基本信息
孙利民  男  博导  中国科学院信息工程研究所
电子邮件: sunlimin@iie.ac.cn
通信地址: 北京海淀区闵庄路甲89号
邮政编码: 100093

招生信息

   
招生专业
083900-网络空间安全
招生方向
物联网安全;工控系统安全;国家基础设施安全

教育背景

1995-06--1998-06   国防科技大学计算机学院   博士
1992-09--1995-05   国防科技大学计算机学院   硕士
1984-09--1988-05   国防科技大学计算机系   学士

工作经历

   
社会兼职
2012-01-10-今,物联网安全技术北京市重点实验室, 主任
2010-05-10-今,北京物联网学会, 副理事长
2006-09-26-今,计算机学会物联网专委会, 副主任

教授课程

物联网安全
物联网及其安全
国家关键信息基础设施安全
科学前沿进展名家系列讲座IV
物联网及安全
传感器网络与模式识别系列讲座
传感器网络系列讲座
无线传感器网络
物联网系列讲座

专利与奖励

   
奖励信息
(1) 端管云一体化系统认知的工业物联网态势安全关键技术及应用, 二等奖, 部委级, 2021
(2) 电力工控系统本体安全防护与攻击检测关键技术及应用, 一等奖, 部委级, 2021
(3) 高等学校科学研究优秀成果奖, 二等奖, 省级, 2020
(4) 基于机器学习的网络安全技术研究, 三等奖, 部委级, 2018
(5) 北京市科学技术奖, 三等奖, 省级, 2014
(6) 国家电网公司科技进步奖, 一等奖, 省级, 2012
专利成果
( 1 ) 模糊测试方法、系统、电子设备及介质, 发明专利, 2022, 第 1 作者, 专利号: CN113934621A

