1. X. Chang, Jose M. Martinez, Kishor S. Trivedi, “Transient Performance Analysis of Smart Grid with Dynamic Power Distribution”, Information Sciences, 422: 98-10, 2018.
  2. Bo Liu, X. Chang, Zhen Han, Kishor Trivedi, Ricardo J. Rodrgues, “Model-based Sensitivity Analysis of IaaS Cloud Availability”, Future Generation Computer Systems, 2018.
  3. Chen Z , Chang X , Han Z , et al. Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers[J]. The Computer Journal, 2017:1-10.
  4. Chang,R.F. Xia,J.K. Muppala, K.S. Trivedi, jiqiang Liu, “Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload”, IEEE Transactions on Cloud Computing, 2018
  5. Chang, et al, “Modeling and Analysis of High Availability Techniques in a Virtualized System”, The Computer Journal, 2018.
  6. Chen N , Liu Y , Cheng J , et al. A novel parallel community detection scheme based on label propagation[J]. World Wide Web, 2018, 21(5):1377-1398.
  7. Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)
  8. Qiang Li , Xuan Feng, Haining Wang, Limin Sun, “Understanding the Usage of Industrial Control System Devices on the Internet”, IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 3, JUNE 2018
  9. Yuxuan Jia, Bing Han, Qiang Li*, Hong Li, Limin Sun, “Who owns Internet of Thing devices?” International Journal of Distributed Sensor Networks, 2018, Vol. 14(11)
  10. Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI][PDF]
  11. Xing Liu,Jiqiang Liu, Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”, Future Generation Computer Systemsvol.89, pp. 402-420 (2018) [DOI][PDF].
  12. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”, Future Generation Computer Systemsvol.78, pp. 987–994 (2018) [DOI][PDF].
  13. Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”, Future Generation Computer Systems (to appear), 2018 [DOI][PDF].
  14. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].
  15. Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 2018 (to appear) [DOI][PDF].
  16. Dan Su, Jiqiang Liu, Wei Wang*, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”, Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].
  17. Yongzhong He, Endalew Elsabeth Alem, Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”, Frontiers of Computer Science (to appear), 2018 [DOI][PDF].
  18. Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) [DOI][PDF].
  19. Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)[DOI]
  20. Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, “Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”, Information Sciences, 433–434(4): 417-430 (2018) [DOI].
  21. Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”, Cluster Computing (2018) 21: 265–275 [DOI][PDF].
  22. Zhao J , Liu J , Qin Z , et al. Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters[J]. IEEE Transactions on Smart Grid, 2016, PP(99):1-1.
  23. Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu:Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018)
  24. Shaohua Lv, Jian Wang*, Yinqi Yang, And Jiqiang Liu, “Intrusion Prediction With System-Call Sequence-to-Sequence Model”, IEEE Access, 2018,
  25. PENG Shuanghe, ZHOU Qiaofeng, LIU Peiyao. A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming[J].武汉大学自然科学学报(英文版),2018,23(6):535-540. DOI:10.1007/s11859-018-1359-1
  26. Wang W . BotCapturer: Detecting Botnets based on Two-Layere Analysis with Graph Anomaly Detection and Network Traffic Clustering[J]. International Journal of Performability Engineering, 2018, 14(5).
  27. Jian Wang, Ya-Cong Geng, Lei Han, Ji-Qiang Liu, “Quantum Image Encryption Algorithm Based on Quantum Key Image”, International Journal of Theoretical Physics, 2018
  28. Zeyu Mi, Haibo Chen,Yinqian Zhang, Shuanghe Peng, Xiaofeng Wang, and Michael Reiter. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring, IEEE Transactions on Dependable and Secure Computing (TDSC), 2018.
  29. Wu, M. Wang, Y. Dong, Y. Tang, H. Mu, H. Li, B. Yin, F. Yan, and Z. Han, “Magnetic field sensor based on a dual-frequency optoelectronic oscillator using cascaded magnetostrictive alloy-fiber Bragg grating-Fabry Perot and fiber Bragg grating-Fabry Perot filters,” Opt. Express 26, 27628-27632 (2018).
  30. Li, S. Atakaramians, J. Yuan, H. Xiao, W. Wang, Y. Li, B. Wu, and Z. Han, “Terahertz polarization-maintaining subwavelength filters,” Opt. Express 26, 25617-25629 (2018).
  31. Li, H. Xiao, J. Yuan, W. Wang, B. Yin, B. Wu, and Z. Han, “Terahertz polarization-maintaining subwavelength dielectric waveguides,” J. Opt. 20, 125602 (2018).
  32. 黎琳, 李振寰, 常晓林, et al. Caché数据库通讯协议安全性分析系统[J]. 信息网络安全, 2018, No.208(04):44-52.
  33. 杜晔 , 张田甜 , 黎妹红 . 基于信息密度贝叶斯算法的云平台入侵检测[J].系统仿真学报, 2018.
  34. 基于程序局部性引导的有界模型检测优化方法,王舜、杜晔、韩臻、刘吉强,通信学报,3
  35. 曹咪, 王继刚, 王伟, et al. 基于静态分析的TVOS恶意应用检测方法研究[J]. 郑州大学学报(理学版), 2018, v.50(03):30-36.
  36. 范博, 杨润垲, 黎琳. 基于SSH的可信信道建立方法研究[J]. 信息网络安全, 2018.
  37. 李强, 贾煜璇, 宋金珂, 李 红, 朱红松, 孙利民, “网络空间物联网信息搜索”, 信息安全学报,第 3 卷 第 5 期,2018年,(CCF B类)
  38. 李春燕,赵佳,刘吉强等. 车载自组网络中基于区块链的路况预警方案,网络空间安全学报,2018, 4(7): 39-47.
  39. 刘俊杰,赵佳,刘吉强等. 军事车载网密钥管理方案研究,网络空间安全学报,2018, 4(8): 39-46.
  40. 彭双和 图尔贡 金传 针对减弱隐蔽信道攻击的XEN虚拟机调度策略   武汉大学学报(工学), 2018.4, 371-376
  41. 赵佳利, 彭双和, 韩静. 计算机高速缓存相关概念的案例教学, 计算机教育. 2018-9. 57-63
  42. 王佳林,刘吉强,赵迪,王盈地,相迎宵,陈彤,童恩栋,牛温佳,“基于非对称卷积自编码器和支持向量机的入侵检测模型”,网络与信息安全学报,2018.
  43. 王健,李昶,韩磊,韩臻,基于桌面云的计算资源控制保护方案,信息网络安全,第2期,27-33,2018
  44. 郭志民, 彭豪辉, 牛霜霞, et al. 基于用户与网络行为分析的主机异常检测方法[J]. 北京交通大学学报, 2018, 42(05).
  45. 罗一帆, 张大伟, 常亮, et al. 一种基于组合公钥的密钥派生方案[J]. 郑州大学学报(理学版), 2018(2).


