学术论文

2020年:

期刊论文:

  1. Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, and Wei Wang: Sensing Users’Emotional Intelligence in Social Networks, IEEE Transactions on Computational Social Systems, vol. 7, no. 1, pp. 103-112, 2020
  2. Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511: 284-296 (2020)
  3. Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Lian, Hequn Xian, Wei Wang, Privacy-Preserving Categorization of Mobile Applications Based on Large-scale Usage Data, Information Sciences, 514: 557-570 (2020)
  4. Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1184-1199, 2020
  5. Xiaoming Liu, Chao Shen, Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection, IEEE Transactions on Fuzzy Systems, 28(5): 806-817, 2020
  6. Yongzhong He, Endalew Elsabeth Alem, Wei Wang. Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites[J]. Frontiers of Computer Science, 2020, 14(3): 1-14.
  7. Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”, Future Generation Computer Systems, 108: 1314-1323, 2020
  8. Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang. Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis[J]. Journal of Systems and Software, 2020: 110609.
  9. Xinyu Huang, Yunze Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang. Exposing Spoofing Attack on Flocking-based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence[J]. Security and Communication Networks:1905.03454, 2020.12:1-20
  10. Yuqing Zhu,Jiejing Wen,Jincheng Zhuang,Chang Lv,Dongdai Lin. Refined analysis to the extended tower number field sieve[J]. Theoretical Computer Science, 2020, 814: 49-68.
  11. Yike Li, YingXiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han. An Empirical Study on GAN-based Traffic Congestion Attack Analysis: A Visualized Method [J]. Wireless Communications and Mobile Computing:1530-8669, 2020.12:1-20
  12. Nan Jiang, Weiqi Wang, Jinchao Wu, Jian Wang. Traceable Method for Personal Information Registration Based on Blockchain [J]. IEEE Access, 2020, 8: 52700-52712.
  13. Nan Jiang, Zhuoxiao Ji, Jian Wang, Xiaowei Lu, Rigui Zhou. Quantum Image Histogram Statistics[J]. International Journal of Theoretical Physics, 2020, 59(11): 3533-3548.
  14. Zhi Chen, Xiaolin Chang, Zhen Han, Yang Yang. Numerical Evaluation of Job Finish Time Under MTD Environment[J]. IEEE Access, 2020, 8: 11437-11446.
  15. Yixiang Wang, Jiqiang Liu, Jelena Misic, Vojislav B. Misic, Shaohua Lv, Xiaolin Chang. Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples[J]. IEEE Access, 2019, 7: 152766-152776.
  16. Ziqi Yan, Qiong Wu, Meng Ren, Jiqiang Liu, Shaowu Liu, Shuo Qiu. Locally private Jaccard similarity estimation[J]. Concurrency and Computation: Practice and Experience, 2019, 31(24): 4889.
  17. Lun Li, Jiqiang Liu, Xiaolin Chang, Tianhao Liu, Jingxian Liu. Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach[J]. Information Sciences, 2020, 509: 290-303.
  18. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu, Yanfeng Shi. Toward practical privacy-preserving frequent itemset mining on encrypted cloud data[J]. IEEE Transactions on Cloud Computing, 2020.
  19. Jing Bai, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi, Zhen Han. Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views[J]. IEEE Access, 2020, 8: 6448-6459.
  20. Runkai Yang, Xiaolin Chang, Jelena Misi, Vojislav B. Misi. Performance Modeling of Linux Network System with Open vSwitch [J]. Peer-to-Peer Networking and Applications, 2020, 13(1): 151-162.
  21. Yipin Zhang, Xiaolin Chang, Yuzhou Lin, Jelena Misic, Vojislav B. Misi. Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification[J]. IEEE Access, 2020, 8: 44652-44660.
  22. Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena Misic, Vojislav B. Misic. Performance analysis of Hyperledger Fabric platform: A hierarchical model approach[J]. Peer-to-Peer Networking and Applications, 2020: 1-12.
  23. Yingying Yao, Xiaolin Chang, Jelena Misic, Vojislav B. Misic. Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks[J]. IEEE Transactions on Cognitive Communications and Networking, 2020.
  24. Jelena Misi, Vojislav B. Misi, Xiaolin Chang, Saeideh Gholamrezazadeh Motlagh, M. Zulfiker Ali. Modeling of bitcoin’s blockchain delivery network[J]. IEEE Transactions on Network Science and Engineering, 2020.
  25. Lili Jiang, Xiaolin Chang, Runkai Yang, Jelena Misi, Vojislav B Misi. Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies[J]. The Computer Journal, 2020, 63(10): 1564-1583.
  26. Runkai Yang, Xiaolin Chang, Jelena Misi, Vojislav B.Misi. Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views[J]. Computers & Security, 2020, 97: 101956.
  27. Junyan Guo, Ye Du. Fog Service in Space Information Network: Architecture, Use Case, Security and Challenges[J]. IEEE Access, 2020, 8: 11104-11115.
  28. Shuanghe Peng, Qiaofeng Zhou, Peiyao Liu. A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming[J]. Wuhan University Journal of Natural Sciences, 2018, 23(6): 535-540.
  29. Kai Yang,Qiang Li,Xiaodong Lin,Xin Chen,Limin Sun. iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting[J]. IEEE Journal on Selected Areas in Communications, 2020, 38(5): 955-967.
  30. Naiyue Chen,Bo Hu,Yuqun Rui. Dynamic Network Community Detection With Coherent Neighborhood Propinquity[J]. IEEE Access, 2020, 8: 27915-27926.
  31. Yingdi Wang,Jiqiang Liu,Tong Chen,Yingxiao Xiang,Endong Tong,Wenjia Niu. A Two-layer Mechanism Identification Method for VIN Adversarial Examples, Journal of Physics: Conference Series, 2020, 1584(1): 012069.
  32. Chao Li,Balaji Palanisamy. Comparison of Decentralization in DPoS and PoW Blockchains, Journal of Physics: Conference Series, vol 1584, 012069(1-9), ISSN:1742-6588,2020(7).
  33. 孟吴同, 张大伟. Hyperledger Fabric共识机制优化方案[J/OL].自动化学报:1-14, 2020-12-12.
  34. 王舜, 杜晔, 韩臻. 基于模块化Abstract-Refine算法框架的软件模型检测方法[J]. 电子学报, 2020, 48(5): 997-1002.
  35. 赵佳, 李春燕, 刘吉强, 韩磊, 张强. 车载自组网中信息通信隐私保护的研究[J]. 网络空间安全, 2020, 11(7): 5.
  36. 彭双和, 赵佳利, 韩静. 基于性能分析的 Cache 侧信道攻击循环定位[J]. 2020.
  37. 彭双和, 韩静. 基于内存访问轨迹的程序脆弱性检测[J]. 北京交通大学学报, 2020, 44(05): 55.
  38. 王健, 王语杰, 韩磊. 基于突变模型的SDN环境中DDoS攻击检测方法[J]. 信息网络安全, 2020, 20(5): 11.
  39. 曹舒雅, 姚英英, 常晓林. 5G超密集网络的认证方案综述[J]. 网络空间安全, 2020, 11(4): 7.
  40. 纪健全, 姚英英, 常晓林. 基于 OpenID Connect 的工业互联网平台认证与授权方案[J]. 网络空间安全, 2020, 11(7): 3.
  41. 韩磊, 刘吉强, 王健, 石波, 旭东. 高安全属性价值设备威胁态势量化评估方法[J]. 网络与信息安全学报, 2020, 6(5): 54-66.
  42. 邱禧荷,李琼,谭晓宇,陈珏.基于半监督学习的骨科植入物推荐系统应用研究[J]. 传感器与微系统, 2020,39(11):11-13+17.

