发表论文
[1] 郑超, 王利明, 徐震, 李宏佳. Mutual Information Based Noise Scale Optimization for Gradient Leakage Resistant Federated Learning. 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2024, 第 3 作者https://ieeexplore.ieee.org/document/10447749.[2] Zhou, Qihui, Ruan, Qianyun, 霍冬冬, Lv, Penghui, Wang, Yu, Xu, zhen. The malicious resource consumption detection in permissioned blockchain based on traffic analysis. CSCWD. 2023, 第 6 作者[3] 宋晨, 王利明, 徐震, 李宏佳. 面向软件定义卫星网络的协同接入认证机制. 信息安全学报[J]. 2023, 第 3 作者8(2): [4] 孙晗, 张妍, 徐震. MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic Encryption. 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2023, 第 3 作者https://ieeexplore.ieee.org/document/10152691.[5] 王建凯, 李宏佳, 王利明, 徐震. Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM. IEEE WCNC 2023. 2023, 第 4 作者[6] 侯雨桥, 王利明, 王宇翔, 徐震, 李宏佳. Semi-Supervised Network Anomaly Detection Via Auto-Regressive Auxiliary Prediction. 2023 IEEE International Conference on Systems, Man and Cybernetics (SMC). 2023, 第 4 作者[7] 邓尧议, 李明轩, 张海龙, 霍冬冬, 张艳秋, 云帅, 王瑜, 徐震. Building Efficient Parallel Endorsement Node on Blockchain Systems. CSCWD. 2023, 第 8 作者[8] 孔凯薇, 霍冬冬, 苏东楠, 徐震. IoT 设备程序同源性智能检测技术综述. 信息安全学报[J]. 2023, 第 4 作者[9] Li, Hongjia, Yang, Chang, Wang, Liming, Ansari, Nirwan, Tang, Ding, Huang, Xueqing, Xu, Zhen, Hu, Dan. A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2023, 第 7 作者22(1): 1-18, [10] Li, Mingxuan, wang, yazhe, ma, shuai, liu, chao, 霍冬冬, wang, yu, 徐震. Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems. VLDB. 2023, 第 7 作者[11] 张云剑, 刘延伟, 刘金霞, Antonios Argyriou, 王利明, 徐震, 季向阳. Perspectively Equivariant Keypoint Learning for Omnidirectional Images. Ieee Transactions on Image Processing[J]. 2023, 第 6 作者32: 2552-2567, [12] 吴在龙, 王利明, 徐震, 李宏佳, 杨婧. GPU虚拟化技术及其安全问题综述. 信息安全学报[J]. 2022, 第 3 作者7(2): 30-58, https://kns.cnki.net/kcms/detail/detail.aspx?dbcode=CJFD&dbname=CJFDLAST2022&filename=XAXB202202003&uniplatform=NZKPT&v=34NnMoFycxGmHt7plsIpeLS2NiYVcId_Qhwdf9NWgu6SVeKonW_cUK8_UEhWMbqM.[13] Fengyu Yang, Yanni Han, Ying Ding, Qian Tan, Zhen Xu. A flexible approach for cyber threat hunting based on kernel audit records. 网络空间安全科学与技术(英文). 2022, 第 5 作者5(3): 74-89, http://lib.cqvip.com/Qikan/Article/Detail?id=7108410660.[14] 张云剑, 刘延伟, 刘金霞, 苗敬博, Antonios Argyriou, 王利明, 徐震. 360-Attack: Distortion-Aware Perturbations from Perspective-Views. IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022, 第 7 作者[15] 张云剑, 刘延伟, 刘金霞, 詹鹏伟, 王利明, 徐震. SP ATTACK: SINGLE-PERSPECTIVE ATTACK FOR GENERATING ADVERSARIAL OMNIDIRECTIONAL IMAGES. 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022). 2022, 第 6 作者[16] 刘畅, 刘延伟, 徐震, 代良. RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs. The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 2022, 第 3 作者[17] 代良, 陈文超, 刘延伟, Antonios Argyriou, 刘畅, 林涛, 王鹏辉, 徐震, 陈勃. Switching Gaussian Mixture Variational RNN for Anomaly Detection of Diverse CDN Websites. The 41st IEEE International Conference on Computer Communications (INFOCOM 2022). 