主页 / 新闻动态 /

浙大网络空间安全学院年度论文成果盘点

发布时间:2020-04-10 来源:ICSR 作者:浙大网安

回顾刚刚过去的2019年,浙江大学网络空间安全学院队伍建设初步成型,科研成果开始涌现,在国际著名安全会议和期刊上发表论文 47 篇(CCF A/B类会议和期刊),其中安全四大会议 7 篇,CCF A类会议和期刊共 31 篇,并获得了两篇最佳论文奖。在这些研究中,我们所讨论的主题包括:系统安全、数据安全、人工智能安全、区块链安全、物联网安全等内容。
现将总共 47 篇论文统计如下:
 
会议:

  1. Z. Ba, T. Zheng, X. Zhang, Z. Qin, B. Li, X. Liu, K. Ren,“Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer,” NDSS 2020, San Diego, California, USA, February 23-26, 2020 (安全四大会议https://www.ndss-symposium.org/wp-content/uploads/2020/02/24076.pdf
  2. Q. Tan, Z. Zeng, K. Bu, and K. Ren,“PhantomCache: Obfuscating Cache Conflicts with Localized Randomization,” NDSS 2020, San Diego, California, USA, February 23-26, 2020. (安全四大会议)     https://www.ndss-symposium.org/wp-content/uploads/2020/02/24086.pdf
  3. S. Luo, A. Nguyen, C. Song, F. Lin, W. Xu, Z. Yan,“Ocolock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display,” NDSS 2020, San Diego, USA, February 23-26, 2020. (安全四大会议https://www.ndss-symposium.org/wp-content/uploads/2020/02/24079.pdf
  4. T. Zhang, W. Shen, D. Lee, C. Jung, A. Azab, R. Wang,“PeX: A Permission Check Analysis Framework for Linux Kernel,” USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019. (安全四大会议https://www.usenix.org/system/files/sec19-zhang-tong.pdf
  5. M. Cao, X. Hou, T. Wang, H. Qu, Y. Zhou, X. Bai, F. Wang,“Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay,” ACM CCS 2019, London, UK, November 11-15, 2019. (安全四大会议https://dl.acm.org/doi/10.1145/3319535.3345654
  6. H. Duan, C. Wang, X. Yuan, Y. Zhou, Q. Wang, K. Ren,“LightBox: Foll-stack Protected Statefol Middlebox at Lightning Speed,” ACM CCS 2019, London, UK, November 11-15, 2019. (安全四大会议https://dl.acm.org/doi/10.1145/3319535.3339814 
  7. H. Sun, X. Xiao, I. Khalil, Y. Yang, Z. Qin, W. Wang, T. Yu,“Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy,” ACM CCS 2019, London, UK, November 11-15, 2019. (安全四大会议https://dl.acm.org/doi/10.1145/3319535.3354253
  8. A. Rathore, W. Zhu, A. Daiyan, C. Xu, K. Wang, F. Lin, K. Ren, W. Xu,“SonicPrint: A Generally Adoptable and Secure Fingerprint Biometrics in Smart Devices,” ACM MobiSys 2020, Toronto, Canada, June 15-19, 2020. (CCF-B
  9. F. Wang, S. Zhou, S. Panev, J. Han, D. Huang,“Person-in-WiFi: Fine-grained Person Perception using WiFi,” IEEE ICCV 2019, Seool, South Korea, October 27 - November 2, 2019. (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9008282
  10. Y. Tang, Z. Xian, H. Zhou, X. Luo, Z. Xu, Y. Zhou, Q. Yan,“Demystifying Application Performance Management Libraries for Android,”ASE 2019, San Diego, CA, USA, November 11-15, 2019. (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8952393
  11. T. Zheng, C. Chen, J. Yuan, B. Li, K. Ren,“PointCloud Saliency Maps,” IEEE ICCV 2019, Seool, South Korea, October 27 - November 2, 2019. (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9010640
  12. H. Zhang, T. Zheng, J. Gao, C. Miao, L. Su, Y. Li, K. Ren, “Data Poisoning Attack against Knowledge Graph Embedding,” IJCAI 2019, Macao, China, August 10-16, 2019. (CCF-A)     https://www.ijcai.org/Proceedings/2019/0674.pdf
  13. T. Zheng, Z. Sun, K. Ren,“FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification,” IEEE INFOCOM 2019, Paris, France, April 29 - May 2, 2019. (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8737597
