基本信息
翁健  男  博导  其他
电子邮件: cryptjweng@gmail.com
通信地址: 广东省广州市黄埔大道西601号暨南大学南海楼120
邮政编码:

研究领域

公钥密码学

招生信息

强烈欢迎对密码学感兴趣且有一定密码学基础的学生联系我!

招生专业
083900-网络空间安全
招生方向
公钥密码学及应用
区块链技术及应用

教育背景

2004-09--2008-01   上海交通大学计算机系   博士研究生
2001-09--2004-07   华南理工大学计算机系   硕士研究生
1996-09--2000-07   华南理工大学计算机系   本科
学历
博士

学位
博士

工作经历

2008.04-2010.02  新加坡管理大学系统资讯学院,博士后

2008.09-2015.07  暨南大学信息科学技术学院,副教授、教授,副院长、主持工作副院长、执行院长


社会兼职
2017-11-22-今,广东省数据安全与隐私保护重点实验室学术委员会委员, 委员
2017-09-01-今,中国密码学会安全协议专业委员会专家委员会委员, 委员
2017-01-01-2019-01-01,广东省人民检查院电子检务工程专家咨询委委员, 委员
2016-12-31-2021-11-30,广州市保密技术专家, 专家
2016-05-15-2019-05-15,密码研究协同创新中心军队公用普通密码算法评估专家组成员, 专家
2016-04-01-今,广东省智慧学习工程技术研究中心工程技术委员会委员, 委员
2015-12-31-2018-12-31,广东省委网络安全和信息化领导小组专家咨询委员会委员, 委员

教授课程

密码学导论
计算机密码学
智能计算

专利与奖励

   
奖励信息
(1) 国家杰出青年科学基金获得者, 国家级, 2018
(2) 广东省高等学校珠江学者特聘教授, 省级, 2017
(3) 全国网络安全优秀教师, 国家级, 2017
(4) 第37届IEEE分布式计算系统国际会议(ICDCS 2017)最佳学生论文奖, 其他, 2017
(5) 暨南大学教学成果奖, 一等奖, 研究所(学校), 2017
(6) 中国密码学会首届密码创新奖, 二等奖, 国家级, 2015
(7) 广东省高校“千百十工程”国家级培养对象, 省级, 2014
专利成果
( 1 ) 一种分布式文件系统, 发明, 2017, 第 4 作者, 专利号: CN104111804A
( 2 ) 一种基于双硬件的数据安全传输方法及系统, 发明, 2017, 第 5 作者, 专利号: CN103634293B
( 3 ) 一种小文件和大文件的存储及访问方法, 发明, 2015, 第 1 作者, 专利号: CN104331428A
( 4 ) 云环境下搜索引擎的访问控制方法及系统, 发明, 2015, 第 5 作者, 专利号: CN102945356B
( 5 ) 一种基于规则冗余消除的加密环境中高效访问控制方法, 发明, 2016, 第 5 作者, 专利号: CN105790929A
( 6 ) 一种基于区块链技术的Android恶意应用控制机制, 发明, 2017, 第 1 作者, 专利号: CN106875254A
( 7 ) 一种基于区块链技术的众包系统及其建设方法, 发明, 2017, 第 1 作者, 专利号: CN107103405A
( 8 ) 一种基于区块链技术的软件定义网络, 发明, 2017, 第 1 作者, 专利号: CN107222478A
( 9 ) 一种Android系统代码保护机制鉴别方法, 发明, 2017, 第 1 作者, 专利号: CN106845171A
( 10 ) 一种基于权限模式的勒索软件检测方法及系统, 发明, 2017, 第 3 作者, 专利号: CD107358101A
( 11 ) 一种基于区块链技术的奖学金管理方法及系统, 发明, 2018, 第 1 作者, 专利号: CD107633469A