会议论文:

  1. Jinke Song,Qiang Li,Haining Wang,Limin Sun. Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild[J]. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2020, 4(1): 1-25.
  2. Zhihao Wang, Qiang Li, Jinke Song, Haining Wang, Limin Sun, Authors Info, Affiliations. Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks,Proceedings of The Web Conference 2020. 2020: 1422-1432.
  3. Xiaoting Lv, Zhe Chen, Di Wu, Wei Wang: Sentiment Analysis on Chinese Weibo regarding COVID-19, accepted by 9th CCF International Conference on Natural Language Processing and Chinese Computing (NLPCC2020), Zhengzhou, China, Oct 14-18, 2020
  4. Xu Gao, Jiqiang Liu,Yike Li, Xiaojin Wang, YingXiao Xiang, Endong Tong, Wenjia Niu, Zhen Han. Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control, International Conference on Intelligent Information Processing. 2020: 254-265.
  5. Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang. Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions, International Symposium on Security and Privacy in Social Networks and Big Data. 2020: 340-354.
  6. Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song. A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning, International Symposium on Security and Privacy in Social Networks and Big Data. 2020: 120-131.
  7. Yindi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu. A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection,Proc of 14th International Conference on Verification and Evaluation of Computer and Communication Systems, 2020.09:1-15.
  8. Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li. Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack[J]. Proc of 16th International Conference on Information Security and Cryptology, 2020.10:1-12.
  9. Yunze Tian, Yindi Wang, Endong Tong, Wenjia Niu, Liang Chang, Chen, Li, Jiqiang Liu. Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples, Proc of IEEE 26th International Conference on Parallel and Distributed Systems, 2020.11:1-11.
  10. Xiaojin Wang, YingXiao Xiang, Wenjia Niu, Endong Tong, Chen, Li, Jiqiang Liu, Long Li. Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System, Proc of IEEE 26th International Conference on Parallel and Distributed Systems, 2020.11:1-11.
  11. Xiaojin Wang, YingXiao Xiang, Wenjia Niu, Endong Tong, Chen, Li, Jiqiang Liu, Long Li. Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack, Proc of 18th IEEE International Symposium on Parallel and Distributed Processing with Applications , 2020.11:1-8.
  12. Jelena Misi, Vojislav B. Misi, Xiaolin Chang. On the benefits of compact blocks in Bitcoin, ICC 2020-2020 IEEE International Conference on Communications (ICC), 2020: 1-6.
  13. Balaji Palanisam,Chao Li. Self-Emerging Data Infrastructures, 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)., 2019: 256-265.
  14. Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu. NF-Crowd: Nearly-free Blockchain-based Crowdsourcing, 2020 International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2020: 41-50.
  15. Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang. DNS Rebinding Detection for Local Internet of Things Devices, International Conference on Frontiers in Cyber Security. Springer, Singapore, 2020: 19-29.
  16. ZiHao Wang, ShuangHe Peng, XinYue Guo, WenBin Jiang. Zero in and TimeFuzz: detection and mitigation of cache side-channel attacks, International Conference on Security for Information Technology and Communications. Springer, Cham, 2018: 410-424.
  17. Jelena Misic, Vojislav B. Misic, Xiaolin Chang. On Ledger Inconsistency Time in Bitcoin’s Blockchain Delivery Network,2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 2019: 1-6.
  18. Runkai Yang, Xiaolin Chang, Jelena Misic, Vojislav B. Misic, Zhi Chen, Bo Liu. Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF,2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 2019: 1-6.
  19. Haoran Zhu, Jing Bai, Xiaolin Chang, Jelena Misi, Vojislav Misi, Yang Yang. Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability,International Conference on Algorithms and Architectures for Parallel Processing. Springer, Cham, 2020: 619-632.
  20. Hongyue Kang, Bo Liu, Jelena Misic, Vojislav B. Misic, Xiaolin Chang. Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks, 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2020: 513-517.

2019年:

期刊论文:

  1. Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang*: SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs, IEEE Transactions on Computational Social Systems, 6(6):1373-1385 (2019) [DOI][PDF].
  2. Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs, ACM Transactions on Intelligent Systems and Technology (TIST), 10(6): 64:1-18(2019)[DOI][PDF] .
  3. Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”, Future Generation Computer Systems99(10):154-163(2019) [DOI][PDF].
  4. Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions, IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].
  5. Nannan Xie, Xing Wang, Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”, Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].
  6. Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality, IEEE Access,  7: 33380-33392 (2019) [PDF][PDF].
  7. Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries, Journal of Information Security and Applications , 99 (10): 154-163 (2019) [DOI][PDF].
  8. Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks, IEEE Access, 7(1): 20381-20393, 2019 [DOI][PDF].
  9. Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF].
  10. Xiaolin Chang, Tianju Wang, Rodríguez,Zhenjiang Zhang. Modeling and Analysis of High Availability Techniques in a Virtualized System, COMPUTER JOURNAL,2018-12,61/,2/,180-198.
  11. Yingying Yao,Xiaolin Chang,Misic . Reliable and Secure Vehicular Fog Service Provision, IEEE INTERNET OF THINGS JOURNAL, 2019-02,6/,1/,734-743.
  12. Yu Shi,Xiaolin Chang,Rodriguez,Zhenjiang Zhang,Trivedi. Quantitative security analysis of a dynamic network system under lateral movement-based attacks,Reliability Engineering & System Safety, 2019-03,183//,213-225.
  13. Yingying Yao; Xiaolin Chang ; Jelena Mišić  ; Vojislav B. Mišić  ; Lin Li. BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services, IEEE internet of things journal, 2019-04,6/,2/,3775 – 3784.
  14. Jelena Misic, Vojislav B. Misic,Xiaolin Chang. Data Lifetime Estimation in a Multicast-Based CoAP Proxy, Open Journal of Internet of Things (OJIOT), 2019-08,5/,1/,150-162
  15. Yixiang Wang, Jiqiang Liu, Jelena V Misic,Vojislav B Misic, Shao hua Lv, Xiaolin Chang. Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples, IEEE Access,2019-12,7/,20/,152766-152776.
  16. Chao Li, Zhenjiang Zhang, Changbing Zhou,Siying Zhao,Naiyue Chen. A UKF-Based Emergency Aware Fusion Model in a Heterogeneous Network for Wireless Body Networks , IEEE ACCESS, 2019-06,7/,2019/,68930-68939,2019-08 ,5/,4/,91-98.
  17. JIAPING MEN,GUANGQUAN XU,ZHEN HAN, ZHONGHAO SUN, XIAOJUN ZHOU,WENJUAN LIAN and XIAOCHUN CHENG .Finding Sands in the Eyes:Vulnerabilities Discovery in IoT with EU Fuzzer on Human Machine Interface, IEEE ACCESS,2019.
  18. Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu,Endong Tong, Zhen Han .Adversarial attack and defense in reinforcement learning-from AI security view,Cybersecurity, 2019.
  19. Shaohua Lv, Jiang Wang, Yinqi Yang, Jiqiang Liu. Intrusion Prediction With System-Call Sequence-to-Sequence Model, IEEE Access,2018-12,6/,1/,71413-71421.
  20. Jiang Wang, Yacong Geng, Lei Han, Jiqiang Liu. Quantum Image Encryption Algorithm Based on Quantum Key Image, International Journal of Theoretical Physics,2019-01,58/,1/,308-322.
  21. Shuanghe Peng,Qiaofeng Zhou,Peiyao Liu. A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming, Wuhan University Journal of Natural Sciences,2018-12,23/,6/,535-540.
  22. Shuanghe Peng,Peiyao Liu,Jing Han. A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection, Wuhan University Journal of Natural Sciences,2019-04,24/,2/,141-148.
  23. 蔡雨彤,常晓林,石禹,陈志. 动态平台技术防御攻击的瞬态效能量化分析, 信息安全学报, 2019-08,4/,4/,59-67.
  24. 赵镇东,常晓林,王逸翔. 机器学习中的隐私保护综述, 信息安全学报, 2019-09,4/,5/,1-13.
  25. 董晓露,黎妹红,杜晔,吴倩倩. 基于切比雪夫混沌映射和生物识别的身份认证方案, 北京航空航天大学学报, 2019-05,45/,5/,1052-1058.
  26. 杜捷,何永忠, 杜晔. 基于改进IPD质心的Tor网络流水印检测方法, 网络与信息安全学报
  27. 杜捷,何永忠,杜晔. 基于改进IPD质心的Tor网络流水印检测方法, 网络与信息安全学报,2019,5/,4/,91-98.
  28. 高凡,张大伟,宋靖文,孟吴同,刘晓东. 基于SM2的无证书可截取签名方案, 郑州大学学报(理学版), 2018-12,51/,3/,7-12.
  29. 宋靖文,张大伟,高凡,孟吴同,刘晓东. 一种改进的基于SM2的代理签名方案, 郑州大学学报(理学版),2018-12,0/,2/,9-16.
  30. 王继刚,李媛媛,高珍祯,王伟. 基于函数调用图分析的NGBTVOS恶意应用检测方法, 北京交通大学学报,2019-04,43/,2/,9-17.
  31. 彭双和,刘佩瑶,赵佳利. 基于特征矩阵的Python克隆代码漏洞检测方法, 武汉大学学报(理学版), 2019-07/,5/,472-478.
  32. 张英俊,李清勇,王公仆,李强. 基于Python语言的“算法分析”课程设计——以动态规划算法为例, 工业和信息化教育,2019,0/,3/,63-68.
  33. 韩静,彭双和,赵佳利. 动态内存分配及内存泄漏相关概念的案例教学, 计算机教育,2019-01,289/,1/,111-115.
  34. 李会霞,彭双和,魏慧琴. 一种适用于SCTP垂直切换的拥塞控制方法, 中国科技论文,2019-07,14/,7/,71-75.

会议论文:

  1. Xiaolei WangAndrea ContinellaYuexiang YangYongzhong He, Sencun Zhu: LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications. IMWUT 3(1): 28:1-28:25 (2019) –The Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT). UbiComp 2019.
  2. Yingjie WangXing LiuWeixuan Mao, Wei Wang:
    DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps. ACM TUR-C 2019: 137:1-137:9
  3. Jingjing SongHaiwu HeZhuo LvChunhua SuGuangquan Xu, Wei Wang:An Efficient Vulnerability Detection Model for Ethereum Smart Contracts. NSS 2019: 433-442
  4. Li ZhangZhuo LvXuesong ZhangCen ChenNuannuan LiYidong Li, Wei Wang:A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System. NSS 2019: 408-417
  5. Xiangyu Wei, Jin LiZhen HanWei Wang:Predicting Users’ Emotional Intelligence with Social Networking Data. SocialSec 2019: 191-202
  6. Jelena Misic,Vojislav B Misic, Xiaolin Chang, Saeideh G Motlagh, MZulfiker Ali. Block Delivery Time in Bitcoin Distribution Network, ICC 2019 – 2019 IEEE International Conference on Communications (ICC), //,ICC 2019 – 2019 IEEE International Conference on.
  7. Bo Liu, Xiaolin Chang, Yang Yang Zhi Chen, Zhen Han.Evaluating Performance of Active Containers on PaaS Fog Under Batch Arrivals: A Modeling Approach,IEEE Symposium on Computers and Communications,2019-06.
  8. Yixiang Wang,Jiqiang Liu,Xiaolin Chang. Assessing transferability of adversarial examples against malware detection classifiers, Proceedings of the 16th ACM International Conference on Computing Frontiers, CF 2019, //,211-214.
  9. Vojislav B Mišić, Jelena Mišić, Xiaolin Chang. Towards a Blockchain-Based Healthcare Information System : Invited Paper, 2019 IEEE/CIC International Conference on Communications in China (ICCC) 2019//,13-18.
  10. Jelena Misic, Vojislav B Misic,Xiaolin Chang. On ledger inconsistency time in Bitcoin’s blockchain delivery network, IEEE Global Communications Conference, GLOBECOM 2019//,1-6.
  11. Yunkai Yang, Xiaolin Chang,Jelena Misic,Vojislav B Misic, Zhi Chen,Bo Liu. Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF, IEEE Global Communications Conference, GLOBECOM 2019,//,1-6.
  12. Naiyue Chen, He,Wang, Zhiyuan Zhang,Yang,Yanping Fu. Community Detection with indirect neighbors based on Granular Computing in social networks, 2019 International Joint Conference on Neural Networks, IJCNN 2019,//,1-8.
  13. Hongshan Yin,Yongzhong He. I2P Anonymous Traffic Detection and Identification, 5th International Conference on Advanced Computing and Communication Systems (ICACCS), 2019//,157-162.
  14. Jiale Liu, Yongzhong He. Membership Detection for Real-world Groups Hidden in Social Network, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019,//,152-154.
  15. Yongzhong He, Liping Hu, Rui Gao. Detection of Tor Traffic Hiding under Obfs4 Protocol Based on Two-level Filtering, 2019 2nd International Conference on Data Intelligence and Security,2019//,195-200.