2022, 第 8 作者[18] Zhou, Qihui, Dang, Xianglin, 霍冬冬, Ruan, Qianyun, Li, Chuang, Wang, Yu, Xu, Zhen. LogBlock: An Anomaly Detection Method on Permissioned Blockchain Based on Log-Block Sequence. UIC. 2022, 第 7 作者[19] Chang, Xiaolin, Shi, Yu, Zhang, Zhenjiang, Xu, Zhen, Trivedi, Kishor. Job Completion Time Under Migration-Based Dynamic Platform Technique. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2022, 第 4 作者15(3): 1345-1357, http://dx.doi.org/10.1109/TSC.2020.2989215.[20] 邓启晴, 谭鑫睿, 杨婧, 郑超, 王利明, 徐震. A Secure Container Placement Strategy Using Deep Reinforcement Learning in Cloud. International Conference on Computer Supported Cooperative Work in Design. 2022, 第 6 作者[21] Huo, Dongdong, Cao, Chen, Liu, Peng, Wang, Yazhe, Li, Mingxuan, Xu, Zhen. Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!. Journal of Systems Architecture[J]. 2021, 第 6 作者116: http://dx.doi.org/10.1016/j.sysarc.2021.102114.[22] Li, Mingxuan, Wang, Xiao, Huo, Dongdong, Wang, Han, Liu, Chao, Wang, Yazhe, Wang, Yu, Xu, Zhen. A Novel Trojan Attack against Co-learning Based ASR DNN System. CSCWD. 2021, 第 8 作者907-912, [23] Liu, Yanwei, Liu, Jinxia, Argyriou, Antonios, Ma, Siwei, Wang, Liming, Xu, Zhen. 360-Degree VR Video Watermarking Based on Spherical Wavelet Transform. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS[J]. 2021, 第 6 作者17(1): http://dx.doi.org/10.1145/3425605.[24] Yin Xiang, Han Yanni, Xu Zhen, Liu Jie. VAECGAN: a generating framework for long-term prediction in multivariate time series. CYBERSECURITY[J]. 2021, 第 3 作者4(3): 1-12, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7054607&detailType=1.[25] 蔡宁, 韩言妮, 安伟, 徐震. 分布式SDN控制器放置问题研究. 信息安全学报[J]. 2021, 第 4 作者6(2): 46-72, http://lib.cqvip.com/Qikan/Article/Detail?id=7104256773.[26] 代良, 林涛, 刘畅, 江波, 刘延伟, 徐震, Zhang Zhili. SDFVAE: Static and Dynamic Factorized VAE for Anomaly Detection of Multivariate CDN KPIs. 30th The Web Conference 2021. 2021, 第 6 作者[27] Yin, Xiang, Han, Yanni, Sun, Hongyu, Xu, Zhen, Yu, Haibo, Duan, Xiaoyu. Multi-Attention Generative Adversarial Network for Multivariate Time Series Prediction. IEEE ACCESS[J]. 2021, 第 4 作者9: 57351-57363, https://doaj.org/article/dd947526d1ee438c97f2c9c4f600f9ab.[28] Xiang Yin, Yanni Han, Zhen Xu, Jie Liu. VAECGAN:a generating framework for long-term prediction in multivariate time series. 网络空间安全科学与技术(英文)[J]. 2021, 第 3 作者4(1): 337-348, http://lib.cqvip.com/Qikan/Article/Detail?id=7106358291.[29] Liu, Yanwei, Liu, Jinxia, Argyriou, Antonios, Wang, Liming, Xu, Zhen. Rendering-Aware VR Video Caching Over Multi-Cell MEC Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2021, 第 5 作者70(3): 2728-2742, http://dx.doi.org/10.1109/TVT.2021.3057684.[30] 徐建峰, 王利明, 徐震. 软件定义网络中资源消耗型攻击及防御综述. 信息安全学报[J]. 2020, 第 3 作者5(4): 72-95, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200407&flag=1.[31] Xu Jianfeng, Zhang Fangtao, Xu Zhen, Wang Liming. Field Manipulation Attacks Based on Sniffing Techniques. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY[J]. 2020, 第 3 作者 通讯作者 42(10): 2342-2349, [32] Tan, Xinrui, Li, Hongjia, Wang, Liming, Xu, Zhen. Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security". IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 第 4 作者15: 3938-3939, https://www.webofscience.com/wos/woscc/full-record/WOS:000550635500011.[33] Yin, Lihua, Luo, Xi, Zhu, Chunsheng, Wang, Liming, Xu, Zhen, Lu, Hui. ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS[J]. 2020, 第 5 作者16(2): 1373-1384, http://dx.doi.org/10.1109/TII.2019.2940742.[34] 徐震, 张妍. 面向政务领域移动办公的安全移动终端防护技术分析与研究. 保密科学技术[J]. 2020, 第 1 作者7-11, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=BMKJ202003003&v=MjY3ODIxTHV4WVM3RGgxVDNxVHJXTTFGckNVUjdxZVp1ZHZGeTdrVXI3SUp5REFaTEc0SE5ITXJJOUZaNFI4ZVg=.[35] 贲永明, 韩言妮, 安伟, 徐震. 一种基于污点追踪的系统审计日志压缩方法. 信息安全学报[J]. 2020, 第 4 作者5(5): 30-42, http://lib.cqvip.com/Qikan/Article/Detail?id=7103104853.[36] Huo, Dongdong, Wang, Yu, Liu, Chao, Li, Mingxuan, Wang, Yazhe, Xu, Zhen. LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems. HPCC. 2020, 第 6 作者[37] 徐建峰, 张方韬, 徐震, 王利明. 基于嗅探技术的字段操纵攻击研究. 电子与信息学报[J]. 2020, 第 3 作者42(10): 2342-2349, https://jeit.ac.cn/cn/article/doi/10.11999/JEIT191047.[38] Zhang, Yunjian, Liu, Yanwei, Wang, Liming, Xu, Zhen, Jin, Qiuqing, IEEE. RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2020, 第 4 作者[39] Xu, Jianfeng, Wang, Liming, Xu, Zhen. An enhanced saturation attack and its mitigation mechanism in software-defined networking. COMPUTER NETWORKS[J]. 2020, 第 3 作者169: http://dx.doi.org/10.1016/j.comnet.2019.107092.[40] Huo, Dongdong, Liu, Chao, Wang,Xiao, Li, Mingxuan, Wang, Yu, Wang, Yazhe, Liu, Peng, Xu, Zhen. A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS. 2020, 第 8 作者[41] Cai, Ning, Han, Yanni, Ben, Yongming, Xu, Zhen, IEEE. Towards Scalable and Flexible Path Control Schema in Software Defined Networking. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 4 作者[42] 丁颖, 刘延伟, 刘金霞, 刘科栋, 王利明, 徐震. 虚拟现实全景图像显著性检测研究进展综述. 电子学报[J]. 2019, 第 6 作者47(7): 1575-1583, http://lib.cqvip.com/Qikan/Article/Detail?id=7002510885.[43] Chen, Kai, Song, Chen, Wang, Liming, Xu, Zhen. Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. COMPUTERS & SECURITY[J]. 2019, 第 4 作者87: http://dx.doi.org/10.1016/j.cose.2019.101582.[44] 徐震. 国家重点研发计划“高安全等级移动终端关键技术”阶段性研究进展. 科技成果管理与研究[J]. 2019, 第 1 作者74-75, http://lib.cqvip.com/Qikan/Article/Detail?id=7002140100.[45] Li, Mingxuan, Huo, Dongdong, Liu, Chao, Wang, Han, Wang, Yazhe, Wang, Yu, Zou, Ping, Li, Yandong, Xu, Zhen. SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS. ISPA. 2019, 第 9 作者[46] Ding, Ying, Liu, Yanwei, Liu, Jinxia, Liu, Kedong, Wang, Liming, Xu, Zhen, Hong, R, Cheng, WH, Yamasaki, T, Wang, M, Ngo, CW. Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2018, PT II. 2018, 第 6 作者11165: 418-429, http://dx.doi.org/10.1007/978-3-030-00767-6_39.[47] Ying Zhang, Zhen Xu, Chi Chen, Assoc Comp Machinery. A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018). 2018, 第 2 作者14-20, http://dx.doi.org/10.1145/3232829.3232843.[48] 李宏佳, 王利明, 徐震, 杨畅. 5G安全:通信与计算融合演进中的需求分析与架构设计. 信息安全学报[J]. 2018, 第 3 作者3(5): 1-14, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849564853484849.