当前位置: X-MOL首页全球导师 国内导师 › 常晓林

个人简介

工作经历 香港科技大学所获得博士学位,2007年加入北京交通大学计算机与信息技术学院。曾在中科院软件所和公司从事网络协议和产品以及安全操作系统的研究、设计和开发。曾获中国科学院科技进步奖一等奖和二等奖、国家科技进步奖二等奖和教育部科技进步一等奖, 2018年IEEE GLOBECOM最佳论文奖。主持或参加的项目包括国务院信息办重点攻关项目、863项目、中国科学院重大科研项目、欧洲第六框架计划项目、教育部博士点基金、北京自然基金、国家自然基金等。已在IEEE IoT, IEEE Trans. on Services Computing、Trans. on Cloud Computing、Information Sciences、Future generation computer systems等领域国际顶级期刊和国际重要 会议上发表论文80余篇。作为第一发明者授权专利有12项。是多个国际学术期刊的审稿人和国际会议的程序委员,担任国家自然科学基金和国家重点研发的评审专家以及加拿大自然科学、加拿大工程研究协会(NSERC)基金的海外评审专家, '网络空间安全'期刊副主编。

研究领域

计算机技术(专业学位) 软件工程(专业学位) 人工智能技术(专业学位) 网络安全 研究方向 (1) 云-边缘中心、5G、C-V2X的安全机制的设计及其机理分析、资源管理及其性能和可用性的评估 (2) 协同智能的恶意代码深度分析 针对海量二进制恶意代码样本,突破API调用序列构建、二进制恶意代码功能模块切分与分类等技术;研制原型工具,实现恶意代码的功能模块切分和功能模块库构建;实现基于机器学习等智能方法的功能模块分类和对比,并研制原型系统。 (3) 安全可靠的机器学习 非共谋双云模型下的神经网络隐私计算, 对抗训练。 (4) 区块链应用及其机理的量化分析 自私挖矿、双花等攻击的定量分析,HyperledgerFabric 多安全策略的性能分析

专利 第一发明人专利 基于TPM的可信Web网页的实现方法 常晓林 一种响应Xen客户硬件虚拟域可信计算TOCTOU攻击的方法 常晓林 一种可扩展的可信SSH的实现方法 常晓林 一种远程动态验证客户端软件完整性的方法 常晓林 一种保护平台信息的可信QpenSSH的实现方法 常晓林 一种有效的可信OpenSSH的实现方法 常晓林 一种基于可信计算实现可信SSH的方法 常晓林 一种响应TOCTOU攻击的轻量级方法 常晓林 完整性度量技术在可信虚拟域无缝运行的方法 常晓林 一种针对TPM可信计算的TOCTOU攻击响应方法 常晓林 自适应的保障可信客户虚拟域正常启动的方法 常晓林 科研项目 边缘计算技术、标准及认证业务研究, 2019-2020 信息系统服务器虚拟化产品检测规范, 2019-2019 异构云-边缘服务的可扩展的性能分析模型, 2019-2021 国家自然科学基金“联合基金项目”: 动静协同的恶意代码智能分析方法研究, 2019-2021 统一身份认证关键技术研究, 2018-2021 面向军民融合的多域网络互联态势感知关键技术, 2018-2022 基于格的轻量级车联网消息签名与验证方案研究, 2018-2020 国家自然科学基金“面上”: 智能穿戴网络数据实时融合算法研究(U1836105), 2018-2021 安全感知的绿色Docker容器资源分配, 2017-2018 国家重点研发计划: 关键信息技术产品和服务网络安全审查关键技术研究, 2016-2019 国家自然科学基金“面上”: 面向异构云计算中心IaaS服务的性能分析模型, 2016-2019, 其它部市: 可信的网络空间安全保障体系, 2015-2019 基本科研业务费: 基于逆向工程的虚拟机漏洞检测技术的研究, 2015-2015 基本科研业务费: RSA公钥密码算法安全性研究, 2014-2015 红果园省部级"企事业": RSA-768数域筛法大数分解多项式选择中的多项式根优化研究与工程实现, 2013-2014 红果园: 基于云计算的涉密信息系统安全保密测评与检查能力建设, 2013-2014 北京交通大学: 典型移动终端多核及虚拟化支持状况分析及可行方案, 2013-2013 北京市自然基金: 收益驱动的多虚拟网络嵌入和虚拟网络资源再分配技术研究, 2012-2013 教育部: 面向电子病历共享系统的安全与隐私保护技术研究, 2012-2013 博士点基金: 虚拟机系统端拥塞控制的研究, 2009-2011 科技部“863”: 虚拟个人计算机系统的可信支撑技术研究, 2008-2009 科技部“863”: 可信计算平台信任链建立关键技术, 2007-200