出版信息

   
发表论文
[1] Xia, Zhihua, Wang, Lan, Tang, Jian, Xiong, Neal N, Weng, Jian. A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING[J]. 2021, 8(1): 318-330, https://www.webofscience.com/wos/woscc/full-record/WOS:000631202700027.
[2] Yang, Anjia, Xu, Jia, Weng, Jian, Zhou, Jianying, Wong, Duncan S. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE TRANSACTIONS ON CLOUD COMPUTING[J]. 2021, 9(1): 212-225, http://dx.doi.org/10.1109/TCC.2018.2851256.
[3] Zhang, Yue, Weng, Jian, Weng, Jiasi, Hou, Lin, Yang, Anjia, Li, Ming, Xiang, Yang, Deng, Robert H. Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(2): 652-666, https://www.webofscience.com/wos/woscc/full-record/WOS:000628912100011.
[4] Ou, Lu, Qin, Zheng, Liao, Shaolin, Weng, Jian, Jia, Xiaohua. An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(4): 1528-1540, http://dx.doi.org/10.1109/TDSC.2020.3031223.
[5] Huang, Feiran, Xu, Jie, Weng, Jian. Multi-Task Travel Route Planning With a Flexible Deep Learning Framework. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS[J]. 2021, 22(7): 3907-3918, http://dx.doi.org/10.1109/TITS.2020.2987645.
[6] Cai, Chengjun, Weng, Jian, Yuan, Xingliang, Wang, Cong. Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(1): 131-144, https://www.webofscience.com/wos/woscc/full-record/WOS:000607379800010.
[7] Li, Xinghua, Ren, Yanbing, Yang, Laurence T, Zhang, Ning, Luo, Bin, Weng, Jian, Liu, Ximeng. Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING[J]. 2021, 8(3): 2073-2086, http://dx.doi.org/10.1109/TNSE.2020.3011607.
[8] Yang, Yang, Deng, Robert H, Liu, Ximeng, Wu, Yongdong, Weng, Jian, Zheng, Xianghan, Rong, Chunming. Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata. 2020, http://arxiv.org/abs/2005.11688.
[9] Chen Hao, He Xianmang, Weng Jian, Xu Liqing. New Constructions of Subspace Codes Using Subsets of MRD codes in Several Blocks. 2020, http://arxiv.org/abs/1908.03804.
[10] 翁健. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Transactions on Dependable and Secure Computing. 2020, [11] Yang, Yang, Liu, Ximeng, Deng, Robert H, Weng, Jian. Flexible Wildcard Searchable Encryption System. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2020, 13(3): 464-477, https://www.webofscience.com/wos/woscc/full-record/WOS:000570066900006.
[12] 翁健. Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage. IEEE Transactions on Dependable and Secure Computing. 2020, [13] Zhang, Yue, Weng, Jian, Dey, Rajib, Jin, Yier, Lin, Zhiqiang, Fu, Xinwen, USENIX Assoc. Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUMnull. 2020, 37-54, [14] Chen, Dunjin, Weng, Jian, Huang, Feiran, Zhou, Jian, Mao, Yijun, Liu, Xiaodong. Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2020, 69(10): 10642-10655, https://www.webofscience.com/wos/woscc/full-record/WOS:000584250300006.
[15] Zhang, Leo Yu, Zheng, Yifeng, Weng, Jian, Wang, Cong, Shan, Zihao, Ren, Kui. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2020, 17(6): 1218-1231, https://www.webofscience.com/wos/woscc/full-record/WOS:000589205500006.
[16] 翁健. Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems. 2020, [17] 翁健. Secure Halftone Image Steganography Based on Feature Space and Layer Embedding. IEEE Transactions on Cybernetics. 2020, [18] Lu, KangDi, Zeng, GuoQiang, Luo, Xizhao, Weng, Jian, Zhang, Yue, Li, Ming. An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2020, 69(5): 4689-4699, http://dx.doi.org/10.1109/TVT.2020.2983565.
[19] Yang, Wenjie, Weng, Jian, Huang, Xinyi, Yang, Anjia. A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. COMPUTER JOURNAL[J]. 2020, 63(8): 1139-1147, https://www.webofscience.com/wos/woscc/full-record/WOS:000582318200002.
[20] Zhang, Yue, Weng, Jian, Ling, Zhen, Pearson, Bryan, Fu, Xinwen, IEEE. BLESS: A BLE Application Security Scanning Framework. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONSnull. 2020, 636-645, [21] Huang, Feiran, Wei, Kaimin, Weng, Jian, Li, Zhoujun. Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS[J]. 2020, 16(3): http://dx.doi.org/10.1145/3388861.
[22] Li, Ming, Weng, Jian, Yang, Anjia, Lu, Wei, Zhang, Yue, Hou, Lin, Liu, JiaNan, Xiang, Yang, Deng, Robert H. CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2019, 30(6): 1251-1266, http://dx.doi.org/10.1109/TPDS.2018.2881735.
[23] Yang, Anjia, Weng, Jian, Cheng, Nan, Ni, Jianbing, Lin, Xiaodong, Shen, Xuemin. DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2019, 68(5): 4834-4845, https://www.webofscience.com/wos/woscc/full-record/WOS:000470017500061.
[24] Wu, Yongdong, Wei, Zhuo, Weng, Jian, Deng, Robert H. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 67(6): 5287-5301, http://dx.doi.org/10.1109/TVT.2018.2802444.
