学术论文

2016

期刊论文

  1. Qian Gao, Yongzhong He, “Two image encryption methods with hiding effect based on moiré pattern”. Int. J. of High Performance Computing and Networking, 1740-0562, vol. 9-5, no. 8, pp. 382-393, 2016-11
  2. Qiang Li, Liming Sun, “Collaborative Recognition of Queuing Behavior on Mobile Phones”. IEEE Transactions on Mobile Computing, 1536-1233, vol. 15, no.1, pp. 60-73, 2016-01
  3. Hong Tao, Qiang Li, et al. “Influential spatial facility prediction over large scale cyber-physical vehicles in smart city”. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 16871472, vol. 2016, no. 13, pp. 24-32, 2016-12
  4. Bianqing Yuan, Jiqiang Liu, “A universally composable secure grouping-proof protocol for RFID tags”. Concurrency & Computation Practice & Experience, 1532-0626, vol. 28, Issue 6, pp. 1872-1883, 2016-04
  5. Shuanghe Peng, Zhige Chen, Deen, Chen, “Membership Proof and Verification in Authenticated Skip Lists Based on Heap”. China Communications, 1673-5447, vol. 13, no. 6, pp. 195-204, 2016-06
  6. Jian Wang, “QRDA: Quantum Representation of Digital Audio”. International Journal of Theoretical Physics, 0020-7748, vol. 55, no. 3, pp. 1622-1641, 2016-03
  7. Nan Jiang, Yijie Dang, Jian Wang, “Quantum image matching”. Quantum Information Processing, 1570-0755, vol. 15, no. 9, pp. 3543-3572, 2016-09
  8. 邢彬,韩臻,常晓林,刘吉强,”基于虚拟机监控技术的可信虚拟域” .信息安全学报, 2096-1146, vol. 1, no. 1 pp. 75-94, 2016-01.
  9. 杜晔,张亚丹,黎妹红,张大伟, “基于改进FastICA算法的入侵检测样本数据优化方法”. 通信学报, 1000-436X, vol. 37, no. 1, pp. 42-48, 2016-01
  10. 马洪亮,王伟,韩臻, ”面向Drive-by-download攻击的检测方法”. 华中科技大学学报(自然科学版), 1671-4512, vol. 44, no. 3,pp. 6-11, 2016-03
  11. 石勇,郭煜,刘吉强,韩臻,马威, “一种透明的可信云租户隔离机制研究”. 软件学报, 1000-9825, vol. 27, no. 6, pp. 1538-1548, 2016-06
  12. 何永忠,陈美玲, ”基于协议的拟态研究综述”. 北京交通大学学报, 1673-0291, vol. 40-5, no. 5, pp. 1-8, 2016-10
  13. 赵佳,刘吉强,唐宏, “基于TCM的智能电表隐私保护协议”. 北京交通大学学报, 1673-0291, vol. 40, no. 5, pp. 29-34, 2016-10
  14. 彭双和,陈志阁, “跳表和认证跳表的性能分析及对比”. 北京交通大学学报, 1000-1506, vol. 40, no. 186, pp. 58-62, 2016-06
  15. 查明明,王伟, “FlowMonitor: Android隐私数据流向监控防护系统”. 山东大学学报 理学版, 1671-9352, vol. 51, no. 9, pp. 59-67, 2016-09
  16. 邢彬,刘吉强,韩臻, “一种可信计算平台完整性度量的新模型”. 信息网络安全, 1671-1122, vol. 16, no. 6, pp. 8-14, 2016-06

会议论文

  1. Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, “Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem”. Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].
  2. Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, “Anomadroid: profiling Android application behaviors for identifying unknown malapps”, accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  3. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
  4. Xuefeng Xiang, Ye Du, Peiyuan Li, Tiantian Zhang, “Design and Implementation of a College Logistics Repair Management Platform”. Proceedings of the 2016 International Conference on Management Science and Management Innovation, 978-94-6252-236-7, pp. 427-431, 2016-08
  5. Lin Li, Xiubin Fan, Zhiyin Kong, Fengmei Liu, Kun Li, “A new approach to the definition of information diffusion and confusion of Boolean transformation”. International Conference on Artificial Intelligence:Technologies and Applications (ICAITA 2016), 978-94-6252-162-9, pp. 59-61, 2016-01
  6. Xuan Feng, Qiang Li, Qi Han, HongSong Zhu, Yan Liu, Limin Sun, “Identification of visible industrial control devices at Internet scale”. 2016 IEEE International Conference on Communications (ICC), 978-1-4799-6664-6, pp. 26-32, 2016-05
  7. Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:” Active profiling of physical devices at internet scale”. 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016, 978-1-5090-2279-3, pp. 26-25, 2016-09
  8. Zhenliang Cai, Jian Wang, Jiqiang Liu, “Novel feature selection algorithm for Chinese text categorization based on CHI”. Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
  9. Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, “An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone”. The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11