  1. Chang, et. al, “Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System”,IEEE ICCCN 2018
  2. Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han, “A PCA-based Model to Predict Adversarial Examples on Q-Learning of Path Finding”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  3. Qiang Li, Xuan Feng, Haining Wang, Zhi Li, Limin Sun, “Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices”, IEEE Conference on Computer Communications (INFOCOM) 2018
  4. Kai Cheng, Qiang Li*, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang, “DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware”, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018
  5. Qiang Li, Xuan Feng, Haining Wang, Limin Sun, “Discovery of Internet of Thing Devices based on Rules”, IEEE Conference on Computer Communications (INFOCOM ’18 Poster) 2018,
  6. X Feng, Q Li, H Wang, L Acquisitional rule-based engine for discovering Internet-of-Things devices. 27th USENIX Security Symposium (USENIX Security 18), 327-341
  7. Liu J , Niu W , Liu J , et al. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN[C]// International Conference on Information & Communications Security. Springer, Cham, 2017.
  8. Bai X , Xiang Y , Niu W , et al. A Cross-Modal CCA-Based Astroturfing Detection Approach[C]// International Conference on Information & Communications Security. Springer, Cham, 2017.
  9. Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang, “An Approach to Generate Topic Similar Document by Seed Extraction-based SeqGAN Training for Bait Document”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  10. Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen, “Intention-aware Multi-channel Keyword Extension for Content Security”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  11. Xiaoxuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu, “Adversarial Examples Construction towards White-Box Q Table Variation in DQN Pathfinding Training”, IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018.
  12. Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, Xiaoxuan Bai, and Jiqiang Liu, “A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System”, 10th IFIP TC 12 International Conference on Intelligent Information Processing, 2018.
  13. Yu, Y., Wang, J., Liu, J., Han, L., He, X., & Lv, S., “Multi-Dimension Threat Situation Assessment Based on Network Security Attributes”, In 2018 27th International Conference on Computer Communication and Networks (ICCCN), 2018, July, IEEE.
  14. He, X., Wang, J., Liu, J., Han, L., Yu, Y., & Lv, S., “Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis”, In 2018 27th International Conference on Computer Communication and Networks (ICCCN) , 2018, July, IEEE.
  15. Yan Chen, Wei Wang, Xiangliang Zhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, accepted by 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia, June 3rd – 6th, 2018
  16. Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and Secure Outsourcing of Differentially Private Data Publication, accepted by 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018
  17. Longfei Wu, Xiaojiang Du, Wei Wang, Bin Lin, “An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology”. Accepted by 2018 International Conference on Computing, Networking and Communications (ICNC 2018)
  18. 李春燕, 赵佳, 刘吉强, et al. 车载自组织网络中基于区块链的路况预警方案[J]. 网络与信息安全学报, 2018(7).



