基本信息
翁健 男 博导 其他
电子邮件: cryptjweng@gmail.com
通信地址: 广东省广州市黄埔大道西601号暨南大学南海楼120
邮政编码:
电子邮件: cryptjweng@gmail.com
通信地址: 广东省广州市黄埔大道西601号暨南大学南海楼120
邮政编码:
研究领域
公钥密码学
招生信息
强烈欢迎对密码学感兴趣且有一定密码学基础的学生联系我!
招生专业
083900-网络空间安全
招生方向
公钥密码学及应用区块链技术及应用
教育背景
2004-09--2008-01 上海交通大学计算机系 博士研究生2001-09--2004-07 华南理工大学计算机系 硕士研究生1996-09--2000-07 华南理工大学计算机系 本科
学历
博士
学位
博士
工作经历
2008.04-2010.02 新加坡管理大学系统资讯学院,博士后
2008.09-2015.07 暨南大学信息科学技术学院,副教授、教授,副院长、主持工作副院长、执行院长
社会兼职
2017-11-22-今,广东省数据安全与隐私保护重点实验室学术委员会委员, 委员
2017-09-01-今,中国密码学会安全协议专业委员会专家委员会委员, 委员
2017-01-01-2019-01-01,广东省人民检查院电子检务工程专家咨询委委员, 委员
2016-12-31-2021-11-30,广州市保密技术专家, 专家
2016-05-15-2019-05-15,密码研究协同创新中心军队公用普通密码算法评估专家组成员, 专家
2016-04-01-今,广东省智慧学习工程技术研究中心工程技术委员会委员, 委员
2015-12-31-2018-12-31,广东省委网络安全和信息化领导小组专家咨询委员会委员, 委员
2017-09-01-今,中国密码学会安全协议专业委员会专家委员会委员, 委员
2017-01-01-2019-01-01,广东省人民检查院电子检务工程专家咨询委委员, 委员
2016-12-31-2021-11-30,广州市保密技术专家, 专家
2016-05-15-2019-05-15,密码研究协同创新中心军队公用普通密码算法评估专家组成员, 专家
2016-04-01-今,广东省智慧学习工程技术研究中心工程技术委员会委员, 委员
2015-12-31-2018-12-31,广东省委网络安全和信息化领导小组专家咨询委员会委员, 委员
教授课程
密码学导论计算机密码学智能计算
专利与奖励
奖励信息
(1) 国家杰出青年科学基金获得者, 国家级, 2018(2) 广东省高等学校珠江学者特聘教授, 省级, 2017(3) 全国网络安全优秀教师, 国家级, 2017(4) 第37届IEEE分布式计算系统国际会议(ICDCS 2017)最佳学生论文奖, 其他, 2017(5) 暨南大学教学成果奖, 一等奖, 研究所(学校), 2017(6) 中国密码学会首届密码创新奖, 二等奖, 国家级, 2015(7) 广东省高校“千百十工程”国家级培养对象, 省级, 2014
专利成果
( 1 ) 一种分布式文件系统, 发明, 2017, 第 4 作者, 专利号: CN104111804A( 2 ) 一种基于双硬件的数据安全传输方法及系统, 发明, 2017, 第 5 作者, 专利号: CN103634293B( 3 ) 一种小文件和大文件的存储及访问方法, 发明, 2015, 第 1 作者, 专利号: CN104331428A( 4 ) 云环境下搜索引擎的访问控制方法及系统, 发明, 2015, 第 5 作者, 专利号: CN102945356B( 5 ) 一种基于规则冗余消除的加密环境中高效访问控制方法, 发明, 2016, 第 5 作者, 专利号: CN105790929A( 6 ) 一种基于区块链技术的Android恶意应用控制机制, 发明, 2017, 第 1 作者, 专利号: CN106875254A( 7 ) 一种基于区块链技术的众包系统及其建设方法, 发明, 2017, 第 1 作者, 专利号: CN107103405A( 8 ) 一种基于区块链技术的软件定义网络, 发明, 2017, 第 1 作者, 专利号: CN107222478A( 9 ) 一种Android系统代码保护机制鉴别方法, 发明, 2017, 第 1 作者, 专利号: CN106845171A( 10 ) 一种基于权限模式的勒索软件检测方法及系统, 发明, 2017, 第 3 作者, 专利号: CD107358101A( 11 ) 一种基于区块链技术的奖学金管理方法及系统, 发明, 2018, 第 1 作者, 专利号: CD107633469A
出版信息
发表论文
[1] Xia, Zhihua, Wang, Lan, Tang, Jian, Xiong, Neal N, Weng, Jian. A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING[J]. 2021, 8(1): 318-330, https://www.webofscience.com/wos/woscc/full-record/WOS:000631202700027.[2] Yang, Anjia, Xu, Jia, Weng, Jian, Zhou, Jianying, Wong, Duncan S. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE TRANSACTIONS ON CLOUD COMPUTING[J]. 2021, 9(1): 212-225, http://dx.doi.org/10.1109/TCC.2018.2851256.[3] Zhang, Yue, Weng, Jian, Weng, Jiasi, Hou, Lin, Yang, Anjia, Li, Ming, Xiang, Yang, Deng, Robert H. Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(2): 652-666, https://www.webofscience.com/wos/woscc/full-record/WOS:000628912100011.[4] Ou, Lu, Qin, Zheng, Liao, Shaolin, Weng, Jian, Jia, Xiaohua. An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(4): 1528-1540, http://dx.doi.org/10.1109/TDSC.2020.3031223.