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

论文/期刊 Journal Publications、 Lili Jiang, X. Chang,et al, "Model-based Comparison of Cloud-Edge Computing Resource Allocation Policies ", The Computer Journal, 2020 (云-边服务量化分析) Lili Jiang, X. Chang,et al, "Dependability Analysis of 5G-AKA Authentication Service from Server and User Perspectives ", IEEE Access, 2020 (5G 认证服务分析) X. Chang,et al, "Job Completion Time under Migration-based Dynamic Platform Technique", IEEE Trans. Services Computing, 2020. (移动目标防御) Yingying Yao, X. Chang,et al, "Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks", IEEE Transactions on Cognitive Communications and Networking, 2020. (云边, 5G, C-V2X安全) Yipin Zhang, X. Chang,et al, "Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification", IEEE Access, 2020. (恶意代码智能检测) Zhi Chen, X. Chang,et al, "Numerical evaluation of job finish time under MTD environment", IEEE Access, 2020. (移动目标防御) Jing Bai, X. Chang,et al, "Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views", IEEE Access, 2020. (云-边服务量化分析) Yingying Yao, X. Chang,et al, "Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing", IEEE Transactions on Vehicular Technology, 2020. (云边, 5G, C-V2X安全) Jelana Misic, Vojislav Misic, X. Chang,et al, "Modeling of Bitcoin's blockchain delivery network“ IEEE Transactions on on Network Science and Engineeringg, 2020 (区块链-比特币-机理量化分析) Vojislav B. Misic, Jelena Misic,X. Chang, "Data Lifetime Estimation in a Multicast-Based CoAP Proxy,",Open Journal of Internet of Things (OJIOT) 2020 Lili Jiang, X. Chang,et al, "Performance Analysis of Hyperledger Fabric Platform: A Hierarchical Model Approach ", Peer-to-Peer Networking and Applications, 2020 (区块链-HyperledgerFabric) Lun Li, Jiqiang Liu, X. Chang, Tianhao Liu, Jingxian Liu:Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 , 2020. (区块链-比特币 应用) Yixiang Wang, Jiqiang Liu, Jelena Misic, Voj. Misic, X. Chang, "Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples", IEEE ACCESS, 2019. (安全可靠的机器学习) Runkai Yang, X. Chang,et al, "Performance Modeling of Linux Network System with Open vSwitch", Peer-to-Peer Networking and Applications, 2019. (移动目标防御) Yingying Yao, X. Chang,et al, "BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services", IEEE IoT Journal, 2019. (云边, 5G, C-V2X安全) Yu Shi,, X. Chang,et al, "Quantitative security analysis of a dynamic network system under lateral movement-based attacks", Reliability Engineering & System Safety, 2019. (网络安全态势量化分析) Yingying Yao, X. Chang,et al, "Reliable and Secure Vehicular Fog Service Provision", IEEE IoT Journal, 2019. (云边, 5G, C-V2X安全) Yingying Yao, X. Chang,et al, "CLAM: Lightweight Certificateless Anonymous Authentication Mechanism for Vehicular Cloud Services", Cyber-Physical Systems, 2018. (云边, 5G, C-V2X安全) Bo Liu, X. Chang, Zhen Han, Kishor Trivedi, Ricardo J. Rodrgues, "Model-based Sensitivity Analysis of IaaS Cloud Availability", Future Generation Computer Systems, 2018. (云-边服务量化分析) Zhi Chen, X. Chang, Zhen Han, Lin Li, "Survivability Modeling and Analysis of Cloud Service in Distributed