[49] 徐震, 韩言妮. IPv6网络的安全风险与应对分析. 保密工作[J]. 2018, 第 1 作者51-53, http://lib.cqvip.com/Qikan/Article/Detail?id=676157307.[50] 李杨, 辛永辉, 韩言妮, 李唯源, 徐震. 内容中心网络中DoS攻击问题综述. 信息安全学报[J]. 2017, 第 5 作者2(1): 91-108, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20170107&flag=1.[51] Sun, Jiyan, Zhang, Yan, Wang, Xin, Xiao, Shihan, Xu, Zhen, Wu, Hongjing, Chen, Xin, Han, Yanni, IEEE. DC2- MTCP: Light-weight Coding for Efficient Multi-path Transmission in Data Center Network. 2017 31ST IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS). 2017, 第 5 作者419-428, [52] 马爽, 徐震, 王利明. 基于集合论的电网信息物理系统模型构建方法. 电力系统自动化[J]. 2017, 第 2 作者41(6): 1-5, http://lib.cqvip.com/Qikan/Article/Detail?id=671614592.[53] Wang, Zejue, Li, Hongjia, Xu, Zhen. Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 第 3 作者60(6): https://www.webofscience.com/wos/woscc/full-record/WOS:000394529300008.[54] Wang, Zejue, Li, Hongjia, Xu, Zhen. Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 第 3 作者60(6): https://www.webofscience.com/wos/woscc/full-record/WOS:000394529300008.[55] Yu Bing, Han Yanni, Wen Xuemin, Chen Xin, Xu Zhen, IEEE. An Energy-Aware Algorithm for Optimizing Resource Allocation in Software Defined Network. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2016, 第 5 作者[56] Li, Hongjia, Wang, Zejue, Hu, Dan, Ci, Song, Xu, Zhen. Cross-layer transmission and energy scheduling under full-duplex energy harvesting wireless OFDM joint transmission. SCIENCECHINAINFORMATIONSCIENCES[J]. 2016, 第 5 作者59(10): https://www.webofscience.com/wos/woscc/full-record/WOS:000381930300006.[57] Wen, Xuemin, Han, Yanni, Yu, Bing, Chen, Xin, Xu, Zhen, IEEE. Towards Reliable Virtual Data Center Embedding in Software Defined Networking. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE. 2016, 第 5 作者1059-1064, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000391433600179.[58] 陈凯, 许海铭, 徐震, 林东岱, 刘勇. 适用于移动云计算的抗中间人攻击的SSP方案. 电子学报[J]. 2016, 第 3 作者44(8): 1806-1813, http://lib.cqvip.com/Qikan/Article/Detail?id=670495346.[59] Li, Hongjia, Wang, Zejue, Hu, Dan, Ci, Song, Xu, Zhen. Cross-layer transmission and energy scheduling under full-duplex energy harvesting wireless OFDM joint transmission. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2016, 第 5 作者59(10): https://www.webofscience.com/wos/woscc/full-record/WOS:000381930300006.[60] 陈晓兵, 陈凯, 徐震, 王利明. 面向工业控制网络的安全监管方案. 信息网络安全[J]. 2016, 第 3 作者61-70, http://lib.cqvip.com/Qikan/Article/Detail?id=669561087.[61] 文学敏, 韩言妮, 于冰, 孙建朋, 徐震. 软件定义数据中心内一种基于拓扑感知的VDC映射算法. 计算机研究与发展[J]. 2016, 第 5 作者53(4): 785-797, http://lib.cqvip.com/Qikan/Article/Detail?id=668556496.[62] Yu Bing, Han Yanni, Wen Xuemin, Xu Zhen, Foster I, Radia N. SMPA: An Energy-Aware Service Migration Strategy in Cloud Networks. PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD). 2016, 第 4 作者984-989, [63] 徐震, 陈路, 于爱民. 可信增强 TLS 协议的设计与实现. 华中科技大学学报(自然科学版)[J]. 2016, 第 1 作者44(3): 44-48, https://d.wanfangdata.com.cn/periodical/hzlgdxxb201603009.[64] 王淼, 王利明, 徐震, 马多贺. 基于熵变的多租户云内DDoS检测方法研究. 通信学报[J]. 2016, 第 3 作者204-210, http://lib.cqvip.com/Qikan/Article/Detail?id=84888866504849548349485057.