( 2 ) 固件内部二进制程序脆弱性发现方法及装置, 发明专利, 2022, 第 1 作者, 专利号: CN113901459A

( 3 ) 一种二进制软件协议探测载荷的挖掘方法及装置, 发明专利, 2021, 第 5 作者, 专利号: CN113746819A

( 4 ) 一种安全漏洞测试方法、装置、设备及可读存储介质, 发明专利, 2021, 第 1 作者, 专利号: CN113722717A

( 5 ) 僵尸网络流量分类检测方法、装置、电子设备及存储介质, 发明专利, 2021, 第 6 作者, 专利号: CN113705604A

( 6 ) 基于符号执行的漏洞利用点查找方法及装置, 发明专利, 2021, 第 7 作者, 专利号: CN113656280A

( 7 ) 针对控制设备私有协议的脆弱性发现方法和装置, 发明专利, 2021, 第 1 作者, 专利号: CN113472739A

( 8 ) 一种社工邮件防御方法、系统、电子设备及存储介质, 发明专利, 2021, 第 6 作者, 专利号: CN113452599A

( 9 ) 一种面向文本配置文件的模糊测试方法及装置, 发明专利, 2021, 第 6 作者, 专利号: CN111913877B

( 10 ) 社工攻击应激变换防护方法、系统、电子设备及存储介质, 发明专利, 2021, 第 7 作者, 专利号: CN113381981A

( 11 ) 网络设备地理定位方法及装置, 专利授权, 2021, 第 6 作者, 专利号: CN111526222B

( 12 ) 社工信息保护方法、装置、电子设备和存储介质, 发明专利, 2021, 第 5 作者, 专利号: CN113141347A

( 13 ) 工业防火墙状态检测方法、装置、电子设备及存储介质, 发明专利, 2021, 第 1 作者, 专利号: CN113098837A

( 14 ) ICS入侵检测方法、装置、电子设备和存储介质, 发明专利, 2021, 第 1 作者, 专利号: CN113067798A

( 15 ) 社工攻击威胁、事件、场景分析方法、装置及系统, 发明专利, 2021, 第 5 作者, 专利号: CN112910872A

( 16 ) 基于工控业务仿真的PLC蜜罐系统、实现方法及仿真设备, 发明专利, 2021, 第 1 作者, 专利号: CN112650077A

( 17 ) 一种基于二进制程序的漏洞检测方法及相关设备, 发明专利, 2021, 第 6 作者, 专利号: CN112613040A

( 18 ) 物联网设备数据集构建方法、装置、电子设备和存储介质, 发明专利, 2021, 第 7 作者, 专利号: CN112445862A

( 19 ) 工控漏洞挖掘方法及装置, 发明专利, 2021, 第 1 作者, 专利号: CN112398839A

( 20 ) 一种工业控制系统的过程控制攻击检测方法及装置, 专利授权, 2021, 第 1 作者, 专利号: CN110825040B

( 21 ) 同源二进制文件检索方法和装置, 专利授权, 2021, 第 5 作者, 专利号: CN109063055B

( 22 ) 一种工业互联网恶意代码识别方法及装置, 发明专利, 2020, 第 3 作者, 专利号: CN111881446A

( 23 ) 物联网设备指纹库的精细化方法, 发明专利, 2020, 第 7 作者, 专利号: CN111680286A

( 24 ) 一种用于电网嵌入式终端的网络安全审计方法及装置, 发明专利, 2020, 第 10 作者, 专利号: CN111614611A

( 25 ) 针对MIPS架构的物联网设备组件版本信息提取方法, 发明专利, 2020, 第 6 作者, 专利号: CN111580856A

( 26 ) 基于VEX中间语言的物联网设备组件版本信息提取方法, 发明专利, 2020, 第 6 作者, 专利号: CN111580822A

( 27 ) 一种电网嵌入式终端的固件编译优化选项识别方法及装置, 发明专利, 2020, 第 9 作者, 专利号: CN111444513A

( 28 ) 基于开源组件版本识别的固件脆弱性判别方法及系统, 发明专利, 2020, 第 7 作者, 专利号: CN111400719A

( 29 ) 一种边缘服务迁移方法及装置, 发明专利, 2020, 第 6 作者, 专利号: CN111381962A

( 30 ) 一种模糊测试中高质量种子生成方法及系统, 发明专利, 2020, 第 1 作者, 专利号: CN111382067A

( 31 ) 一种物联网设备识别方法、系统、电子设备及存储介质, 专利授权, 2020, 第 5 作者, 专利号: CN110022308B

( 32 ) 一种电力固件同源二进制文件关联方法及系统, 发明专利, 2020, 第 6 作者, 专利号: CN111104674A

( 33 ) 物联网恶意软件的可视化分类方法、装置与电子设备, 发明专利, 2020, 第 4 作者, 专利号: CN110826060A

( 34 ) 同源二进制代码的检索方法及装置, 发明专利, 2019, 第 6 作者, 专利号: CN110414238A

( 35 ) 基于机器学习的大规模嵌入式设备在线固件智能识别方法, 发明专利, 2019, 第 6 作者, 专利号: CN110413909A

( 36 ) 一种网络设备探测中端口选择方法及系统, 专利授权, 2019, 第 8 作者, 专利号: CN110380925A

( 37 ) 工控蜜罐攻击数据来源的判别方法及装置, 专利授权, 2019, 第 1 作者, 专利号: CN110365636A

( 38 ) 用于数控机床的蜜罐方法及装置, 发明专利, 2019, 第 1 作者, 专利号: CN110351237A

( 39 ) 工控蜜罐系统, 发明专利, 2019, 第 4 作者, 专利号: CN110351238A

( 40 ) Conpot工控蜜罐的识别方法, 发明专利, 2019, 第 5 作者, 专利号: CN110266650A

( 41 ) 工业控制系统的威胁检测方法及装置, 发明专利, 2019, 第 1 作者, 专利号: CN110059726A

( 42 ) 一种物联网设备识别方法及系统, 发明专利, 2019, 第 5 作者, 专利号: CN110022308A

( 43 ) 一种针对智能设备固件的脆弱哈希函数的识别与破解方法, 发明专利, 2019, 第 4 作者, 专利号: CN109740347A

( 44 ) 工控系统的隐蔽攻击的检测方法及装置, 发明专利, 2019, 第 1 作者, 专利号: CN109361648A

( 45 ) 序列攻击的检测方法及装置, 专利授权, 2019, 第 1 作者, 专利号: CN109344610A

( 46 ) 内网设备类型识别方法及装置, 专利授权, 2018, 第 5 作者, 专利号: CN108900351A

( 47 ) 一种网络中IP设备的位置确定方法及装置, 发明专利, 2018, 第 5 作者, 专利号: CN108900566A

( 48 ) 一种基于DCS分布式控制的蜜罐系统, 发明专利, 2018, 第 1 作者, 专利号: CN108833333A

( 49 ) 一种视频监控网络的异常检测方法及系统, 发明专利, 2018, 第 1 作者, 专利号: CN108737367A

( 50 ) 一种蜜罐系统, 专利授权, 2018, 第 1 作者, 专利号: CN108712370A

( 51 ) 一种基于聚类分析的自动化指纹特征提取方法, 发明专利, 2018, 第 5 作者, 专利号: CN108628876A

( 52 ) 一种面向视频监控网络的入侵检测方法、装置及系统, 专利授权, 2018, 第 1 作者, 专利号: CN108600003A

( 53 ) 一种基于多维度的固件Web漏洞检测方法及系统, 专利授权, 2018, 第 6 作者, 专利号: CN108520180A

( 54 ) 一种探测网络设备的方法及系统, 专利授权, 2018, 第 5 作者, 专利号: CN108418727A

( 55 ) 一种网络威胁情报生成方法及系统, 发明专利, 2018, 第 5 作者, 专利号: CN108399194A

( 56 ) 针对不安全函数的数据依赖图构建方法及装置, 发明专利, 2018, 第 5 作者, 专利号: CN108319858A

( 57 ) 一种识别同源二进制文件的方法及系统, 专利授权, 2018, 第 3 作者, 专利号: CN108280197A

( 58 ) 一种内核源码级的系统调用跟踪方法, 发明专利, 2018, 第 5 作者, 专利号: CN108228434A

( 59 ) 一种事件触发式的MTD防护系统及方法, 发明专利, 2018, 第 5 作者, 专利号: CN105227540B

( 60 ) 一种签到数据的映射方法及设备, 发明专利, 2018, 第 4 作者, 专利号: CN107766422A

( 61 ) 一种识别同源二进制文件的方法及系统, 发明专利, 2018, 第 5 作者, 专利号: CN107704501A

( 62 ) 一种社交关系推断方法及系统, 发明专利, 2018, 第 1 作者, 专利号: CN107563402A

( 63 ) 一种工业控制系统序列攻击检测方法及设备, 专利授权, 2017, 第 1 作者, 专利号: CN107491058A

( 64 ) 一种网络设备定位方法及装置, 专利授权, 2017, 第 1 作者, 专利号: CN107277121A

( 65 ) 一种跨架构的二进制程序漏洞函数关联方法, 发明专利, 2017, 第 5 作者, 专利号: CN107229563A

( 66 ) 一种基于协议状态图深度遍历的工控漏洞挖掘方法, 专利授权, 2017, 第 1 作者, 专利号: CN106888209A

( 67 ) 一种基于反馈聚类的网络设备识别方法及系统, 专利授权, 2017, 第 7 作者, 专利号: CN106850333A

( 68 ) 一种基于梯度式级联SVM分类器的行人识别方法, 发明专利, 2017, 第 1 作者, 专利号: CN106778603A

( 69 ) 一种基于混合特征的带缓存机制的实时行人检测与跟踪方法, 发明专利, 2017, 第 2 作者, 专利号: CN106778478A

( 70 ) 一种适用于工业控制系统的风险评估方法, 专利授权, 2017, 第 4 作者, 专利号: CN106709613A

( 71 ) 一种基于网络报文的序列号识别方法, 专利授权, 2017, 第 1 作者, 专利号: CN106533955A

( 72 ) 一种基于智能手机时钟机制的批处理唤醒低功耗方法, 发明专利, 2017, 第 1 作者, 专利号: CN106445077A

( 73 ) 一种适用于MIMO RFID系统的身份认证方法, 专利授权, 2017, 第 5 作者, 专利号: CN106452780A

( 74 ) 一种面向嵌入式设备的固件漏洞检测方法及系统, 发明专利, 2017, 第 3 作者, 专利号: CN106295335A

( 75 ) 基于级联深度学习的交通标志识别方法和系统, 专利授权, 2016, 第 5 作者, 专利号: CN106022300A

( 76 ) 一种网络空间工业控制设备快速检测识别方法, 专利授权, 2016, 第 1 作者, 专利号: CN105871620A

( 77 ) 一种自学习协议规则的入侵检测方法, 专利授权, 2016, 第 4 作者, 专利号: CN105871861A

( 78 ) 基于神经网络的指令集无关的二进制代码相似性检测方法, 发明专利, 2016, 第 5 作者, 专利号: CN105868108A

( 79 ) 针对大规模嵌入式设备固件的函数搜索方法和搜索引擎, 专利授权, 2016, 第 5 作者, 专利号: CN105740477A

( 80 ) 一种基于整数规划的人群密度估计方法, 发明专利, 2016, 第 1 作者, 专利号: CN105740819A

( 81 ) 一种视频监控系统日志安全审计方法, 专利授权, 2016, 第 6 作者, 专利号: CN105721198A

( 82 ) 一种基于H.264视频流的密钥同步信息传输方法, 发明专利, 2016, 第 6 作者, 专利号: CN105704545A

( 83 ) 一种网络扫描发包速率探测系统及方法, 专利授权, 2016, 第 6 作者, 专利号: CN105634868A

( 84 ) 一种室内区域定位优化方法及系统, 发明专利, 2016, 第 3 作者, 专利号: CN105554879A

( 85 ) 一种嵌入式设备固件解压成功的判断方法, 发明专利, 2016, 第 6 作者, 专利号: CN105488531A

( 86 ) 一种时间同步方法, 发明专利, 2016, 第 2 作者, 专利号: CN102752843B

( 87 ) 一种基于DM8148开发板的运动目标检测与跟踪方法, 发明专利, 2016, 第 3 作者, 专利号: CN105427343A

( 88 ) 一种基于长连接的双向调用方法及系统, 发明专利, 2016, 第 5 作者, 专利号: CN105282128A

( 89 ) 基于Hadoop和Red5的视频点播系统及方法, 发明专利, 2015, 第 8 作者, 专利号: CN105187855A

( 90 ) 密文视频播放器及播放方法, 专利授权, 2015, 第 8 作者, 专利号: CN105187912A

( 91 ) 一种室内区域定位优化方法及系统, 发明专利, 2015, 第 3 作者, 专利号: CN105163382A

( 92 ) 一种基于物理环境感知的计算机访问控制方法及系统, 发明专利, 2015, 第 2 作者, 专利号: CN105138922A

( 93 ) 密钥生成方法, 发明专利, 2015, 第 7 作者, 专利号: CN105120453A

( 94 ) 基于Hadoop的密文视频流处理方法、装置、服务器及系统, 专利授权, 2015, 第 7 作者, 专利号: CN105072456A

( 95 ) 一种具有网络选择功能的多网络覆盖设备及方法, 发明专利, 2015, 第 1 作者, 专利号: CN105007587A

( 96 ) 一种事件触发式的MTD防护系统及方法, 发明专利, 2015, 第 5 作者, 专利号: CN104917757A

( 97 ) 一种海量数据下可靠索引更新系统及方法, 发明专利, 2015, 第 3 作者, 专利号: CN104899249A

( 98 ) 一种基于物理环境感知的计算机访问控制方法及系统, 发明专利, 2015, 第 2 作者, 专利号: CN104866772A

( 99 ) 一种基于分级迭代的大规模图像样本标注方法及系统, 发明专利, 2015, 第 5 作者, 专利号: CN104850832A

( 100 ) 一种物联网资源访问权限控制方法及系统, 发明专利, 2015, 第 4 作者, 专利号: CN104717206A

( 101 ) 一种基于H.264编码标准的通用视频加密方法及系统, 发明专利, 2015, 第 7 作者, 专利号: CN104639943A

( 102 ) 一种基于多种异构传感器的排队行为检测方法及系统, 发明专利, 2015, 第 1 作者, 专利号: CN104581939A

( 103 ) 一种基于级联字典的人群异常检测方法及系统, 发明专利, 2015, 第 1 作者, 专利号: CN104504367A

( 104 ) 移动智能终端Wi-Fi信号数据包的收集装置、方法及系统, 发明专利, 2015, 第 4 作者, 专利号: CN104349339A

( 105 ) 一种基于多摄像头的在线目标跟踪方法及系统, 发明专利, 2014, 第 5 作者, 专利号: CN104123732A

( 106 ) 一种SIP安全防范视频监控入网控制系统, 发明专利, 2014, 第 3 作者, 专利号: CN104113547A

( 107 ) 一种SIP视频监控联网系统的密钥管理方法及系统, 发明专利, 2014, 第 1 作者, 专利号: CN104113409A

( 108 ) 滤波器组训练方法及系统和图像关键点定位方法及系统, 发明专利, 2014, 第 3 作者, 专利号: CN103955719A

( 109 ) 一种图像生物特征保护方法和装置及信息恢复方法, 发明专利, 2014, 第 5 作者, 专利号: CN103955881A

( 110 ) 网络快速邻居发现机制的组管理方法及系统, 发明专利, 2014, 第 1 作者, 专利号: CN103889031A

( 111 ) 一种双网络耦合结构协同仿真方法及系统, 发明专利, 2014, 第 2 作者, 专利号: CN103729232A

( 112 ) 一种基于捷径的移动容迟网络快速消息通知方法及装置, 发明专利, 2014, 第 1 作者, 专利号: CN103716880A

( 113 ) 一种开放型无线传感网性能测试方法及系统, 发明专利, 2014, 第 2 作者, 专利号: CN103716201A

( 114 ) 一种低功耗有损网络的路由构建方法及系统, 发明专利, 2014, 第 3 作者, 专利号: CN103619045A

( 115 ) 一种认证方法及系统, 发明专利, 2014, 第 3 作者, 专利号: CN103532718A

( 116 ) 一种异构无线网络拓扑认知方法及系统, 发明专利, 2013, 第 5 作者, 专利号: CN103476066A

( 117 ) 一种Wifi指纹定位的隐私保护方法及装置, 发明专利, 2013, 第 1 作者, 专利号: CN103442335A

( 118 ) 一种在线视频目标跟踪方法和装置, 发明专利, 2013, 第 5 作者, 专利号: CN103440668A

( 119 ) 一种针对特定车辆潜在群体的行驶轨迹预测方法, 发明专利, 2013, 第 1 作者, 专利号: CN103366566A

( 120 ) 基于车辆轨迹的数据传输方法及系统, 发明专利, 2013, 第 1 作者, 专利号: CN103338441A

( 121 ) 一种基于道路的入侵目标检测方法及系统, 发明专利, 2013, 第 5 作者, 专利号: CN103338477A

( 122 ) 一种黑名单车辆的时空行驶轨迹预测方法, 发明专利, 2013, 第 5 作者, 专利号: CN103325245A

( 123 ) 一种基于链路质量的节点休眠调度方法, 发明专利, 2013, 第 4 作者, 专利号: CN103327518A

( 124 ) 一种无线传感器网络节点能耗测试设备, 实用新型, 2013, 第 4 作者, 专利号: CN202918501U

( 125 ) 一种用于物品移动检测与报警的嵌入式设备, 实用新型, 2013, 第 3 作者, 专利号: CN202916932U

( 126 ) 一种信号强度预测方法, 发明专利, 2012, 第 1 作者, 专利号: CN102780536A

( 127 ) 通信调度方法、系统及监测系统和方法, 发明专利, 2012, 第 3 作者, 专利号: CN102781062A

( 128 ) 一种公交车到站时间实时预测系统和方法, 发明专利, 2012, 第 2 作者, 专利号: CN102708701A

( 129 ) 一种对无线传感器网络中的节点进行无线升级的方法, 发明专利, 2012, 第 2 作者, 专利号: CN102711095A

出版信息

   
发表论文
[1] Kai Yang, Qiang Li, Haining Wang, Limin Sun, Jiqiang Liu. Fingerprinting Industrial IoT devices based on multi-branch neural network. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2024, 238: http://dx.doi.org/10.1016/j.eswa.2023.122371.
