发表论文
(1) Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 第 6 作者(2) 面向版式文档的细粒度隐私操作控制方法, Fine-grained privacy operation control method for layout documents, 通信学报, 2023, 第 2 作者(3) Recommending Orchestration Plan for Space-Ground Integration Information Network: A Subgraph Matching Approach, The 20th IEEE International Conference on Ubiquitous Intelligence and Computing, 2023, 第 4 作者(4) Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation, IEEE Winter Conference on Applications of Computer Vision, 2023, 第 6 作者(5) On-Demand Allocation of Cryptographic Computing Resource with Load Prediction, International Conference on Information and Communications Security, 2023, 第 2 作者(6) Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation, SecureComm, 2023, 第 4 作者(7) Evaluating the Impact of Adversarial Factors on Membership Inference Attacks, The 20th IEEE International Conference on Ubiquitous Intelligence and Computing, 2023, 通讯作者(8) Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 第 6 作者(9) Insider Threat Detection Using Generative Adversarial Graph Attention Networks, IEEE Global Communications Conference, 2022, 第 2 作者(10) 隐私计算的学术内涵与研究趋势, Academic connotation and research trends of privacy computing, 网络与信息安全学报, 2022, 第 1 作者(11) DP-Opt: Identify High Differential Privacy Violation by Optimization, Wireless Algorithms, Systems, and Applications, 2022, 通讯作者(12) Detecting conflict of heterogeneous access control policies, Detecting conflict of heterogeneous access control policies, 数字通信与网络:英文版, 2022, 第 2 作者(13) Inferring Attack Path in Networks With Periodic Topology Changes, The 19th IEEE International Conference on Ubiquitous Intelligence and Computing(UIC 2022), 2022, 第 6 作者(14) 泛在网络环境下隐蔽通道关键技术研究综述, Survey on key technologies of covert channel in ubiquitous network environment, 通信学报, 2022, 第 1 作者(15) “多级本地化差分隐私算法推荐框架”, Multi-level local differential privacy algorithm recommendation framework, 通信学报, 2022, 第 5 作者(16) Detecting conflict of heterogeneous access control policies, DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 通讯作者(17) Efficiently Constructing Topology of Dynamic Networks, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2022, 第 1 作者(18) A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2022, 第 3 作者(19) Efficiently Managing Large-Scale Keys in HDFS, IEEE International Conference on High Performance Computing and Communications (HPCC 2021,CCF-C), 2021, 通讯作者(20) 跨域访问控制技术研究, Research on cross-domain access control technology, 网络与信息安全学报, 2021, 第 2 作者(21) AdaPDP: Adaptive Personalized Differential Privacy, IEEE Conference on Computer Communications(IEEE INFOCOM,CCF-A), 2021, 通讯作者(22) Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach, IEEE International Conference on Computational Science, 2021, 第 4 作者(23) 天地一体化信息网络安全动态赋能架构, Dynamic security-empowering architecture for space-ground integration information network, 通信学报, 2021, 第 3 作者(24) 基于区间决策图的威胁处置策略快速匹配, 通信学报, 2021, 第 2 作者(25) Utility-aware Exponential Mechanism for Personalized Differential Privacy, 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020, 通讯作者(26) Android设备中基于流量特征的隐私泄露评估方案, Traffic characteristic based privacy leakage assessment scheme for Android device, 通信学报, 2020, 第 5 作者(27) Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs, IEEE WIRELESS COMMUNICATIONS, 2020, 第 1 作者(28) Securing instruction interaction for hierarchical management, Journal of Parallel and Distributed Computing, 2020, 第 1 作者(29) Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?, IEEE International Conference on Communications, 2020, 第 4 作者(30) A Framework to Preserve User Privacy for Machine Learning as a Service, IEEE Global Communications Conference, 2020, 通讯作者(31) 天地一体化信息网络安全动态赋能研究, Dynamically Empowering Security for Space-Terrestrial Integrated Information Network, 无线电通信技术, 2020, 第 1 作者(32) Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission, WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 第 