回顾刚刚过去的2019年,浙江大学网络空间安全学院队伍建设初步成型,科研成果开始涌现,在国际著名安全会议和期刊上发表论文 47 篇(CCF A/B类会议和期刊),其中安全四大会议 7 篇,CCF A类会议和期刊共 31 篇,并获得了两篇最佳论文奖。在这些研究中,我们所讨论的主题包括:系统安全、数据安全、人工智能安全、区块链安全、物联网安全等内容。
现将总共 47 篇论文统计如下:
会议:
- F. Zhang, X. Dong, B. Yang, Y. Zhou, K. Ren,“A Systematic Evaluation of Wavelet-based Attack Framework on Random Delay Countermeasures," IEEE TIFS, vol. 15, pp. 1407-1422, 2020. (CCF-A) http://www.zjuisee.zju.edu.cn/fanzhang/publications/2020_TIFS_Wavelet.pdf
- B. Belleville, W. Shen, S. Volckaert, A. Azab, and M. Franz,“KALD: Detecting Direct Pointer Disclosure Volnerabilities,” IEEE TDSC (Early Access) (CCF-A) https://ieeexplore.ieee.org/document/8712444
- Z. Ba, Z. Qin, X. Fu, K. Ren,“CIM: Camera in Motion for Smartphone Authentication,” IEEE TIFS, vol. 14, no. 11, pp. 2987-3002, 2019 (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8691573
- Y. Liu, Z. Ma, X. Liu, S. Ma, K. Ren,“Privacy-Preserving Object Detection for Medical Images with Faster R-CNN,” IEEE TIFS (Early Access) (CCF-A) https://ieeexplore.ieee.org/abstract/document/8864005
- Y. Hu, H. Wang, Y. Zhou, Y. Guo, L. Li, B. Luo, F. Xu,“Dating with Scambots: Understanding the Ecosystem of Fraudolent Dating Applications,” IEEE TDSC (Early Access) (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8680707
- H. Cui, Y. Zhou, C. Wang, X. Wang, Y. Du, Q. Wang,“PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing,” IEEE TDSC (Early Access)(CCF-A) https://ieeexplore.ieee.org/document/8815745/
- L. Xue, C. Qian, H. Zhou, X. Luo, Y. Zhou, Y. Shao and A. Chan,“NDroid: Towards Tracking Information Flows Across Moltiple Android Contexts,” IEEE TIFS, vol. 14, pp. 814 - 828, 2019(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8443386
- H. Ding, J. Han, A. Liu, W. Xi, J. Zhao, P. Yang, Z. Jiang,“Counting Human Objects Using Backscattered Radio Frequency Signals,” IEEE TMC, vol.18, no.5, pp. 1054-1067, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402149
- G. Wang, J. Han, C. Qian, W. Xi, H. Ding, Z. Jiang, J. Zhao,“Verifiable Smart Packaging with Passive RFID,” IEEE TMC, vol. 18, no. 5, pp. 1217-1230, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402101
- H. Ding, C. Qian, J. Han, J. Xiao, X. Zhang, G. Wang, W. Xi, J. Zhao,“Close-Proximity Detection for Hand Approaching Using Backscatter Communication,” IEEE TMC, vol.18, no.10, pp. 2285-2297, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8476237
- Z. Liu, Y. Cao, X. Zhang, C. Zhu, F. Zhang,“Managing recurrent virtual network updates in molti-tenant datacenters: A system perspective," IEEE TPDS, vol.30, no.8, pp. 1816-1825, August 2019.(CCF-A) http://www.zjuisee.zju.edu.cn/fanzhang/publications/2019_TPDS_RVN.pdf
- J. Ning, J. Xu, K. Liang, F. Zhang, E. Chang,“Passive Attacks Against Searchable Encryption,” IEEE TIFS, vol. 13, no. 3, pp.789-802, March 2019.(CCF-A)http://www.zjuisee.zju.edu.cn/fanzhang/publications/2018_TIFS_PassiveAttacks.pdf
- K. Ren, Q.Wang, C. Wang, Z. Qin, X. Lin, “The Security of Autonomous Driving: Threats, Defenses, and Future Directions,” Proceedings of the IEEE, vol. 108, no. 2, pp. 357-372, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8890622
- P. Zhao, J. Yu, H. Zhang, Z. Qin, C. Wang,“How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs,” IEEE TIFS, vol. 15, pp. 315-328, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8735830
- J. Zhou, Z. Cao, Z. Qin, X. Dong, K. Ren,“LPPA: Lightweight Privacy-Preserving Authentication From Efficient Molti-Key Secure Outsourced Computation for Location-Based Services in VANETs,” IEEE TIFS, vol. 15, pp. 420-434, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8736796
- F. Lin, K. Cho, C. Song, Z. Jin, W. Xu,“Exploring a Brain-based Cancelable Biometrics for Smart Headwear: Concept, Implementation, and Evaluation,” IEEE TMC(CCF-A), In press https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8807304
- C. Miao, W. Jiang, L. Su, Y. Li, S. Guo, Z. Qin, H. Xiao, J. Gao, K. Ren, “Privacy-Preserving Truth Discovery in Crowd Sensing Systems,” ACM TOSN, vol. 15, no. 1, pp. 9:1-9:32 (CCF-B) https://dl.acm.org/doi/10.1145/3277505
- B. Sengupta, Y. Li, K. Bu, R. Deng,“Privacy-Preserving Network Path Validation,” ACM TOIT, vol. 20, no. 1, pp. 1-27, 2020. (CCF-B) https://dl.acm.org/doi/10.1145/3372046
- L. Ma, K. Bu, N. Wu, T. Luo, K. Ren, “Atlas: A First Step Toward Moltipath Validation,” Computer Networks, vol. 173, in press, 2020. (CCF-B) https://doi.org/10.1016/j.comnet.2020.107224
最佳论文奖
- F. Wang, J. Han, F. Lin, K. Ren,“WiPIN : Operation - free Passive Person Identification Using Wi - Fi Signals,” IEEE Globecom 2019, Waikoloa, HI, USA, December 9-13, 2019. https://arxiv.org/pdf/1810.04106.pdf
- M. Khandaker, A. Naser, W. Liu, Z. Wang, Y. Zhou, Y. Cheng,“Adaptive Call-site Sensitive Control Flow Integrity,” IEEE EURO S&P 2019, Stockholm, Sweden, June 17-19, 2019. https://ieeexplore.ieee.org/abstract/document/8806734/