[2] 郑春阳, 王进法, 司帅宗, 张卫东, 孙利民. ChainDet: A Traffic-Based Detection Method of Microservice Chains. IEEE International Performance Computing and Communications Conferencenull. 2023, [3] Yan, Senming, Ren, Jing, Wang, Wei, Sun, Limin, Zhang, Wei, Yu, Quan. A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS[J]. 2023, 25(1): 467-496, http://dx.doi.org/10.1109/COMST.2022.3225137.
[4] 刘培培, 李红, 王志宇, 任一墨, 刘洁, 吕飞, 朱红松, 孙利民. CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. International Joint Conference on Neural Networksnull. 2023, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10191251.
[5] 陈晓惠, 崔磊, 文辉, 李志, 朱红松, 郝志宇, 孙利民. MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)null. 2023, [6] 宾浩宇, 赵森, 李志, 于楠, 席荣荣, 朱红松, 孙利民. UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic. IEEE International Performance Computing and Communications Conferencenull. 2023, [7] Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun. Owner name entity recognition in websites based on multiscale features and multimodal co-attention. EXPERT SYSTEMS WITH APPLICATIONS. 2023, 224: http://dx.doi.org/10.1016/j.eswa.2023.120014.
[8] Chuan Qin, Jiaqian Peng, Puzhuo Liu, Yaowen Zheng, Kai Cheng, Weidong Zhang, Limin Sun. UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. COMPUTERS & SECURITY. 2023, 128: http://dx.doi.org/10.1016/j.cose.2023.103157.
[9] 闫兆腾, 李志, 李红, 杨寿国, 朱红松, 孙利民. Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 20(5): 3890-3909, https://ieeexplore.ieee.org/document/9954619.
[10] 任一墨, 王进法, 李红, 朱红松, 孙利民. DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things. International Conference on Research on Development in Information Retrievalnull. 2023, https://dl.acm.org/doi/pdf/10.1145/3539618.3591972.
[11] 王高升, 刘培培, 黄晋涛, 司帅宗, 朱红松, 孙利民. CSEDesc: CyberSecurity Event Detection with Event Description. International Conference on Artificial Neural Networksnull. 2023, https://link.springer.com/chapter/10.1007/978-3-031-44213-1_3.
[12] 李思源, 文辉, 邓立廷, 周宇, 张文源, 李志, 孙利民. Denoising Network of Dynamic Features for Enhanced Malware Classification. IEEE International Performance Computing and Communications Conferencenull. 2023, [13] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. COMPUTERS & SECURITY[J]. 2023, 131: http://dx.doi.org/10.1016/j.cose.2023.103317.
[14] 任一墨, 李志, 李红, 刘培培, 刘洁, 朱红松, 孙利民. ip2text A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. Database Systems for Advanced Applicationsnull. 2023, https://link.springer.com/chapter/10.1007/978-3-031-35415-1_2.
[15] Kai Cheng, Yaowen Zheng, Tao Liu, Guan Le, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun. Detecting Vulnerabilities in Linux-based Embedded Firmware with SSE-based On-demand Alias Analysis. ISSTA'23null. 2023, [16] 杨寿国, 董超鹏, 肖扬, 程怡然, 石志强, 李志, 孙利民. Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Transactions on Software Engineering and Methodology[J]. 2023, [17] 孙怡亭, 郭越, 李长进, 张红军, 刘康, 刘俊矫, 孙利民. 可编程逻辑控制器的控制逻辑注入攻击入侵检测方法. 计算机应用. 2023, 43(6): 1861-1869, http://lib.cqvip.com/Qikan/Article/Detail?id=7109941717.
[18] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Li, Zhi, Zhu, Hongsong, Sun, Limin. Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. KNOWLEDGE AND INFORMATION SYSTEMS. 2023, http://dx.doi.org/10.1007/s10115-023-01908-4.
[19] 杨寿国, Zhengzi Xu, 肖扬, Zhe Lang, 唐伟, Yang Liu, 石志强, 李红, 孙利民. Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Transactions on Software Engineering and Methodology (TOSEM)[J]. 2023, [20] Ren, Yimo, Li, Hong, Liu, Peipei, Liu, Jie, Zhu, Hongsong, Sun, Limin. Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS[J]. 2023, 2023: http://dx.doi.org/10.1155/2023/3138551.
[21] Chen, Yanru, Yin, Fengming, Hu, Shunfang, Sun, Limin, Li, Yang, Xing, Bin, Chen, Liangyin, Guo, Bing. ECC-Based Authenticated Key Agreement Protocol for Industrial Control System. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 10(6): 4688-4697, http://dx.doi.org/10.1109/JIOT.2022.3219233.
[22] 孙越, 李志, 吕世超, 孙利民. Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, https://ieeexplore.ieee.org/abstract/document/9978697/metrics#metrics.
[23] Cheng, Yiran, Yang, Shouguo, Lang, Zhe, Shi, Zhiqiang, Sun, Limin. VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. COMPUTERS & SECURITY[J]. 2023, 126: http://dx.doi.org/10.1016/j.cose.2022.103068.
[24] 邓立廷, 文辉, 辛明峰, 李红, 潘志文, 孙利民. ENIMANAL: Augmented Cross-Architecture IoT Malware Analysis using Graph Neural Networks. Computers & Security[J]. 2023, [25] 刘培培, 李红, 刘洁, 朱红松, 孙利民. Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis. Proceedings of the International Conference on Acoustics, Speech and Signal Processing(ICASSP 2023).null. 2023, [26] 任一墨, 王进法, 李红, 朱红松, 孙利民. User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Label. International Joint Conference on Neural Networksnull. 2023, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10192043.
[27] Ke Li, Zhi Li, Zhimin Gu, Ziying Wang, Limin Sun. Compromised IoT Devices Detection in Smart Home via Semantic Information. IEEE International Conference on Communications(ICC)null. 2022, [28] Mengjie Sun, limin sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li, Limin Sun. Inferring Device Interactions for Attack Path Discovery in Smart Home IoT. International Conference on Wireless Algorithms, Systems, and Applications(WASA)null. 2022, [29] Yang, Kai, Haining Wang, Limin Sun. An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. COMPUTERS IN INDUSTRY[J]. 2022, 138: http://dx.doi.org/10.1016/j.compind.2022.103613.
[30] Liu, Puzhuo, Zheng, Yaowen, Song, Zhanwei, Fang, Dongliang, Lv, Shichao, Sun, Limin. Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2022, 127: http://dx.doi.org/10.1016/j.sysarc.2022.102483.
[31] 方栋梁, 刘圃卓, 秦川, 宋站威, 孙玉砚, 石志强, 孙利民. 工业控制系统协议安全综述. 计算机研究与发展[J]. 2022, 59(5): 978-993, http://lib.cqvip.com/Qikan/Article/Detail?id=7107098515.
[32] Yimo Ren, Hong Li, Ruinian Li, Hongsong Zhu, Limin Sun. Understanding User-Level IP Blocks on the Internet. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, https://doaj.org/article/c8c42716667d4f8da07ab482a5a4c977.
[33] 周明, 吕世超, 游建舟, 朱红松, 石志强, 孙利民. 工业控制系统安全态势感知技术研究. 信息安全学报[J]. 2022, 7(2): 101-119, http://lib.cqvip.com/Qikan/Article/Detail?id=7106868449.
[34] Zhihui Zhao, , Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun. Detection and Incentive: An tampering detection mechanism for object detection in edge computing. IEEE International Symposium on Reliable Distributed Systems(SRDS 2022)null. 2022, [35] Puzhuo Liu, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv,, Hongsong Zhu, Limin Sun. Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022null. 2022, [36] Shijie Li, Junjiao Liu, Zhiwen Pan, Shichao Lv,, Shuaizong Si, Limin Sun. Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems. IEEE International Conference on Mobile Ad-Hoc and Sensor Systems(MASS)null. 2022, [37] Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun. SIFOL: Solving Implicit Flows in Loops for Concolic Execution. IEEE International Performance Computing and Communications Conference(IPCCC 2022)null. 2022, [38] Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun. Gradient-based Adversarial Attacks against Malware Detection by Instruction Replacement. 17th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2022)null. 2022, [39] Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun. An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification. International Conference on Security and Privacy in Communication Networks(SecureComm 2022)null. 2022, [40] 孙越, 吕世超, 游建舟, 孙玉砚, 陈新, 郑尧文, 孙利民. IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. ACNS 2022: Applied Cryptography and Network Securitynull. 2022, doi.org/10.1007/978-3-031-09234-3_1.
[41] Jie Liu, Jinfa Wang, Peipei Liu, Hongsong Zhu, Limin Sun. Discover the ICS Landmarks based on multi-stage clue mining. International Conference on Wireless Algorithms, Systems, and Applications(WASA 2022)null. 2022, [42] Sen Zhao, Jinfa Wang, yang shouguo, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu, Limin Sun. ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification. 30th IEEE International Conference on Network Protocols(ICNP 2022)null. 2022, [43] Yimo Ren, Hong Li, Min Xu, Gang Xiong, ,Shuqin Zhang, Hongsong Zhu, Limin Sun. Joint Classification of IoT Devices and Relations In the Internet with Network Traffic. IEEE Wireless Communications and Networking Conference(WCNC2022)null. 2022, [44] Yaowen Zheng, Yuekang Li, Cen Zhang, Hongsong Zhu, Yang Liu, Limin Sun. Efficient Greybox Fuzzing of Applications in Linux-based IoT Devices via Enhanced User-mode Emulation. 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022)null. 2022, [45] Xiaoling Zhang, Shouguo Yang, Luqian Duan, Zhe Lang, Zhiqiang Shi, Limin Sun. Transformer XL With Graph Neural Network for Source Code Summarization. IEEE International Conference on Systems, Man, and Cybernetics[J]. 2021, [46] 杨锴, 张悦阳, 林晓东, 李志, 孙利民. Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, https://ieeexplore.ieee.org/document/9530590.
[47] Li, Qiang, Wang, Zhihao, Tan, Dawei, Song, Jinke, Wang, Haining, Sun, Limin, Liu, Jiqiang. GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2021, 29(4): 1798-1812, http://dx.doi.org/10.1109/TNET.2021.3073926.