  1. Yang Yang, Xiaolin Chang, Jiqiang Liu, Lin Li, “Towards Robust Green Virtual Cloud Data Center Provisioning”. IEEE Transactions on Cloud Computing, 2168-7161, vol. 5, no. 2, pp. 168-181, 2017-06
  2. Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android apps’ behavior for effective detection of malapps at large scale”. Future Generation Computer Systems, 0167-739X, vol. 75, pp. 30-45, 2017-05
  3. Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li, “Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers”. Computer Journal, The British Computer Society, 2017-12
  4. Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, “Discovering and understanding android sensor usage behaviors with data flow analysis”. World Wide Web-internet & Web Information System, pp. 1-22, 2017-03
  5. Chu Huang, Sencun Zhu, Quanlong Guan, Yongzhong He, “A software assignment algorithm for minimizing worm damage in networked systems”. Journal of Information Security & Applications, 2214-2126, vol. 35, no. 8, pp. 55-67, 2017-05
  6. Qiang Li, Xuan Feng, Liang Zhao, Limin Sun, “A Framework for Searching Internet wide Devices”. IEEE NETWORK, 0890-8044, vol. 31Issue 6, no. 0890-8044, pp. 101-107, 2017-11
  7. Zhiwei Guo, Wenjia Niu, “Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems”. IEEE Access, 2169-3536, vol. 5, no. 2017(5), pp. 15529-15541, 2017-07
  8. Han Wang, Jian Wang, Yacong Geng, Yan Song, Jiqiang Liu, “Quantum Image Encryption Based on Iterative Framework of Frequency-SpatialDomain Transforms”. International Journal of Theoretical Physics, 0020-7748, vol. 56, no. 10, pp. 3029-3049, 2017-10
  9. Jian Wang, Han Wang, Yan Song, “Quantum Endpoint Detection Based on QRDA”. International Journal of Theoretical Physics, 0020-7748, vol. 56, no. 10, pp. 3257-3270, 2017-10
  10. Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”,  IEEE Transactions on Information Forensics and Security (TIFS)vol. 12, no. 8, pp. 1772-1785, 2017
  11. Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A time-delay neural network for solving time-dependent shortest path problem”, Neural Networksvol. 90, pp. 21-28, 2017
  12. 马李翠,黎妹红,吴倩倩,杜晔, “智能电网通信中动态密钥加密方法的研究与改进”. 北京邮电大学学报, ISSN 1007-5321, vol. 40, no. 4, pp. 51-56, 2017-08
  13. 何永忠,韩臻, “网络空间安全专业学科培养体系比较研究”. 北京电子科技学院学报, 1672-464X, vol. 25, no. 1, pp. 1-8, 2017-03
  14. 马洪亮,王伟*,韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”. 计算机学报, 0254-4164, vol. 40, no. 7, pp. 1699-1713, 2017-07
  15. 宋衍, 韩臻, 李建军, “支持安全共享的云存储系统研究”. 通信学报, vol. 38, no. z2, pp. 1-9, 2017-11
  16. 董友康,张大伟,韩臻, “基于联盟区块链的董事会电子投票系统”. 网络与信息安全学报, 2017-12
  17. 刘伟,何永忠,赵佳,黎琳, “六轮DES截断差分攻击算法的改进与实现”. 北京交通大学学报, 1673-0291, vol. 41, no. 2, pp. 28-35, 2017-02
  18. 何永忠,李响,陈美玲,王伟, “基于云流量混淆的Tor匿名通信识别方法”. 工程科学与技术(四川大学学报), 2096-3246, vol. 49, no. 2, pp. 121-132, 2017-03
  19. 李超,何永忠, “新技术应用等级保护安全设计与实现”. 科学出版社, 978-7-03-052049-4, 2017-03
  20. 吴兴茹,何永忠, “基于函数调用图的Android重打包应用检测”. 计算机工程, 1000-3428, vol. 43, no. 11, pp. 122-127, 2017-11
  21. 王柯翔,黎琳,彭双和, “一种基于LWE采样算法的实现与优化”. 北京交通大学学报, ISSN 1673-0291, vol. 41, no. 5, pp. 32-36, 2017-10
  22. 彭双和,图尔贡麦提萨比尔,周巧凤, “基于Simhash的中文文本去重技术研究”. 计算机技术与发展, 1673-629X, vol. 27, no. 11, pp. 137-145, 2017-11
  23. 郭青霄,张大伟, “基于SM2的代理保护代理签名的设计与实现”. 网络与信息安全学报, 2096-109X, vol. 3, no. 9, pp. 192-200, 2017-09
  24. 赵佳,李娜,韩磊,刘吉强, “城市环境下基于车辆分类的车载自组网隐私保护方案研究”. 南京信息工程大学学报(自然科学版), 1674-7070, vol. 9, no. 5, pp. 480-489, 2017-10
  25. 陈勋,刘吉强,韩臻,邱硕, “基于计算平台安全属性的高效远程证明方案”. 北京工业大学学报, 0254-0037, vol. 43, no. 9, pp. 1357-1365, 2017-09


