skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Wu, Zhou"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. The ever increasing amount of personal data accumulated by companies offering innovative services through the cloud, Internet of Things devices and, more recently, social robots has started to alert consumers and legislative authorities. In the advent of the first modern laws trying to protect user privacy, such as the European Union General Data Protection Regulation, it is still unclear what are the tools and techniques that the industry should employ to comply with regulations in a transparent and cost effective manner. We propose an architecture for a public blockchain based ledger that can provide strong evidence of policy compliance. To address scalability concerns, we define a new type of off-chain channel that is based on general state channels and offers verification for information external to the blockchain. We also create a model of the business relationships in a smart home setup that includes a social robot and suggest a sticky policy mechanism to monitor cross-boundary policy compliance. 
    more » « less
  2. As artificially intelligent humanoids become increasingly prevalent in the home, it is imperative that we develop secure designs to guard against cyberattacks. The next evolution of AI-powered home devices, such as Alexa, is to create physical effectors to enable these devices to alter their environments. Current humanoids on the market, such as the EZ-Robot JD and NAO, are examples of artificially intelligent robots that may one day become common in home environments. If these humanoids are not designed to be safe against cybersecurity vulnerabilities, they may be used to cause harm to living spaces and possibly even the humans living in these spaces. This paper examines the cybersecurity of two humanoid robots and provides recommendations for future safe designs and protections in artificial intelligent social robots. 
    more » « less