[48] Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun. SHADOWPLCS: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Transactions on Dependable and Secure Computing[J]. 2021, 19(3): 2054-2069, [49] Zhou, Wei, Cao, Chen, Huo, Dongdong, Cheng, Kai, Zhang, Lan, Guan, Le, Liu, Tao, Jia, Yan, Zheng, Yaowen, Zhang, Yuqing, Sun, Limin, Wang, Yazhe, Liu, Peng. Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 8(14): 11621-11639, http://dx.doi.org/10.1109/JIOT.2021.3059457.
[50] Wang, Zuoguang, Zhu, Hongsong, Liu, Peipei, Sun, Limin. Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples. CYBERSECURITY[J]. 2021, 4(1): 1-21, http://arxiv.org/abs/2106.01157.
[51] Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo liu, Limin Sun. DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. Proceedings of the 19th International Conference on Applied Cryptography and Network Security[J]. 2021, [52] Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun. Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. ICT systems security and privacy protection :null. 2021, 83-99, [53] Li, Jitong, Wang, Chao, Seo, Daehee, Cheng, Xiaoman, He, Yunhua, Sun, Limin, Xiao, Ke. Deep Learning-Based Service Scheduling Mechanism for GreenRSUs in the IoVs. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2021, 2021: https://doaj.org/article/6daa528180744d84bd5d66961f8e9dcc.
[54] 游建舟, 吕世超, 孙越, 文辉, 孙利民. HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. IEEE International Conference on Communications (ICC 2021)null. 2021, https://ieeexplore.ieee.org/document/9500567.
[55] 孙利民, 潘志文, 吕世超, 石志强, 朱红松. 智能制造场景下工业互联网安全风险与对策. 信息通信技术与政策[J]. 2021, 24-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7105457933.
[56] 王作广, 朱红松, 孙利民. 社工概念演化分析. 信息安全学报[J]. 2021, 6(2): 12-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7104256771.
[57] Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun. PMatch: Semantic-based Patch Detection for Binary Programs. IEEE International Performance Computing and Communications Conference[J]. 2021, [58] Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun. A Robust IoT Device Identification Method with Unknown Traffic Detection. Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications(WASA 2021)[J]. 2021, [59] 闫兆腾, 李志, 白稳平, 朱红松, 孙利民. Detecting Internet-scale Surveillance Devices using RTSP Recessive Features. International Conference on Science of Cyber Securitynull. 2021, https://link.springer.com/chapter/10.1007/978-3-030-89137-4_2.
[60] Bowen Yu, Yucheng Wang, Tingwen Liu, Hongsong Zhu, Limin Sun, Bin Wang. Maximal Clique Based Non-Autoregressive Open Information Extraction. EMNLPnull. 2021, [61] Dongliang Fang, Zhanwei Song, Yue Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun*. ICS3Fuzzer: A Fuzzing Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software. Proceedings of the Annual Computer Security Applications Conference[J]. 2021, [62] 何云华, 黄伟, 王伟忠, 张翠, 李红, 孙利民. 基于区块链的分布式激励架构研究. 工程科学与技术[J]. 2021, 53(1): 178-187, http://lib.cqvip.com/Qikan/Article/Detail?id=7103756524.
[63] He, Yunhua, Shen, Jialong, Xiao, Ke, Sood, Keshav, Wang, Chao, Sun, Limin, IEEE. A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2020, [64] Limin Sun. Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. Proceedings of the the Web Conference (WWW)). 2020, [65] You, Jianzhou, Lv, Shichao, Zhao, Lian, Niu, Mengyao, Shi, Zhiqiang, Sun, Limin, IEEE. A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. 2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL)null. 2020, [66] Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu,, Hongsong Zhu, Limin Sun. TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. COLINGnull. 2020, http://arxiv.org/abs/2010.13415.
[67] Yang, Kai, Li, Qiang, Lin, Xiaodong, Chen, Xin, Sun, Limin. iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS[J]. 2020, 38(5): 955-967, http://dx.doi.org/10.1109/JSAC.2020.2980921.
[68] 游建舟, 吕世超, 孙玉砚, 石志强, 孙利民. 物联网蜜罐综述. 信息安全学报[J]. 2020, 5(4): 138-156, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488259.
[69] Hu, Yan, Li, Hong, Luan, Tom H, Yang, An, Sun, Limin, Wang, Zhiliang, Wang, Rui. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2020, 108: 1230-1240, http://dx.doi.org/10.1016/j.future.2018.07.027.
[70] Limin Sun. Malware Classification using Attention-based Transductive Learning Network. Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm 2020). 2020, [71] You, Jianzhou, Lv, Shichao, Hao, Yichen, Feng, Xuan, Zhou, Ming, Sun, Limin, Zhou, J, Luo, X, Shen, Q, Xu, Z. Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 71-88, [72] Liting deng, Hui Wen, Yue Sun, MingFeng Xin, Limin Sun, Hongsong Zhu. Attention Based Transductive Network for Malware Classification. 16th EAI International Conference on Security and Privacy in Communication Networksnull. 2020, [73] 陈千, 程凯, 郑尧文, 朱红松, 孙利民. 函数级数据依赖图及其在静态脆弱性分析中的应用. 软件学报[J]. 2020, 31(11): 3421-3435, http://lib.cqvip.com/Qikan/Article/Detail?id=7103363893.
[74] 赵国新, 丁若凡, 游建舟, 吕世超, 彭锋, 李菲, 孙利民. 基于工控业务仿真的高交互可编程逻辑控制器蜜罐系统设计实现. 计算机应用[J]. 2020, 40(9): 2650-2656, http://lib.cqvip.com/Qikan/Article/Detail?id=7102860244.
[75] Zhou, Zan, Kuang, Xiaohui, Sun, Limin, Zhong, Lujie, Xu, Changqiao. Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service. IEEE COMMUNICATIONS MAGAZINE[J]. 2020, 58(6): 58-64, http://dx.doi.org/10.1109/MCOM.001.1900367.
[76] 闫兆腾, 于楠, 文辉, 李志, 朱红松, 孙利民. Detecting Internet-Scale NATs for Devices Based on Tri-Net IoT. Wireless Algorithms, Systems, and Applications[J]. 2020, https://link.springer.com/chapter/10.1007/978-3-030-59016-1_50.
[77] Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang. Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2019, 1-14, https://doaj.org/article/2ae3f76953494545bfe90dfa314735ae.
[78] 孙利民. 工业互联网安全首要任务是建立安全检查和风险识别能力. 中国战略新兴产业[J]. 2019, 94-96, http://lib.cqvip.com/Qikan/Article/Detail?id=7003117691.
[79] Li Ke, You Jianzhou, Wen Hui, Li Hong, Sun Limin, Arai K, Bhatia R, Kapoor S. Collaborative Intelligence Analysis for Industrial Control Systems Threat Profiling. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2null. 2019, 881: 94-106, [80] 王志豪, 张卫东, 文辉, 朱红松, 尹丽波, 孙利民. IP定位技术研究. 信息安全学报[J]. 2019, 4(3): 34-47, http://lib.cqvip.com/Qikan/Article/Detail?id=7002369083.
[81] Yang, Kai, Li, Qiang, Sun, Limin. Towards automatic fingerprinting of IoT devices in the cyberspace. COMPUTER NETWORKS[J]. 2019, 148: 318-327, http://dx.doi.org/10.1016/j.comnet.2018.11.013.
[82] Wang, Yucheng, Wang, Xu, Zhu, Hongsong, Zhao, Hai, Li, Hong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019null. 2019, 11604: 346-357, [83] 刘烃, 田决, 王稼舟, 吴宏宇, 孙利民, 周亚东, 沈超, 管晓宏. 信息物理融合系统综合安全威胁与防御研究. 自动化学报[J]. 2019, 45(1): 5-24, http://lib.cqvip.com/Qikan/Article/Detail?id=7001387698.
[84] 何云华, 李梦茹, 李红, 孙利民, 肖珂, 杨超. 群智感知应用中基于区块链的激励机制. 计算机研究与发展[J]. 2019, 56(3): 544-554, http://lib.cqvip.com/Qikan/Article/Detail?id=7001418111.
[85] Zheng Yaowen, Davanian Ali, Yin Heng, Song Chengyu, Zhu Hongsong, Su Limin, USENIX Assoc. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUMnull. 2019, 1099-1114, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000063.
[86] Zhou, Ming, Lv, Shichao, Yin, Libo, Chen, Xin, Li, Hong, Sun, Limin, IEEE. SCTM: A Multi-view Detecting Approach Against Industrial Control Systems Attacks. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [87] Wang Xu, Wang Yucheng, Feng Xuan, Zhu Hongsong, Sun Limin, Zou Yuchi, IEEE. IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices. 2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM)null. 2019, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000494803500042.
[88] Feng Xuan, Liao Xiaojing, Wang XiaoFeng, Wang Haining, Li Qiang, Yang Kai, Zhu Hongsong, Sun Limin, USENIX Assoc. Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUMnull. 2019, 887-903, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000051.
[89] Li, Ruinian, Song, Tianyi, Mei, Bo, Li, Hong, Cheng, Xiuzhen, Sun, Limin. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2019, 12(5): 762-771, https://www.webofscience.com/wos/woscc/full-record/WOS:000492430500009.
[90] Mi, Xianghang, Feng, Xuan, Liao, Xiaojing, Liu, Baojun, Wang, XiaoFeng, Qian, Feng, Li, Zhou, Alrwais, Sumayah, Sun, Limin, Liu, Ying, IEEE. Resident Evil: Understanding Residential IP Proxy as a Dark Service. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019)null. 2019, 1185-1201, [91] Yang, Shouguo, Shi, Zhiqiang, Zhang, Guodong, Li, Mingxuan, Ma, Yuan, Sun, Limin, IEEE. Understand Code Style: Efficient CNN-based Compiler Optimization Recognition System. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [92] 肖珂, 戴舜, 何云华, 孙利民. 基于城市监控的自然场景图像的中文文本提取方法. 计算机研究与发展[J]. 2019, 56(7): 1525-1533, http://lib.cqvip.com/Qikan/Article/Detail?id=7002364320.
