翁健教师主页|暨南大学网络空间安全学院简历|翁健招生信息|翁健专利信息

教师主页移动版

主页 > 广东省 > 暨南大学

翁健

姓名 翁健
性别 教授
学校 暨南大学
部门 网络空间安全学院
学位 发明专利包写包过 特惠申请
学历 网络空间安全学院
职称 软件著作权666包写包过
联系方式 【发送到邮箱】
邮箱 【发送到邮箱】
人气
软件产品登记测试
软件著作权666元代写全部资料
实用新型专利1875代写全部资料
集群智慧云企服 / 知识产权申请大平台
微信客服在线:543646
急速申请 包写包过 办事快、准、稳

导航 个人简介 学习经历 工作经历 研究方向 主要论文 主要著作 承担课题,个人信息 姓名: 翁健 部门: 网络空间安全学院 性别: 男 职称: 教授 联系方式 学习经历 2004.9-2008.1 上海交通大学计算机系 博士研究生 (导师:陈克非 教授)2001.9-2004.7 华南理工大学计算机系 硕士研究生 (导师:李仲麟 教授)1996.9-2000.7 华南理工大学计算机系 本科 研究方向 密码学与信息安全 主要论文 部分期刊论文1. Xin Chen, Jian Weng, Wei Lu, Jiaming Xu. Multi-Gait Recognition Based on Attribute Discovery. IEEE Transactions on Pattern Analysis and Machine Intelligence (IEEE TPAMI), 40(7): 1697-1710, 20182. Jia-Si Weng, Jian Weng, Yue Zhang, Weiqi Luo. BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-based VANET. IEEE Transactions on Vehicular Technology, 20183. Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Transactions on Dependable and Secure Computing, 15(1): 27-39, 20184. Xin Chen, Jian Weng, Wei Lu, Jiaming Xu, Jia-Si Weng. Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE Transactions on Neural Networks and Learning Systems, 29(9): 3938-3952, 20185. Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren. Secure Integrated Circuit Design via Hybrid Cloud. IEEE Transactions on Parallel and Distributed Systems, 29(8): 1851-1864, 20186. Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Transactions on Smart Grid 9(5): 4490-4502, 20187. Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Transactions on Information Forensics and Security, 12(8): 1874-1884, 20178. Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren. Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE Transactions on Smart Grid 8(2): 619-626, 20179. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li. Lightweight fine-grained search over encrypted data in fog computing, IEEE Transactions on Services Computing, 201810. Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu. False Load Attack to Smart Meters by Synchronously Switching Power Circuits, IEEE Transactions on Smart Grid, 201811. Yang Yang, Ximeng Liu, Robert H Deng, Jian Weng. Flexible wildcard searchable encryption system, IEEE Transactions on Services Computing, 201712. Minxin Du, Qian Wang, Meiqi He, Jian Weng. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage, IEEE Transactions on Information Forensics and Security 13 (9), 2320-2332, 201813. Zhijun Zhang, Lunan Zheng, Jian Weng, Yijun Mao, Wei Lu, Lin Xiao. A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation. IEEE Transactions on Cybernetics, pp. 1-14, 201814. Yongdong Wu, Zhuo Wei, Jian Weng, Robert H Deng. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Transactions on Vehicular Technology 67 (6), 5287-530115. Zhe Liu, Jian Weng, Xinyi Huang, Zhi Hu, Lu Zhou. Efficient Elliptic Curve Cryptography for Embedded Devices. ACM Transactions on Embedded Computing Systems, 201616. Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren. You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Transactions on Dependable and Secure Computing, 201817. Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert Deng. Vulnerabilities, Attacks and Countermeasures in Balise-based Train Control Systems, IEEE Transactions on Intelligent Transportation Systems, 18 (4), 814-823, 201718. Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K Liu, Xun Yi. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Transactions on Dependable and Secure Computing, 201819. Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S Wong. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Transactions on Cloud Computing, 2018部分CCF推荐会议论文1. Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond. Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, LNCS 9216, pp. 77-92, Springer-Verlag, 20152. Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao. Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. In Proc. of 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2014), LNCS 8441, pp. 77–92, 20143. Lingguang Lei,Yi He,Kun Sun,Jiwu Jing,Yuewu Wang,Qi Li,Jian Weng. Vulnerable Implicit Service: A Revisit.ACM CCS2017:1051-10634. Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. In Proc. of Twelfth IACR Theory of Cryptography Conference (TCC 2015), LNCS 9014, pp. 7-35, Springer-Verlag, 2015.5. Yu Yu and Xiangxue Li and Jian Weng. Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters. 19th Annual International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), K. Sako and P. Sarkar (Eds.), LNCS 8270, pp. 261–279, Spring-Verlag, 20136. Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng. CCA-Secure Keyed-Fully Homomorphic Encryption. In: 19th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2016), pp. 70-98, 2016.7. Jian Weng, Yunlei Zhao, Goichiro Hanaoka. On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy8. Jie Chen, Junqing Gong, Jian Weng.Tightly Secure IBE Under Constant-Size Master Public Key. In: 19th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2017),pp. 207-231.9. Yanjiang, Jianying Zhou, Jian Weng and Feng Bao. A New Approach for Anonymous Password Authentication. 25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 200910. Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou: Verifiable Computation over Large Database with Incremental Updates. In 19th European Symposium on Research in Computr Security (ESORICS 2014), 2014: 148-162, 201411. Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng. Verifiable Computation on Outsourced Encrypted Data. In 19th European Symposium on Research in Computer Security (ESORICS 2014), 2014: 273-291, 201412. Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng. Authorized Keyword Search on Encrypted Data. In 19th European Symposium on Research in Computr Security (ESORICS 2014), 2014: 419-435, 201413. Junzuo Lai, Robert Deng, Yingjiu Li and Jian Weng. Fully Secure Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts and Fast Decryption. In Proc. of ACM ASIACCS 2014, ACM Press, pp. 239-248, 201414. Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai. Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack. Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 200915. Yanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang and Jianying Zhou. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. ACM ASIACCS 2016, pp. 141-151.16. Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng and Kui Ren. Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. ACM ASIACCS 2016, pp. 59-7017. Kai He, Jian Weng, Jia'Nan Liu, Joseph Liu, Robert Deng and Wei Liu. Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACM ASIACCS 2016, 247-25518. Wenjie Yang, Jian Weng, Futai Zhang. New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ICICS 2017: 236-24719. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai: Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222(Best Paper Award) 主要著作 第26届信息安全国际会议SCIS 2011(会议地点:Kokura, Japan)最佳论文奖国家杰出青年科学基金获得者广东省珠江学者特聘教授广东省高校“千百十工程”国家奖培养对象中国密码学会首届密码创新奖2017年全国网络安全优秀教师第八届可证明安全国际会议ProvSec 2014(会议地点:Hong Kong)最佳学生论文奖第37届IEEE分布式计算系统国际会议(ICDCS 2017)最佳学生论文奖

杨永