Daniel Commey profile photo

Daniel Commey

Ph.D. (defended Dec 2025; conferral May 2026)

dcommey@tamu.edu

Research

My research focuses on secure, verifiable, and deployable systems for blockchain-IoT and federated learning. I build practical frameworks that combine applied cryptography, ML-driven defense, and system-level evaluation.

Hardware-Rooted Blockchain-IoT Security

Device identity and authentication anchored in PUFs and zero-knowledge proofs, integrated with permissioned blockchain environments.

PUFZIN explainer · IEEE LCN 2024

Adaptive Cyber Deception for IoT

Dynamic honeypot conversion driven by ML-based threat scoring and game-theoretic decision models for resource-efficient defense.

BHICS explainer · JISA 2025

Post-Quantum Secure Federated Learning

Quantum-resistant signatures and blockchain verification for FL updates, with benchmarks on MNIST, SVHN, and HAR.

PQS-BFL explainer · ESWA 2026

Full publication list →

Research Explainers

Accessible explanations of my research on blockchain, IoT security, and applied cryptography.

MEV in DeFi: A Game-Theoretic View of Attacks and Mitigations

February 11, 2026 · Data Security

The 20-Second Summary

LEO IoT Reliability: The 6-Hour TLE Ageing Cliff

February 11, 2026 · Network Security

The 20-Second Summary

FedSkipTwin: Digital-Twin-Guided Client Skipping for Communication-Efficient FL

February 11, 2026 · Data Security

The 20-Second Summary

ZKP-FedEval: Verifiable, Privacy-Preserving Federated Evaluation

February 10, 2026 · Data Security

The 20-Second Summary

Post-Quantum Cryptography for Consumer Electronics: Performance and Deployment

February 10, 2026 · Device Security

The 20-Second Summary

Securing Health Data on the Blockchain with DP and Federated Learning

February 10, 2026 · Data Security

The 20-Second Summary

FedGraph-VASP: Privacy-Preserving Federated Graph Learning for AML

February 10, 2026 · Data Security

The 20-Second Summary

EGAN: Evolutional GAN for Ransomware Evasion

February 10, 2026 · Network Security

The 20-Second Summary

A Bayesian Incentive Mechanism for Poison-Resilient Federated Learning

February 10, 2026 · Data Security

The 20-Second Summary

PUFZIN: Device Authentication with PUFs and Zero-Knowledge Proofs

February 02, 2026 · Device Security

The 20-Second Summary

PQS-BFL: Post-Quantum Secure Federated Learning for Healthcare

February 02, 2026 · Data Security

The 20-Second Summary

BHICS: Dynamic Honeypots That Adapt to Attackers

February 02, 2026 · Network Security

The 20-Second Summary