华景煜 Jingyu Hua

出自COSECWiki

(重定向自Huajy
跳转到: 导航, 搜索

目录

联系方式 Contact Information

huajingyu2012@gmail.com

职务 Job Title

教师 Faculty

个人简介 Short Biography

华景煜于2012年从日本九州大学获得工学博士学位。现任南京大学助理研究员,IEEE Computer Society南京分会副秘书长。主要研究方向为移动安全(例如智能手机安全、无线通信安全等),大数据隐私保护,网络攻击与防御等。


Jingyu Hua received PhD (2012) in Computer Science from Kyushu University, Japan. Currently he is an assistant professor in Computer Science and Technology Department at Nanjing University, and also the deputy secretary of IEEE Computer Society Nanjing Chapter. His research interests include mobile security (e.g., Smartphone security, wireless communication security), privacy protection of big data, and network attack and defense.

课程链接 Teaching

[操作系统]

[移动安全]

部分论文如下 Publications

  1. Wei Tong, Jingyu Hua, Sheng Zhong. A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Transactions on Information Forensics & Security, Accepted.
  2. J. Hua, Z. Shen, S. Zhong. We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Transactions on Information Forensics and Security, Accepted.
  3. J. Hua, A. Tang, Y. Fang, Z. Shen, S. Zhong. Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Transactions on Information Forensics & Security, 2016. (To Appear)
  4. J. Hua, X. Ge, S. Zhong. FOUM: A Flow-Ordered Consistent Update Mechanism for Software-Defined Networking in Adversarial Settings. Accepted by the 35th International Conference on Computer Communications (INFOCOM'16).
  5. J. Hua, S. Du, S. Zhong. Towards Attack-Resistant Peer-Assisted Indoor Localization. To appear in the proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15).
  6. S. Du, J. Hua, Y. Gao, S. Zhong. EV-Linker: Mapping Eavesdropped Wi-Fi Packets toIndividuals via Electronic and Visual Signal Matching. accepted by Journal of Computer and System Sciences.
  7. L. Zhao, J. Hua, X. Ge, S. Zhong. Traffic Engineering in Hierarchical SDN Control Plane, IwQos 2015.
  8. J. Hua, C. Xia, S. Zhong. Differentially private matrix factorization. To appear in the proceeding of 2015 International Joint Conference on Artificial Intelligence (IJCAI-15), 2015.
  9. J. Hua, Y. Gao, S. Zhong. Differentially Private Publication of General Time-Serial Trajectory Data. In proceedings of the 34th International Conference on Computer Communications (INFOCOM'15). Hongkong, 2015.
  10. J. Hua, A. Tang, S. Zhong. Advertiser and Publisher-Centric Privacy Aware Online Behavioral Advertising. To appear in the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15).
  11. J. Hua, K. Sakurai. Botnet command and control based on Short Message Service and human mobility, Computer Networks, 57(2), pp.579-597, 2012. (SCI 收录)
  12. J. Hua, M. Li, Y. Ren, K. Sakurai. Efficient Context-Sensitive Intrusion Detection Based on State Transition Table, IEICE Trans. Fundamentals.VOL.E94-A, NO.1, 2011. (SCI 收录)
  13. J. Hua, K. Sakurai. Barrier: A Lightweight Hypervisor for Protecting Kernel Integrity via Memory Isolation, The 27th ACM Symposium On Applied Computing (SAC'12), pp.1470-1477, Riva del Garda, Italy, 2012.03.26-30. (EI 收录)
  14. J. Hua, K. Sakurai. A Prevention System for Automatic Google Hacking. The 28th Symposium of Cryptography and Information Security (SCIS’11), Kokura, Japan, 2011.01.25-28.
  15. J. Hua, K. Sakurai. A SMS-Based Mobile Botnet Using Flooding Algorithm, The 5th Workshop in Information Security and Privacy (WISTP'11), Springer LNCS 6633, pp. 264-279, Heraklion, Greece, 2011.06.01-03. (EI 收录)
  16. J. Hua, K. Sakurai. Modeling and Containment of Search Worms Targeting Web Applications, The 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'10), Springer LNCS 6201, pp. 182-199, Bonn, Germany, 2010.07.08-09. (EI 收录)
  17. J. Hua, T. Nishide, K. Sakurai. Model-Based Intrusion Detection by Abstract Interpretation, The 10th Annual International Symposium on Applications and the Internet (SAINT’10), pp.359-362, Seoul, Koera, 2010.07.19-23. (EI 收录)
  18. J. Hua, M. Li, Y. Ren, K. Sakurai. Efficient Intrusion Detection Based on Static Analysis and Stack Walks. The 4th International Workshop on Security (IWSEC 2009), Springer LNCS 5824, pp.158-173, Toyama, Japan, 2009.10.28-30. (EI 收录)
个人工具