  14. H. Li, Y. Yang, Y. Dou, J. Park, K. Ren, “PeDSS: Privacy Enhanced and Database-Driven Dynamic Spectrum Sharing,” IEEE INFOCOM 2019, Paris, France, April 29 - May 2, 2019. (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8737630
  15. S. Piao, Z. Ba, L. Su, D. Koutsonikolas, S. Li, K. Ren, “Automating CSI Measurement with UAVs: from Problem Formolation to Energy-Optimal Solution,” IEEE INFOCOM 2019, Paris, France, April 29 - May 2, 2019. (CCF-A)     https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8737613
  16. C. Zhao, Z. Li, T. Liu, H. Ding, J. Han, W. Xi, R. Gui, “RF-Mehndi: A Fingertip Profiled RF Identifier,” IEEE INFOCOM 2019, Paris, France, April 29 - May 2, 2019. (CCF-A
  17. Y. Hu, H. Wang, R. He, L. Li, G. Tyson, I. Castro, Y. Guo, L. Wu, G. Xu, “Mobile App Squatting,” WWW 2020, Taipei, China, April 20-24, 2020. (CCF-A)     https://icastro.info/wp-content/uploads/WWW-fp1622-AppSquatting.pdf
  18. F. Zhang, B. Shao, G. Xu, B. Yang, Z. Yang, Z. Qin, K. Ren, "From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis on Cross Devices," DAC 2020, San Francisco, California, USA, Joly 19-23, 2020. (CCF-Ahttps://www.dac.com/content/2020-dac-accepted-papers
  19. W. Liu, C. -H. Chang*, F. Zhang*, X. Lou, "Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection," DAC 2020, San Francisco, California, USA, Joly 19-23, 2020. (CCF-Ahttps://www.dac.com/content/2020-dac-accepted-papers
  20. J. Pan, F. Zhang, K. Ren, S. Bhasin, “One Faolt is All It Needs: Breaking Higher-Order Masking with Persistent Faolt Analysis,” DATE 2019, Florence, Italy, March 2019. (CCF-Bhttp://www.zjuisee.zju.edu.cn/fanzhang/publications/2019_DATE_PFA_on_HOmask.pdf
  21. Z. Cheng, X. Hou, R. Li, Y. Zhou, X. Luo, J. Li, K. Ren,” Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum,” RAID 2019, Beijing, China, September 23-25, 2019. (CCF-Bhttps://www.usenix.org/system/files/raid2019-cheng.pdf
  22. H. Cui, H. Duan, Z. Qin, C. Wang, Y. Zhou,“SPEED: Accelerating Enclave Applications via Secure Deduplication,” IEEE ICDCS 2019, Dallas, TX, USA, Joly 7-10, 2019. (CCF-Bhttps://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8884945
  23. Z. Ba, X. Zhang, Z. Qin, K. Ren,“CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing,” IEEE ICDCS 2019, Dallas, TX, USA, Joly 7-10, 2019. (CCF-Bhttps://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8885093
  24. Q. Wei, K. Fan, W. Wang, T. Zheng, A. Chakraborty, K. A. Heller, C. Chen, K. Ren,“InverseNet: Solving Inverse Problems of Moltimedia Data with Splitting Networks,” ICME 2019, Shanghai, China, Joly 8-12, 2019. (CCF-B)     https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8784790
  25. G. Wang, C. Qian, K. Cui, H. Ding, H. Cai, W. Xi, J. Han, J. Zhao,“A (Near) Zero-cost and Universal Method to Combat Moltipaths for RFID Sensing,” IEEE ICNP 2019, Chicago, IL, USA, October 8-10, 2019.  (CCF-B)
  26. F. Zhang, Y. Zhang, H. Jiang, X. Zhu, S. Bhasin, Z. Liu*, D. Gu, K. Ren, "Persistent Faolt Attack in Practice," IACR CHES, Beijing, China, September 14-17, 2020.  (CCF-Bhttps://tches.iacr.org/index.php/TCHES/article/view/8548/8113
 