2015

期刊论文

  1. Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
  2. Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:Privacy beyond sensitive values. SCIENCE CHINA Information Sciences 58(7): 1-15 (2015).
  4. Changlong Tang, Jiqiang Liu:Selecting a trusted cloud service provider for your SaaS program. Computers & Security 50: 60-73 (2015).
  5. Xiaolin Chang, Jiqiang Liu, “Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload”.  IEEE Transactions on Cloud Computing, 2168-7161, vol. 1, no. 1, pp. 1-14, 2015.
  6. Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu: OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurrency and Computation: Practice and Experience 27(5): 1092-1109 (2015)
  7. Shuanghe Peng, Zhige Chen, Deen Chen, Membership Proof and Verification in Authenticated Skip Lists based on Heap, China Communication, 2015.
  8. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communication, 2015.
  9. Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communications Letters 19(4): 537-540 (2015)
  10. Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Information Science 295: 221-231 (2015)
  11. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, 2015
  12. Guang Yang, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, 2015.
  13. Jian Wang, Nan Jiang, Quantum image translation, Quantum Information Processing, 2015.
  14. Nan Jiang, Jian Wang, Yue Mu, Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio, Quantum Information Processing,  2015.
  15. Jian Wang, QRDA: Quantum Representation of Digital Audio, International Journal of Theoretical Physics, 2015.
  16. 宋衍, 韩臻, 刘凤梅, 刘 磊, 基于访问树的策略隐藏属性加密方案, 通信学报, 2015
  17. 原变青, 刘吉强, 可证明安全的RFID标签所有权转移协议, 通信学报, 2015
  18. 原变青, 刘吉强, 通用可组合安全的RFID标签组所有权转移协议, 计算机研究与发展, 2015
  19. 吕从东, 韩臻, 一种保持多等级安全策略细化后无干扰属性的方法, 四川大学学报(工程科学版), 2015
  20. 张大伟,郭烜,韩臻, 安全可信智能移动终端研究, 中兴通讯技术, 2015.
  21. 黎妹红,李论,张大伟,杜晔, 基于SDKEY的安卓手机安全传输技术, 解放军理工大学学报, 2015.
  22. 彭双和, 陈志阁, 陈得恩, 跳表及认证跳表数据完整性认证性能分析及对比研究, 北京交通大学学报, 2015.

会议论文

  1. Xing Liu, Wei Wang, Jiqiang Liu, “Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis”, accepted by 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).
  2. Xing Liu, Wei Wang, Jiqiang Liu, “POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
  3. Li Lu, Zhen Han, Zhi Chen, OpenStack VulnerabilityDetection andAnalysis 6th International Conference of Applications and Techniques in Information security(ATIS 2015) Springer, 2015.
  4. Xun Chen, Jiqiang Liu, Zhen Han, An Enhanced Authentication Scheme for Virtual Private Network Access based on Platform Attributes of Multi-level Classification, The 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, China, November 4-6, 2015.
  5. Ye Du, Xin Kang, Yahang Zhang, Luyuan Wang, Meihong Li, Model Checking of Software Safety Based on LLBMC, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.
  6. Ye Du, Xinyu Liu, Meihong Li, Yahang Zhang, NuSMV Oriented Formal Modeling of Software and Semantic Translation, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.

教学类及其他技术类论文

  1. 黎妹红,赵琳,张大伟,杜晔, 美国信息安全教育和培训的启示, 计算机教育, 2015.
  2. 杜晔,陈贺男,黎妹红,张大伟, Web 应用安全实验教学探讨与案例评析, 计算机教育,  2015.
  3. 马威, 韩臻, 成阳, 可信云计算中的多级管理机制研究, 信息与网络安全, 2015
  4. 车浩然, 何永忠, 基于P2P和网格ID的位置匿名算法研究, 信息网络安全, 2015
  5. 何永忠,韩臻, 美国宾夕法尼亚州立大学网络空间安全学科专业建设分析, 保密科学技术, 2015
  6. 吴同, 孙忆茹, 中美解密法律制度比较研究, 保密科学技术, 2015

2014

期刊论文

  1. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (top 5 most frequently downloaded paper)[PDF][DOI].
  2. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, ”Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [DOI]
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model for Privacy-Preserving Data Publishing, China Communications, Accepted
  4. Hongchao Wang, Zhen Han, Dong Yang: On Application-Customized Common Platform for Wireless Vehicular Sensor Networks. International Journal of Distributed Sensor Networks (IJDSN), 2014
  5. Yanfeng Shi, Jiqiang Liu, Zhen Han: Attribute-Based Proxy Re-encryption with Keyword Search. Plos One, 2014.
  6. Lizhi Peng, Hongli Zhang, Bo Yang Tong Wu, Traffic Labeller:Collecting Internet Traffic Samples with Accurate Application Information, China Communications, 11/1/69-78, 2014.