5 作者(33) Exploiting location-related behaviors without the GPS data on smartphones, INFORMATION SCIENCES, 2020, 第 1 作者(34) 天地网络安全保障技术研究, Research on Space-Ground Network Security Guarantee Technology, 天地一体化信息网络, 2020, 第 1 作者(35) 新形势下理工门类学科建设内涵与学科评估导向, Construction of academic discipline of science and engineering and orientation for their ranking under the new situation, 网络与信息安全学报, 2020, 第 1 作者(36) Dynamic countermeasures selection for multi-path attacks, COMPUTERS & SECURITY, 2020, 第 1 作者(37) An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks, 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, 第 1 作者(38) 面向海量电子凭据的分层可扩展存储架构, Hierarchical scalable storage architecture for massive electronic bill, 通信学报, 2019, 第 1 作者(39) HideMe: Privacy-Preserving Photo Sharing on Social Networks, IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, 第 1 作者(40) A Game Theoretic Approach to Cooperative Intrusion Detection, JOURNAL OF COMPUTATIONAL SCIENCE, 2019, 通讯作者(41) Privacy Computing: Concept, Computing Framework, and Future Development Trends, ENGINEERING, 2019, 第 1 作者(42) 复杂网络环境下面向威胁监测的采集策略精化方法, Collection policy refining method for threat monitoring in complex network environment, 通信学报, 2019, 第 1 作者(43) APP隐私泄露风险评估与保护方案, Risk assessing and privacy-preserving scheme for privacy leakage in APP, 通信学报, 2019, 第 3 作者(44) 基于Stackelberg攻防博弈的网络系统安全控制机制优化研究, Research on Optimizing Security Control Mechanism of Networked System Based on Stackelberg Defender-Attacker Game, 信息安全学报, 2019, 第 6 作者(45) 支持高并发的Hadoop高性能加密方法研究, High-performance and high-concurrency encryption scheme for Hadoop platform, 通信学报, 2019, 第 3 作者(46) Privacy Computing: Concept, Computing Framework, and Future Development Trends, Privacy Computing: Concept, Computing Framework, and Future Development Trends, ENGINEERING, 2019, 第 1 作者(47) Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies, IEEE Internet of Things Journal, 2019, 第 1 作者(48) Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks, 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019, 第 6 作者(49) Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach, International Conference on Computational Science, 2019, 第 5 作者(50) 不完全信息下的威胁处置效果模糊评估, Fuzzy evaluation for response effectiveness in cases of incomplete information, 通信学报, 2019, 第 1 作者(51) Security Measurement for Unknown Threats Based on Attack Preferences, SECURITY AND COMMUNICATION NETWORKS, 2018, 第 5 作者(52) A game-theoretic approach to advertisement dissemination in ephemeral networks, WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 第 3 作者(53) SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, 工程(英文), 2018, 第 1 作者(54) UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks, SECURITY AND COMMUNICATION NETWORKS, 2018, 第 4 作者(55) Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach, 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2018, 第 4 作者(56) 2-MR: A Two-Phase MapReduce Approach for Incremental Replication, International Conference on Big data Technologies (ICBDT 2018), 2018, 第 1 作者(57) Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services, 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018, 第 1 作者(58) DESC: enabling secure data exchange based on smart contracts, SCIENCE CHINA-INFORMATION SCIENCES, 2018, 第 7 作者(59) Privacy-preserving Partner Selection for Ride-sharing Services, IEEE Transactions on Vehicular Technology, 2018, 第 1 作者(60) Resolving Access Conflicts: an Auction-based Incentive Approach, IEEE Military Communications Conference, 2018, 通讯作者(61) 复杂网络环境下跨网访问控制机制, Cross-network access control mechanism for complex network environment, 通信学报, 2018, 第 1 作者(62) Real-time Data Incentives for IoT Searches, 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018, 通讯作者(63) Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System, 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018, 第 1 作者(64) Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach, COMPUTATIONAL SCIENCE - ICCS 2018, PT I, 2018, 通讯作者(65) Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 第 5 作者(66) 社交照片隐私保护机制研究进展, Research Progress of Photo Privacy-Preserving Mechanisms in Online Social Network, 信息安全学报, 2018, 第 1 作者(67) SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, ENGINEERING, 2018, 第 1 作者(68) Privacy-Prese ving Partner Selection for Ride-Sharing Services, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 第 5 作者(69) 抗隐蔽敌手的云外包秘密共享方案, Cloud outsourcing secret sharing scheme against covert adversaries, 通信学报, 2017, 第 6 作者(70) A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks, NETWORK AND SYSTEM SECURITY, 2017, 第 5 作者(71) Impact Factor-Based Group Recommendation Scheme with Privacy Preservation in MSNs, 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017, 第 4 作者(72) Pricing Privacy Leakage in Location-Based Service, WASA, 2017, 第 1 作者(73) Small-world: Secure friend matching over physical world and social networks, INFORMATION SCIENCES, 2017, 第 1 作者(74) Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game, ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 第 4 作者(75) Who is Visible: Resolving Access Policy Conflicts in Online Social Networks, GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017, 第 4 作者(76) Cyberspace-Oriented Access Control: Model and Policies, 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, 第 1 作者(77) SRAM: A State-Aware Risk Assessment Model for Intrusion Response, IEEE International Conference on Data Science in Cyberspace(DSC), 2017, 第 1 作者(78) A Privacy-Preserving Method for Photo Sharing in Instant Message Systems, International Conference on Cryptography, Security and Privacy, 2017, 第 1 作者(79) Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field, IEEE International Symposium on UbiSafe Computing(UbiSafe), 2017, 第 1 作者(80) Server-aided private set intersection based on reputation, INFORMATION SCIENCES, 2017, 通讯作者(81) TrackU: Exploiting User's Mobility Behavior via WiFi List, GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017, 第 1 作者(82) 基于谱聚类的访问控制异常权限配置挖掘机制, Spectral-clustering-based abnormal permission assignments hunting framework, 通信学报, 2017, 第 3 作者(83) Pricing Privacy Leakage in Location-Based Services, WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 第 1 作者(84) A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks, IEEE Wireless Communications and Network Conference, 2016, 第 1 作者(85) Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information, International Conference on Computing, Networking and Communication, 2016, 通讯作者(86) 天地一体化信息网络安全保障技术研究进展及发展趋势, Research status and development trends of security assurance for space-ground integration information network, 通信学报, 2016, 第 1 作者(87) Achieving Secure and Accurate Friend Discovery Based on Friend-of-Friend's Recommendations, 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, 第 2 作者(88) Hunting Abnormal Configurations for Permission-Sensitive Role Mining, IEEE Military Communications Conference, 2016, 第 5 作者(89) 云环境中数据安全去重研究进展, Research progress on secure data deduplication in cloud, 通信学报, 2016, 第 3 作者(90) 隐私计算研究范畴及发展趋势, Privacy computing:concept,connotation and its research trend, 通信学报, 2016, 第 1 作者(91) Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends’ Recommendation, International Conference on Computing, Networking and Communication, 2016, 第 1 作者(92) 面向网络空间的访问控制模型, Novel cyberspace-oriented access control model, 通信学报, 2016, 第 1 作者(93) Time Obfucation-Based Privacy-Preserving Scheme for Location-Based Services, IEEE Wireless Communications and Networking Conference(WCNC 2016), 2016, 第 1 作者(94) Role and Time-based Access Control with Efficient Revocation for Cloud Storage, 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, 通讯作者(95) 基于密码学的云数据确定性删除研究进展, Research progress on cloud data assured deletion based on cryptography, 通信学报, 2016, 第 2 作者(96) An IPv6 Routing Lookup Algorithm Using Weight-balanced Tree based on Prefix Value for Virtual