[25] Qin, Zhan, Weng, Jian, Cui, Yong, Ren, Kui. Privacy-preserving Image Processing in the Cloud. IEEE CLOUD COMPUTING[J]. 2018, 5(2): 48-57, https://www.webofscience.com/wos/woscc/full-record/WOS:000431964300008.
[26] Du, Minxin, Wang, Qian, He, Meiqi, Weng, Jian. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2018, 13(9): 2320-2332, https://www.webofscience.com/wos/woscc/full-record/WOS:000431896200015.
[27] Chen, Xin, Weng, Jian, Lu, Wei, Xu, Jiaming. Multi-Gait Recognition Based on Attribute Discovery. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE[J]. 2018, 40(7): 1697-1710, http://dx.doi.org/10.1109/TPAMI.2017.2726061.
[28] Yuan, Xingliang, Weng, Jian, Wang, Cong, Ren, Kui. Secure Integrated Circuit Design via Hybrid Cloud. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2018, 29(8): 1851-1864, https://www.webofscience.com/wos/woscc/full-record/WOS:000438962800013.
[29] Liu, Ximeng, Choo, KimKwang Raymond, Deng, Robert H, Lu, Rongxing, Weng, Jian. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2018, 15(1): 27-39, https://www.webofscience.com/wos/woscc/full-record/WOS:000427527100004.
[30] Wu, Xiaotian, Weng, Jian, Yan, WeiQi. Adopting secret sharing for reversible data hiding in encrypted images. SIGNAL PROCESSING[J]. 2018, 143: 269-281, http://dx.doi.org/10.1016/j.sigpro.2017.09.017.
[31] Wu, Yongdong, Wei, Zhuo, Weng, Jian, Li, Xin, Deng, Robert H. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE TRANSACTIONS ON SMART GRID[J]. 2018, 9(5): 4490-4502, https://www.webofscience.com/wos/woscc/full-record/WOS:000443200700050.
[32] Yang, Wenjie, Weng, Jian, Yang, Anjia, Xie, Congge, Yang, Yaxi. Notes on a provably-secure certificate-based encryption against malicious CA attacks. INFORMATION SCIENCES[J]. 2018, 463: 86-91, http://dx.doi.org/10.1016/j.ins.2018.06.049.
[33] Chen, Xin, Weng, Jian, Lu, Wei, Xu, Jiaming, Weng, Jiasi. Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS[J]. 2018, 29(9): 3938-3952, http://dx.doi.org/10.1109/TNNLS.2017.2740318.
[34] 翁健. BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-based VANET.. IEEE Transactions on Vehicular Technology. 2018, [35] Yang, Fan, Li, Jingwei, Lu, Wei, Weng, Jian. Copy-move forgery detection based on hybrid features. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE[J]. 2017, 59: 73-83, http://dx.doi.org/10.1016/j.engappai.2016.12.022.
[36] Fu, Zhangjie, Huang, Fengxiao, Ren, Kui, Weng, Jian, Wang, Cong. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(8): 1874-1884, https://www.webofscience.com/wos/woscc/full-record/WOS:000401340500009.
[37] Wu, Yongdong, Weng, Jian, Tang, Zhe, Li, Xin, Deng, Robert H. Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS[J]. 2017, 18(4): 814-823, https://www.webofscience.com/wos/woscc/full-record/WOS:000398975700011.
[38] Qin, Zhan, Ren, Kui, Yu, Ting, Weng, Jian. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud. IEEE TRANSACTIONS ON MULTIMEDIA[J]. 2016, 18(5): 929-939, https://www.webofscience.com/wos/woscc/full-record/WOS:000374996200012.
[39] He, Kai, Weng, Jian, Deng, Robert H, Liu, Joseph K. On the security of two identity-based conditional proxy re-encryption schemes. THEORETICAL COMPUTER SCIENCE[J]. 2016, 652: 18-27, http://dx.doi.org/10.1016/j.tcs.2016.08.023.
[40] Wu, Xiaotian, Chen, Bing, Weng, Jian. Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION[J]. 2016, 41: 58-64, http://dx.doi.org/10.1016/j.jvcir.2016.09.005.
[41] Liu, Sha, Hu, Shun, Weng, Jian, Zhu, Shuhua, Chen, Zhiyan. A novel asymmetric three-party based authentication scheme in wearable devices environment. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS[J]. 2016, 60: 144-154, http://dx.doi.org/10.1016/j.jnca.2015.10.001.
[42] Liu, Ximeng, Deng, Robert H, Choo, KimKwang Raymond, Weng, Jian. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2016, 11(11): 2401-2414, https://www.webofscience.com/wos/woscc/full-record/WOS:000386223800001.
[43] Yuan, Xingliang, Wang, Xinyu, Wang, Cong, Weng, Jian, Ren, Kui. Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE TRANSACTIONS ON MULTIMEDIA[J]. 2016, 18(10): 2002-2014, https://www.webofscience.com/wos/woscc/full-record/WOS:000384644800008.
[44] Chen, Xiaofeng, Li, Jin, Weng, Jian, Ma, Jianfeng, Lou, Wenjing. Verifiable Computation over Large Database with Incremental Updates. IEEE TRANSACTIONS ON COMPUTERS[J]. 2016, 65(10): 3184-3195, https://www.webofscience.com/wos/woscc/full-record/WOS:000384131200019.

科研活动

   
科研项目
( 1 ) 公钥密码学, 主持, 国家级, 2019-01--2023-12
( 2 ) 车联网信息检测与安全防护关键技术研究, 主持, 国家级, 2018-01--2021-12
( 3 ) 多维动态位置的隐私保护关键技术与系统, 主持, 国家级, 2017-01--2020-12
( 4 ) 量子安全的轻量级密码与安全协议, 参与, 国家级, 2018-01--2021-12
( 5 ) 基因大数据安全存储与传输系统, 主持, 研究所(学校), 2016-01--2019-04