2018年:

期刊论文:

  1. X. Chang, Jose M. Martinez, Kishor S. Trivedi, “Transient Performance Analysis of Smart Grid with Dynamic Power Distribution”, Information Sciences, 422: 98-10, 2018.
  2. Bo Liu, X. Chang, Zhen Han, Kishor Trivedi, Ricardo J. Rodrgues, “Model-based Sensitivity Analysis of IaaS Cloud Availability”, Future Generation Computer Systems, 2018.
  3. Chen Z , Chang X , Han Z , et al. Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers[J]. The Computer Journal, 2017:1-10.
  4. Chang,R.F. Xia,J.K. Muppala, K.S. Trivedi, jiqiang Liu, “Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload”, IEEE Transactions on Cloud Computing, 2018
  5. Chang, et al, “Modeling and Analysis of High Availability Techniques in a Virtualized System”, The Computer Journal, 2018.
  6. Chen N , Liu Y , Cheng J , et al. A novel parallel community detection scheme based on label propagation[J]. World Wide Web, 2018, 21(5):1377-1398.
  7. Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)
  8. Qiang Li , Xuan Feng, Haining Wang, Limin Sun, “Understanding the Usage of Industrial Control System Devices on the Internet”, IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018
  9. Yuxuan Jia, Bing Han, Qiang Li*, Hong Li, Limin Sun, “Who owns Internet of Thing devices?” International Journal of Distributed Sensor Networks, 2018, Vol. 14(11)
  10. Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI][PDF]
  11. Xing Liu,Jiqiang Liu, Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”, Future Generation Computer Systemsvol.89, pp. 402-420 (2018) [DOI][PDF].
  12. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”, Future Generation Computer Systemsvol.78, pp. 987–994 (2018) [DOI][PDF].
  13. Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”, Future Generation Computer Systems (to appear), 2018 [DOI][PDF].
  14. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].
  15. Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 2018 (to appear) [DOI][PDF].
  16. Dan Su, Jiqiang Liu, Wei Wang*, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”, Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].
  17. Yongzhong He, Endalew Elsabeth Alem, Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”, Frontiers of Computer Science (to appear), 2018 [DOI][PDF].
  18. Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) [DOI][PDF].
  19. Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)[DOI]
  20. Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, “Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”, Information Sciences, 433–434(4): 417-430 (2018) [DOI].
  21. Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”, Cluster Computing (2018) 21: 265–275 [DOI][PDF].
  22. Zhao J , Liu J , Qin Z , et al. Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters[J]. IEEE Transactions on Smart Grid, 2016, PP(99):1-1.
  23. Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu:Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018)
  24. Shaohua Lv, Jian Wang*, Yinqi Yang, And Jiqiang Liu, “Intrusion Prediction With System-Call Sequence-to-Sequence Model”, IEEE Access, 2018,
  25. PENG Shuanghe, ZHOU Qiaofeng, LIU Peiyao. A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming[J].武汉大学自然科学学报(英文版),2018,23(6):535-540. DOI:10.1007/s11859-018-1359-1
  26. Wang W . BotCapturer: Detecting Botnets based on Two-Layere Analysis with Graph Anomaly Detection and Network Traffic Clustering[J]. International Journal of Performability Engineering, 2018, 14(5).
  27. Jian Wang, Ya-Cong Geng, Lei Han, Ji-Qiang Liu, “Quantum Image Encryption Algorithm Based on Quantum Key Image”, International Journal of Theoretical Physics, 2018
  28. Zeyu Mi, Haibo Chen,Yinqian Zhang, Shuanghe Peng, Xiaofeng Wang, and Michael Reiter. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring, IEEE Transactions on Dependable and Secure Computing (TDSC), 2018.
  29. Wu, M. Wang, Y. Dong, Y. Tang, H. Mu, H. Li, B. Yin, F. Yan, and Z. Han, “Magnetic field sensor based on a dual-frequency optoelectronic oscillator using cascaded magnetostrictive alloy-fiber Bragg grating-Fabry Perot and fiber Bragg grating-Fabry Perot filters,” Opt. Express 26, 27628-27632 (2018).
  30. Li, S. Atakaramians, J. Yuan, H. Xiao, W. Wang, Y. Li, B. Wu, and Z. Han, “Terahertz polarization-maintaining subwavelength filters,” Opt. Express 26, 25617-25629 (2018).
  31. Li, H. Xiao, J. Yuan, W. Wang, B. Yin, B. Wu, and Z. Han, “Terahertz polarization-maintaining subwavelength dielectric waveguides,” J. Opt. 20, 125602 (2018).
  32. 黎琳, 李振寰, 常晓林, et al. Caché数据库通讯协议安全性分析系统[J]. 信息网络安全, 2018, No.208(04):44-52.
  33. 杜晔 , 张田甜 , 黎妹红 . 基于信息密度贝叶斯算法的云平台入侵检测[J].系统仿真学报, 2018.
  34. 基于程序局部性引导的有界模型检测优化方法,王舜、杜晔、韩臻、刘吉强,通信学报,3
  35. 曹咪, 王继刚, 王伟, et al. 基于静态分析的TVOS恶意应用检测方法研究[J]. 郑州大学学报(理学版), 2018, v.50(03):30-36.
  36. 范博, 杨润垲, 黎琳. 基于SSH的可信信道建立方法研究[J]. 信息网络安全, 2018.
  37. 李强, 贾煜璇, 宋金珂, 李 红, 朱红松, 孙利民, “网络空间物联网信息搜索”, 信息安全学报,第 3 卷 第 5 期,2018年,(CCF B类)
  38. 李春燕,赵佳,刘吉强等. 车载自组网络中基于区块链的路况预警方案,网络空间安全学报,2018, 4(7): 39-47.
  39. 刘俊杰,赵佳,刘吉强等. 军事车载网密钥管理方案研究,网络空间安全学报,2018, 4(8): 39-46.
  40. 彭双和 图尔贡 金传 针对减弱隐蔽信道攻击的XEN虚拟机调度策略   武汉大学学报(工学), 2018.4, 371-376
  41. 赵佳利, 彭双和, 韩静. 计算机高速缓存相关概念的案例教学, 计算机教育. 2018-9. 57-63
  42. 王佳林,刘吉强,赵迪,王盈地,相迎宵,陈彤,童恩栋,牛温佳,“基于非对称卷积自编码器和支持向量机的入侵检测模型”,网络与信息安全学报,2018.
  43. 王健,李昶,韩磊,韩臻,基于桌面云的计算资源控制保护方案,信息网络安全,第2期,27-33,2018
  44. 郭志民, 彭豪辉, 牛霜霞, et al. 基于用户与网络行为分析的主机异常检测方法[J]. 北京交通大学学报, 2018, 42(05).
  45. 罗一帆, 张大伟, 常亮, et al. 一种基于组合公钥的密钥派生方案[J]. 郑州大学学报(理学版), 2018(2).

