华景煜(Hua Jing Yu)

发布者:系统管理员发布时间:2022-05-12浏览次数:43


副教授

huajingyu2012@gmail.com


个人简介

华景煜,南京大学计算机科学与技术系副教授,博士生导师。博士毕业于日本九州大学。主要研究方向大数据隐私保护,机器学习安全,智能移动设备安全等。在TIFS,TDSC,TMC等期刊,以及ESORICS, INFOCOM, IJCAI,ICDCS等国际会议发表论文三十多篇。兼任IEEE CS 南京分部副秘书长,Frontiers of Computer Science期刊青年编委,以及10多个国际会议的程序委员会委员。主持并参与了多个国家自然科学基金面目,江苏省基础前沿引领技术研究专项项目,以及与华为、百度、字节、美团等主流企业的横向项目。相关研究成果得到多家国内外网络媒体的报道,并被主流APP 集成应用。

招生信息:欢迎有志攻读机器学习安全,大数据隐私保护以及移动终端安全攻防等方向博士或硕士的同学联系我。请发你的简历至huajingyu AT nju DOT edu DOT cn。本课题组可以提供一流的科研学习环境,与国内外信息安全领域的主流学者交流密切,并与字节跳动等互联网企业建立了紧密的合作关系,提供专属研究实习岗位。

Jingyu Hua received PhD (2012) in Computer Science from Kyushu University, Japan. Currently he is an associate professor in Computer Science and Technology Department at Nanjing University, and also the deputy secretary of IEEE Computer Society Nanjing Chapter. His research interests include mobile security (e.g., Smartphone security, wireless communication security), privacy protection of big data, and network attack and defense.


课程链接

操作系统


部分论文

  1. Shaoyong Du, Minrui Zhao, Jingyu Hua, Hang Zhang, Xiaoyu Chen, Zhiyun Qian, and Sheng Zhong. Who Moves My App Promotion Investment? A Systematic Study about App Distribution Fraud. IEEE Transactions on Dependable and Secure Computing.

  2. Yangyang Liu, Laiping Zhao, Jingyu Hua, Wenyu Qu, Suohao Zhang, and Sheng Zhong. Distributed Traffic Engineering for Multi-Domain SDN without Trust. IEEE Transactions on Cloud Computing.

  3. Zidong Zhou, Jingyu Hua, Sheng Zhong. Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Convert Channel, IEEE Transactions on Information Forensics & Security(TIFS 2020).

  4. Yunlong Mao, Ying He, Yuan Zhang, Jingyu Hua and Sheng Zhong, Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack, IEEE Transactions on Mobile Computing.

  5. Laiping Zhao, Jingyu Hua, Yangyang Liu, Wenyu Qu, Suohao Zhang and Sheng Zhong. Distributed Traffic Engineering for Multi-Domain Software Defined Networks. In Proceedings of the 39th IEEE International Conference on Distributed Computing (ICDCS’19), 2019

  6. Shaoyong Du, Pengxiong Zhu, Jingyu Hua, Zhiyun Qian, Zhao Zhang, Xiaoyu Chen, Sheng Zhong. An Empirical Analysis of Hazardous Uses of Android Shared Storage. IEEE Transactions on Dependable and Secure Computing, Accepted.

  7. Shaoyong Du, Jingyu Hua, Sheng Zhong. Securing Peer-Assisted Indoor Localization Leveraging Acoustic Ranging. Computers & Security, 2018, Accepted.

  8. Jingyu Hua, Laiping Zhao, Suohao Zhang, Yangyang Liu, Xin Ge, Sheng Zhong. Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN. Computer Networks, Accepted.

  9. Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong. Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.Accepted by the 37th International Conference on Computer Communications (INFOCOM’18),Honolulu, 2018, Accepted

  10. Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Transactions on Information Forensics & Security, 2017, Accepted.

  11. Wei Tong, Jingyu Hua, Sheng Zhong. A Jointly Differentially Private Scheduling Protocol for Ridesharing Services. IEEE Transactions on Information Forensics & Security, Accepted.