  1. Xiaodan Li, Xiaolin Chang, John_A_Board, Kishor_S_Trivedi, “A Novel Approach for Software Vulnerability Classification”. Proceedings of the 2017 Annual Reliability and Maintainability Symposium, 978-1-5090-5284-4, pp.1-7, 2017-01
  2. Sukhwani, Martinez, Xiaolin Chang, Trivedi, Rindos, “Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)”. Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 978-1-5386-1679-6, pp.253-255, 2017-09
  3. Xinwei Gao, Lin Li, Ding, Jiqiang Liu, RV, Liu, “Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite”. Information Security Practice and Experience 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings (LNCS, volume 10701), 978-3-319-72359-4, pp. 551-564, 2017-12
  4. Qiang Li, Feng, Wang, Sun, “Automatically Discovering Surveillance Devices in the Cyberspace”. Proceeding MMSys’17, Proceedings of the 8th ACM on Multimedia Systems Conference, 978-1-4503-5002-0, pp. 331-342, 2017-06
  5. Zhiwei Guo, Wenjia Niu, “Beyond the Aggregation of Its Members— A Novel Group Recommender System from the Perspective of Preference Distribution”. Proceedings of the 10th International Conference(KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017) – Knowledge Science, Engineering and Management, 978-3-319-63557-6, pp. 359-370, 2017-08
  6. Tong Chen, Alallaq, Wenjia Niu, et al. “A Hidden Astroturfing Detection Approach Base On Emotion Analysis”. Proceedings of the 10th International Conference(KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017) – Knowledge Science, Engineering and Management, 978-3-319-63557-6, pp. 55-66, 2017-08
  7. Jingjing Liu, Wenjia Niu, Jiqiang Liu, et al. “A Method to Effectively Detect Vulnerabilities on Path Planning of VIN”. ICICS: International Conference on Information and Communications Security, 978-3-319-50010-2, pp. 81-93, 2017-12
  8. Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, et al. “A Cross-modal CCA-based Astroturfing Detection Approach”. ICICS: International Conference on Information and Communications Security, 978-3-319-50010-2, pp. 50-62, 2017-12



