About Me
I am currently a second-year Master’s student in Computer Engineering at the University of Illinois Urbana-Champaign, working with Prof. Varun Chandrasekaran. I feel fortunate to have met many kind and talented professors who have supported and inspired my journey. I am grateful to Prof. David Heath and Prof. Yupeng Zhang, whose guidance introduced me to the fascinating world of cryptography, and to Prof. Varun Chandrasekaran, whose mentorship has been invaluable in beginning my academic journey.
Before joining UIUC in 2023, I earned my Bachelor’s degree in Computer Engineering through a joint program between the University of Illinois Urbana-Champaign and Zhejiang University. During my undergraduate studies, I had the privilege of working with Prof. Wee-Liat Ong, Prof. Gaoang Wang, and Prof. Thomas Honold.
I’m open to collaborating on interesting research ideas. If you are interested in Trustworthy ML/AI Safety and seek collaboration, please feel free to contact me at taoranl2 [at] illinois [dot] edu.
“Stay hungry, stay foolish.”
— Steve Jobs, Stanford Commencement Address, 2005
Education
University of Illinois, Urbana-Champaign, 2023 - Present
Master of Engineering in Computer Engineering
Zhejiang University, 2018 - 2023
Bachelor of Engineering in Computer Engineering
University of Illinois, Urbana-Champaign, 2018 - 2023
Bachelor of Science in Computer Engineering
“纸上得来终觉浅,绝知此事要躬行。”
— 陆游《冬夜读书示子聿》
Research Interests
My research broadly covers computer security and privacy, focusing on robust, scalable, and practical solutions in the following domains:
- Trustworthy Machine Learning
- Integrating Cryptographic Protocols with ML Models: Utilizing cryptographic solutions like MPC and zero-knowledge proofs to develop privacy-preserving machine learning frameworks.
- Secure and Practical AI Systems: Creating robust, resilient AI models that withstand adversarial attacks and maintain user data privacy.
- Machine Unlearning: Investigating efficient algorithms and frameworks for safely removing data from trained machine learning models, ensuring regulatory compliance and privacy protection.
- AI for Code Generation, Debugging, Translation, and Vulnerability Detection: Leveraging large language models to automate secure coding practices, improve debugging effectiveness, facilitate code translation, and identify potential security vulnerabilities.
- Security and Privacy of IoT and Cyber-Physical Systems
- Secure AI Integration in Robotics and Autonomous Vehicles: Developing secure, resilient AI solutions to ensure reliable operation and safety in robotic systems and autonomous transportation.
- Enhancing Safety and Resilience of Interconnected Systems: Strengthening security frameworks for IoT-enabled smart infrastructures, enhancing their capability to resist cyber-attacks and privacy breaches.
- Cryptography
- Secure Multi-party Computation (MPC): Developing efficient MPC protocols to enable privacy-preserving analytics for sensitive data, such as healthcare records or financial transactions.
- Zero-knowledge Proofs (zk-SNARK): Designing and optimizing efficient, scalable zk-SNARK solutions for privacy-preserving applications in blockchain and decentralized systems.
- Data Privacy: Building scalable cryptographic mechanisms that protect privacy without compromising data utility or performance.
Miscellaneous
I enjoy cooking Chinese food with my friends. Additionally, I have a passion for hiking and photography, especially in natural environments. I have had the opportunity to visit several national parks, where I capture the beauty of the landscapes through my lens. The national parks I have visited include:
- Grand Canyon National Park
- Joshua Tree National Park
- Indiana Dunes National Park
- Grand Teton National Park
- Yellowstone National Park
- Great Sand Dunes National Park and Preserve
- Rocky Mountain National Park