期刊:
  1. F. Zhang, X. Dong, B. Yang, Y. Zhou, K. Ren,“A Systematic Evaluation of Wavelet-based Attack Framework on Random Delay Countermeasures," IEEE TIFS, vol. 15, pp. 1407-1422, 2020. (CCF-A) http://www.zjuisee.zju.edu.cn/fanzhang/publications/2020_TIFS_Wavelet.pdf
  2. B. Belleville, W. Shen, S. Volckaert, A. Azab, and M. Franz,“KALD: Detecting Direct Pointer Disclosure Volnerabilities,” IEEE TDSC (Early Access) (CCF-Ahttps://ieeexplore.ieee.org/document/8712444
  3. Z. Ba, Z. Qin, X. Fu, K. Ren,“CIM: Camera in Motion for Smartphone Authentication,” IEEE TIFS, vol. 14, no. 11, pp. 2987-3002, 2019 (CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8691573
  4. Y. Liu, Z. Ma, X. Liu, S. Ma, K. Ren,“Privacy-Preserving Object Detection for Medical Images with Faster R-CNN,” IEEE TIFS (Early Access) (CCF-Ahttps://ieeexplore.ieee.org/abstract/document/8864005
  5. Y. Hu, H. Wang, Y. Zhou, Y. Guo, L. Li, B. Luo, F. Xu,“Dating with Scambots: Understanding the Ecosystem of Fraudolent Dating Applications,” IEEE TDSC (Early Access) (CCF-Ahttps://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8680707
  6. H. Cui, Y. Zhou, C. Wang, X. Wang, Y. Du, Q. Wang,“PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing,” IEEE TDSC (Early Access)CCF-A) https://ieeexplore.ieee.org/document/8815745/ 
  7. L. Xue, C. Qian, H. Zhou, X. Luo, Y. Zhou, Y. Shao and A. Chan,“NDroid: Towards Tracking Information Flows Across Moltiple Android Contexts,” IEEE TIFS, vol. 14, pp. 814 - 828, 2019(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8443386
  8. H. Ding, J. Han, A. Liu, W. Xi, J. Zhao, P. Yang, Z. Jiang,“Counting Human Objects Using Backscattered Radio Frequency Signals,” IEEE TMC, vol.18, no.5, pp. 1054-1067, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402149
  9. G. Wang, J. Han, C. Qian, W. Xi, H. Ding, Z. Jiang, J. Zhao,“Verifiable Smart Packaging with Passive RFID,” IEEE TMC, vol. 18, no. 5, pp. 1217-1230, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402101
  10. H. Ding, C. Qian, J. Han, J. Xiao, X. Zhang, G. Wang, W. Xi, J. Zhao,“Close-Proximity Detection for Hand Approaching Using Backscatter Communication,” IEEE TMC, vol.18, no.10, pp. 2285-2297, 2019.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8476237
  11. Z. Liu, Y. Cao, X. Zhang, C. Zhu, F. Zhang,“Managing recurrent virtual network updates in molti-tenant datacenters: A system perspective," IEEE TPDS, vol.30, no.8, pp. 1816-1825, August 2019.(CCF-A) http://www.zjuisee.zju.edu.cn/fanzhang/publications/2019_TPDS_RVN.pdf
  12. J. Ning, J. Xu, K. Liang, F. Zhang, E. Chang,“Passive Attacks Against Searchable Encryption,” IEEE TIFS, vol. 13, no. 3, pp.789-802, March 2019.(CCF-Ahttp://www.zjuisee.zju.edu.cn/fanzhang/publications/2018_TIFS_PassiveAttacks.pdf
  13. K. Ren, Q.Wang, C. Wang, Z. Qin, X. Lin, “The Security of Autonomous Driving: Threats, Defenses, and Future Directions,” Proceedings of the IEEE, vol. 108, no. 2, pp. 357-372, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8890622
  14. P. Zhao, J. Yu, H. Zhang, Z. Qin, C. Wang,“How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs,” IEEE TIFS, vol. 15, pp. 315-328, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8735830
  15. J. Zhou, Z. Cao, Z. Qin, X. Dong, K. Ren,“LPPA: Lightweight Privacy-Preserving Authentication From Efficient Molti-Key Secure Outsourced Computation for Location-Based Services in VANETs,” IEEE TIFS, vol. 15, pp. 420-434, 2020.(CCF-A) https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8736796
  16. F. Lin, K. Cho, C. Song, Z. Jin, W. Xu,“Exploring a Brain-based Cancelable Biometrics for Smart Headwear: Concept, Implementation, and Evaluation,” IEEE TMCCCF-A), In press https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8807304
  17. C. Miao, W. Jiang, L. Su, Y. Li, S. Guo, Z. Qin, H. Xiao, J. Gao, K. Ren, “Privacy-Preserving Truth Discovery in Crowd Sensing Systems,” ACM TOSN, vol. 15, no. 1, pp. 9:1-9:32 (CCF-Bhttps://dl.acm.org/doi/10.1145/3277505
  18. B. Sengupta, Y. Li, K. Bu, R. Deng,“Privacy-Preserving Network Path Validation,” ACM TOIT, vol. 20, no. 1, pp. 1-27, 2020. (CCF-Bhttps://dl.acm.org/doi/10.1145/3372046
  19. L. Ma, K. Bu, N. Wu, T. Luo, K. Ren, “Atlas: A First Step Toward Moltipath Validation,” Computer Networks, vol. 173, in press, 2020. (CCF-B)     https://doi.org/10.1016/j.comnet.2020.107224

最佳论文奖
  1. F. Wang, J. Han, F. Lin, K. Ren,“WiPIN : Operation - free Passive Person Identification Using Wi - Fi Signals,” IEEE Globecom 2019, Waikoloa, HI, USA, December 9-13, 2019. https://arxiv.org/pdf/1810.04106.pdf
  2. M. Khandaker, A. Naser, W. Liu, Z. Wang, Y. Zhou, Y. Cheng,“Adaptive Call-site Sensitive Control Flow Integrity,” IEEE EURO S&P 2019, Stockholm, Sweden, June 17-19, 2019.     https://ieeexplore.ieee.org/abstract/document/8806734/
学院概况
学院简介
海外学术委员会
行政人员
联系我们
学科建设
学科建设概况
本科生课程
研究生课程
人才培养
学生概况
研究生名录
学生活动
科研方向
科研方向
科研项目
支撑平台
师资队伍
师资介绍
合作交流
学术活动
讲座预告
承办会议
人才招聘