学术论文

2017年:

期刊论文

  1. Yang Yang, Xiaolin Chang, Jiqiang Liu, Lin Li, “Towards Robust Green Virtual Cloud Data Center Provisioning”. IEEE Transactions on Cloud Computing, 2168-7161, vol. 5, no. 2, pp. 168-181, 2017-06
  2. Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android apps’ behavior for effective detection of malapps at large scale”. Future Generation Computer Systems, 0167-739X, vol. 75, pp. 30-45, 2017-05
  3. Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li, “Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers”. Computer Journal, The British Computer Society, 2017-12
  4. Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, “Discovering and understanding android sensor usage behaviors with data flow analysis”. World Wide Web-internet & Web Information System, pp. 1-22, 2017-03
  5. Chu Huang, Sencun Zhu, Quanlong Guan, Yongzhong He, “A software assignment algorithm for minimizing worm damage in networked systems”. Journal of Information Security & Applications, 2214-2126, vol. 35, no. 8, pp. 55-67, 2017-05
  6. Qiang Li, Xuan Feng, Liang Zhao, Limin Sun, “A Framework for Searching Internet wide Devices”. IEEE NETWORK, 0890-8044, vol. 31Issue 6, no. 0890-8044, pp. 101-107, 2017-11
  7. Zhiwei Guo, Wenjia Niu, “Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems”. IEEE Access, 2169-3536, vol. 5, no. 2017(5), pp. 15529-15541, 2017-07
  8. Han Wang, Jian Wang, Yacong Geng, Yan Song, Jiqiang Liu, “Quantum Image Encryption Based on Iterative Framework of Frequency-SpatialDomain Transforms”. International Journal of Theoretical Physics, 0020-7748, vol. 56, no. 10, pp. 3029-3049, 2017-10
  9. Jian Wang, Han Wang, Yan Song, “Quantum Endpoint Detection Based on QRDA”. International Journal of Theoretical Physics, 0020-7748, vol. 56, no. 10, pp. 3257-3270, 2017-10
  10. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers”. Future Generation Computer Systems, 0167-739X, pp. 1-8, 2017-01
  11. Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”,  IEEE Transactions on Information Forensics and Security (TIFS)vol. 12, no. 8, pp. 1772-1785, 2017
  12. Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A time-delay neural network for solving time-dependent shortest path problem”, Neural Networksvol. 90, pp. 21-28, 2017
  13. 马李翠,黎妹红,吴倩倩,杜晔, “智能电网通信中动态密钥加密方法的研究与改进”. 北京邮电大学学报, ISSN 1007-5321, vol. 40, no. 4, pp. 51-56, 2017-08
  14. 何永忠,韩臻, “网络空间安全专业学科培养体系比较研究”. 北京电子科技学院学报, 1672-464X, vol. 25, no. 1, pp. 1-8, 2017-03
  15. 马洪亮,王伟*,韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”. 计算机学报, 0254-4164, vol. 40, no. 7, pp. 1699-1713, 2017-07
  16. 宋衍, 韩臻, 李建军, “支持安全共享的云存储系统研究”. 通信学报, vol. 38, no. z2, pp. 1-9, 2017-11
  17. 董友康,张大伟,韩臻, “基于联盟区块链的董事会电子投票系统”. 网络与信息安全学报, 2017-12
  18. 刘伟,何永忠,赵佳,黎琳, “六轮DES截断差分攻击算法的改进与实现”. 北京交通大学学报, 1673-0291, vol. 41, no. 2, pp. 28-35, 2017-02
  19. 何永忠,李响,陈美玲,王伟, “基于云流量混淆的Tor匿名通信识别方法”. 工程科学与技术(四川大学学报), 2096-3246, vol. 49, no. 2, pp. 121-132, 2017-03
  20. 李超,何永忠, “新技术应用等级保护安全设计与实现”. 科学出版社, 978-7-03-052049-4, 2017-03
  21. 吴兴茹,何永忠, “基于函数调用图的Android重打包应用检测”. 计算机工程, 1000-3428, vol. 43, no. 11, pp. 122-127, 2017-11
  22. 王柯翔,黎琳,彭双和, “一种基于LWE采样算法的实现与优化”. 北京交通大学学报, ISSN 1673-0291, vol. 41, no. 5, pp. 32-36, 2017-10
  23. 彭双和,图尔贡麦提萨比尔,周巧凤, “基于Simhash的中文文本去重技术研究”. 计算机技术与发展, 1673-629X, vol. 27, no. 11, pp. 137-145, 2017-11
  24. 郭青霄,张大伟, “基于SM2的代理保护代理签名的设计与实现”. 网络与信息安全学报, 2096-109X, vol. 3, no. 9, pp. 192-200, 2017-09
  25. 赵佳,李娜,韩磊,刘吉强, “城市环境下基于车辆分类的车载自组网隐私保护方案研究”. 南京信息工程大学学报(自然科学版), 1674-7070, vol. 9, no. 5, pp. 480-489, 2017-10
  26. 陈勋,刘吉强,韩臻,邱硕, “基于计算平台安全属性的高效远程证明方案”. 北京工业大学学报, 0254-0037, vol. 43, no. 9, pp. 1357-1365, 2017-09