Data", The Computer Journal, 2018. (云-边服务量化分析) X. Chang, et al, "Modeling and Analysis of High Availability Techniques in a Virtualized System", The Computer Journal, 2018. (云-边服务量化分析) X. Chang, R.F. Xia, J.K. Muppala, K.S. Trivedi, jiqiang Liu, "Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload", IEEE Transactions on Cloud Computing, 2018 (云-边服务量化分析) X. Chang, Jose M. Martinez, Kishor S. Trivedi, "Transient Performance Analysis of Smart Grid with Dynamic Power Distribution", Information Sciences, 422: 98-10, 2018. Guozhi zhang, Jiqiang Liu, X. Chang, et al, "Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content Centric Networking", IEEE ACCESS, 2017. (信息中心网络) Yang Yang, X. Chang, jiqiangliu ,lin Li, "Towards Robust Green Virtual Cloud Data Center Provisioning," IEEE Transactions on Cloud Computing, 5(2): 168-181, 2017. (云-边网络切片) X.Chang, Bin Wang, Jogesh K. Muppala, Jiqiang Liu: Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue. IEEE Trans. Services Computing 9(3): 408-420 (2016) (云-边服务量化分析) Bin Wang, X. Chang*, jiqiangliu , "Modeling Heterogeneous Virtual Machines on IaaS Data Centers", IEEE Communication Letter, 2015. (云-边服务量化分析) Bin Xing, Zhen Han, X. Chang, jiqiangliu , "OB-IMA: Out-of-the-Box Integrity Measurement Approach for Guest Virtual Machines", Concurrency and Computation: Practice and Experience, 2015. (可信计算) X. Chang, et al., "Performance Evaluation of Artificial Intelligence Algorithms for Virtual Network Embedding," Engineering Applications of Artificial Intelligence, 2013. (云-边网络切片) X. Chang,and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services," Computer Communications,2006. X. Chang,and J. K. Muppala, "A stable queue-based adaptive AQM mechanism," Computer Networks, 2006. X. Chang, and J. K. Muppala, "On Improving Bandwidth Assurance in AF-based DiffServ Network Using a Control Theoretic Approach," Computer Networks, 2005. Conference and Poster Publication Jelana Misic, Vojislav Misic, X. Chang, et. al, ”On the Benefits of Compact Blocks in Bitcoin ", IEEE ICC 2020. (区块链-比特币-机理量化分析) Hongyue Kang, Bo Liu, X. Chang,, et. al "Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks", IEEE ICNC 2020. (网络安全态势量化分析) Runkai Yang, X. Chang,Vojislav Misic, Jelana Misic, et al, "Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF", IEEE GlobeCom 2019. Vojislav Misic, Jelana Misic, X. Chang ”On forks and fork characteristics in a Bitcoin-like distribution network", 2019 IEEE International Conference on Blockchain (区块链-比特币-机理量化分析) Vojislav Misic, Jelana Misic, X. Chang ”Towards a Blockchain-Based Healthcare Information System", 2019 IEEE ICCC. (区块链应用) Bo Liu, X. Chang, et. al, "Evaluating Performance of Active Containers on PaaS Fog Under Batch Arrivals: A Modeling Approach," IEEE ISCC 2019. Yixiang Wang, Jiqiang Liu, X. Chang, "Assessing Transferability of Adversarial Examples against Malware Detection Classifiers," IEEE CF 2019. (安全可靠的机器学习) Jelana Misic, Vojislav Misic, X. Chang, et. al, ”Block delivery time in Bitcoin distribution network ", IEEE ICC 2019. (区块链-比特币-机理量化分析) Yang