  1. Qian Gao, Yongzhong He, “Two image encryption methods with hiding effect based on moiré pattern”. Int. J. of High Performance Computing and Networking, 1740-0562, vol. 9-5, no. 8, pp. 382-393, 2016-11
  2. Qiang Li, Liming Sun, “Collaborative Recognition of Queuing Behavior on Mobile Phones”. IEEE Transactions on Mobile Computing, 1536-1233, vol. 15, no.1, pp. 60-73, 2016-01
  3. Hong Tao, Qiang Li, et al. “Influential spatial facility prediction over large scale cyber-physical vehicles in smart city”. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 16871472, vol. 2016, no. 13, pp. 24-32, 2016-12
  4. Bianqing Yuan, Jiqiang Liu, “A universally composable secure grouping-proof protocol for RFID tags”. Concurrency & Computation Practice & Experience, 1532-0626, vol. 28, Issue 6, pp. 1872-1883, 2016-04
  5. Shuanghe Peng, Zhige Chen, Deen, Chen, “Membership Proof and Verification in Authenticated Skip Lists Based on Heap”. China Communications, 1673-5447, vol. 13, no. 6, pp. 195-204, 2016-06
  6. Jian Wang, “QRDA: Quantum Representation of Digital Audio”. International Journal of Theoretical Physics, 0020-7748, vol. 55, no. 3, pp. 1622-1641, 2016-03
  7. Nan Jiang, Yijie Dang, Jian Wang, “Quantum image matching”. Quantum Information Processing, 1570-0755, vol. 15, no. 9, pp. 3543-3572, 2016-09
  8. 邢彬,韩臻,常晓林,刘吉强,”基于虚拟机监控技术的可信虚拟域” .信息安全学报, 2096-1146, vol. 1, no. 1 pp. 75-94, 2016-01.
  9. 杜晔,张亚丹,黎妹红,张大伟, “基于改进FastICA算法的入侵检测样本数据优化方法”. 通信学报, 1000-436X, vol. 37, no. 1, pp. 42-48, 2016-01
  10. 马洪亮,王伟,韩臻, ”面向Drive-by-download攻击的检测方法”. 华中科技大学学报(自然科学版), 1671-4512, vol. 44, no. 3,pp. 6-11, 2016-03
  11. 石勇,郭煜,刘吉强,韩臻,马威, “一种透明的可信云租户隔离机制研究”. 软件学报, 1000-9825, vol. 27, no. 6, pp. 1538-1548, 2016-06
  12. 何永忠,陈美玲, ”基于协议的拟态研究综述”. 北京交通大学学报, 1673-0291, vol. 40-5, no. 5, pp. 1-8, 2016-10
  13. 赵佳,刘吉强,唐宏, “基于TCM的智能电表隐私保护协议”. 北京交通大学学报, 1673-0291, vol. 40, no. 5, pp. 29-34, 2016-10
  14. 彭双和,陈志阁, “跳表和认证跳表的性能分析及对比”. 北京交通大学学报, 1000-1506, vol. 40, no. 186, pp. 58-62, 2016-06
  15. 查明明,王伟, “FlowMonitor: Android隐私数据流向监控防护系统”. 山东大学学报 理学版, 1671-9352, vol. 51, no. 9, pp. 59-67, 2016-09
  16. 邢彬,刘吉强,韩臻, “一种可信计算平台完整性度量的新模型”. 信息网络安全, 1671-1122, vol. 16, no. 6, pp. 8-14, 2016-06