[65] Wen Xuemin, Han Yanni, Yuan Hanning, Zhou Xu, Xu Zhen, IEEE. An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2015, 第 5 作者[66] Hu Yahui, Liu Yinlong, Zhou Xu, Xu Zhen. Towards Qo E-based resource allocation schemes in SC-FDMA systems. THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS[J]. 2015, 第 4 作者22(5): 63-70,100, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=5574127&detailType=1.[67] Ren, Shoushou, Lin, Tao, An, Wei, Zhang, Guoqiang, Wu, Dalei, Bhuyan, Laxmi Narayan, Xu, Zhen. Design and analysis of collaborative EPC and RAN caching for LTE mobile networks. COMPUTER NETWORKS[J]. 2015, 第 7 作者93: 80-95, http://dx.doi.org/10.1016/j.comnet.2015.10.012.[68] Ren Shoushou, Lin Tao, An Wei, Li Yang, Zhang Yu, Xu Zhen, IEEE. Collaborative EPC and RAN Caching Algorithms for LTE Mobile Networks. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2015, 第 6 作者[69] Sun Jiyan, Zhang Yan, Tang Ding, Zhang Shuli, Xu Zhen, Ge Jingguo, Kanhere S, Tolle J, Cherkaoui S. Improving TCP Performance in Data Center Networks with Adaptive Complementary Coding. 40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015). 2015, 第 5 作者295-302, [70] Ma Duohe, Xu Zhen, Lin Dongdai, Tian J, Jing J, Srivatsa M. Defending Blind DDoS Attack on SDN Based on Moving Target Defense. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I. 2015, 第 2 作者152: 463-480, [71] Yu, Bing, Han, Yanni, Yuan, Hanning, Zhou, Xu, Xu, Zhen. A cost-effective scheme supporting adaptive service migration in cloud data center. FRONTIERS OF COMPUTER SCIENCE[J]. 2015, 第 5 作者9(6): 875-886, https://www.webofscience.com/wos/woscc/full-record/WOS:000368588400004.[72] 王雅哲, 徐震, 王瑜, 晏敏, 张妍, 刘桐. 智能云电视公共安全服务平台建设. 中国科学. 信息科学[J]. 2015, 第 2 作者45(10): 1289-1309, https://www.sciengine.com/doi/10.1360/N112014-00339.[73] Song Jiahui, An Wei, Hu Yahui, Zhang Yu, Zhou Xu, Xu Zhen, IEEE. Balancing Harvesting Energy Consumption with Potential Field in Wireless Sensor Networks. 2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC). 2015, 第 6 作者2014-2019, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000377900900372.[74] Zhang Shuli, Zhang Yan, Tang Ding, Xu Zhen, Ge Jingguo, Zhao Zhijun, Kanhere S, Tolle J, Cherkaoui S. A Partial-decentralized Coflow Scheduling Scheme in Data Center Networks. 40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015). 2015, 第 4 作者434-437, [75] 田雪, 徐震, 陈驰. 若干新型数据库隐蔽信道应用场景研究. 中国科学院研究生院学报[J]. 2013, 第 2 作者30(3): 403-409, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=4837065&detailType=1.[76] 张秋璞, 徐震, 叶顶锋. 一个可追踪身份的基于属性签名方案. 软件学报[J]. 2012, 第 2 作者23(9): 2449-2464, http://lib.cqvip.com/Qikan/Article/Detail?id=43116862.[77] 徐震. Research on Real-Time Remote Attestation in IaaS Cloud Computing. CCIS/IEEE. 2012, 第 1 作者[78] 张德胜, 徐震, 冯登国, 李鹏飞. 一种栅格数据的敏感信息保护模型. 电子学报[J]. 2012, 第 2 作者40(4): 647-653, http://lib.cqvip.com/Qikan/Article/Detail?id=42028602.[79] 徐震, 刘韧, 于爱民, 汪丹. 智能电网中的移动应用安全技术. 电力系统自动化[J]. 2012, 第 1 作者36(16): 82-87, http://lib.cqvip.com/Qikan/Article/Detail?id=43034542.