- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
- User Authentication and Security Systems
- Cryptography and Data Security
- Advanced Authentication Protocols Security
- Privacy-Preserving Technologies in Data
- Access Control and Trust
- Wireless Communication Security Techniques
- Advanced Algorithms and Applications
- Embedded Systems and FPGA Design
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- IoT and Edge/Fog Computing
- Bluetooth and Wireless Communication Technologies
- Software-Defined Networks and 5G
- Mobile and Web Applications
- Traffic control and management
- Wireless Networks and Protocols
- Spam and Phishing Detection
- Mobile Agent-Based Network Management
- Cloud Data Security Solutions
- Context-Aware Activity Recognition Systems
- Digital and Cyber Forensics
Southeast University
2013-2025
Purple Mountain Laboratories
2020-2025
Wuhan University of Technology
2025
Southeast University
2008-2024
Lanzhou Jiaotong University
2017-2022
Qufu Normal University
2021
Hong Kong Polytechnic University
2016-2017
Qingdao Municipal Hospital
2012
Qingdao University
2012
Northeast Petroleum University
2011
The introduction of software-defined networking (SDN) has emerged as a new network paradigm for innovations. By decoupling the control plane from data in traditional networks, SDN provides high programmability to and manage networks. However, communication between two planes can be bottleneck whole network. SDN-aimed DoS attacks cause long packet delay loss rate by using massive table-miss packets jam links planes. To detect mitigate attacks, this paper presents FloodDefender, an efficient...
Many efforts have been devoted to the development of efficient Network Intrusion Detection System (NIDS) using machine learning approaches in Software-defined (SDN). Unfortunately, existing solutions failed detect real-time and zero-day attacks due their limited throughput prior knowledge-based detection. To this end, we propose Griffin, a NIDS that uses unsupervised expertise both known intrusion with high accuracy. Specifically, Griffin an feature extraction framework capture sequential...
Data immutability, transparency and decentralization of blockchain make it widely used in various fields, such as Internet things, finance, energy healthcare. With the advent Big era, companies organizations urgently need data from other parties for analysis mining to provide better services. Therefore, sharing exchange have become an enormous industry. Traditional centralized platforms face many problems, privacy leakage, high transaction costs lack interoperability. Introducing into this...
As mass devices access to network in the era of Internet Things (IoT), control becomes more important. Traditional authentication mechanisms are no longer suitable for IoT with limited physical and computational resources because their complexity. This problem can be solved by device fingerprinting, which identify only traffic characteristics. However, existing fingerprinting technologies cannot accurately devices' type from same manufacturer equips these similar hardwares softwares....
White-box cryptography plays a vital role in untrusted environments where attackers can fully access the execution process and potentially expose cryptographic keys. It secures keys by embedding them within complex obfuscated transformations, such as lookup tables algebraic manipulations. However, existing white-box protection schemes for SM2 signatures face vulnerabilities, notably random number leakage, which compromises key security diminishes overall effectiveness. This paper proposes an...
Shared energy storage (SES) and some photovoltaic prosumers (PVPs) are difficult to aggregate by the virtual power plant (VPP) in short term. In order realize optimal operation of VPP incomplete resource aggregation environment promote mutual benefit multiple market entities, trading strategy based on hybrid game SES–VPP–PVP is proposed. Firstly, whole system configuration with proposed, as well preconfigured rules general problem for VPP. Secondly, novel theory-based optimization proposed...
The Network Intrusion Detection Systems (NIDS) with machine learning in SDN become increasingly popular solutions. NIDS uses abnormal traffic detection to identify unknown network attacks. Most of today's systems are supposed continuously update the recognition model time based on features from newly collected packets accurately attack behaviors. However, those existing solutions always require a large number train offline. That means it is impossible detect emergence new cyber-attacks...
Wi-Fi device authentication is crucial for defending against impersonation attacks and information forgery attacks. Most of the existing technologies rely on complex cryptographic algorithms. However, they cannot be supported well devices with limited hardware resources. A fine-grained technology based channel state (CSI) provides a noncryptographic method, which uses CSI fingerprints since can uniquely identify devices. But long-term challenging work. First, are environment-sensitive, means...