  7. Lizhi Peng, Tong Wu, Bo Yang, Yuehui Chen, How Many Packets Are Most Effective for Early Stage Traffic Identification: An Experimental Study. China Communications,11/9/183-193, 2014 
  8. Jian Wang, Nan Jiang, Quantum image translation. Quantum Information Processing, 2014, Accepted.
  9. Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.
  10. Qiuping Wang, Ye Du, Design and implementation of a monitor system for application server based on JMX, WIT Transactions on Information and Communication Technologies, 2014.
  11. Nan Jiang, Jian Wang, The Theoretical Limits of Watermark Spread Spectrum Sequence, Scientific World Journal, 432740/1-6, 2014-3.
  12. Jian Wang, Nan Jiang, Novel properties of spread spectrum sequence in digital watermarking, ICIC Express Letters, 8/6/1645-1651, 2014-6
  13. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han, Multi-party identity-based symmetric privacy-preserving matching with cloud storage, Wuhan University Journal of Natural Sciences,19/5/426-432 2014-10
  14. 王中华,韩臻,刘吉强, 云环境下多用户文件共享方案, 计算机研究与发展, 51/12/2614-2622 2014-12
  15. 马洪亮,王伟,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
  16. 张大伟;韩臻;蒋逸尘;黎妹红, 基于DAA和TLS的匿名远程证明协议, 华中科技大学学报(自然科学版), 42/11/28-33, 2014-11.
  17. 吴同;周丽, 论刑事诉讼中电子证据的鉴真, 山东警察学院学报, 26/1/73-81, 2014

会议论文

  1. Xuezhen Huang, Liu Jiqiang, Han Zhen, A privacy-aware access model on anonymized data, Proceedings of 6th International conference on Trustworthy Computing, Beijing 2014

  2. Xuanni Du, Xiaolin Chang, Performance of AI algorithms for mining meaningful roles, IEEE Congress on Evolutionary Computation,  2070-2076, 2014
  3. Licui Ma, Meihong Li, Ye Du, Dawei Zhang, A SDKEY-based Secure Storage and Transmission Approach for Android Phone, CyberC 2014.
  4. Shuanghe Peng, Yingjie Qin, Zhige Chen, A Simple and More Versatile Authentication Path Computation Algorithm for Binary Hash Tree, 2014 ASE BIGDATA SOCIALCOM CYBERSECURITY Conference.
  5. Tianhua Liu, Dawei Zhang, Yichen Jiang, Research and Implementation of Bytecode Instruction Folding on Java Card, International Conference on Computer, Communications and Information Technology (CCIT 2014), 2014-1.

  6. Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE MobileCloud 2014.
  7. Jia Zhao, The design and implementation of invisible eavesdropping protection application, IEEE 12th international conference on signal processing proceedings, 2014-1 赵佳

  8. Jia Zhao, Bo Gao, Measures of information security level protection on sensing layer in Internet of things, ICACC,2014-1

教学类及其他技术类论文

  1. 刘行,王娜娜,刘吉强,韩臻,Android收集非敏感型传感器安全现状研究, 第二十四届全国信息保密学术会议论文集 //290-294 2014-10
  2. 王舜,杜晔,韩臻,

    针对存储 主的模块的一种模型检测方法, 第二十四届全国信息保密学术会议论文集 //295-300 2014-10 

  3. 王健,引导学生参与学科竞赛以促进专业教学, 保密学科通讯, 3/3/13-15 2014-6
  4. 王健;吴同,黎妹红, 保密专业计算机取证实验室建设, 计算机教育, 11/13/44-46, 2014-7
  5. 吴同;韩臻,王健,黎妹红, 保密专业计算机取证实验教学 计算机教育, 11/13/32-34, 2014-7
  6. 何永忠;王伟,黎琳, 基于云计算的信息安全实验教学平台建设 计算机教育, 2014/1/39-42, 2014
  7. 王伟;何永忠, 以完整解决一个具体问题为中心的研究型教学, 计算机教育, 2014/13/7-9, 2014
  8. 郭烜;张大伟,黎妹红, 手机动态令牌认证系统 保密科学技术, 9/9/266-273, 2014-9 
  9. 韩臻,沈固朝, 保密管理专业的建设和培养方法, 信息安全与通信保密, 5/42-44, 2014-5
  10. 吕从东, 韩臻, 马威, 云存储服务端数据存储加密机制的设计和实现, 信息网络安全, 2014/6
  11. 韩臻,黎琳,何永忠, 美国信息安全教育和人才培养措施借鉴 保密科学技术, 2014/7/4-9, 2014-7