-202

J8. Shushan Zhao “Viable Email Attacks and a Simple End-to-End Security Solution”, Indian Journal of Computer Science, Volume 3, Issue 4, July 2018, pp. 22-31

J7. Shushan Zhao, Robert D. Kent and Akshai Aggarwal “A Key Management and Secure Routing Integrated Framework

for Mobile Ad-hoc Networks”, Ad Hoc Networks, Elsevier, Volume 11, Issue 3, May 2013, pp. 1046–1061 

J6. Shushan Zhao, Akshai Aggarwal, Richard Frost and Xiaole Bai “A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks”, Communications Surveys & Tutorials, IEEE, Volume PP Issue 99, March 2011, pp. 1-21 

J5. Shuping Liu, Shushan Zhao and Weirong Jiang “A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks”, Int’l J. of Communications Network and System Sciences, Volume 4 Issue 7, pp. 456-463, July 2011

J4. Shushan Zhao and Akshai Aggarwal “PAPA-UIC: A Design Approach and a Framework for Secure Mobile Ad-hoc Metworks”, Security and Communication Networks, Special Issue: Security in Ad Hoc Networks and Pervasive Computing, John Wiley and Sons, Volume 3 Issue 5, pp. 371-383, September-October 2010

J3. Shushan Zhao and Jian Zhou “The Realization of SFT3 in NOVELL Netware”, J. New Tide in Information Technology (China), pp. 32-39, 1994-Jun

J2. Jian Zhou and Shushan Zhao “WINDOWS and Multi-task Operating Systems”, J. New Tide in Information Technology (China), pp. 26-33, 1994-May 

J1. Shushan Zhao, “A Foresight on Future Technological Developments of Radio Paging Systems”, J. China Communications, pp. 3-9, 1999-Nov

Book Chapter

Shushan Zhao, “Improvement on Security of SMS Verification Codes”, Software Engineering Research, Management and Applications. 2019. Studies in Computational Intelligence book series, Volume 845. Springer (ISBN: 978-3-030-24343-2), pp. 189-203

Conference Papers

C16. Shushan Zhao and Wes Chiang, "Privacy-preserving, Low-storage, and High-quality Image Processing in IoT and Clouds", 2023 International Conference on Intelligent Communication and Computer Engineering (ICICCE)

C15. Shushan Zhao and Xiaobing Hou, “Security Improvement on HMAC-based One-time Password (HOTP)”, 2021 International Conference on Security and Management (SAM'21), 2021

C14. C. Chiang, D. E. Mitchell and Shushan Zhao. “Marketing Mistakes or Unethical Marketing - Two Case Studies in the Era of Commercialization of Higher Education”, International Conference on Management, Leadership and Business Intelligence, 2020

C13. Shushan Zhao, Shuping Liu, "An Add-on End-to-end Secure Email Solution in Mobile Communications", 10th EAI International Conference on Mobile Multimedia Communications, 2017.

C12. Shushan Zhao, Robert D. Kent, and Akshai Aggarwal “An integrated key management and secure routing solution for Mobile Ad-Hoc Networks”, In Proc. Privacy, Security and Trust (2012), IEEE

C11. Shushan Zhao and Akshai Aggarwal “Against mobile attacks in Mobile Ad-hoc Networks”, In Proc. Information    Theory and Information Security (2010), IEEE

C10. Shushan Zhao and Akshai Aggarwal “General-purpose Identity Hiding Schemes for Ad-hoc Networks”, In Proc. International Symposium on Intelligent Ubiquitous Computing (2009), IEEE

C9. Shuping Liu, Jianwei Chen, Shushan Zhao and Fan Na, “Peer-to-Peer Application in Mobile Cellular Systems”, In Proc. 5th International Conference on Information Technology: New Generations (2008), IEEE

C8. Shushan Zhao, Akshai Aggarwal, Shuping Liu and Huapeng Wu “A Secure Routing Protocol in Proactive Security Approach forMobile Ad-hoc Networks”, In Proc. Wireless Communications & Networking Conference (2008), IEEE

C7. Shushan Zhao, Akshai Aggarwal and Robert D. Kent “A Framework for Revocation of Proxy Certificates in a Grid”, In Proc. 8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (2007), IEEE

C6. Shushan Zhao, Akshai Aggarwal and Robert D. Kent “PKI-Based Authentication Mechanisms in Grid Systems”, In Proc. International Conterence on Networking, Architecture, and Storage (2007), IEEE

C5. Shushan Zhao, Akshai Aggarwal and Shuping Liu “Building Secure User-to-user Messaging Channels in Mobile Telecommunication Networks”, In Proc. 7th Wireless Telecommunications Symposium (2007), IEEE

C4. Shushan Zhao, Daniel Jaskiewicz and Jouni Karvo “A Deployment Tool for Public Safety Ad-hoc Networks”, In Proc. 1st Communication System Software and Middleware (2006), IEEE

C3. Shushan Zhao, Jouni Karvo and Henri Koskinen “Connectivity Enhancement in Deployable Ad-Hoc Networks with Moving Nodes”, 15th IST Mobile & Wireless Communications Summit (2006), IST 

C2. Shushan Zhao, Ronja Addams-Moring and Markku Kekkonen “Building Mobile Emergency   Announcement Systems in 3G Networks”, In Porc. IASTED Computer &Communication Networks (2005).

C1. Ronja Addams-Moring, Markku Kekkonen and Shushan Zhao “A simple taxonomy for mobile emergency announcement systems”, In Proc. 2nd ISCRAM (2005)

Technical Reports

  1. H. Aïache, J. M. Barceló, C. Blondia, A. Boukalov, L. Cerdà, P. D. Cleyn, J. Delaigle, J. García, X. Gonzalez, R. Guimaraes, D. Jaskiewicz, J. Karvo, E. Lara, J. Meessen, J. Morillo, A. Pascual, C. Parisot, A. Pérez-Neira, M. Realp, S. Romaszko, E. Santos, M. Voorhaen and S. Zhao, Specification of IP Stack for Advanced Ad Hoc Network, EU FP6-507572 Widens project, D3.1, 2004
  2. H. Aïache, J. M. Barceló, C. Blondia, A. Boukalov, L. Cerdà, P. D. Cleyn, J. Delaigle, J. García, X. Gonzalez, R. Guimaraes, D. Jaskiewicz, J. Karvo, E. Lara, J. Meessen, J. Morillo, A. Pascual, C. Parisot, A. Pérez-Neira, M. Realp, S. Romaszko, E. Santos, M. Voorhaen and S. Zhao, Specification of Low Layer Interface - IP/MAC Mapping, EU FP6-507572 Widens project, D3.2, 2004