Utilizing browsers to identify and track users has become a routine on the Web in recent years. It is easy for browser collect sensitive information construct comprehensive user profiles while are still unaware. As problem mentioned above, several anti-fingerprint mechanisms have been adopted protect privacy. However, our research finds novel method based localization fingerprints that may threaten The location fingerprint obtains response delay of data transmission over link between...
Aiming at the problem of depression recognition, this paper proposes a computer-aided recognition framework based on decision-level multimodal fusion. In Song Dynasty China, idea fusion was contained in "one gets different impressions mountain when viewing it from front or sideways, close range afar" poetry. Objective and comprehensive analysis can more accurately restore its essence, represent information about compared to single modal. Linear electroencephalography (EEG) features adaptive...
Internet of Things (IoT) devices deployed in publicly accessible locations increasingly encounter security threats from device replacement and impersonation attacks. Unfortunately, the limited memory poor computing capability on such make solutions involving complex algorithms or enhanced authentication protocols untenable. To address this issue, identification technologies based traffic characteristics finger-printing have been proposed to prevent illegal intrusion impersonation. However,...
Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on permissions. However, most them ignore specific permission combinations and categories that affect the accuracy. The features they extracted are neither representative enough distinguish benign applications. For these problems, an Android method sensitivity is proposed. First, for each kind...
Non-cryptographic mobile wireless device authentication based on channel signature has aroused extensive attention. This technology uses the device's physical characteristics to mark and verify its identity, can be used detect impersonation attacks information forgery attacks. Channel State Information (CSI) been generate fine-grained signatures. However, there are two sticking points in using CSI-based for association phase. The first is that state will change as moves, which means local...
Unauthorized voice recording via smartphones can leak the talking content stealthily. This would be a serious security threat to those individuals, enterprises and government who need keep conversation confidential. Furthermore, due size miniaturization of smartphones, it is hard find covert from malicious attendees. Existing solutions usually jam with audible noise or electromagnetic emitting. However, will seriously interfere effect emitting limited by distance. In this paper, we propose...
In an era marked by rapid advancements in information technology, the task of risk assessment for data security within complex infrastructure power grid has become increasingly vital. This paper introduces a novel methodology dynamic, scenario-adaptive assessment, specifically designed to address entire lifecycle data. Integrating hierarchical analysis with fuzzy comprehensive evaluation, our approach provides flexible and robust framework assessing managing risks various scenarios. method...
The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for huge cost building a before, kind attack were really implemented before. This paper presents an implement based on software radio technologies. Furthermore, discusses two types attacks our platform. first IMSI/IMEI catch attack, can get phone’s IMSI and IMEI. With information, attacker got track...
In recent years, various sensors have been integrated into smartphones to sense the slight motions of human body. However, security researchers found that these can not only be used in motion detection, but also as side-channel reveal users' privacy data by inferring keystrokes. What is worse, defined W3C specifications, mobile web applications get sensor readings silently without permissions from users. Therefore, when cross-site scripting vulnerabilities are a application, attackers...
Smartphone sensors have been applied to record the movement of users for healthy use. However, motion sensor readings recorded by malicious applications can be utilized as a side-channel leak user privacy keystroke inference. Most existing approaches use time-domain statistical characteristics Their systems are poor show subtle changes in short time period, since time- domain features only reflect long-time interval. In this paper, we propose novel framework perform inference on smartphones....
Advertising income depends on the amount of clicks by users websites and mobile applications. However, emergence click fraud greatly reduces real benefits advertisement. Most existing researches focus detecting analyzing properties patterns data streams, but attackers can construct that looks legitimate replaying former streams. In this paper, we propose a novel system called ClickGuard to detect attacks. takes advantage motion sensor signals from devices, since pattern is completely...
We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The applies idea active theory and combines with protection. initially clarify high safety protection performance our in following steps: we simulates wireless access environment then capture phones; after that, can search potential attacks, as well analyze monitor their behaviors. discuss feasibility efficiency testing an Android phone which...