Router, FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2016, 第 4 作者(97) A Network Monitor for HTTPS Protocol based on Proxy, FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2016, 第 4 作者(98) Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage, INTERNATIONALCONFERENCEONCOMPUTINGNETWORKINGANDCOMMUNICATION, 2016, 通讯作者(99) 基于代理的移动互联网隐私保护机制, Proxy-based privacy-preserving scheme for mobile Internet, 通信学报, 2015, 第 2 作者(100) 高效的轨迹隐私保护方案, Efficient scheme for user's trajectory privacy, 通信学报, 2015, 第 1 作者(101) 支持多关键字的可搜索公钥加密方案, Public key encryption with multi-keywords search, 西安电子科技大学学报, 2015, 第 2 作者(102) Achieving Secure Friend Discovery in Social Strength-Aware PMSNs, IEEE Military Communications Conference, 2015, 通讯作者(103) UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks, Proceedings of the IEEE International Conference on Communications(ICC 2015), 2015, 通讯作者(104) Privacy-Preserving Strategies in Service Quality Aware Location-Based Services, IEEE International Conference on Communications, 2015, 第 1 作者(105) Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 通讯作者(106) A full lifecycle privacy protection scheme for sensitive data in cloud computing, PEE, 2015, 第 2 作者(107) 面向多维数字媒体的访问控制机制, Multidimensional digital media-oriented access control scheme, 通信学报, 2015, 第 2 作者(108) Achieving Lightweight and Secure Access Control in Multi-Authority Cloud, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, 通讯作者(109) 基于布隆过滤器的轻量级隐私信息匹配方案, Bloom filter-based lightweight private matching scheme, 通信学报, 2015, 第 3 作者(110) CL-TAP: An Efficient Certificate less Based Trusted Access Protocol for WLAN, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 2 作者(111) A User-based Document Management Mechanism in Cloud, 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, 第 3 作者(112) 基于属性加密的组合文档安全自毁方案, A Secure Self-Destruction Scheme for Composite Documents with Attribute Based Encryption, 电子学报, 2014, 第 4 作者(113) 面向网络内容隐私的基于身份加密的安全自毁方案, A Secure Self-Destruction Scheme with IBE for the Internet Content Privacy, 计算机学报, 2014, 第 4 作者(114) A Reliable Supervision Model and Implementation for the Trading of Digital Works, 2014, 第 1 作者(115) 公共云存储服务数据安全及隐私保护技术综述, Secure and Privacy-Preserving Data Storage Service in Public Cloud, 计算机研究与发展, 2014, 第 2 作者(116) 一种抗隐蔽通道的网络隔离通信方案, 通信学报, 2014, 第 1 作者(117) An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application, THE SCIENTIFIC WORLD JOURNAL, 2014, 第 2 作者(118) 基于行为的多级访问控制模型, Action-Based Multi-level Access Control Model, 计算机研究与发展, 2014, 第 2 作者(119) 抗隐蔽通道的网络隔离通信方案, Network isolation communication scheme to resist against covert channel, 通信学报, 2014, 第 1 作者(120) 移动互联服务与隐私保护的研究进展, Survey on security and privacy preserving for mobile internet service, 通信学报, 2014, 第 2 作者(121) FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation, In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, 2013, 通讯作者(122) 基于行为的结构化文档多级访问控制, Action-Based Multilevel Access Control for Structured Document, 计算机研究与发展, 2013, 第 4 作者(123) Video Steganography with Multi-path Motion Estimation, MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013, 2013, (124) An improved attack on clock-controlled shift register based on hardware implementation, SCIENCE CHINA-INFORMATION SCIENCES, 2013, 第 1 作者(125) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 第 5 作者(126) An Action-based Access Control Model Implementation for MLS Information Systems, 2012, 第 1 作者(127) General Purpose Framework Designing for Network Security Test Devices Based on Multi-core Processor, 2012, 第 2 作者(128) An Action Based Access Control Model for Multi-level Security, INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 第 2 作者(129) 基于亚稳态的QDI逻辑随机路径切换方法研究, The Research on QDI Random Path Swapping, 电子学报, 2012, 第 4 作者(130) Action Based Access Control Model for Multi-level Security (MLS), In Proceedings of the 2012 International Conference on Information Security and Assurance (ISA 2012), 2012, 第 1 作者