发表论文
(1) CD-Net: Robust mobile traffic classification against apps updating, COMPUTERS & SECURITY, 2025, 第 3 作者 通讯作者(2) A Poisson Game-Based Incentive Mechanism for Federated Learning in Web 3.0, IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 第 4 作者(3) A Blockchain-based carbon emission security accounting scheme, COMPUTER NETWORKS, 2024, 第 6 作者(4) Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification, IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 第 3 作者(5) A Robust joint coverless image steganography scheme based on two independent modules, CYBERSECURITY, 2024, 第 2 作者 通讯作者(6) A Practical Data Trading Protocol for Sudoku Solutions, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 第 2 作者 通讯作者(7) 能源区块链的跨链服务安全技术研究进展, Research Progress on Security Technology for Cross-Chain Service of Energy Blockchain, 计算机研究与发展, 2024, 第 4 作者(8) Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA, IEEE INTERNET OF THINGS JOURNAL, 2023, 第 3 作者 通讯作者(9) 深度学习模型的后门攻击研究综述, Backdoor Attack on Deep Learning Models:A Survey, 计算机科学, 2023, 第 2 作者 通讯作者(10) DLP: towards active defense against backdoor attacks with decoupled learning process, CYBERSECURITY, 2023, 第 2 作者 通讯作者(11) NBA: defensive distillation for backdoor removal via neural behavior alignment, CYBERSECURITY, 2023, 第 2 作者 通讯作者(12) BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles, JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 第 2 作者 通讯作者(13) A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment, IEEE INTERNET OF THINGS JOURNAL, 2023, 第 3 作者(14) A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain, IEEE INTERNET OF THINGS JOURNAL, 2022, 第 3 作者 通讯作者(15) Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain, ISPA/BDCloud/SocialCom/SustainCom, 2021, 第 3 作者(16) DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection, 2021 International Joint Conference on Neural Networks (IJCNN 2021), 2021, 第 5 作者 通讯作者(17) RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 第 5 作者(18) Achieving low-entropy secure cloud data auditing with file and authenticator deduplication, INFORMATION SCIENCES, 2021, 第 7 作者(19) A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain, IEEE INTERNET OF THINGS JOURNAL, 2021, 第 3 作者(20) Cross-chain Trusted Service Quality Computing Scheme For Multi-chain Model-based 5G Network Slicing SLA, IEEE INTERNET OF THINGS JOURNAL, 2021, 第 3 作者(21) Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening, The 25th European Symposium on Research in Computer Security(ESORICS 2020) 欧洲系统安全顶级会议, 2020, 第 2 作者 通讯作者(22) 面向无载体信息隐藏的映射关系智能搜索方法, An intelligent search method of mapping relation for coverless information hiding, 信息安全学报, 2020, 第 2 作者 通讯作者(23) 基于Attention-Bi-LSTM的微博评论情感分析研究, Attention-Bi-LSTM Based Analysis of Weibo Comments, 计算机科学与应用, 2020, 第 3 作者(24) Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 第 4 作者(25) Linear Attack on Round-Reduced DES Using Deep Learning, ESORICS 2020, 2020, 第 4 作者 通讯作者(26) Cloning Vulnerability Detection in Driver Layer of IoT Devices, INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 第 2 作者 通讯作者(27) A Behavior-based Covert Channel Based on GPS Deception for Smart Mobile Devices, ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019, 第 1 作者 通讯作者(28) Comment Spam Detection via Effective Features Combination, ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019, 第 2 作者 通讯作者(29) Text Image Deblurring via Intensity Extremums Prior, MULTIMEDIA MODELING, MMM 2018, PT I, 2018, 第 2 作者 通讯作者(30) Anomaly User Detection via Comprehensive Keystroke Features Optimization, 2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018, 第 2 作者 通讯作者(31) 面向代理重加密算法的程序设计语言研究, Research on the programming language for proxy re-encryption, 通信学报, 2018, 第 3 作者 通讯作者(32) Robust Steganography via Patch-based Texture Synthesis, The 9th International Conference on Internet Multimedia Computing and Service (ICIMCS 2017), 2017, 第 1 作者 通讯作者(33) Motion vector reversion-based steganalysis revisited, 2015 IEEE China Summit and International Conference on Signal and Information Processing, 2015, (34) Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015, 第 5 作者(35) 访问控制系统防隐私泄露证明方案, 计算机学报(已录用), 2013, 第 1 作者(36) 多域环境下基于属性的授权委托模型, Attribute-Based Authorization Delegation Model in Multi-Domain Environments, 软件学报, 2011, 第 1 作者(37) Privacy preserving of trust management credentials based on trusted computing, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), 2010, 第 1 作者