会议论文:

  1. Chang, et. al, “Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System”,IEEE ICCCN 2018
  2. Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han, “A PCA-based Model to Predict Adversarial Examples on Q-Learning of Path Finding”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  3. Qiang Li, Xuan Feng, Haining Wang, Zhi Li, Limin Sun, “Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices”, IEEE Conference on Computer Communications (INFOCOM) 2018
  4. Kai Cheng, Qiang Li*, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang, “DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware”, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018
  5. Qiang Li, Xuan Feng, Haining Wang, Limin Sun, “Discovery of Internet of Thing Devices based on Rules”, IEEE Conference on Computer Communications (INFOCOM ’18 Poster) 2018,
  6. X Feng, Q Li, H Wang, L Acquisitional rule-based engine for discovering Internet-of-Things devices. 27th USENIX Security Symposium (USENIX Security 18), 327-341
  7. Liu J , Niu W , Liu J , et al. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN[C]// International Conference on Information & Communications Security. Springer, Cham, 2017.
  8. Bai X , Xiang Y , Niu W , et al. A Cross-Modal CCA-Based Astroturfing Detection Approach[C]// International Conference on Information & Communications Security. Springer, Cham, 2017.
  9. Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang, “An Approach to Generate Topic Similar Document by Seed Extraction-based SeqGAN Training for Bait Document”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  10. Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen, “Intention-aware Multi-channel Keyword Extension for Content Security”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  11. Xiaoxuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu, “Adversarial Examples Construction towards White-Box Q Table Variation in DQN Pathfinding Training”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  12. Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, Xiaoxuan Bai, and Jiqiang Liu, “A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System”, 10th IFIP TC 12 International Conference on Intelligent Information Processing, 2018.
  13. Yu, Y., Wang, J., Liu, J., Han, L., He, X., & Lv, S., “Multi-Dimension Threat Situation Assessment Based on Network Security Attributes”, In 2018 27th International Conference on Computer Communication and Networks (ICCCN), 2018, July, IEEE.
  14. He, X., Wang, J., Liu, J., Han, L., Yu, Y., & Lv, S., “Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis”, In 2018 27th International Conference on Computer Communication and Networks (ICCCN) , 2018, July, IEEE.
  15. Yan Chen, Wei Wang, Xiangliang Zhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, accepted by 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia, June 3rd – 6th, 2018
  16. Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and Secure Outsourcing of Differentially Private Data Publication, accepted by 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018
  17. Longfei Wu, Xiaojiang Du, Wei Wang, Bin Lin, “An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology”. Accepted by 2018 International Conference on Computing, Networking and Communications (ICNC 2018)
  18. 李春燕, 赵佳, 刘吉强, et al. 车载自组织网络中基于区块链的路况预警方案[J]. 网络与信息安全学报, 2018(7).

2017年:

期刊论文

  1. Yang Yang, Xiaolin Chang, Jiqiang Liu, Lin Li, “Towards Robust Green Virtual Cloud Data Center Provisioning”. IEEE Transactions on Cloud Computing, 2168-7161, vol. 5, no. 2, pp. 168-181, 2017-06
  2. Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android apps’ behavior for effective detection of malapps at large scale”. Future Generation Computer Systems, 0167-739X, vol. 75, pp. 30-45, 2017-05
  3. Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li, “Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers”. Computer Journal, The British Computer Society, 2017-12
  4. Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, “Discovering and understanding android sensor usage behaviors with data flow analysis”. World Wide Web-internet & Web Information System, pp. 1-22, 2017-03
  5. Chu Huang, Sencun Zhu, Quanlong Guan, Yongzhong He, “A software assignment algorithm for minimizing worm damage in networked systems”. Journal of Information Security & Applications, 2214-2126, vol. 35, no. 8, pp. 55-67, 2017-05
  6. Qiang Li, Xuan Feng, Liang Zhao, Limin Sun, “A Framework for Searching Internet wide Devices”. IEEE NETWORK, 0890-8044, vol. 31Issue 6, no. 0890-8044, pp. 101-107, 2017-11
  7. Zhiwei Guo, Wenjia Niu, “Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems”. IEEE Access, 2169-3536, vol. 5, no. 2017(5), pp. 15529-15541, 2017-07
  8. Han Wang, Jian Wang, Yacong Geng, Yan Song, Jiqiang Liu, “Quantum Image Encryption Based on Iterative Framework of Frequency-SpatialDomain Transforms”. International Journal of Theoretical Physics, 0020-7748, vol. 56, no. 10, pp. 3029-3049, 2017-10
  9. Jian Wang, Han Wang, Yan Song, “Quantum Endpoint Detection Based on QRDA”. International Journal of Theoretical Physics, 0020-7748, vol. 56, no. 10, pp. 3257-3270, 2017-10
  10. Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”,  IEEE Transactions on Information Forensics and Security (TIFS)vol. 12, no. 8, pp. 1772-1785, 2017
  11. Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A time-delay neural network for solving time-dependent shortest path problem”, Neural Networksvol. 90, pp. 21-28, 2017
  12. 马李翠,黎妹红,吴倩倩,杜晔, “智能电网通信中动态密钥加密方法的研究与改进”. 北京邮电大学学报, ISSN 1007-5321, vol. 40, no. 4, pp. 51-56, 2017-08
  13. 何永忠,韩臻, “网络空间安全专业学科培养体系比较研究”. 北京电子科技学院学报, 1672-464X, vol. 25, no. 1, pp. 1-8, 2017-03
  14. 马洪亮,王伟*,韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”. 计算机学报, 0254-4164, vol. 40, no. 7, pp. 1699-1713, 2017-07
  15. 宋衍, 韩臻, 李建军, “支持安全共享的云存储系统研究”. 通信学报, vol. 38, no. z2, pp. 1-9, 2017-11
  16. 董友康,张大伟,韩臻, “基于联盟区块链的董事会电子投票系统”. 网络与信息安全学报, 2017-12
  17. 刘伟,何永忠,赵佳,黎琳, “六轮DES截断差分攻击算法的改进与实现”. 北京交通大学学报, 1673-0291, vol. 41, no. 2, pp. 28-35, 2017-02
  18. 何永忠,李响,陈美玲,王伟, “基于云流量混淆的Tor匿名通信识别方法”. 工程科学与技术(四川大学学报), 2096-3246, vol. 49, no. 2, pp. 121-132, 2017-03
  19. 李超,何永忠, “新技术应用等级保护安全设计与实现”. 科学出版社, 978-7-03-052049-4, 2017-03
  20. 吴兴茹,何永忠, “基于函数调用图的Android重打包应用检测”. 计算机工程, 1000-3428, vol. 43, no. 11, pp. 122-127, 2017-11
  21. 王柯翔,黎琳,彭双和, “一种基于LWE采样算法的实现与优化”. 北京交通大学学报, ISSN 1673-0291, vol. 41, no. 5, pp. 32-36, 2017-10
  22. 彭双和,图尔贡麦提萨比尔,周巧凤, “基于Simhash的中文文本去重技术研究”. 计算机技术与发展, 1673-629X, vol. 27, no. 11, pp. 137-145, 2017-11
  23. 郭青霄,张大伟, “基于SM2的代理保护代理签名的设计与实现”. 网络与信息安全学报, 2096-109X, vol. 3, no. 9, pp. 192-200, 2017-09
  24. 赵佳,李娜,韩磊,刘吉强, “城市环境下基于车辆分类的车载自组网隐私保护方案研究”. 南京信息工程大学学报(自然科学版), 1674-7070, vol. 9, no. 5, pp. 480-489, 2017-10
  25. 陈勋,刘吉强,韩臻,邱硕, “基于计算平台安全属性的高效远程证明方案”. 北京工业大学学报, 0254-0037, vol. 43, no. 9, pp. 1357-1365, 2017-09

会议论文

  1. Xiaodan Li, Xiaolin Chang, John_A_Board, Kishor_S_Trivedi, “A Novel Approach for Software Vulnerability Classification”. Proceedings of the 2017 Annual Reliability and Maintainability Symposium, 978-1-5090-5284-4, pp.1-7, 2017-01
  2. Sukhwani, Martinez, Xiaolin Chang, Trivedi, Rindos, “Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)”. Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 978-1-5386-1679-6, pp.253-255, 2017-09
  3. Xinwei Gao, Lin Li, Ding, Jiqiang Liu, RV, Liu, “Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite”. Information Security Practice and Experience 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings (LNCS, volume 10701), 978-3-319-72359-4, pp. 551-564, 2017-12
  4. Qiang Li, Feng, Wang, Sun, “Automatically Discovering Surveillance Devices in the Cyberspace”. Proceeding MMSys’17, Proceedings of the 8th ACM on Multimedia Systems Conference, 978-1-4503-5002-0, pp. 331-342, 2017-06
  5. Zhiwei Guo, Wenjia Niu, “Beyond the Aggregation of Its Members— A Novel Group Recommender System from the Perspective of Preference Distribution”. Proceedings of the 10th International Conference(KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017) – Knowledge Science, Engineering and Management, 978-3-319-63557-6, pp. 359-370, 2017-08
  6. Tong Chen, Alallaq, Wenjia Niu, et al. “A Hidden Astroturfing Detection Approach Base On Emotion Analysis”. Proceedings of the 10th International Conference(KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017) – Knowledge Science, Engineering and Management, 978-3-319-63557-6, pp. 55-66, 2017-08
  7. Jingjing Liu, Wenjia Niu, Jiqiang Liu, et al. “A Method to Effectively Detect Vulnerabilities on Path Planning of VIN”. ICICS: International Conference on Information and Communications Security, 978-3-319-50010-2, pp. 81-93, 2017-12
  8. Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, et al. “A Cross-modal CCA-based Astroturfing Detection Approach”. ICICS: International Conference on Information and Communications Security, 978-3-319-50010-2, pp. 50-62, 2017-12

