发表论文
(1) 深度学习模型的后门攻击研究综述, Backdoor Attack on Deep Learning Models:A Survey, 计算机科学, 2023, 通讯作者(2) DLP: towards active defense against backdoor attacks with decoupled learning process, CYBERSECURITY, 2023, 通讯作者(3) BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles, JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 通讯作者(4) Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain, ISPA/BDCloud/SocialCom/SustainCom, 2021, 第 3 作者(5) DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection, 2021 International Joint Conference on Neural Networks (IJCNN 2021), 2021, 通讯作者(6) RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 第 5 作者(7) Achieving low-entropy secure cloud data auditing with file and authenticator deduplication, INFORMATION SCIENCES, 2021, 第 7 作者(8) A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain, IEEE INTERNET OF THINGS JOURNAL, 2021, 第 3 作者(9) Cross-chain Trusted Service Quality Computing Scheme For Multi-chain Model-based 5G Network Slicing SLA, IEEE INTERNET OF THINGS JOURNAL, 2021, 第 3 作者(10) Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening, The 25th European Symposium on Research in Computer Security(ESORICS 2020) 欧洲系统安全顶级会议, 2020, 通讯作者(11) 面向无载体信息隐藏的映射关系智能搜索方法, An intelligent search method of mapping relation for coverless information hiding, 信息安全学报, 2020, 第 2 作者(12) 基于Attention-Bi-LSTM的微博评论情感分析研究, Attention-Bi-LSTM Based Analysis of Weibo Comments, 计算机科学与应用, 2020, 第 3 作者(13) Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 第 4 作者(14) Linear Attack on Round-Reduced DES Using Deep Learning, ESORICS 2020, 2020, 通讯作者(15) Cloning Vulnerability Detection in Driver Layer of IoT Devices, INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 通讯作者(16) A Behavior-based Covert Channel Based on GPS Deception for Smart Mobile Devices, ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019, 通讯作者(17) Comment Spam Detection via Effective Features Combination, ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019, 通讯作者(18) Text Image Deblurring via Intensity Extremums Prior, MULTIMEDIA MODELING, MMM 2018, PT I, 2018, 通讯作者(19) Anomaly User Detection via Comprehensive Keystroke Features Optimization, 2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018, 通讯作者(20) 面向代理重加密算法的程序设计语言研究, Research on the programming language for proxy re-encryption, 通信学报, 2018, 第 3 作者(21) Robust Steganography via Patch-based Texture Synthesis, The 9th International Conference on Internet Multimedia Computing and Service (ICIMCS 2017), 2017, 通讯作者(22) Motion vector reversion-based steganalysis revisited, 2015 IEEE China Summit and International Conference on Signal and Information Processing, 2015, (23) Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015, 第 5 作者(24) 访问控制系统防隐私泄露证明方案, 计算机学报(已录用), 2013, 第 1 作者(25) 多域环境下基于属性的授权委托模型, Attribute-Based Authorization Delegation Model in Multi-Domain Environments, 软件学报, 2011, 第 1 作者(26) Privacy preserving of trust management credentials based on trusted computing, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), 2010, 第 1 作者