[5] Huang, Feiran, Xu, Jie, Weng, Jian. Multi-Task Travel Route Planning With a Flexible Deep Learning Framework. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS[J]. 2021, 22(7): 3907-3918, http://dx.doi.org/10.1109/TITS.2020.2987645.[6] Cai, Chengjun, Weng, Jian, Yuan, Xingliang, Wang, Cong. Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(1): 131-144, https://www.webofscience.com/wos/woscc/full-record/WOS:000607379800010.[7] Li, Xinghua, Ren, Yanbing, Yang, Laurence T, Zhang, Ning, Luo, Bin, Weng, Jian, Liu, Ximeng. Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING[J]. 2021, 8(3): 2073-2086, http://dx.doi.org/10.1109/TNSE.2020.3011607.[8] Yang, Yang, Deng, Robert H, Liu, Ximeng, Wu, Yongdong, Weng, Jian, Zheng, Xianghan, Rong, Chunming. Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata. 2020, http://arxiv.org/abs/2005.11688.[9] Chen Hao, He Xianmang, Weng Jian, Xu Liqing. New Constructions of Subspace Codes Using Subsets of MRD codes in Several Blocks. 2020, http://arxiv.org/abs/1908.03804.[10] 翁健. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Transactions on Dependable and Secure Computing. 2020, [11] Yang, Yang, Liu, Ximeng, Deng, Robert H, Weng, Jian. Flexible Wildcard Searchable Encryption System. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2020, 13(3): 464-477, https://www.webofscience.com/wos/woscc/full-record/WOS:000570066900006.[12] 翁健. Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage. IEEE Transactions on Dependable and Secure Computing. 2020, [13] Zhang, Yue, Weng, Jian, Dey, Rajib, Jin, Yier, Lin, Zhiqiang, Fu, Xinwen, USENIX Assoc. Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUMnull. 2020, 37-54, [14] Chen, Dunjin, Weng, Jian, Huang, Feiran, Zhou, Jian, Mao, Yijun, Liu, Xiaodong. Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2020, 69(10): 10642-10655, https://www.webofscience.com/wos/woscc/full-record/WOS:000584250300006.[15] Zhang, Leo Yu, Zheng, Yifeng, Weng, Jian, Wang, Cong, Shan, Zihao, Ren, Kui. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2020, 17(6): 1218-1231, https://www.webofscience.com/wos/woscc/full-record/WOS:000589205500006.[16] 翁健. Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems. 2020, [17] 翁健. Secure Halftone Image Steganography Based on Feature Space and Layer Embedding. IEEE Transactions on Cybernetics. 2020, [18] Lu, KangDi, Zeng, GuoQiang, Luo, Xizhao, Weng, Jian, Zhang, Yue, Li, Ming. An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2020, 69(5): 4689-4699, http://dx.doi.org/10.1109/TVT.2020.2983565.[19] Yang, Wenjie, Weng, Jian, Huang, Xinyi, Yang, Anjia. A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. COMPUTER JOURNAL[J]. 2020, 63(8): 1139-1147, https://www.webofscience.com/wos/woscc/full-record/WOS:000582318200002.