会议论文

  1. Xiaodan Li, Xiaolin Chang, John_A_Board, Kishor_S_Trivedi, “A Novel Approach for Software Vulnerability Classification”. Proceedings of the 2017 Annual Reliability and Maintainability Symposium, 978-1-5090-5284-4, pp.1-7, 2017-01
  2. Sukhwani, Martinez, Xiaolin Chang, Trivedi, Rindos, “Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)”. Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 978-1-5386-1679-6, pp.253-255, 2017-09
  3. Xinwei Gao, Lin Li, Ding, Jiqiang Liu, RV, Liu, “Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite”. Information Security Practice and Experience 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings (LNCS, volume 10701), 978-3-319-72359-4, pp. 551-564, 2017-12
  4. Qiang Li, Feng, Wang, Sun, “Automatically Discovering Surveillance Devices in the Cyberspace”. Proceeding MMSys’17, Proceedings of the 8th ACM on Multimedia Systems Conference, 978-1-4503-5002-0, pp. 331-342, 2017-06
  5. Zhiwei Guo, Wenjia Niu, “Beyond the Aggregation of Its Members— A Novel Group Recommender System from the Perspective of Preference Distribution”. Proceedings of the 10th International Conference(KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017) – Knowledge Science, Engineering and Management, 978-3-319-63557-6, pp. 359-370, 2017-08
  6. Tong Chen, Alallaq, Wenjia Niu, et al. “A Hidden Astroturfing Detection Approach Base On Emotion Analysis”. Proceedings of the 10th International Conference(KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017) – Knowledge Science, Engineering and Management, 978-3-319-63557-6, pp. 55-66, 2017-08
  7. Jingjing Liu, Wenjia Niu, Jiqiang Liu, et al. “A Method to Effectively Detect Vulnerabilities on Path Planning of VIN”. ICICS: International Conference on Information and Communications Security, 978-3-319-50010-2, pp. 81-93, 2017-12
  8. Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, et al. “A Cross-modal CCA-based Astroturfing Detection Approach”. ICICS: International Conference on Information and Communications Security, 978-3-319-50010-2, pp. 50-62, 2017-12