2016

期刊论文

  1. Qian Gao, Yongzhong He, “Two image encryption methods with hiding effect based on moiré pattern”. Int. J. of High Performance Computing and Networking, 1740-0562, vol. 9-5, no. 8, pp. 382-393, 2016-11
  2. Qiang Li, Liming Sun, “Collaborative Recognition of Queuing Behavior on Mobile Phones”. IEEE Transactions on Mobile Computing, 1536-1233, vol. 15, no.1, pp. 60-73, 2016-01
  3. Hong Tao, Qiang Li, et al. “Influential spatial facility prediction over large scale cyber-physical vehicles in smart city”. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 16871472, vol. 2016, no. 13, pp. 24-32, 2016-12
  4. Bianqing Yuan, Jiqiang Liu, “A universally composable secure grouping-proof protocol for RFID tags”. Concurrency & Computation Practice & Experience, 1532-0626, vol. 28, Issue 6, pp. 1872-1883, 2016-04
  5. Shuanghe Peng, Zhige Chen, Deen, Chen, “Membership Proof and Verification in Authenticated Skip Lists Based on Heap”. China Communications, 1673-5447, vol. 13, no. 6, pp. 195-204, 2016-06
  6. Jian Wang, “QRDA: Quantum Representation of Digital Audio”. International Journal of Theoretical Physics, 0020-7748, vol. 55, no. 3, pp. 1622-1641, 2016-03
  7. Nan Jiang, Yijie Dang, Jian Wang, “Quantum image matching”. Quantum Information Processing, 1570-0755, vol. 15, no. 9, pp. 3543-3572, 2016-09
  8. 邢彬,韩臻,常晓林,刘吉强,”基于虚拟机监控技术的可信虚拟域” .信息安全学报, 2096-1146, vol. 1, no. 1 pp. 75-94, 2016-01.
  9. 杜晔,张亚丹,黎妹红,张大伟, “基于改进FastICA算法的入侵检测样本数据优化方法”. 通信学报, 1000-436X, vol. 37, no. 1, pp. 42-48, 2016-01
  10. 马洪亮,王伟,韩臻, ”面向Drive-by-download攻击的检测方法”. 华中科技大学学报(自然科学版), 1671-4512, vol. 44, no. 3,pp. 6-11, 2016-03
  11. 石勇,郭煜,刘吉强,韩臻,马威, “一种透明的可信云租户隔离机制研究”. 软件学报, 1000-9825, vol. 27, no. 6, pp. 1538-1548, 2016-06
  12. 何永忠,陈美玲, ”基于协议的拟态研究综述”. 北京交通大学学报, 1673-0291, vol. 40-5, no. 5, pp. 1-8, 2016-10
  13. 赵佳,刘吉强,唐宏, “基于TCM的智能电表隐私保护协议”. 北京交通大学学报, 1673-0291, vol. 40, no. 5, pp. 29-34, 2016-10
  14. 彭双和,陈志阁, “跳表和认证跳表的性能分析及对比”. 北京交通大学学报, 1000-1506, vol. 40, no. 186, pp. 58-62, 2016-06
  15. 查明明,王伟, “FlowMonitor: Android隐私数据流向监控防护系统”. 山东大学学报 理学版, 1671-9352, vol. 51, no. 9, pp. 59-67, 2016-09
  16. 邢彬,刘吉强,韩臻, “一种可信计算平台完整性度量的新模型”. 信息网络安全, 1671-1122, vol. 16, no. 6, pp. 8-14, 2016-06

会议论文

  1. Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, “Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem”. Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].
  2. Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, “Anomadroid: profiling Android application behaviors for identifying unknown malapps”, accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  3. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
  4. Xuefeng Xiang, Ye Du, Peiyuan Li, Tiantian Zhang, “Design and Implementation of a College Logistics Repair Management Platform”. Proceedings of the 2016 International Conference on Management Science and Management Innovation, 978-94-6252-236-7, pp. 427-431, 2016-08
  5. Lin Li, Xiubin Fan, Zhiyin Kong, Fengmei Liu, Kun Li, “A new approach to the definition of information diffusion and confusion of Boolean transformation”. International Conference on Artificial Intelligence:Technologies and Applications (ICAITA 2016), 978-94-6252-162-9, pp. 59-61, 2016-01
  6. Xuan Feng, Qiang Li, Qi Han, HongSong Zhu, Yan Liu, Limin Sun, “Identification of visible industrial control devices at Internet scale”. 2016 IEEE International Conference on Communications (ICC), 978-1-4799-6664-6, pp. 26-32, 2016-05
  7. Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:” Active profiling of physical devices at internet scale”. 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016, 978-1-5090-2279-3, pp. 26-25, 2016-09
  8. Zhenliang Cai, Jian Wang, Jiqiang Liu, “Novel feature selection algorithm for Chinese text categorization based on CHI”. Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
  9. Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, “An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone”. The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11

2015

期刊论文

  1. Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
  2. Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:Privacy beyond sensitive values. SCIENCE CHINA Information Sciences 58(7): 1-15 (2015).
  4. Changlong Tang, Jiqiang Liu:Selecting a trusted cloud service provider for your SaaS program. Computers & Security 50: 60-73 (2015).
  5. Xiaolin Chang, Jiqiang Liu, “Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload”.  IEEE Transactions on Cloud Computing, 2168-7161, vol. 1, no. 1, pp. 1-14, 2015.
  6. Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu: OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurrency and Computation: Practice and Experience 27(5): 1092-1109 (2015)
  7. Shuanghe Peng, Zhige Chen, Deen Chen, Membership Proof and Verification in Authenticated Skip Lists based on Heap, China Communication, 2015.
  8. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communication, 2015.
  9. Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communications Letters 19(4): 537-540 (2015)
  10. Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Information Science 295: 221-231 (2015)
  11. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, 2015
  12. Guang Yang, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, 2015.
  13. Jian Wang, Nan Jiang, Quantum image translation, Quantum Information Processing, 2015.
  14. Nan Jiang, Jian Wang, Yue Mu, Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio, Quantum Information Processing,  2015.
  15. Jian Wang, QRDA: Quantum Representation of Digital Audio, International Journal of Theoretical Physics, 2015.
  16. 宋衍, 韩臻, 刘凤梅, 刘 磊, 基于访问树的策略隐藏属性加密方案, 通信学报, 2015
  17. 原变青, 刘吉强, 可证明安全的RFID标签所有权转移协议, 通信学报, 2015
  18. 原变青, 刘吉强, 通用可组合安全的RFID标签组所有权转移协议, 计算机研究与发展, 2015
  19. 吕从东, 韩臻, 一种保持多等级安全策略细化后无干扰属性的方法, 四川大学学报(工程科学版), 2015
  20. 张大伟,郭烜,韩臻, 安全可信智能移动终端研究, 中兴通讯技术, 2015.
  21. 黎妹红,李论,张大伟,杜晔, 基于SDKEY的安卓手机安全传输技术, 解放军理工大学学报, 2015.
  22. 彭双和, 陈志阁, 陈得恩, 跳表及认证跳表数据完整性认证性能分析及对比研究, 北京交通大学学报, 2015.

会议论文

  1. Xing Liu, Wei Wang, Jiqiang Liu, “Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis”, accepted by 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).
  2. Xing Liu, Wei Wang, Jiqiang Liu, “POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
  3. Li Lu, Zhen Han, Zhi Chen, OpenStack VulnerabilityDetection andAnalysis 6th International Conference of Applications and Techniques in Information security(ATIS 2015) Springer, 2015.
  4. Xun Chen, Jiqiang Liu, Zhen Han, An Enhanced Authentication Scheme for Virtual Private Network Access based on Platform Attributes of Multi-level Classification, The 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, China, November 4-6, 2015.
  5. Ye Du, Xin Kang, Yahang Zhang, Luyuan Wang, Meihong Li, Model Checking of Software Safety Based on LLBMC, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.
  6. Ye Du, Xinyu Liu, Meihong Li, Yahang Zhang, NuSMV Oriented Formal Modeling of Software and Semantic Translation, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.

