Short Biography
Dr. Jin-Hee Cho is an associate professor and a director of Trustworthy Cyberspace Lab (tClab) in the Department of Computer science at Virginia Tech since Aug. 2018. Prior to joining the Virginia Tech, she worked as a computer scientist (DB III for 2010-2015; DB IV for 2016-2018) at the U.S. Army Research Laboratory (USARL), Adelphi, Maryland, since July 2010 and was an ORAU/ARL postdoctoral researcher for Jan. 2009 - July 2010. Dr. Cho was on the adjunct faculty at Virginia Tech for 2012-2016 and at The George Washington University for 2014-2016. Dr. Cho's main areas of research interest includes trust management, moving target defense, defensive deception, metrics and measurements, network performance analysis, resource allocation, agent-based modeling, uncertainty reasoning and analysis, decision making under uncertainty, network science, information fusion and credibility, and social network analysis. She published more than 160 peer-reviewed technical papers in those areas as of Feb. 2022. She received the best paper awards in IEEE TrustCom 2009, BRIMS 2013, IEEE GLOBECOM 2017, 2017 ARL's publication award, and IEEE CogSIMA 2018. She is a winner of the 2015 IEEE Communications Society William R. Bennett Prize in the Field of Communications Networking. In 2016, Dr. Cho was selected for the 2013 Presidential Early Career Award for Scientists and Engineers (PECASE), which is the highest honor bestowed by the US government on outstanding scientists and engineers in the early stages of their independent research careers. Dr. Jin-Hee Cho received the BA from Ewha Womans University, Seoul, Republic of Korea and MA from Washington University in St. Louis, MO, USA. She also obtained MS and PhD degrees in computer science from Virginia Tech in 2004 and 2008, respectively. She is a senior member of the IEEE and a member of the ACM.
Courses
- CS 6804 Advanced Topics on Game Theoretic Cybersecurity (Graduate Course; Spring'21). This course will consists of three parts: (1) Study the fundamentals of game theory: To provide basic knowledge about game theory, we will go over a game theory text book (described below) for 1-8 lectures and make sure the understanding of knowledge learned via two quizzes; (2) Learning the state-of-the-art game theoretic cybersecurity research: We will go over the state-of-the-art research articles on game theoretic cybersecurity and discuss them based on a set of criteria for critiques; and (3) Writing a research paper: With the help of the instructor, students will come up with novel research ideas in the area of game theoretic cybersecurity and write a technical research paper. The details of evaluation rubrics will be provided via canvas. If the quality of the research paper is good, we can publish the paper. But this will require additional work to require the paper.
- CS/ECE 5584: Network Security (Graduate Course; Fall'19-21). This course first covers the following fundamentals of network security: secret key cryptography, modes of operations, hashes and message digest, public key algorithms, number theory, authentication, security handshakes, passwords, Kerberos standards, PKI, real-time communication security, IPsec (AH and ESP), IKE, SSL/TLS, electronic mail security, PEM, S/MIME, PGP, firewall, web issues, protocol designs between security and performance. Second, we also learn the state-of-the-art security technologies in terms of intrusion detection, blockchains, intrusion prevention (proactive defense), security metrics, game theoretic approach for cybersecrutiy, and social network attacks and their countermeasures. The course website is available for registered VT students at the VT Canvas.
- CS 5114: Theory of Algorithms (Graduate Course; Spring'20, 22; Fall'18; Summer'12-15). This course covers methods to construct algorithms and to analyze algorithms in a graduate level. The main content to be covered in this course includes design and analysis of algorithms, probabilistic analysis and randomized algorithms, sorting algorithms, graphs, dynamic programming, greedy algorithms, amortized analysis, linear programming, single-source shortest paths, maximum flow, B-Tree, basic graph algorithms, and NP-completeness. The course website is available for registered VT students at the VT Canvas.
- CS 6204: Advanced Topics in Network Science (Graduate Course; Spring'19, Summer'16). This course will consist of two parts: (1) learning through the lectures to cover the key concepts of network theories including types of networks, mathematical representations of networks, measures and metrics of networks, the large-scale structure of networks, network models, and processes on networks; and (2) studying the state-of-art research papers published in the area of network science related to the content covered in the lecture. The course website is available for registered VT students at the VT Canvas.