2016

期刊论文

  1. Qian Gao, Yongzhong He, “Two image encryption methods with hiding effect based on moiré pattern”. Int. J. of High Performance Computing and Networking, 1740-0562, vol. 9-5, no. 8, pp. 382-393, 2016-11
  2. Qiang Li, Liming Sun, “Collaborative Recognition of Queuing Behavior on Mobile Phones”. IEEE Transactions on Mobile Computing, 1536-1233, vol. 15, no.1, pp. 60-73, 2016-01
  3. Hong Tao, Qiang Li, et al. “Influential spatial facility prediction over large scale cyber-physical vehicles in smart city”. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 16871472, vol. 2016, no. 13, pp. 24-32, 2016-12
  4. Bianqing Yuan, Jiqiang Liu, “A universally composable secure grouping-proof protocol for RFID tags”. Concurrency & Computation Practice & Experience, 1532-0626, vol. 28, Issue 6, pp. 1872-1883, 2016-04
  5. Shuanghe Peng, Zhige Chen, Deen, Chen, “Membership Proof and Verification in Authenticated Skip Lists Based on Heap”. China Communications, 1673-5447, vol. 13, no. 6, pp. 195-204, 2016-06
  6. Jian Wang, “QRDA: Quantum Representation of Digital Audio”. International Journal of Theoretical Physics, 0020-7748, vol. 55, no. 3, pp. 1622-1641, 2016-03
  7. Nan Jiang, Yijie Dang, Jian Wang, “Quantum image matching”. Quantum Information Processing, 1570-0755, vol. 15, no. 9, pp. 3543-3572, 2016-09
  8. 邢彬,韩臻,常晓林,刘吉强,”基于虚拟机监控技术的可信虚拟域” .信息安全学报, 2096-1146, vol. 1, no. 1 pp. 75-94, 2016-01.
  9. 杜晔,张亚丹,黎妹红,张大伟, “基于改进FastICA算法的入侵检测样本数据优化方法”. 通信学报, 1000-436X, vol. 37, no. 1, pp. 42-48, 2016-01
  10. 马洪亮,王伟,韩臻, ”面向Drive-by-download攻击的检测方法”. 华中科技大学学报(自然科学版), 1671-4512, vol. 44, no. 3,pp. 6-11, 2016-03
  11. 石勇,郭煜,刘吉强,韩臻,马威, “一种透明的可信云租户隔离机制研究”. 软件学报, 1000-9825, vol. 27, no. 6, pp. 1538-1548, 2016-06
  12. 何永忠,陈美玲, ”基于协议的拟态研究综述”. 北京交通大学学报, 1673-0291, vol. 40-5, no. 5, pp. 1-8, 2016-10
  13. 赵佳,刘吉强,唐宏, “基于TCM的智能电表隐私保护协议”. 北京交通大学学报, 1673-0291, vol. 40, no. 5, pp. 29-34, 2016-10
  14. 彭双和,陈志阁, “跳表和认证跳表的性能分析及对比”. 北京交通大学学报, 1000-1506, vol. 40, no. 186, pp. 58-62, 2016-06
  15. 查明明,王伟, “FlowMonitor: Android隐私数据流向监控防护系统”. 山东大学学报 理学版, 1671-9352, vol. 51, no. 9, pp. 59-67, 2016-09
  16. 邢彬,刘吉强,韩臻, “一种可信计算平台完整性度量的新模型”. 信息网络安全, 1671-1122, vol. 16, no. 6, pp. 8-14, 2016-06

会议论文

  1. Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, “Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem”. Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].
  2. Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, “Anomadroid: profiling Android application behaviors for identifying unknown malapps”, accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  3. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
  4. Xuefeng Xiang, Ye Du, Peiyuan Li, Tiantian Zhang, “Design and Implementation of a College Logistics Repair Management Platform”. Proceedings of the 2016 International Conference on Management Science and Management Innovation, 978-94-6252-236-7, pp. 427-431, 2016-08
  5. Lin Li, Xiubin Fan, Zhiyin Kong, Fengmei Liu, Kun Li, “A new approach to the definition of information diffusion and confusion of Boolean transformation”. International Conference on Artificial Intelligence:Technologies and Applications (ICAITA 2016), 978-94-6252-162-9, pp. 59-61, 2016-01
  6. Xuan Feng, Qiang Li, Qi Han, HongSong Zhu, Yan Liu, Limin Sun, “Identification of visible industrial control devices at Internet scale”. 2016 IEEE International Conference on Communications (ICC), 978-1-4799-6664-6, pp. 26-32, 2016-05
  7. Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:” Active profiling of physical devices at internet scale”. 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016, 978-1-5090-2279-3, pp. 26-25, 2016-09
  8. Zhenliang Cai, Jian Wang, Jiqiang Liu, “Novel feature selection algorithm for Chinese text categorization based on CHI”. Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
  9. Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, “An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone”. The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11