[93] Li, Ke, Li, Hong, Zhu, Hongsong, Sun, Limin, Wen, Hui, IEEE. Side-Channel Information Leakage of Traffic Data in Instant Messaging. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [94] Sun Yuyan, Sun Limin, Shi Zhiqiang, Yu Wenhao, Ying Huan, Urien P, Piramuthu S. Vulnerability Finding and Firmware Association in Power Grid. PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)null. 2019, [95] Zheng, Yaowen, Song, Zhanwei, Sun, Yuyan, Cheng, Kai, Zhu, Hongsong, Sun, Limin, IEEE. An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [96] Wen, Hui, Zhang, Weidong, Hu, Yan, Hu, Qing, Zhu, Hongsong, Sun, Limin, Biagioni, ES, Zheng, Y, Cheng, S. Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019null. 2019, 11604: 613-621, [97] 游建舟, 张悦阳, 吕世超, 陈新, 尹丽波, 孙利民. 基于数据包分片的工控蜜罐识别方法. 信息安全学报[J]. 2019, 4(3): 83-92, http://lib.cqvip.com/Qikan/Article/Detail?id=7002369086.
[98] 郑尧文, 文辉, 程凯, 宋站威, 朱红松, 孙利民. 物联网设备漏洞挖掘技术研究综述. 信息安全学报[J]. 2019, 4(5): 61-75, http://lib.cqvip.com/Qikan/Article/Detail?id=7100187215.
[99] 徐顺超, 陈永乐, 李志, 孙利民. 物联网设备Web弱口令自动化探测. 计算机工程与设计[J]. 2019, 40(1): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=7001132765.
[100] Yang An, Wang Xiaoshan, Sun Yuyan, Hu Yan, Shi Zhiqiang, Sun Limin, IEEE. Multi-dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)[J]. 2018, [101] Li Qiang, Feng Xuan, Wang Haining, Sun Limin, IEEE. Discovery of Internet of Thing Devices based on Rules. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS)null. 2018, [102] 杨安, 胡堰, 周亮, 郑为民, 石志强, 孙利民. 基于信息流和状态流融合的工控系统异常检测算法. 计算机研究与发展[J]. 2018, 55(11): 2532-2542, http://lib.cqvip.com/Qikan/Article/Detail?id=7000898773.
[103] 李强, 贾煜璇, 宋金珂, 李红, 朱红松, 孙利民. 网络空间物联网信息搜索. 信息安全学报[J]. 2018, 3(5): 38-53, http://lib.cqvip.com/Qikan/Article/Detail?id=676689801.
[104] Li, Qiang, Feng, Xuan, Wang, Haining, Li, Zhi, Sun, Limin, IEEE. Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018)null. 2018, 2537-2545, [105] Chen, Yu, Li, Hong, Ma, Yuan, Shi, Zhiqiang, Sun, Limin, Chellappan, S, Cheng, W, Li, W. Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018)null. 2018, 10874: 53-65, [106] Limin Sun. Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices. USENIX Security '18. 2018, [107] Limin Sun. Mining Human Periodic Behaviors using Mobility Internation and Relative Entropy. Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Date Mining(PAKDD 2018). 2018, [108] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin. Understanding the Usage of Industrial Control System Devices on the Internet. IEEE INTERNET OF THINGS JOURNAL[J]. 2018, 5(3): 2178-2189, http://dx.doi.org/10.1109/JIOT.2018.2826558.
[109] 王迁, 杨明祥, 雷晓辉, 舒坚, 孙利民, 黄雪姝. 基于PSO-SVR的丹江口年径流预报. 南水北调与水利科技[J]. 2018, 16(3): 65-71, http://lib.cqvip.com/Qikan/Article/Detail?id=675818962.
[110] 舒坚, 蒋善东, 孙利民. 表征机会传感网络连通性的方法. 北京邮电大学学报[J]. 2018, 41(1): 59-64, http://lib.cqvip.com/Qikan/Article/Detail?id=675222784.
[111] Wang, Hongtao, Wang, Hongmei, Yi, Feng, Wen, Hui, Li, Gang, Sun, Limin. Context-aware personalized path inference from large-scale GPS snippets. EXPERT SYSTEMS WITH APPLICATIONS[J]. 2018, 91: 78-88, http://dx.doi.org/10.1016/j.eswa.2017.08.027.
[112] Du, Suguo, Li, Xiaolong, Zhong, Jinli, Zhou, Lu, Xue, Minhui, Zhu, Haojin, Sun, Limin. Modeling Privacy Leakage Risks in Large-Scale Social Networks. IEEE ACCESS[J]. 2018, 6: 17653-17665, https://doaj.org/article/0fefefca21664f72a4852ca6b71cafff.
[113] Hu, Yan, Yang, An, Li, Hong, Sun, Yuyan, Sun, Limin. A survey of intrusion detection on industrial control systems. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 14(8): [114] Zhang Weidong, Chen Yu, Li Hong, Li Zhi, Sun Limin, IEEE. PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2018, [115] Liu Junjiao, Yin Libo, Hu Yan, Lv Shichao, Sun Limin, IEEE. A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2018, [116] Liu Qi, Li Hong, Hu Yan, Sun Limin, IEEE. A Check-in System Leveraging Face Recognition. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGYnull. 2018, 412-418, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00095.
[117] Hu, Chunqiang, Yu, Jiguo, Cheng, Xiuzhen, Tian, Zhi, Akkaya, Kemal, Sun, Limin. CP_ABSC: AN ATTRIBUTE-BASED SIGNCRYPTION SCHEME TO SECURE MULTICAST COMMUNICATIONS IN SMART GRIDS. MATHEMATICAL FOUNDATIONS OF COMPUTING[J]. 2018, 1(1): 77-100, [118] Cheng, Kai, Li, Qiang, Wang, Lei, Chen, Qian, Zheng, Yaowen, Sun, Limin, Liang, Zhenkai, IEEE. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN)null. 2018, 430-441, [119] Yang An, Sun Limin, Shi Zhiqiang, Zheng Weimin, Sun Yuyan, Hu Yan, IEEE. SBSD: Detecting the Sequence Attack through Sensor Data in ICSs. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2018, [120] 陈昱, 刘中金, 赵威威, 马原, 石志强, 孙利民. 一种大规模的跨平台同源二进制文件检索方法. 计算机研究与发展[J]. 2018, 55(7): 1498-1507, http://lib.cqvip.com/Qikan/Article/Detail?id=676015048.
[121] Jia, Yuxuan, Han, Bing, Li, Qiang, Li, Hong, Sun, Limin. Who owns Internet of Thing devices?. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2018, 14(11): [122] Zhang Weidong, Li Hong, Wen Hui, Zhu Hongsong, Sun Limin, IEEE. A graph neural network based efficient firmware information extraction method for IoT devices. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2018, [123] Li Qizhen, Gao Jie, Wen Jinming, Tang Xiaohu, Zhao Lian, Sun Limin, IEEE. SMDP-based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGYnull. 2018, 268-273, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00074.
[124] 张光华, 庞少博, 张玉清, 孙利民. 云环境下基于静态博弈的信任等级模型研究. 北京理工大学学报[J]. 2018, 38(1): 96-101, http://lib.cqvip.com/Qikan/Article/Detail?id=674636135.
[125] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, USENIX Assoc. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUMnull. 2018, 327-341, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485139900020.
[126] He, Yunhua, Li, Hong, Cheng, Xiuzhen, Liu, Yan, Yang, Chao, Sun, Limin. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE ACCESS[J]. 2018, 6: 27324-27335, https://doaj.org/article/95bfd085d9b44e0b8cff8df1a490d768.
[127] Wang, Hao, Chen, Liangyin, Liu, Shijia, Fu, Songtao, Luo, Qian, Yin, Feng, Sun, Limin, Li, Zhanghua. Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks. JOURNAL OF SENSORS[J]. 2017, 2017: https://doaj.org/article/748d48fc27924491b131dda6409247eb.
[128] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. CovertMIMO: A Covert Uplink Transmission Scheme for MIMO Systems. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2017, [129] Xiao, Liang, Chen, Tianhua, Han, Guoan, Zhuang, Weihua, Sun, Limin. Game Theoretic Study on Channel-Based Authentication in MIMO Systems. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2017, 66(8): 7474-7484, https://www.webofscience.com/wos/woscc/full-record/WOS:000407686300068.
[130] 张书钦, 李凯江, 郭倩倩, 孙利民, 石志强. 工业控制网络安全脆弱性分析技术研究. 中原工学院学报[J]. 2017, 28(6): 63-69, http://lib.cqvip.com/Qikan/Article/Detail?id=674230076.
[131] Li, Qiang, Feng, Xuan, Wang, Haining, Sun, Limin, ACM. Automatically Discovering Surveillance Devices in the Cyberspace. PROCEEDINGS OF THE 8TH ACM MULTIMEDIA SYSTEMS CONFERENCE (MMSYS'17)null. 2017, 331-342, http://dx.doi.org/10.1145/3083187.3084020.
[132] Zhang, Lin, Li, Hong, Sun, Limin, Shi, Zhiqiang, He, Yunhua, IEEE. POSTER: Towards Fully Distributed User Authentication with Blockchain. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC)null. 2017, 202-203, http://dx.doi.org/10.1109/PAC.2017.28.
[133] Lv, Shichao, Xiao, Liang, Hu, Qing, Wang, Xiaoshan, Hu, Changzhen, Sun, Limin, IEEE. Anti-jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [134] Nan, Yuhong, Yang, Zhemin, Yang, Min, Zhou, Shunfan, Zhang, Yuan, Gu, Guofei, Wang, Xiaofeng, Sun, Limin. Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2017, 12(3): 647-661, https://www.webofscience.com/wos/woscc/full-record/WOS:000394666300007.
[135] Wang, Hongtao, Wen, Hui, Yi, Feng, Zhu, Hongsong, Sun, Limin. Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. SENSORS[J]. 2017, 17(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000398818700123.
[136] Lu, Xiang, Tu, Linlin, Zhou, Xinyun, Xiong, Naixue, Sun, Limin. ViMediaNet: an emulation system for interactive multimedia based telepresence services. JOURNAL OF SUPERCOMPUTING[J]. 2017, 73(8): 3562-3578, https://www.webofscience.com/wos/woscc/full-record/WOS:000406215500014.
[137] Yi, Feng, Gu, Yu, Wang, Hongtao, Sun, Yuyan, Sun, Limin, IEEE. Mobility Pattern based Relationship Inference from Spatiotemporal Data. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [138] Yi Feng, Li Hong, Wang Hongtao, Wen Hui, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 871-876, [139] 程冬梅, 严彪, 文辉, 孙利民. 基于规则匹配的分布式工控入侵检测系统设计与实现. 信息网络安全[J]. 2017, 45-51, http://lib.cqvip.com/Qikan/Article/Detail?id=672608923.
[140] Wang, Zhihao, Chen, Yongle, Wen, Hui, Zhao, Lian, Sun, Limin, IEEE. Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL)null. 2017, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000428141601091.
[141] 任春林, 谷雨, 崔杰, 刘松, 朱红松, 孙利民. 基于WEB信息的特定类型物联网终端识别方法. 通信技术[J]. 2017, 50(5): 1003-1009, http://lib.cqvip.com/Qikan/Article/Detail?id=672259108.