[80] 冯登国, 张敏, 张妍, 徐震. 云计算安全研究. 软件学报[J]. 2011, 第 4 作者22(1): 71-83, http://lib.cqvip.com/Qikan/Article/Detail?id=36367781.[81] 陈驰, 冯登国, 徐震. 数据库事务恢复日志和入侵响应模型研究. 计算机研究与发展[J]. 2010, 第 3 作者1797-1804, http://lib.cqvip.com/Qikan/Article/Detail?id=35538598.[82] 徐震. An anonymous property-base attestation protocol from bilinear maps. The 2009 IEEE/IFIP International Symposium on Trusted Computing and Communications. 2009, 第 1 作者[83] FENG Dengguo, WANG Xingang, XU Zhen. Decentralized Secure Interoperation Multi-Domain Environments. 电子学报:英文版[J]. 2009, 第 3 作者1-7, http://lib.cqvip.com/Qikan/Article/Detail?id=31079228.[84] 汪丹, 冯登国, 徐震. 基于可信虚拟平台的数据封装方案. 计算机研究与发展[J]. 2009, 第 3 作者1325-1333, http://lib.cqvip.com/Qikan/Article/Detail?id=31190790.[85] 徐震, 沈丽红, 汪丹. 一种可配置的可信引导系统. 中国科学院研究生院学报[J]. 2008, 第 1 作者25(5): 626-630, http://lib.cqvip.com/Qikan/Article/Detail?id=28281939.[86] 翟征德, 徐震, 冯登国. 域间动态角色转换中的静态互斥角色约束违反. 计算机研究与发展[J]. 2008, 第 2 作者45(4): 677-683, http://lib.cqvip.com/Qikan/Article/Detail?id=27071330.[87] Zhang Min, Feng DengGuo, Xu Zhen. Global timestamp serialization in multi-level multi-version dbms. RUAN JIAN XUE BAO/JOURNAL OF SOFTWARE[J]. 2007, 第 3 作者18(2): 345-350, http://124.16.136.157/handle/311060/11238.[88] 陈驰, 冯登国, 张敏, 徐震. 信息安全产品测评平台的设计与实现. 计算机工程[J]. 2007, 第 4 作者33(8): 256-258, http://lib.cqvip.com/Qikan/Article/Detail?id=24295869.[89] Zhang Min, Feng Dengguo, Xu Zhen. 多级多版本数据库管理系统全局串行化. 软件学报[J]. 2007, 第 3 作者18(2): 345-350, http://lib.cqvip.com/Qikan/Article/Detail?id=23828956.[90] 李晓峰, 冯登国, 徐震. 一种通用访问控制管理模型. 计算机研究与发展[J]. 2007, 第 3 作者44(6): 947-957, http://lib.cqvip.com/Qikan/Article/Detail?id=24672319.[91] 陈驰, 冯登国, 徐震. 信息安全产品安全保证量化评估方法研究. 电子学报[J]. 2007, 第 3 作者35(10): 1886-1891, http://lib.cqvip.com/Qikan/Article/Detail?id=25776885.[92] 翟征德, 冯登国, 徐震. 细粒度的基于信任度的可控委托授权模型. 软件学报[J]. 2007, 第 3 作者18(8): 2002-2015, http://lib.cqvip.com/Qikan/Article/Detail?id=25244468.[93] 徐震, 冯登国. 一种使用组织结构的访问控制方法. 计算机工程[J]. 2006, 第 1 作者32(13): 20-22, http://lib.cqvip.com/Qikan/Article/Detail?id=22250463.[94] 徐震, 张敏. 核心化多级安全数据库系统未决提交事务日志写出依赖研究. 计算机学报[J]. 2006, 第 1 作者29(8): 1438-1446, http://lib.cqvip.com/Qikan/Article/Detail?id=22602170.[95] 徐震. 并行分布式数据库系统中系统目录的同步. 计算机科学. 2006, 第 1 作者[96] 徐震, 李斓, 冯登国. 基于动态上下文栈的DBMS访问控制模型. 计算机研究与发展[J]. 2005, 第 1 作者42(12): 2093-2099, http://lib.cqvip.com/Qikan/Article/Detail?id=20781222.[97] 李斓, 冯登国, 徐震. 多级安全OS与DBMS模型的信息流及其一致性分析. 计算机学报[J]. 2005, 第 3 作者28(7): 1123-1129, http://lib.cqvip.com/Qikan/Article/Detail?id=16070293.[98] 徐震, 李谰, 冯登国. 基于角色的受限委托模型. 软件学报[J]. 2005, 第 1 作者16(5): 970-978, http://lib.cqvip.com/Qikan/Article/Detail?id=15677505.[99] 徐震, 张敏, 冯登国. 支持多策略的安全数据库系统体系结构. 华中科技大学学报:自然科学版[J]. 2005, 第 1 作者306-309, http://lib.cqvip.com/Qikan/Article/Detail?id=1000137208.[100] 李斓, 冯登国, 徐震. RBAC与MAC在多级关系数据库中的综合模型. 电子学报[J]. 2004, 第 3 作者32(10): 1635-1639, http://lib.cqvip.com/Qikan/Article/Detail?id=10693890.[101] 徐震. UC-RBAC: A Usage Constrained Role-Base Access Control Model. In Proceeding of The 5th Conference on Information and Communication Security, Springer. 2003, 第 1 作者