2015

期刊论文

  1. Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
  2. Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:Privacy beyond sensitive values. SCIENCE CHINA Information Sciences 58(7): 1-15 (2015).
  4. Changlong Tang, Jiqiang Liu:Selecting a trusted cloud service provider for your SaaS program. Computers & Security 50: 60-73 (2015).
  5. Xiaolin Chang, Jiqiang Liu, “Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload”.  IEEE Transactions on Cloud Computing, 2168-7161, vol. 1, no. 1, pp. 1-14, 2015.
  6. Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu: OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurrency and Computation: Practice and Experience 27(5): 1092-1109 (2015)
  7. Shuanghe Peng, Zhige Chen, Deen Chen, Membership Proof and Verification in Authenticated Skip Lists based on Heap, China Communication, 2015.
  8. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communication, 2015.
  9. Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communications Letters 19(4): 537-540 (2015)
  10. Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Information Science 295: 221-231 (2015)
  11. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, 2015
  12. Guang Yang, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, 2015.
  13. Jian Wang, Nan Jiang, Quantum image translation, Quantum Information Processing, 2015.
  14. Nan Jiang, Jian Wang, Yue Mu, Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio, Quantum Information Processing,  2015.
  15. Jian Wang, QRDA: Quantum Representation of Digital Audio, International Journal of Theoretical Physics, 2015.
  16. 宋衍, 韩臻, 刘凤梅, 刘 磊, 基于访问树的策略隐藏属性加密方案, 通信学报, 2015
  17. 原变青, 刘吉强, 可证明安全的RFID标签所有权转移协议, 通信学报, 2015
  18. 原变青, 刘吉强, 通用可组合安全的RFID标签组所有权转移协议, 计算机研究与发展, 2015
  19. 吕从东, 韩臻, 一种保持多等级安全策略细化后无干扰属性的方法, 四川大学学报(工程科学版), 2015
  20. 张大伟,郭烜,韩臻, 安全可信智能移动终端研究, 中兴通讯技术, 2015.
  21. 黎妹红,李论,张大伟,杜晔, 基于SDKEY的安卓手机安全传输技术, 解放军理工大学学报, 2015.
  22. 彭双和, 陈志阁, 陈得恩, 跳表及认证跳表数据完整性认证性能分析及对比研究, 北京交通大学学报, 2015.

会议论文

  1. Xing Liu, Wei Wang, Jiqiang Liu, “Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis”, accepted by 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).
  2. Xing Liu, Wei Wang, Jiqiang Liu, “POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
  3. Li Lu, Zhen Han, Zhi Chen, OpenStack VulnerabilityDetection andAnalysis 6th International Conference of Applications and Techniques in Information security(ATIS 2015) Springer, 2015.
  4. Xun Chen, Jiqiang Liu, Zhen Han, An Enhanced Authentication Scheme for Virtual Private Network Access based on Platform Attributes of Multi-level Classification, The 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, China, November 4-6, 2015.
  5. Ye Du, Xin Kang, Yahang Zhang, Luyuan Wang, Meihong Li, Model Checking of Software Safety Based on LLBMC, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.
  6. Ye Du, Xinyu Liu, Meihong Li, Yahang Zhang, NuSMV Oriented Formal Modeling of Software and Semantic Translation, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.

教学类及其他技术类论文

  1. 黎妹红,赵琳,张大伟,杜晔, 美国信息安全教育和培训的启示, 计算机教育, 2015.
  2. 杜晔,陈贺男,黎妹红,张大伟, Web 应用安全实验教学探讨与案例评析, 计算机教育,  2015.
  3. 马威, 韩臻, 成阳, 可信云计算中的多级管理机制研究, 信息与网络安全, 2015
  4. 车浩然, 何永忠, 基于P2P和网格ID的位置匿名算法研究, 信息网络安全, 2015
  5. 何永忠,韩臻, 美国宾夕法尼亚州立大学网络空间安全学科专业建设分析, 保密科学技术, 2015
  6. 吴同, 孙忆茹, 中美解密法律制度比较研究, 保密科学技术, 2015

2014

期刊论文

  1. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (top 5 most frequently downloaded paper)[PDF][DOI].
  2. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, ”Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [DOI]
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model for Privacy-Preserving Data Publishing, China Communications, Accepted
  4. Hongchao Wang, Zhen Han, Dong Yang: On Application-Customized Common Platform for Wireless Vehicular Sensor Networks. International Journal of Distributed Sensor Networks (IJDSN), 2014
  5. Yanfeng Shi, Jiqiang Liu, Zhen Han: Attribute-Based Proxy Re-encryption with Keyword Search. Plos One, 2014.
  6. Lizhi Peng, Hongli Zhang, Bo Yang Tong Wu, Traffic Labeller:Collecting Internet Traffic Samples with Accurate Application Information, China Communications, 11/1/69-78, 2014.