[142] He Yunhua, Li Hong, Cheng Xiuzhen, Liu Yan, Sun Limin, Ma L, Khreishah A, Zhang Y, Yan M. A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 457-468, [143] Hu Qing, Lv Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang, Ma L, Khreishah A, Zhang Y, Yan M. Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 326-337, [144] Wang, Xiaoshan, Liu, Yao, Lu, Xiang, Lv, Shichao, Shi, Zhiqiang, Sun, Limin, IEEE. On Eavesdropping Attacks and Countermeasures for MU-MIMO Systems. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM)null. 2017, 40-45, [145] Li, Qiang, Feng, Xuan, Zhao, Lian, Sun, Limin. A Framework for Searching Internet-Wide Devices. IEEE NETWORK[J]. 2017, 31(6): 101-107, http://dx.doi.org/10.1109/MNET.2017.1700034.
[146] Yi Feng, Li Zhi, Wang Hongtao, Zheng Weimin, Sun Limin, Li G, Ge Y, Zhang Z, Jin Z, Blumenstein M. MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017)null. 2017, 10412: 432-444, [147] Yi, Feng, Li, Hong, Wang, Hongtao, Sun, Limin. Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2017, https://doaj.org/article/8f12121d6fbf4daabb0bed8bf92d3269.
[148] Wang, Hongtao, Li, Qiang, Yi, Feng, Li, Zhi, Sun, Limin. Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, http://dx.doi.org/10.1186/s13638-016-0606-4.
[149] Lv, Shichao, Lu, Xiang, Lu, Zhu, Wang, Xiaoshan, Wang, Ning, Sun, Limin, IEEE. Zero Reconciliation Secret Key Extraction in MIMO Backscatter Wireless Systems. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2016, http://dx.doi.org/10.1109/ICC.2016.7510987.
[150] Li, Qiang, Han, Qi, Sun, Limin. Collaborative Recognition of Queuing Behavior on Mobile Phones. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2016, 15(1): 60-73, https://www.webofscience.com/wos/woscc/full-record/WOS:000365990700005.
[151] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS:—种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 53(10): 2288-2298, http://lib.cqvip.com/Qikan/Article/Detail?id=7000068576.
[152] Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng. Achieving Privacy Preservation in WiFi Fingerprint-Based Localization. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications : Volume 3 of 3 Pages 1905-2866.. 2016, 2337-2345, [153] Feng, Xuan, Li, Qiang, Han, Qi, Zhu, Hongsong, Liu, Yan, Sun, Limin, IEEE. Identification of Visible Industrial Control Devices at Internet Scale. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2016, http://dx.doi.org/10.1109/ICC.2016.7511426.
[154] Li, Yi, Zhou, Lu, Zhu, Haojin, Sun, Limin. Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks. IEEE INTERNET OF THINGS JOURNAL[J]. 2016, 3(4): 563-571, https://www.webofscience.com/wos/woscc/full-record/WOS:000381470400013.
[155] Yang, Weidong, He, Yunhua, Sun, Limin, Lu, Xiang, Li, Xinghua. An optimal query strategy for protecting location privacy in location-based services. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2016, 9(4): 752-761, https://www.webofscience.com/wos/woscc/full-record/WOS:000377468100012.
[156] Li Hong, Zhang Cheng, He Yunhua, Cheng Xiuzhen, Liu Yan, Sun Limin, Yang Q, Yu W, Challal Y. An Enhanced Structure-Based De-anonymization of Online Social Networks. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016null. 2016, 9798: 331-342, [157] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. Characterizing Industrial Control System Devices on the Internet. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2016, [158] Zhao, Qinglin, Sakurai, Taka, Yu, Jiguo, Sun, Limin. Maximizing the stable throughput of high-priority traffic for wireless cyber-physical systems. EURASIPJOURNALONWIRELESSCOMMUNICATIONSANDNETWORKING[J]. 2016, https://www.webofscience.com/wos/woscc/full-record/WOS:000391597400001.
[159] Li, Shujun, Li, Hong, Sun, Limin. Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2016, http://dx.doi.org/10.1186/s13638-016-0624-2.
[160] 杨安, 孙利民, 王小山, 石志强. 工业控制系统入侵检测技术综述. 计算机研究与发展[J]. 2016, 53(9): 2039-2054, http://lib.cqvip.com/Qikan/Article/Detail?id=669858996.
[161] 黄伟武, 闫兆腾, 朱红松, 孙利民. 网络扫描发包速率学习算法. 信息安全与通信保密[J]. 2016, 110-114, http://lib.cqvip.com/Qikan/Article/Detail?id=668364925.
[162] Wei, Liangxiong, Zhou, Beisi, Ma, Xichu, Chen, Dexin, Zhang, Jingyu, Peng, Jian, Luo, Qian, Sun, Limin, Li, Dingcheng, Chen, Liangyin. Lightning: A High-Efficient Neighbor Discovery Protocol for Low Duty Cycle WSNs. IEEE COMMUNICATIONS LETTERS[J]. 2016, 20(5): 966-969, https://www.webofscience.com/wos/woscc/full-record/WOS:000376516000033.
[163] Zheng Yaowen, Cheng Kai, Li Zhi, Pan Shiran, Zhu Hongsong, Sun Limin, Lam KY, Chi CH, Qing S. A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016null. 2016, 9977: 27-36, [164] 常青, 刘中金, 王猛涛, 陈昱, 石志强, 孙利民. VDNS: 一种跨平台的固件漏洞关联算法. 计算机研究与发展[J]. 2016, 53(10): 2287-2297, https://crad.ict.ac.cn/cn/article/doi/10.7544/issn1000-1239.2016.20160442.
[165] Feng, Xuan, Li, Qiang, Wang, Haining, Sun, Limin, IEEE. ASCEND: A Search Engine for Online Industrial Control Devices. 2016 IEEE 24TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2016, [166] He, Zaobo, Cai, Zhipeng, Han, Qilong, Tong, Weitian, Sun, Limin, Li, Yingshu. An energy efficient privacy-preserving content sharing scheme in mobile social networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2016, 20(5): 833-846, http://dx.doi.org/10.1007/s00779-016-0952-6.
[167] Li Hong, He Yunhua, Sun Limin, Cheng Xiuzhen, Yu Jiguo, IEEE. Side-Channel Information Leakage of Encrypted Video Stream in Video Surveillance Systems. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONSnull. 2016, [168] Wen Hui, Ge Shiming, Chen Shuixian, Wang Hongtao, Sun Limin, IEEE. Abnormal Event Detection via Adaptive Cascade Dictionary Learning. 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP)null. 2015, 847-851, [169] 孙玉砚, 孙利民, 朱红松, 周新运. 基于车牌识别系统车辆轨迹的行为异常检测. 计算机研究与发展[J]. 2015, 52(8): 1921-1929, http://lib.cqvip.com/Qikan/Article/Detail?id=665742497.
[170] Chen Shuixian, Lu Xiang, Sun Limin, Ge Shiming, IEEE. Target Domain Adaptation for Face Detection in A Smart Camera Network with Peer-to-Peer Communications. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)null. 2015, [171] Jin Yongming, Zhu Hongsong, Shi Zhiqiang, Lu Xiang, Sun Limin, IEEE. Cryptanalysis and Improvement of two RFID-OT Protocols Based on Quadratic Residues. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2015, 7234-7239, [172] 蔡青松, 刘燕, 牛建伟, 孙利民. 一种关注消息时效性的机会社会网络中节点传播能力分析模型. 电子学报[J]. 2015, 43(9): 1705-1713, http://lib.cqvip.com/Qikan/Article/Detail?id=666434163.
[173] Wen, Hong, Tang, Jie, Wu, Jinsong, Song, Huanhuan, Wu, Tingyong, Wu, Bin, Ho, PinHan, Lv, ShiChao, Sun, LiMin. A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING[J]. 2015, 3(1): 119-126, https://www.webofscience.com/wos/woscc/full-record/WOS:000209844700012.
[174] Luan, Tom H, Shen, Xuemin Sherman, Bai, Fan, Sun, Limin. Feel Bored? Join Verse! Engineering Vehicular Proximity Social Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 64(3): 1120-1131, https://www.webofscience.com/wos/woscc/full-record/WOS:000351459600022.
[175] Xie Kaixuan, Ge Shiming, Yang Rui, Lu Xiang, Sun Limin, Zha H, Chen X, Wang L, Miao Q. Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. COMPUTER VISION, CCCV 2015, PT Inull. 2015, 546: 249-257, [176] Li, Zhi, Liu, Yan, Zhu, Hongsong, Sun, Limin. Coff: Contact- Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2015, 64(11): 5257-5268, https://www.webofscience.com/wos/woscc/full-record/WOS:000365016700030.
[177] Li, Liqun, Sun, Limin, Xing, Guoliang, Huangfu, Wei, Zhou, Ruogu, Zhu, Hongsong. ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2015, 14(10): https://www.webofscience.com/wos/woscc/full-record/WOS:000360744700012.
[178] 王小山, 杨安, 石志强, 孙利民. 工业控制系统信息安全新趋势. 信息网络安全[J]. 2015, 6-11, http://lib.cqvip.com/Qikan/Article/Detail?id=663556222.
[179] Gao Shanyan, Zhu Hongsong, Zhou Xinyun, Liu Yan, Sun Limin, Sun L, Ma H, Fang D, Niu J, Wang W. Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture. ADVANCES IN WIRELESS SENSOR NETWORKSnull. 2015, 501: 568-582, [180] Li, Hong, He, Yunhua, Cheng, Xiuzhen, Zhu, Hongsong, Sun, Limin. Security and Privacy in Localization for Underwater Sensor Networks. IEEE COMMUNICATIONS MAGAZINE[J]. 2015, 53(11): 56-62, https://www.webofscience.com/wos/woscc/full-record/WOS:000364972000010.
[181] 杨红, 朱红松, 孙利民. B-RPL:低存储开销的RPL路由协议. 计算机科学[J]. 2015, 42(1): 96-100, http://lib.cqvip.com/Qikan/Article/Detail?id=663510087.
[182] Wei, Yu, Yan, Hongli, Bie, Rongfang, Wang, Shenling, Sun, Limin. Performance monitoring and evaluation in dance teaching with mobile sensing technology. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 18(8): 1929-1939, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200013.
[183] 吴子珺, 于重重, 孙利民, 孙玉砚. 一种针对特定车辆潜在群体的行驶轨迹预测方法. 计算机应用研究[J]. 2014, 31(7): 1951-1955, http://lib.cqvip.com/Qikan/Article/Detail?id=50158715.
[184] 何鹏, 阎保平, 李志, 孙利民. CM-MAC:一种基于分簇的多信道车载网MAC协议. 计算机研究与发展[J]. 2014, 51(3): 502-510, http://lib.cqvip.com/Qikan/Article/Detail?id=48799053.
