浙大网络空间安全学院年度论文成果盘点

发布者:系统管理员发布时间:2020-04-10浏览次数:25

回顾刚刚过去的2019年,浙江大学网络空间安全学院队伍建设初步成型,科研成果开始涌现,在国际著名安全会议和期刊上发表论文 47 篇(CCF A/B类会议和期刊),其中安全四大会议 7 篇,CCF A类会议和期刊共 31 篇,并获得了两篇最佳论文奖。在这些研究中,我们所讨论的主题包括:系统安全、数据安全、人工智能安全、区块链安全、物联网安全等内容。
现将总共 47 篇论文统计如下:
 
会议:

  1. F. Zhang, X. Dong, B. Yang, Y. Zhou, K. Ren,“A Systematic Evaluation of Wavelet-based Attack Framework on Random Delay Countermeasures," IEEE TIFS, vol. 15, pp. 1407-1422, 2020. (CCF-A) http://www.zjuisee.zju.edu.cn/fanzhang/publications/2020_TIFS_Wavelet.pdf
  2. B. Belleville, W. Shen, S. Volckaert, A. Azab, and M. Franz,“KALD: Detecting Direct Pointer Disclosure Volnerabilities,” IEEE TDSC (Early Access) (CCF-Ahttps://ieeexplore.ieee.org/document/8712444
  3. Z. Ba, Z. Qin, X. Fu, K. Ren,“CIM: Camera in Motion for Smartphone Authentication,” IEEE TIFS, vol. 14, no. 11, pp. 2987-3002, 2019 (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8691573
  4. Y. Liu, Z. Ma, X. Liu, S. Ma, K. Ren,“Privacy-Preserving Object Detection for Medical Images with Faster R-CNN,” IEEE TIFS (Early Access) (CCF-Ahttps://ieeexplore.ieee.org/abstract/document/8864005
  5. Y. Hu, H. Wang, Y. Zhou, Y. Guo, L. Li, B. Luo, F. Xu,“Dating with Scambots: Understanding the Ecosystem of Fraudolent Dating Applications,” IEEE TDSC (Early Access) (CCF-Ahttps://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8680707
  6. H. Cui, Y. Zhou, C. Wang, X. Wang, Y. Du, Q. Wang,“PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing,” IEEE TDSC (Early Access)CCF-A) https://ieeexplore.ieee.org/document/8815745/ 
  7. L. Xue, C. Qian, H. Zhou, X. Luo, Y. Zhou, Y. Shao and A. Chan,“NDroid: Towards Tracking Information Flows Across Moltiple Android Contexts,” IEEE TIFS, vol. 14, pp. 814 - 828, 2019(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8443386
  8. H. Ding, J. Han, A. Liu, W. Xi, J. Zhao, P. Yang, Z. Jiang,“Counting Human Objects Using Backscattered Radio Frequency Signals,” IEEE TMC, vol.18, no.5, pp. 1054-1067, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402149
  9. G. Wang, J. Han, C. Qian, W. Xi, H. Ding, Z. Jiang, J. Zhao,“Verifiable Smart Packaging with Passive RFID,” IEEE TMC, vol. 18, no. 5, pp. 1217-1230, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402101
  10. H. Ding, C. Qian, J. Han, J. Xiao, X. Zhang, G. Wang, W. Xi, J. Zhao,“Close-Proximity Detection for Hand Approaching Using Backscatter Communication,” IEEE TMC, vol.18, no.10, pp. 2285-2297, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8476237
  11. Z. Liu, Y. Cao, X. Zhang, C. Zhu, F. Zhang,“Managing recurrent virtual network updates in molti-tenant datacenters: A system perspective," IEEE TPDS, vol.30, no.8, pp. 1816-1825, August 2019.(CCF-A) http://www.zjuisee.zju.edu.cn/fanzhang/publications/2019_TPDS_RVN.pdf
  12. J. Ning, J. Xu, K. Liang, F. Zhang, E. Chang,“Passive Attacks Against Searchable Encryption,” IEEE TIFS, vol. 13, no. 3, pp.789-802, March 2019.(CCF-Ahttp://www.zjuisee.zju.edu.cn/fanzhang/publications/2018_TIFS_PassiveAttacks.pdf
  13. K. Ren, Q.Wang, C. Wang, Z. Qin, X. Lin, “The Security of Autonomous Driving: Threats, Defenses, and Future Directions,” Proceedings of the IEEE, vol. 108, no. 2, pp. 357-372, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8890622
  14. P. Zhao, J. Yu, H. Zhang, Z. Qin, C. Wang,“How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs,” IEEE TIFS, vol. 15, pp. 315-328, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8735830
  15. J. Zhou, Z. Cao, Z. Qin, X. Dong, K. Ren,“LPPA: Lightweight Privacy-Preserving Authentication From Efficient Molti-Key Secure Outsourced Computation for Location-Based Services in VANETs,” IEEE TIFS, vol. 15, pp. 420-434, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8736796
  16. F. Lin, K. Cho, C. Song, Z. Jin, W. Xu,“Exploring a Brain-based Cancelable Biometrics for Smart Headwear: Concept, Implementation, and Evaluation,” IEEE TMCCCF-A), In press https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8807304
  17. C. Miao, W. Jiang, L. Su, Y. Li, S. Guo, Z. Qin, H. Xiao, J. Gao, K. Ren, “Privacy-Preserving Truth Discovery in Crowd Sensing Systems,” ACM TOSN, vol. 15, no. 1, pp. 9:1-9:32 (CCF-Bhttps://dl.acm.org/doi/10.1145/3277505
  18. B. Sengupta, Y. Li, K. Bu, R. Deng,“Privacy-Preserving Network Path Validation,” ACM TOIT, vol. 20, no. 1, pp. 1-27, 2020. (CCF-Bhttps://dl.acm.org/doi/10.1145/3372046
  19. L. Ma, K. Bu, N. Wu, T. Luo, K. Ren, “Atlas: A First Step Toward Moltipath Validation,” Computer Networks, vol. 173, in press, 2020. (CCF-B)     https://doi.org/10.1016/j.comnet.2020.107224

最佳论文奖