  12. J. Hua, Z. Shen, S. Zhong. We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones. IEEE Transactions on Information Forensics and Security, Accepted.

  13. J. Hua, A. Tang, Y. Fang, Z. Shen, S. Zhong. Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms. IEEE Transactions on Information Forensics & Security, 2016. (To Appear)

  14. J. Hua, X. Ge, S. Zhong. FOUM: A Flow-Ordered Consistent Update Mechanism for Software-Defined Networking in Adversarial Settings. Accepted by the 35th International Conference on Computer Communications (INFOCOM’16).

  15. J. Hua, S. Du, S. Zhong. Towards Attack-Resistant Peer-Assisted Indoor Localization. To appear in the proceedings of the 20th European Symposium on Research in Computer Security (ESORICS’15).

  16. S. Du, J. Hua, Y. Gao, S. Zhong. EV-Linker: Mapping Eavesdropped Wi-Fi Packets toIndividuals via Electronic and Visual Signal Matching. accepted by Journal of Computer and System Sciences.

  17. L. Zhao, J. Hua, X. Ge, S. Zhong. Traffic Engineering in Hierarchical SDN Control Plane, IwQos 2015.

  18. J. Hua, C. Xia, S. Zhong. Differentially private matrix factorization. To appear in the proceeding of 2015 International Joint Conference on Artificial Intelligence (IJCAI-15), 2015.

  19. J. Hua, Y. Gao, S. Zhong. Differentially Private Publication of General Time-Serial Trajectory Data. In proceedings of the 34th International Conference on Computer Communications (INFOCOM’15). Hongkong, 2015.

  20. J. Hua, A. Tang, S. Zhong. Advertiser and Publisher-Centric Privacy Aware Online Behavioral Advertising. To appear in the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS’15).

  21. J. Hua, K. Sakurai. Botnet command and control based on Short Message Service and human mobility, Computer Networks, 57(2), pp.579-597, 2012. (SCI 收录)

  22. J. Hua, M. Li, Y. Ren, K. Sakurai. Efficient Context-Sensitive Intrusion Detection Based on State Transition Table, IEICE Trans. Fundamentals.VOL.E94-A, NO.1, 2011. (SCI 收录)

  23. J. Hua, K. Sakurai. Barrier: A Lightweight Hypervisor for Protecting Kernel Integrity via Memory Isolation, The 27th ACM Symposium On Applied Computing (SAC’12), pp.1470-1477, Riva del Garda, Italy, 2012.03.26-30. (EI 收录)

  24. J. Hua, K. Sakurai. A Prevention System for Automatic Google Hacking. The 28th Symposium of Cryptography and Information Security (SCIS’11), Kokura, Japan, 2011.01.25-28.

  25. J. Hua, K. Sakurai. A SMS-Based Mobile Botnet Using Flooding Algorithm, The 5th Workshop in Information Security and Privacy (WISTP’11), Springer LNCS 6633, pp. 264-279, Heraklion, Greece, 2011.06.01-03. (EI 收录)

  26. J. Hua, K. Sakurai. Modeling and Containment of Search Worms Targeting Web Applications, The 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA’10), Springer LNCS 6201, pp. 182-199, Bonn, Germany, 2010.07.08-09. (EI 收录)

  27. J. Hua, T. Nishide, K. Sakurai. Model-Based Intrusion Detection by Abstract Interpretation, The 10th Annual International Symposium on Applications and the Internet (SAINT’10), pp.359-362, Seoul, Koera, 2010.07.19-23. (EI 收录)

  28. J. Hua, M. Li, Y. Ren, K. Sakurai. Efficient Intrusion Detection Based on Static Analysis and Stack Walks. The 4th International Workshop on Security (IWSEC 2009), Springer LNCS 5824, pp.158-173, Toyama, Japan, 2009.10.28-30. (EI 收录)