[185] Yang, Weidong, Liu, Wei, Li, Pan, Sun, Limin. TDMA-Based Control Channel Access for IEEE 802.11p in VANETs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 10: https://doaj.org/article/4d8815e01316407a8d05406a20352ef6.
[186] Han, Yibo, Tang, Jine, Zhou, ZhangBing, Xiao, Mingzhong, Sun, Limin, Wang, Qun. Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 18(8): 1989-2001, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200018.
[187] Li, Liqun, Xing, Guoliang, Sun, Limin, Liu, Yan. A Quality-Aware Voice Streaming System for Wireless Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2014, 10(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000339008000008.
[188] Cai, Qingsong, Bai, Yuqing, Sun, Limin, Niu, Jianwei, Niu, J, Shu, L, Zhou, Z. Quantifying Individual Communication Capability in Opportunistic Mobile Social Networks. 2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP)null. 2014, 1-6, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380447700001.
[189] Liu, Wei, Li, Hong, Chen, Yongle, Zhu, Hongsong, Sun, Limin. LARES: latency-reduced neighbour discovery for contagious diseases prevention. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING[J]. 2014, 16(1): 3-13, https://www.webofscience.com/wos/woscc/full-record/WOS:000338418800002.
[190] Guo, Junqi, Xie, Xiaobo, Bie, Rongfang, Sun, Limin. Structural health monitoring by using a sparse coding-based deep learning algorithm with wireless sensor networks. PERSONAL AND UBIQUITOUS COMPUTING[J]. 2014, 18(8): 1977-1987, https://www.webofscience.com/wos/woscc/full-record/WOS:000344812200017.
[191] Di Wu, Xiaojing Wang, Limin Sun, Yan Ling, Dongxia Zhang. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.
[192] He, Yunhua, Sun, Limin, Yang, Weidong, Li, Hong. A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2014, 10: https://doaj.org/article/9d96d4d0a63b45138968bd5897a29609.
[193] Wen Hui, Ge Shiming, Yang Rui, Chen Shuixian, Sun Limin, IEEE. Robust Visual Tracking via Discriminative Sparse Point Matching. PROCEEDINGS OF THE 2014 9TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA)null. 2014, 1243-1246, [194] Wu, Di, Wang, Xiaojing, Sun, Limin, Ling, Yan, Zhang, Dongxia. Identity privacy-based reliable routing method in VANETs. PEER-TO-PEER NETWORKING AND APPLICATIONS[J]. 2014, 7(3): 285-294, http://dx.doi.org/10.1007/s12083-012-0143-9.
[195] Zhang, Yuan, Sun, Limin, Song, Houbing, Cao, Xiaojun. Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects. IEEE INTERNET OF THINGS JOURNAL[J]. 2014, 1(4): 311-318, https://www.webofscience.com/wos/woscc/full-record/WOS:000209672500003.
[196] Xiong, Yongping, Zhou, Ruogu, Li, Minming, Xing, Guoliang, Sun, Limin, Ma, Jian. ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2014, 13(11): 2675-2688, https://www.webofscience.com/wos/woscc/full-record/WOS:000343317500018.
[197] 金永明, 吴棋滢, 石志强, 芦翔, 孙利民. 基于PRF的RFID轻量级认证协议研究. 计算机研究与发展[J]. 2014, 51(7): 1506-1514, http://lib.cqvip.com/Qikan/Article/Detail?id=50300270.
[198] 李平, 孙利民, 吴佳英, 方庆, 谢晋阳, 周博翔. 基于可离散处理的RFID防碰撞混杂算法研究. 通信学报[J]. 2013, 34(8): 10-17, http://lib.cqvip.com/Qikan/Article/Detail?id=46897700.
[199] Li Qiang, Han Qi, Sun Limin, IEEE. Context-aware Handoff on Smartphones. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013)null. 2013, 470-478, [200] Chen, Yongle, Chen, Ci, Zhu, Hongsong, Sun, Limin. Efficient Deterministic Anchor Deployment for Sensor Network Positioning. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/950537e1f14e4f2bbd9cab7aad3893bf.
[201] Zhang, Qinyu, Cao, Bin, Wang, Ye, Zhang, Naitong, Lin, Xiaodong, Sun, Limin. ON EXPLOITING POLARIZATION FOR ENERGY-HARVESTING ENABLED COOPERATIVE COGNITIVE RADIO NETWORKING. IEEE WIRELESS COMMUNICATIONS[J]. 2013, 20(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000324598600017.
[202] Wu, Di, Zhang, Dongxia, Tan, Guozhen, Sun, Limin, Li, Juanjuan, Liu, Jiangchuan. Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/7095cec7979b4b048eb79e68e72ffc90.
[203] Xiao, Fu, Wang, Ruchuan, Sun, Limin, Li, Qun, Zhang, Hongwei, Huang, Liusheng. Selected Papers from "The 6th China Conference of Wireless Sensor Networks". INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/fa832fa3372940518646454436502e11.
[204] Qin, Weijun, Zhang, Jiadi, Li, Bo, Sun, Limin. Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/ae665d8df86749ca9c4d28e40ded8724.
[205] Li, Zhi, Sun, Limin, Zhou, Xinyun. Amortized Fairness for Drive-Thru Internet. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2013, 9: https://doaj.org/article/b770bcc6afad4346aa3274506317a5be.
[206] 孙利民, 刘伟. 对大规模传感器网络应用面临问题的思考. 中兴通讯技术[J]. 2012, 18(2): 10-14, http://lib.cqvip.com/Qikan/Article/Detail?id=41345877.
[207] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.
[208] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.
[209] 周新运, 李志, 李立群, 孙利民. 一种移动容迟网络体系结构及其应用. 计算机研究与发展[J]. 2012, 49(3): 518-528, http://lib.cqvip.com/Qikan/Article/Detail?id=41043886.
[210] 蒋文涛, 孙利民, 吕俊伟, 朱红松. 传感器网络中基于局部信号重建的目标计数算法. 通信学报[J]. 2012, 33(9): 44-52, http://lib.cqvip.com/Qikan/Article/Detail?id=43269893.
[211] Limin Sun. Exploiting Ephemeral Link Correlation for Mobile Wireless Networks. 2012, [212] Li, Liqun, Xing, Guoliang, Han, Qi, Sun, Limin. ASM: Adaptive Voice Stream Multicast over Low-Power Wireless Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2012, 23(4): 626-633, https://www.webofscience.com/wos/woscc/full-record/WOS:000300981100007.
[213] Chen Yongle, Sun Limin, Wang Feng, Zhou Xinyun. Congestion-aware indoor emergency navigation algorithm for wireless sensor networks. GLOBECOM - IEEE GLOBAL TELECOMMUNICATIONS CONFERENCEnull. 2011, http://ir.iscas.ac.cn/handle/311060/16297.
[214] Xiong Yongping, He Wenbo, Chen Canfeng, Ma Jian, Sun Limin. Phoenix: peer-to-peer location based notification in mobile networks. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011null. 2011, 691-696, http://ir.iscas.ac.cn/handle/311060/16247.
[215] Li Liqun, Xing Guoliang, Sun Limin, Huangfu Wei, Zhou Ruogu, Zhu Hongsong. Exploiting fm radio data system for adaptive clock calibration in sensor networks. MOBISYS'11 - COMPILATION PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES AND CO-LOCATED WORKSHOPSnull. 2011, 169-181, http://124.16.136.157/handle/311060/14309.
[216] Ma Li, Liu Jiangchuan, Sun Limin, Karimi Ouldooz Baghban. The trajectory exposure problem in location-aware mobile networking. PROCEEDINGS - 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, MASS 2011null. 2011, 7-12, http://ir.iscas.ac.cn/handle/311060/16270.
[217] Xing, Guoliang, Wang, Jianping, Yuan, Zhaohui, Tan, Rui, Sun, Limin, Huang, Qingfeng, Jia, Xiaohua, So, Hing Cheung. Mobile Scheduling for Spatiotemporal Detection in Wireless Sensor Networks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2010, 21(12): 1851-1866, https://www.webofscience.com/wos/woscc/full-record/WOS:000283559800011.
[218] Zhou, Ruogu, Xiong, Yongping, Xing, Guoliang, Sun, Limin, Ma, Jian, ACM. ZiFi: Wireless LAN Discovery via ZigBee Interference Signatures. MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTINGnull. 2010, 49-60, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000332847500005.
[219] Li Liqun, 孙利民. Seer: trend-prediction-based geographic message forwarding in sparse vehicular networks. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONSnull. 2010, http://124.16.136.157/handle/311060/8896.
[220] Li Liqun, Xing Guoliang, Sun Limin, Liu Yan. QVS: Quality-aware Voice Streaming for Wireless Sensor Networks. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMSnull. 2009, 450-+, [221] 熊永平, 孙利民, 牛建伟, 刘燕. 机会网络. 软件学报[J]. 2009, 124-137, http://lib.cqvip.com/Qikan/Article/Detail?id=29337262.
[222] Huangfu Wei, Duan Bin, Sun Limin, Chen Canfeng, Ma Jian. Thta: triangle-shaped hierarchy aggregation time allocation algorithm for wireless sensor network. IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNCnull. 2008, 2397-2402, http://124.16.136.157/handle/311060/10498.
[223] Bi, Yanzhong, Li, Na, Sun, Limin. DAR: An energy-balanced data-gathering scheme for wireless sensor networks. COMPUTER COMMUNICATIONS[J]. 2007, 30(14-15): 2812-2825, http://dx.doi.org/10.1016/j.comcom.2007.05.021.
[224] Kai Yang, Xiaodong Lin, Limin Sun. CShield: Enabling code privacy for Cyber-Pysical systems. FUTURE GENERATION COMPUTER SYSTEMS. http://dx.doi.org/10.1016/j.future.2021.06.051.
[225] Yan Hu, Hong Li, Tom H Luan, An Yang, Limin Sun, Zhiliang Wang, Rui Wang. Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. FUTURE GENERATION COMPUTER SYSTEMS. http://dx.doi.org/10.1016/j.future.2018.07.027.
发表著作
(1) 移动IP, Mobile IP Technology, 电子工业出版社, 2003-07, 第 1 作者
(2) 无线传感器网络, Wireless Sensor Networks, 清华大学, 2005-05, 第 1 作者
(3) VANET车载网技术与应用, Vehicular Applications and Inter-Networking Technologies, 清华大学出版社, 2013-03, 第 1 作者
(4) 无线传感器网络基础-理论和实践, Fundamentals of Wireless Sensor Networks, 清华大学, 2014-01, 第 1 作者
(5) 美国关键基础设施安全防护体系与策略, 清华大学出版社, 2017-12, 第 1 作者
(6) 无线传感器网络: 理论及应用, Wireless Sensor Networks Theory and Applications, 清华大学出版社, 2018-08, 第 1 作者
(7) 车联网技术, 清华大学出版社, 2021-05, 第 1 作者