[20] Zhang, Yue, Weng, Jian, Ling, Zhen, Pearson, Bryan, Fu, Xinwen, IEEE. BLESS: A BLE Application Security Scanning Framework. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONSnull. 2020, 636-645, [21] Huang, Feiran, Wei, Kaimin, Weng, Jian, Li, Zhoujun. Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS[J]. 2020, 16(3): http://dx.doi.org/10.1145/3388861.[22] Li, Ming, Weng, Jian, Yang, Anjia, Lu, Wei, Zhang, Yue, Hou, Lin, Liu, JiaNan, Xiang, Yang, Deng, Robert H. CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2019, 30(6): 1251-1266, http://dx.doi.org/10.1109/TPDS.2018.2881735.[23] Yang, Anjia, Weng, Jian, Cheng, Nan, Ni, Jianbing, Lin, Xiaodong, Shen, Xuemin. DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2019, 68(5): 4834-4845, https://www.webofscience.com/wos/woscc/full-record/WOS:000470017500061.[24] Wu, Yongdong, Wei, Zhuo, Weng, Jian, Deng, Robert H. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 67(6): 5287-5301, http://dx.doi.org/10.1109/TVT.2018.2802444.[25] Qin, Zhan, Weng, Jian, Cui, Yong, Ren, Kui. Privacy-preserving Image Processing in the Cloud. IEEE CLOUD COMPUTING[J]. 2018, 5(2): 48-57, https://www.webofscience.com/wos/woscc/full-record/WOS:000431964300008.[26] Du, Minxin, Wang, Qian, He, Meiqi, Weng, Jian. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2018, 13(9): 2320-2332, https://www.webofscience.com/wos/woscc/full-record/WOS:000431896200015.[27] Chen, Xin, Weng, Jian, Lu, Wei, Xu, Jiaming. Multi-Gait Recognition Based on Attribute Discovery. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE[J]. 2018, 40(7): 1697-1710, http://dx.doi.org/10.1109/TPAMI.2017.2726061.[28] Yuan, Xingliang, Weng, Jian, Wang, Cong, Ren, Kui. Secure Integrated Circuit Design via Hybrid Cloud. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2018, 29(8): 1851-1864, https://www.webofscience.com/wos/woscc/full-record/WOS:000438962800013.[29] Liu, Ximeng, Choo, KimKwang Raymond, Deng, Robert H, Lu, Rongxing, Weng, Jian. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2018, 15(1): 27-39, https://www.webofscience.com/wos/woscc/full-record/WOS:000427527100004.[30] Wu, Xiaotian, Weng, Jian, Yan, WeiQi. Adopting secret sharing for reversible data hiding in encrypted images. SIGNAL PROCESSING[J]. 2018, 143: 269-281, http://dx.doi.org/10.1016/j.sigpro.2017.09.017.[31] Wu, Yongdong, Wei, Zhuo, Weng, Jian, Li, Xin, Deng, Robert H. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE TRANSACTIONS ON SMART GRID[J]. 2018, 9(5): 4490-4502, https://www.webofscience.com/wos/woscc/full-record/WOS:000443200700050.[32] Yang, Wenjie, Weng, Jian, Yang, Anjia, Xie, Congge, Yang, Yaxi. Notes on a provably-secure certificate-based encryption against malicious CA attacks. INFORMATION SCIENCES[J]. 2018, 463: 86-91, http://dx.doi.org/10.1016/j.ins.2018.06.049.[33] Chen, Xin, Weng, Jian, Lu, Wei, Xu, Jiaming, Weng, Jiasi. Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS[J]. 2018, 29(9): 3938-3952, http://dx.doi.org/10.1109/TNNLS.2017.2740318.[34] 翁健. BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-based VANET.. IEEE Transactions on Vehicular Technology. 2018, [35] Yang, Fan, Li, Jingwei, Lu, Wei, Weng, Jian. Copy-move forgery detection based on hybrid features. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE[J]. 2017, 59: 73-83, http://dx.doi.org/10.1016/j.engappai.2016.12.022.[36] Fu, Zhangjie, Huang, Fengxiao, Ren, Kui, Weng, Jian, Wang, Cong. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(8): 1874-1884, https://www.webofscience.com/wos/woscc/full-record/WOS:000401340500009.[37] Wu, Yongdong, Weng, Jian, Tang, Zhe, Li, Xin, Deng, Robert H. Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS[J]. 2017, 18(4): 814-823, https://www.webofscience.com/wos/woscc/full-record/WOS:000398975700011.[38] Qin, Zhan, Ren, Kui, Yu, Ting, Weng, Jian. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud. IEEE TRANSACTIONS ON MULTIMEDIA[J]. 2016, 18(5): 929-939, https://www.webofscience.com/wos/woscc/full-record/WOS:000374996200012.[39] He, Kai, Weng, Jian, Deng, Robert H, Liu, Joseph K. On the security of two identity-based conditional proxy re-encryption schemes. THEORETICAL COMPUTER SCIENCE[J]. 2016, 652: 18-27, http://dx.doi.org/10.1016/j.tcs.2016.08.023.[40] Wu, Xiaotian, Chen, Bing, Weng, Jian. Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION[J]. 2016, 41: 58-64, http://dx.doi.org/10.1016/j.jvcir.2016.09.005.[41] Liu, Sha, Hu, Shun, Weng, Jian, Zhu, Shuhua, Chen, Zhiyan. A novel asymmetric three-party based authentication scheme in wearable devices environment. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS[J]. 2016, 60: 144-154, http://dx.doi.org/10.1016/j.jnca.2015.10.001.[42] Liu, Ximeng, Deng, Robert H, Choo, KimKwang Raymond, Weng, Jian. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2016, 11(11): 2401-2414, https://www.webofscience.com/wos/woscc/full-record/WOS:000386223800001.[43] Yuan, Xingliang, Wang, Xinyu, Wang, Cong, Weng, Jian, Ren, Kui. Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE TRANSACTIONS ON MULTIMEDIA[J]. 2016, 18(10): 2002-2014, https://www.webofscience.com/wos/woscc/full-record/WOS:000384644800008.[44] Chen, Xiaofeng, Li, Jin, Weng, Jian, Ma, Jianfeng, Lou, Wenjing. Verifiable Computation over Large Database with Incremental Updates. IEEE TRANSACTIONS ON COMPUTERS[J]. 2016, 65(10): 3184-3195, https://www.webofscience.com/wos/woscc/full-record/WOS:000384131200019.
科研活动
科研项目
( 1 ) 公钥密码学, 主持, 国家级, 2019-01--2023-12( 2 ) 车联网信息检测与安全防护关键技术研究, 主持, 国家级, 2018-01--2021-12( 3 ) 多维动态位置的隐私保护关键技术与系统, 主持, 国家级, 2017-01--2020-12( 4 ) 量子安全的轻量级密码与安全协议, 参与, 国家级, 2018-01--2021-12( 5 ) 基因大数据安全存储与传输系统, 主持, 研究所(学校), 2016-01--2019-04