  1. Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, “Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem”. Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].
  2. Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, “Anomadroid: profiling Android application behaviors for identifying unknown malapps”, accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  3. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
  4. Xuefeng Xiang, Ye Du, Peiyuan Li, Tiantian Zhang, “Design and Implementation of a College Logistics Repair Management Platform”. Proceedings of the 2016 International Conference on Management Science and Management Innovation, 978-94-6252-236-7, pp. 427-431, 2016-08
  5. Lin Li, Xiubin Fan, Zhiyin Kong, Fengmei Liu, Kun Li, “A new approach to the definition of information diffusion and confusion of Boolean transformation”. International Conference on Artificial Intelligence:Technologies and Applications (ICAITA 2016), 978-94-6252-162-9, pp. 59-61, 2016-01
  6. Xuan Feng, Qiang Li, Qi Han, HongSong Zhu, Yan Liu, Limin Sun, “Identification of visible industrial control devices at Internet scale”. 2016 IEEE International Conference on Communications (ICC), 978-1-4799-6664-6, pp. 26-32, 2016-05
  7. Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:” Active profiling of physical devices at internet scale”. 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016, 978-1-5090-2279-3, pp. 26-25, 2016-09
  8. Zhenliang Cai, Jian Wang, Jiqiang Liu, “Novel feature selection algorithm for Chinese text categorization based on CHI”. Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
  9. Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, “An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone”. The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11



  1. Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
  2. Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:Privacy beyond sensitive values. SCIENCE CHINA Information Sciences 58(7): 1-15 (2015).
  4. Changlong Tang, Jiqiang Liu:Selecting a trusted cloud service provider for your SaaS program. Computers & Security 50: 60-73 (2015).
  5. Xiaolin Chang, Jiqiang Liu, “Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload”.  IEEE Transactions on Cloud Computing, 2168-7161, vol. 1, no. 1, pp. 1-14, 2015.
  6. Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu: OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurrency and Computation: Practice and Experience 27(5): 1092-1109 (2015)
  7. Shuanghe Peng, Zhige Chen, Deen Chen, Membership Proof and Verification in Authenticated Skip Lists based on Heap, China Communication, 2015.
  8. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communication, 2015.
  9. Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communications Letters 19(4): 537-540 (2015)
  10. Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Information Science 295: 221-231 (2015)
  11. Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, 2015
  12. Guang Yang, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, 2015.
  13. Jian Wang, Nan Jiang, Quantum image translation, Quantum Information Processing, 2015.
  14. Nan Jiang, Jian Wang, Yue Mu, Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio, Quantum Information Processing,  2015.
  15. Jian Wang, QRDA: Quantum Representation of Digital Audio, International Journal of Theoretical Physics, 2015.
  16. 宋衍, 韩臻, 刘凤梅, 刘 磊, 基于访问树的策略隐藏属性加密方案, 通信学报, 2015
  17. 原变青, 刘吉强, 可证明安全的RFID标签所有权转移协议, 通信学报, 2015
  18. 原变青, 刘吉强, 通用可组合安全的RFID标签组所有权转移协议, 计算机研究与发展, 2015
  19. 吕从东, 韩臻, 一种保持多等级安全策略细化后无干扰属性的方法, 四川大学学报(工程科学版), 2015
  20. 张大伟,郭烜,韩臻, 安全可信智能移动终端研究, 中兴通讯技术, 2015.
  21. 黎妹红,李论,张大伟,杜晔, 基于SDKEY的安卓手机安全传输技术, 解放军理工大学学报, 2015.
  22. 彭双和, 陈志阁, 陈得恩, 跳表及认证跳表数据完整性认证性能分析及对比研究, 北京交通大学学报, 2015.