  7. Lizhi Peng, Tong Wu, Bo Yang, Yuehui Chen, How Many Packets Are Most Effective for Early Stage Traffic Identification: An Experimental Study. China Communications,11/9/183-193, 2014 
  8. Jian Wang, Nan Jiang, Quantum image translation. Quantum Information Processing, 2014, Accepted.
  9. Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.
  10. Qiuping Wang, Ye Du, Design and implementation of a monitor system for application server based on JMX, WIT Transactions on Information and Communication Technologies, 2014.
  11. Nan Jiang, Jian Wang, The Theoretical Limits of Watermark Spread Spectrum Sequence, Scientific World Journal, 432740/1-6, 2014-3.
  12. Jian Wang, Nan Jiang, Novel properties of spread spectrum sequence in digital watermarking, ICIC Express Letters, 8/6/1645-1651, 2014-6
  13. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han, Multi-party identity-based symmetric privacy-preserving matching with cloud storage, Wuhan University Journal of Natural Sciences,19/5/426-432 2014-10
  14. 王中华,韩臻,刘吉强, 云环境下多用户文件共享方案, 计算机研究与发展, 51/12/2614-2622 2014-12
  15. 马洪亮,王伟,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
  16. 张大伟;韩臻;蒋逸尘;黎妹红, 基于DAA和TLS的匿名远程证明协议, 华中科技大学学报(自然科学版), 42/11/28-33, 2014-11.
  17. 吴同;周丽, 论刑事诉讼中电子证据的鉴真, 山东警察学院学报, 26/1/73-81, 2014

会议论文

  1. Xuezhen Huang, Liu Jiqiang, Han Zhen, A privacy-aware access model on anonymized data, Proceedings of 6th International conference on Trustworthy Computing, Beijing 2014

  2. Xuanni Du, Xiaolin Chang, Performance of AI algorithms for mining meaningful roles, IEEE Congress on Evolutionary Computation,  2070-2076, 2014
  3. Licui Ma, Meihong Li, Ye Du, Dawei Zhang, A SDKEY-based Secure Storage and Transmission Approach for Android Phone, CyberC 2014.
  4. Shuanghe Peng, Yingjie Qin, Zhige Chen, A Simple and More Versatile Authentication Path Computation Algorithm for Binary Hash Tree, 2014 ASE BIGDATA SOCIALCOM CYBERSECURITY Conference.
  5. Tianhua Liu, Dawei Zhang, Yichen Jiang, Research and Implementation of Bytecode Instruction Folding on Java Card, International Conference on Computer, Communications and Information Technology (CCIT 2014), 2014-1.

  6. Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE MobileCloud 2014.
  7. Jia Zhao, The design and implementation of invisible eavesdropping protection application, IEEE 12th international conference on signal processing proceedings, 2014-1 赵佳

  8. Jia Zhao, Bo Gao, Measures of information security level protection on sensing layer in Internet of things, ICACC,2014-1

教学类及其他技术类论文

  1. 刘行,王娜娜,刘吉强,韩臻,Android收集非敏感型传感器安全现状研究, 第二十四届全国信息保密学术会议论文集 //290-294 2014-10
  2. 王舜,杜晔,韩臻,

    针对存储 主的模块的一种模型检测方法, 第二十四届全国信息保密学术会议论文集 //295-300 2014-10 

  3. 王健,引导学生参与学科竞赛以促进专业教学, 保密学科通讯, 3/3/13-15 2014-6
  4. 王健;吴同,黎妹红, 保密专业计算机取证实验室建设, 计算机教育, 11/13/44-46, 2014-7
  5. 吴同;韩臻,王健,黎妹红, 保密专业计算机取证实验教学 计算机教育, 11/13/32-34, 2014-7
  6. 何永忠;王伟,黎琳, 基于云计算的信息安全实验教学平台建设 计算机教育, 2014/1/39-42, 2014
  7. 王伟;何永忠, 以完整解决一个具体问题为中心的研究型教学, 计算机教育, 2014/13/7-9, 2014
  8. 郭烜;张大伟,黎妹红, 手机动态令牌认证系统 保密科学技术, 9/9/266-273, 2014-9 
  9. 韩臻,沈固朝, 保密管理专业的建设和培养方法, 信息安全与通信保密, 5/42-44, 2014-5
  10. 吕从东, 韩臻, 马威, 云存储服务端数据存储加密机制的设计和实现, 信息网络安全, 2014/6
  11. 韩臻,黎琳,何永忠, 美国信息安全教育和人才培养措施借鉴 保密科学技术, 2014/7/4-9, 2014-7