Publications
Recent Services
Editorial Board
- Editorial Board, Associate Editor, IEEE Transactions on Services Computing (IEEE Communications Society; Impact Factor 5.823 in 2020), 2021 - current
- Editorial Board, Associate Editor, IEEE Transactions on Network and Service Management (IEEE Communications Society; Impact Factor 3.878 in 2019-2020), 2019 - current
- Editorial Board, Associate Editor, The Computer Journal (Oxford Academic; 2020 Impact Factor 1.494), 2016 – 2021
(Co)Chairs or Technical Program Committee (TPC)
- Program Co-Chair, 26th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2021) 2021
- TPC, The 17th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS 2022)
- TPC, Annual Computer Security Applications Conference (ACSAC 2019-2021)
- TPC, IEEE CogSIMA, 2014-2021
- TPC, IARIA The Thirteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2020)
- TPC, The 20th World Conference on Information Security Applications (WISA 2019 - 2020)
- TPC, IEEE Military Communications Conf. (MILCOM 2019)
- TPC, The IEEE/ACM Int'l Conf. on Social Network Analysis and Mining (ASONAM 2019)
- TPC, The 20th World Conference on Information Security Applications (WISA 2019)
- TPC, IEEE Conference on Communications and Network Security (CNS 2019)
- TPC, IEEE CogSIMA, 2019
- TPC, IEEE SecDev, 2019
Funded Projects at Virginia Tech
External Funding
- Co-PI with the lead PI Peter Beling (VT, Hume Center), Old Dominion University and Norfolk State University collaborators, Funding Program of Virtual Institutes for Cyber and Electromagnetic Spectrum Research and Employ (VICEROY), ``Cybersecurity Research and Advanced Training of ROTC Students (CREATORS),'' (Total: $1,487,269; VT: $812,269; My share: $62,025; 12/25/2021 - 12/24/2023).
- Lead PI with Co-PI Hoda Eldardiry (CS, VT), PI Hongyi Wu (ODU), and Co-PI Rui Ning (ODU), The Commonwealth Cyber Initiative (CCI) Collaboration Funding Program, ``Deep Resilience for Multifaceted Federated Learning in Internet-of-Everything'' (Total $125K; VT: $75K; My share: $40K; 12/25/2021-12/24/2022)
- Co-PI with lead PI Dong S. Ha (ECE, VT), PI Swarun Kumar (ECE, CMU) and Co-PI Robin White (Animal and Poultry Science, VT), NSF CNS: Medium: ``Energy Centric Wireless Sensor Node System for Smart Farms'' (Total $750K; VT: $573,750; My share: $191,108; 10/01/2021-09/30/2025)
- PI with lead PI Feng Chen (UTD) and PI Dong Hyun Jeong (UDC), NSF III: Medium: ``Multidimensional Uncertainty-Aware Deep Learning Framework'' (Total $1.2M; My share: $500K; 10/01/2021-09/30/2025)
- PI, ARO: ``Uncertainty-Aware Deep Reinforcement Learning-based Defense for Resilient Cyber-Physical Systems'' (Total/VT/My share: $240K; 05/01/2021 - 04/30/2024)
- PI with co-PI Munindar Singh (CS, North Carolina State University): Army Research Office (ARO): ``Foureye: Cyber Defensive Deception based on Hypergame Theory for Tactical Networks'' (Total $285K; VT/My share: $190K; 05/2020-4/2023)
- PI with lead PI Hongyi Wu (ODU) et al., The Commonwealth Cyber Initiative (CCI): ``Backdoor Detection and Mitigation in Deep Neural Networks'' (Total $184,816; VT/My share: $48,284; 05/2021-04/2022)
- Co-PI with PI Hwajung Lee (Radford University) and other 5 VT Co-PIs, The Commonwealth Cyber Initiative (CCI): ``5G Enabled Smart Farms through Secure and Intelligent Wireless Sensors'' (Total $20K; VT: $10K; My share: $1,667; 01/2021-06/2021)
- Co-PI with PI Dong S. Ha (ECE, VT) and Co-PI Robin White (APS, VT): FY20 Southwest Virginia Collaboration Grant Proposal sponsored by The Commonwealth Cyber Initiative (CCI) Southwest Virginia Node Institutions: ``Secure Wireless IoT Sensors for Smart Farms,'' (Total $20K; My share: $6.7K; 07/2020 - 12/2020)
Internal Funding
- Co-PI with PI Dong S. Ha (ECE, VT) and Co-PI Robin White (APS, VT): Internal Funding; ICTAS EFO Opportunity Seed Investment Grant: ``Secure Wireless IoT Sensors for Smart Farms'' (Total $10K; My share: $3.3K; 01/2021 - 06/2021)
- PI with PI Lifu Huang (CS, VT) and Co-PIs Kee Jeong Kim (Human Development and Family Science), Mary Beth Dunkenberger (Policy and Government), Lara Nagle (Policy and Government), Internal Funding, ISDA-ISERC (Integrated Security Destination Area-The Integrated Security Education and Research Center) research proposal entitled ``Building Youth Resilience to Cybergrooming: Transdisciplinary Prevention Approach'' (Total $10K; My share: $3K; 07/01/2021 - 06/31/2022)
Selected Awards & Honors
- Team Award for the Cyber Strategic Challenge Group of TTCP (The Technical Cooperation Program) by DoD OUDS (R&E), Feb. 2019
- Best Paper Award, IEEE CogSIMA 2018, June 2018
- Best-In-Session Presentation Award, IEEE INFOCOM 2018, April 2018
- Best Paper Award, IEEE GLOBECOM 2017, Dec. 2017
- ARL’s Publication Award, Nov. 2016
- 2013 Presidential Early Career Award for Scientists and Engineers (PECASE), May 2016
- The 2015 IEEE Communications Society William R. Bennett Prize in the Field of Communications Networking, Apr. 2015
- Elevation to IEEE Senior Member, Aug. 2014
- Best Paper Award, BRIMS 2013
- Best Paper Award, IEEE TrustCom 2009
To the top