Yang, X. Chang, et. al, ” Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework”, ICSP 2018. (云-边网络切片) Guozhi Zhang, Jiqiang Liu, X. Chang, et. al, ” Interest Relevance-Based Caching Design in Content-centric Networking”, ICA3PP 2018. (信息中心网络) Jelena Misic, Vojislav Misic, X. Chang, ”Kernel based estimation of domain parameters at IoT proxy“,IEEE GlobeCom 2018. Vojislav Misic, Jelena Misic, X. Chang, ”Efficient traffic reduction in IoT domains using Bernoulli scheduling of proactive cache refresh“,IEEE GlobeCom 2018 X. Chang, et. al, ”Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System“,IEEE ICCCN 2018 (安全可靠的机器学习) Bo Liu, X. Chang, et. al, "Performance Analysis Model for Fog Services under Multiple Resource Types," IEEE DSA 2017. (云-边服务量化分析) Lin Li, Yingying Yao, X. Chang, "Plaintext-dependent selective image encryption scheme based on chaotic maps and DNA coding",IEEE DSA 2017. Harish Sukhwani1,Jose M. Martinez1, X.Chang, Kishor S. Trivedi,Andy Rindos,"Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)" IEEE SRDS 2017, poster. (区块链- HyperledgerFabric) Xiaodan Li, X.Chang, et al, "A Novel Approach for Software Vulnerability Classfication", IEEE RAMS 2017. Zibo zhou, X.Chang, et al, "Resource-aware Virtual Network Parallel Embedding Based on Genetic Algorithm", IEEE PDCAT 2016. (云-边网络切片) T.J. Wang, X.Chang, et al, "Performability Analysis for IaaS Cloud Data Center", IEEE PDCAT 2016. (云-边服务量化分析) X.Chang, et al, "Model-based Survivability Analysis of a Virtualized System", IEEE LCN 2016. (网络安全态势量化分析) Ricardo J. Rodrgues, X.Chang, Xiaodan Li, Kishor Trivedi, "Survivability Analysis of a Computer System under an Advanced Persistent Threat", Proc. Of the 3rd Workshop on Graphical Models for Security (GraMSec), @IEEE Computer Security Foundations Symposium. 2016. (网络安全态势量化分析) Xuanni DU ,X.Chang, "Performance of AI Algorithms for Mining Meaningful Roles " IEEE WCCI-CEC, 2014 Yang Yang ,X.Chang, et al., "Effective and Efficient AI-based Approaches to Cloud Resource Provisioning" In Proc. IEEE ICON, 2013. (云-边网络切片) Wenbo wang,X.Chang, et al., "Simulated Annealing Based Resource Allocation for Cloud Data Centers" In Proc. GECCO, 2013. (云-边网络切片) X.Chang, et al., "Green Cloud Virtual Network Provisioning Based Ant Colony Optimization" In Proc. GECCO-GreenGEC 2013, . (云-边网络切片) X.Chang, et al., "Network State Aware Virtual Network Parallel Embedding"? In Proc. IEEE IPCCC 2012. (云-边切片) B. Wang, X.Chang, et al., "Reducing Power Consumption in Embedding Virtual Infrastructures" In Proc. IEEE Globecom Workshop ManSec 2012. (云-边切片) X.Chang, et al., "Migration Cost Aware Virtual Network Re-Embedding in Presence of Resource Failures" In Proc. IEEE ICON 2012. (云-边网络切片) X.M. Mi, X.Chang, et al., "Embedding Virtual Infrastructure Based on Genetic Algorithm" In Proc. IEEE PDCAT 2012. (云-边切片) X.Chang, et al., "Robust and Efficient Response to TCG TOCTOU Attacks In TPVM" In Proc. IEEE PDCAT 2012. (可信计算) X.M. Mi, X.Chang, et al., "An Integrated Approach To Virtual Network EmbeddingWith Sharing Physical Nodes" In Proc. IEEE MINES 2012. (云-边网络切片) X.Chang, "ZRTP-based