科研活动

   
科研项目
( 1 ) 移动容迟网络理论与关键技术研究, 负责人, 国家任务, 2011-01--2014-12
( 2 ) 物联网的基础理论与实践研究-物联网的异构融合和自治机理研究, 负责人, 国家任务, 2011-01--2013-12
( 3 ) 城市公共安全创新应用研究与示范, 负责人, 中国科学院计划, 2012-01--2016-12
( 4 ) 物联网位置隐私保护的关键技术研究, 负责人, 国家任务, 2015-01--2018-12
( 5 ) 脆弱性分析与威胁态势感知技术和验证, 负责人, 国家任务, 2016-07--2019-09
( 6 ) 面向电力工控系统的攻击仿真验证技术研究, 负责人, 企业委托, 2017-01--2018-12
( 7 ) 智能电网信息安全纵深防护关键技术, 负责人, 国家任务, 2018-01--2021-12
( 8 ) 关键基础设施信息安全研究现状、趋势调研及发展建议, 负责人, 国家任务, 2019-01--2019-12
( 9 ) 工业控制系统内置式主动防御技术研究, 负责人, 中国科学院计划, 2018-07--2023-06
( 10 ) 安全防护技术研究, 负责人, 国家任务, 2021-01--2023-12
( 11 ) 面向工业互联网可证明安全的身份认证技术研究, 负责人, 地方任务, 2022-01--2023-12

指导学生

已指导学生

王海东  硕士研究生  081203-计算机应用技术  

孙玉砚  硕士研究生  081203-计算机应用技术  

张友波  硕士研究生  081203-计算机应用技术  

刘俊涛  硕士研究生  081203-计算机应用技术  

颜庭莘  硕士研究生  081203-计算机应用技术  

段斌  硕士研究生  081203-计算机应用技术  

李波  硕士研究生  081203-计算机应用技术  

李立群  博士研究生  081220-信息安全  

陈永乐  博士研究生  081220-信息安全  

赵忠华  博士研究生  081220-信息安全  

孙玉砚  博士研究生  081220-信息安全  

刘伟  博士研究生  081220-信息安全  

杨红  硕士研究生  081220-信息安全  

张慧超  硕士研究生  081220-信息安全  

李志  博士研究生  081220-信息安全  

李强  博士研究生  081220-信息安全  

齐良  硕士研究生  430112-计算机技术  

文辉  博士研究生  081220-信息安全  

刘玉红  硕士研究生  085211-计算机技术  

李红  博士研究生  0812Z1-信息安全  

刘庆昊  硕士研究生  085211-计算机技术  

姚尧  硕士研究生  085211-计算机技术  

姜舟  硕士研究生  085212-软件工程  

张文  硕士研究生  085212-软件工程  

刘庆超  硕士研究生  085212-软件工程  

陈玉成  硕士研究生  085211-计算机技术  

吕世超  博士研究生  0812Z1-信息安全  

张卫东  博士研究生  0812Z1-信息安全  

张晨  硕士研究生  081203-计算机应用技术  

田莹莹  硕士研究生  085208-电子与通信工程  

宋烨青  硕士研究生  085211-计算机技术  

涂琳琳  硕士研究生  085212-软件工程  

江再伟  硕士研究生  085212-软件工程  

王志豪  博士研究生  081001-通信与信息系统  

游建舟  博士研究生  081001-通信与信息系统  

李科  博士研究生  081001-通信与信息系统  

严彪  硕士研究生  081001-通信与信息系统  

杨安  博士研究生  0812Z1-信息安全  

易锋  博士研究生  0812Z1-信息安全  

王洪涛  博士研究生  081202-计算机软件与理论  

黄伟武  硕士研究生  0812Z1-信息安全  

郑尧文  博士研究生  083900-网络空间安全  

余文豪  硕士研究生  085211-计算机技术  

程凯  博士研究生  083900-网络空间安全  

丰轩  博士研究生  083900-网络空间安全  

常丽娟  硕士研究生  085211-计算机技术  

牛月晗  硕士研究生  085211-计算机技术  

陈子琦  硕士研究生  085208-电子与通信工程  

周明  博士研究生  083900-网络空间安全  

丁振全  博士研究生  083900-网络空间安全  

张悦阳  硕士研究生  085211-计算机技术  

牛梦瑶  硕士研究生  085211-计算机技术  

刘明东  硕士研究生  085211-计算机技术  

刘俊矫  博士研究生  083900-网络空间安全  

杨锴  博士研究生  083900-网络空间安全  

孙嘉伟  博士研究生  083900-网络空间安全  

白双朋  硕士研究生  083900-网络空间安全  

董浩阳  硕士研究生  085211-计算机技术  

孙怡亭  硕士研究生  085211-计算机技术  

王荟昭  硕士研究生  085211-计算机技术  

刘宸睿  硕士研究生  083900-网络空间安全  

丁云杰  硕士研究生  085400-电子信息  

王希玥  硕士研究生  085412-网络与信息安全  

现指导学生

方栋梁  博士研究生  083900-网络空间安全  

辛明峰  博士研究生  083900-网络空间安全  

孙越  博士研究生  083900-网络空间安全  

邓立廷  博士研究生  083900-网络空间安全  

刘圃卓  博士研究生  083900-网络空间安全  

董超鹏  博士研究生  083900-网络空间安全  

林迦密  博士研究生  083900-网络空间安全  

秦川  博士研究生  083900-网络空间安全  

马叶桐  博士研究生  083900-网络空间安全  

刘亚鑫  博士研究生  083900-网络空间安全  

孙梦杰  博士研究生  083900-网络空间安全  

斯琴  博士研究生  083900-网络空间安全  

郑春阳  博士研究生  083900-网络空间安全  

李大辉  博士研究生  083900-网络空间安全  

宋站威  博士研究生  083900-网络空间安全  

王允成  博士研究生  083900-网络空间安全  

屈义博  博士研究生  083900-网络空间安全  

张逢时  博士研究生  083900-网络空间安全  

程嘉兴  博士研究生  083900-网络空间安全  

张杰  博士研究生  083900-网络空间安全  

陈晓惠  博士研究生  083900-网络空间安全  

陈新  博士研究生  083900-网络空间安全  

郗来乐  硕士研究生  083900-网络空间安全  

张洋  硕士研究生  083900-网络空间安全  

关星茂  博士研究生  083900-网络空间安全  

石丁燚  博士研究生  083900-网络空间安全  

谷中尉  博士研究生  083900-网络空间安全  

周沁  博士研究生  083900-网络空间安全  

董诗泉  博士研究生  083900-网络空间安全  

刘明东  博士研究生  083900-网络空间安全  

付家乐  硕士研究生  085400-电子信息  

白明强  硕士研究生  083900-网络空间安全  

魏子淇  硕士研究生  083900-网络空间安全  

党经天  硕士研究生  083900-网络空间安全  

李泽东  博士研究生  083900-网络空间安全