  1. Xing Liu, Wei Wang, Jiqiang Liu, “Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis”, accepted by 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).
  2. Xing Liu, Wei Wang, Jiqiang Liu, “POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
  3. Li Lu, Zhen Han, Zhi Chen, OpenStack VulnerabilityDetection andAnalysis 6th International Conference of Applications and Techniques in Information security(ATIS 2015) Springer, 2015.
  4. Xun Chen, Jiqiang Liu, Zhen Han, An Enhanced Authentication Scheme for Virtual Private Network Access based on Platform Attributes of Multi-level Classification, The 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, China, November 4-6, 2015.
  5. Ye Du, Xin Kang, Yahang Zhang, Luyuan Wang, Meihong Li, Model Checking of Software Safety Based on LLBMC, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.
  6. Ye Du, Xinyu Liu, Meihong Li, Yahang Zhang, NuSMV Oriented Formal Modeling of Software and Semantic Translation, International Conference on Computer Science and Communication Engineering (ICCSCE), 2015.


  1. 黎妹红,赵琳,张大伟,杜晔, 美国信息安全教育和培训的启示, 计算机教育, 2015.
  2. 杜晔,陈贺男,黎妹红,张大伟, Web 应用安全实验教学探讨与案例评析, 计算机教育,  2015.
  3. 马威, 韩臻, 成阳, 可信云计算中的多级管理机制研究, 信息与网络安全, 2015
  4. 车浩然, 何永忠, 基于P2P和网格ID的位置匿名算法研究, 信息网络安全, 2015
  5. 何永忠,韩臻, 美国宾夕法尼亚州立大学网络空间安全学科专业建设分析, 保密科学技术, 2015
  6. 吴同, 孙忆茹, 中美解密法律制度比较研究, 保密科学技术, 2015



  1. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (top 5 most frequently downloaded paper)[PDF][DOI].
  2. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, ”Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [DOI]
  3. Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model for Privacy-Preserving Data Publishing, China Communications, Accepted
  4. Hongchao Wang, Zhen Han, Dong Yang: On Application-Customized Common Platform for Wireless Vehicular Sensor Networks. International Journal of Distributed Sensor Networks (IJDSN), 2014
  5. Yanfeng Shi, Jiqiang Liu, Zhen Han: Attribute-Based Proxy Re-encryption with Keyword Search. Plos One, 2014.
  6. Lizhi Peng, Hongli Zhang, Bo Yang Tong Wu, Traffic Labeller:Collecting Internet Traffic Samples with Accurate Application Information, China Communications, 11/1/69-78, 2014.