Trusted Transmission of VoIP Traffic and Formal Verification," In Proc. IEEE MINES 2012. (可信计算) X.Chang, et al., "Defeating TCG TOCTOU Attacks In T" In Proc. IEEE MINES 2010. (可信计算) X.Chang, Bin Xing, Jiqiang Liu, "LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack" In Proc. 28th IEEE IPCCC 2009. (可信计算) X. Chang, " Analysis of Interrupt coalescing in? Gigabit Ethernet Networks”, In Proc. IEEE ICC 2008. (Linux ) X. Chang, Jogesh. K. Muppala, P.C Zou, and X.K. Li,"A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks”, In Proc. IEEE LCN 2007. (Linux ) X. Chang, Jogesh K. Muppala, P.C. Zou, Z.Y. Zheng, and X.K. Li, "A Queue-based Adaptive Approach to Improve System Performance in Gigabit Ethernet Networks,” In Proc. 26 IEEE IPCCC 2007 (Linux ) X. Chang, X. Lin and J. K. Muppala,"A Control-Theoretic Approach to Improving Fairness in DCF Based WLANs," In Proc. 25th IEEE IPCCC, 2006. X. Chang, and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services,” In Proc. 24th IEEE IPCCC,2005. X. Chang, and J. K. Muppala,"Applying Adaptive Virtual Queue to Improve the Performance of the Assured Forwarding Service," In Proc. IEEE ICC,2005. X. Chang, X. Lin and J. K. Muppala, "An Adaptive Queue Management Mechanism for Improving TCP Fairness in the Infrastructure WLAN," In Proc. 16th Ann. International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2005), Berlin, Germany, Sep. 2005. X. Lin, X. Chang, and J. K. Muppala,"VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN," In Proc. 5th International IEEE Workshop on Wireless Local Networks (WLN 2005), Sydney, Australia, Nov. 2005. X. Chang, and J. K. Muppala, "A Robust Nonlinear PI Controller for Improving AQM Performance," In Proc. IEEE ICC,2004. X. Chang, and J. K. Muppala, "An Integral Sliding Mode based AQM for Stable Queue Length," In Proc. IEEE GLOBECOM, 2004. X. Chang, and J.K. Muppala, "A Robust PI Controller for Improving Performance in the AF-based Differentiated Services Network," In Proc. 23rd IEEE IPCCC,2004. X. Chang, and J. K. Muppala, "Adaptive Marking Threshold for Improving Performance of Assured Forwarding Services (based on local knowledge)," In Proc. IEEE Globecom, 2003. X. Chang, and J. K. Muppala,"Adaptive Marking Threshold for Assured Forwarding Services (based on router cooperation)," In Proc. IEEE ICCCN, 2003. S. Qing, X. Chang,J.Zhang,"Design and implementation of Secure e-commerce protocol iKPI," In Proc. 1st CCICS, 1999. 中文论文、 张嘉楠, 常晓林 ,et al, "深度学习的对抗攻击方法综述",网络空间安全, 2020. (安全可靠的机器学习) 赵镇东, 常晓林 ,et al, "深度学习对抗样本的防御方法综述", 网络空间安全, 2020. (恶意代码智能检测) 赵镇东, 常晓林 et al, "机器学习中的隐私保护综述", 信息安全学报, 2019. (安全可靠的机器学习) Yutong Cai, 常晓林 ,et al, "动态平台技术防御攻击的瞬态效能量化分析", 信息安全学报, 2019. (目标移动防御) 邢 彬, 韩 臻, 常晓林, 刘吉强, "基于虚拟机监控技术的可信虚拟域", 信息安全学报,2016. (可信计算) 常晓林 , Dengguo Feng, Sihan Qing, "A Single Sign on Protocol for Multiple Servers," 软件学报, China, 2002. 专著/译著 常晓林.Linux黑客大曝光:Linux安全机密与解决方案(第3版) [M]。国内:清华大学出版社,2011-01

学术兼职

近五年主要研究成果: (1)移动目标防御的机理分析 (2)网络系统安全度量方法的研究 (3)网络虚拟资源和云数据中心虚拟资源分配 (4)基于随机演化模型的智能电网的可生存分析 (5)大规模异构云计算中心IaaS服务的性能与可用性分析

推荐链接
down
wechat
bug