教学类及其他技术类论文

  1. 黎妹红,赵琳,张大伟,杜晔, 美国信息安全教育和培训的启示, 计算机教育, 2015.
  2. 杜晔,陈贺男,黎妹红,张大伟, Web 应用安全实验教学探讨与案例评析, 计算机教育,  2015.
  3. 马威, 韩臻, 成阳, 可信云计算中的多级管理机制研究, 信息与网络安全, 2015
  4. 车浩然, 何永忠, 基于P2P和网格ID的位置匿名算法研究, 信息网络安全, 2015
  5. 何永忠,韩臻, 美国宾夕法尼亚州立大学网络空间安全学科专业建设分析, 保密科学技术, 2015
  6. 吴同, 孙忆茹, 中美解密法律制度比较研究, 保密科学技术, 2015

2014

期刊论文

  1. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (top 5 most frequently downloaded paper)[PDF][DOI].
  2. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, ”Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [DOI]
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model for Privacy-Preserving Data Publishing, China Communications, Accepted
  4. Hongchao Wang, Zhen Han, Dong Yang: On Application-Customized Common Platform for Wireless Vehicular Sensor Networks. International Journal of Distributed Sensor Networks (IJDSN), 2014
  5. Yanfeng Shi, Jiqiang Liu, Zhen Han: Attribute-Based Proxy Re-encryption with Keyword Search. Plos One, 2014.
  6. Lizhi Peng, Hongli Zhang, Bo Yang Tong Wu, Traffic Labeller:Collecting Internet Traffic Samples with Accurate Application Information, China Communications, 11/1/69-78, 2014.

  7. Lizhi Peng, Tong Wu, Bo Yang, Yuehui Chen, How Many Packets Are Most Effective for Early Stage Traffic Identification: An Experimental Study. China Communications,11/9/183-193, 2014 
  8. Jian Wang, Nan Jiang, Quantum image translation. Quantum Information Processing, 2014, Accepted.
  9. Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.
  10. Qiuping Wang, Ye Du, Design and implementation of a monitor system for application server based on JMX, WIT Transactions on Information and Communication Technologies, 2014.
  11. Nan Jiang, Jian Wang, The Theoretical Limits of Watermark Spread Spectrum Sequence, Scientific World Journal, 432740/1-6, 2014-3.
  12. Jian Wang, Nan Jiang, Novel properties of spread spectrum sequence in digital watermarking, ICIC Express Letters, 8/6/1645-1651, 2014-6
  13. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han, Multi-party identity-based symmetric privacy-preserving matching with cloud storage, Wuhan University Journal of Natural Sciences,19/5/426-432 2014-10
  14. 王中华,韩臻,刘吉强, 云环境下多用户文件共享方案, 计算机研究与发展, 51/12/2614-2622 2014-12
  15. 马洪亮,王伟,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
  16. 张大伟;韩臻;蒋逸尘;黎妹红, 基于DAA和TLS的匿名远程证明协议, 华中科技大学学报(自然科学版), 42/11/28-33, 2014-11.
  17. 吴同;周丽, 论刑事诉讼中电子证据的鉴真, 山东警察学院学报, 26/1/73-81, 2014

会议论文

  1. Xuezhen Huang, Liu Jiqiang, Han Zhen, A privacy-aware access model on anonymized data, Proceedings of 6th International conference on Trustworthy Computing, Beijing 2014

  2. Xuanni Du, Xiaolin Chang, Performance of AI algorithms for mining meaningful roles, IEEE Congress on Evolutionary Computation,  2070-2076, 2014
  3. Licui Ma, Meihong Li, Ye Du, Dawei Zhang, A SDKEY-based Secure Storage and Transmission Approach for Android Phone, CyberC 2014.
  4. Shuanghe Peng, Yingjie Qin, Zhige Chen, A Simple and More Versatile Authentication Path Computation Algorithm for Binary Hash Tree, 2014 ASE BIGDATA SOCIALCOM CYBERSECURITY Conference.
  5. Tianhua Liu, Dawei Zhang, Yichen Jiang, Research and Implementation of Bytecode Instruction Folding on Java Card, International Conference on Computer, Communications and Information Technology (CCIT 2014), 2014-1.

  6. Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE MobileCloud 2014.
  7. Jia Zhao, The design and implementation of invisible eavesdropping protection application, IEEE 12th international conference on signal processing proceedings, 2014-1 赵佳

  8. Jia Zhao, Bo Gao, Measures of information security level protection on sensing layer in Internet of things, ICACC,2014-1

教学类及其他技术类论文

  1. 刘行,王娜娜,刘吉强,韩臻,Android收集非敏感型传感器安全现状研究, 第二十四届全国信息保密学术会议论文集 //290-294 2014-10
  2. 王舜,杜晔,韩臻,

    针对存储 主的模块的一种模型检测方法, 第二十四届全国信息保密学术会议论文集 //295-300 2014-10 

  3. 王健,引导学生参与学科竞赛以促进专业教学, 保密学科通讯, 3/3/13-15 2014-6
  4. 王健;吴同,黎妹红, 保密专业计算机取证实验室建设, 计算机教育, 11/13/44-46, 2014-7
  5. 吴同;韩臻,王健,黎妹红, 保密专业计算机取证实验教学 计算机教育, 11/13/32-34, 2014-7
  6. 何永忠;王伟,黎琳, 基于云计算的信息安全实验教学平台建设 计算机教育, 2014/1/39-42, 2014
  7. 王伟;何永忠, 以完整解决一个具体问题为中心的研究型教学, 计算机教育, 2014/13/7-9, 2014
  8. 郭烜;张大伟,黎妹红, 手机动态令牌认证系统 保密科学技术, 9/9/266-273, 2014-9 
  9. 韩臻,沈固朝, 保密管理专业的建设和培养方法, 信息安全与通信保密, 5/42-44, 2014-5
  10. 吕从东, 韩臻, 马威, 云存储服务端数据存储加密机制的设计和实现, 信息网络安全, 2014/6
  11. 韩臻,黎琳,何永忠, 美国信息安全教育和人才培养措施借鉴 保密科学技术, 2014/7/4-9, 2014-7