  7. Lizhi Peng, Tong Wu, Bo Yang, Yuehui Chen, How Many Packets Are Most Effective for Early Stage Traffic Identification: An Experimental Study. China Communications,11/9/183-193, 2014 
  8. Jian Wang, Nan Jiang, Quantum image translation. Quantum Information Processing, 2014, Accepted.
  9. Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.
  10. Qiuping Wang, Ye Du, Design and implementation of a monitor system for application server based on JMX, WIT Transactions on Information and Communication Technologies, 2014.
  11. Nan Jiang, Jian Wang, The Theoretical Limits of Watermark Spread Spectrum Sequence, Scientific World Journal, 432740/1-6, 2014-3.
  12. Jian Wang, Nan Jiang, Novel properties of spread spectrum sequence in digital watermarking, ICIC Express Letters, 8/6/1645-1651, 2014-6
  13. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han, Multi-party identity-based symmetric privacy-preserving matching with cloud storage, Wuhan University Journal of Natural Sciences,19/5/426-432 2014-10
  14. 王中华,韩臻,刘吉强, 云环境下多用户文件共享方案, 计算机研究与发展, 51/12/2614-2622 2014-12
  15. 马洪亮,王伟,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
  16. 张大伟;韩臻;蒋逸尘;黎妹红, 基于DAA和TLS的匿名远程证明协议, 华中科技大学学报(自然科学版), 42/11/28-33, 2014-11.
  17. 吴同;周丽, 论刑事诉讼中电子证据的鉴真, 山东警察学院学报, 26/1/73-81, 2014


  1. Xuezhen Huang, Liu Jiqiang, Han Zhen, A privacy-aware access model on anonymized data, Proceedings of 6th International conference on Trustworthy Computing, Beijing 2014

  2. Xuanni Du, Xiaolin Chang, Performance of AI algorithms for mining meaningful roles, IEEE Congress on Evolutionary Computation,  2070-2076, 2014
  3. Licui Ma, Meihong Li, Ye Du, Dawei Zhang, A SDKEY-based Secure Storage and Transmission Approach for Android Phone, CyberC 2014.
  4. Shuanghe Peng, Yingjie Qin, Zhige Chen, A Simple and More Versatile Authentication Path Computation Algorithm for Binary Hash Tree, 2014 ASE BIGDATA SOCIALCOM CYBERSECURITY Conference.
  5. Tianhua Liu, Dawei Zhang, Yichen Jiang, Research and Implementation of Bytecode Instruction Folding on Java Card, International Conference on Computer, Communications and Information Technology (CCIT 2014), 2014-1.

  6. Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE MobileCloud 2014.
  7. Jia Zhao, The design and implementation of invisible eavesdropping protection application, IEEE 12th international conference on signal processing proceedings, 2014-1 赵佳

  8. Jia Zhao, Bo Gao, Measures of information security level protection on sensing layer in Internet of things, ICACC,2014-1


  1. 刘行,王娜娜,刘吉强,韩臻,Android收集非敏感型传感器安全现状研究, 第二十四届全国信息保密学术会议论文集 //290-294 2014-10
  2. 王舜,杜晔,韩臻,

    针对存储 主的模块的一种模型检测方法, 第二十四届全国信息保密学术会议论文集 //295-300 2014-10 

  3. 王健,引导学生参与学科竞赛以促进专业教学, 保密学科通讯, 3/3/13-15 2014-6
  4. 王健;吴同,黎妹红, 保密专业计算机取证实验室建设, 计算机教育, 11/13/44-46, 2014-7
  5. 吴同;韩臻,王健,黎妹红, 保密专业计算机取证实验教学 计算机教育, 11/13/32-34, 2014-7
  6. 何永忠;王伟,黎琳, 基于云计算的信息安全实验教学平台建设 计算机教育, 2014/1/39-42, 2014
  7. 王伟;何永忠, 以完整解决一个具体问题为中心的研究型教学, 计算机教育, 2014/13/7-9, 2014
  8. 郭烜;张大伟,黎妹红, 手机动态令牌认证系统 保密科学技术, 9/9/266-273, 2014-9 
  9. 韩臻,沈固朝, 保密管理专业的建设和培养方法, 信息安全与通信保密, 5/42-44, 2014-5
  10. 吕从东, 韩臻, 马威, 云存储服务端数据存储加密机制的设计和实现, 信息网络安全, 2014/6
  11. 韩臻,黎琳,何永忠, 美国信息安全教育和人才培养措施借鉴 保密科学技术, 2014/7/4-9, 2014-7