当前位置: X-MOL首页全球导师 国内导师 › 彭图

个人简介

2021/01-至今,北京理工大,网络空间安全学院, 副教授 2011/09-2021/01,北京理工大,计算机学院, 副教授 2006/01-2010/06,德克萨斯大学达拉斯分校,计算机学院,博士 2002/09-2005/06,北京大学,数学学院,硕士 1998/09-2002/06,北京大学,数学学院,学士 研究成果 作为负责人承担国家自然科学基金,北京市自然科学基金,中科院开放基金,教育部博士点基金等科研项目5项。在IEEE Trans. on Cloud Computing,Information and Software Technology,Computer Journal等期刊和会议发表较高水平论文10余篇,在多服务器身份认证和隐私保护协议的设计和分析方面,取得国内外同行公认的重要成果。在基于机器学习的软件缺陷检测方面,有丰富的理论积累和项目实践。 主持课题 中科院开放基金,网络评测技术重点实验室课题,201720843021,虚拟化安全并行监控技术研究 ,2018-01至2019-12,10万元,已结题,主持 国家自然科学基金,青年基金项目,61502034,基于动态函数调用图的软件验证和缺陷定位研究 ,2016-01至2018-12,20万元,已结题,主持 北京市自然科学基金,预探索项目,4133088,基于CCS的智能化软件验证, 2012-2014,5 万元,已结题,主持。教育部博士点基金: 基于CCS的软件验证研究 2012-2014, 主持

研究领域

工业互联网安全、物联网安全、软件安全和软件缺陷检测

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Tu Peng, Shuliang Wang, Jing Geng, Qinsi Wang, Yun Yang, Kang Zhang. “Verification of the Instantiation and Integration of Security Patterns”[J], Journal of Web Engineering, vol 19, issue 3-4, 2020. Peng T , Chen X , Wan M , et al. “The Prediction of Hepatitis E through Ensemble Learning”[J], International Journal of Environmental Research and Public Health, 卷: 18 期: 1 页159. 2021.1. Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu and Tu Peng. “An Efficient Privacy-Aware Authentication Scheme with Hierarchical Access Control for Mobile Cloud Computing Services”[J], IEEE Transactions on Cloud Computing, pp(99)1-1, 2020.9. Ling Xiong, Fagen Li, Shengke Zeng, Tu Peng and Zhicai Liu, “A Blockchain-Based Privacy-Awareness Authentication Scheme with Efficient Revocation for Multi-Server Architectures”[J], IEEE Access, Volume 7, Page 125840-125853, 2019. 引用数 6 Xiong, L; Peng, T ; Peng, DY ; et al. “An Efficient Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings”[J],Journal of Information Science and Engineering, Volume 35(2), Page 341-360, 2019. Zhi-cai Liu, Ling Xiong, Tu Peng, et al. “A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks”[J], IEEE Access, Volume 6, Page 26307 – 26317, 2018. 引用数12 Xiong, Ling , Peng, Daiyuan , Peng, Tu , et al. “On the security of a realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks”[C], 3rd IEEE International Conference on Computer and Communications (ICCC). IEEE. Volume: 2018-January Pages: 342-346. Zhu H, Peng T, Xiong L, et al. “Fault Localization Using Function Call Sequences”[J]. 7th International Congress of Information and Communication Technology, ICICT 2017, 卷107 页871-877. Ling, X. , Daiyuan, P. , Tu, P. , Hongbin, L. , & Zhicai, L. A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors[J], 2017,卷: 17 期: 11, 2681-. Jing Dong, Tu Peng, Yajing Zhao, Automated Verification of Security Pattern Compositions, Information and Software Technology (IST), Elsevier-Science, Volume 53, Issue 3, Pages 274-295, March 2010. Jing Dong, Tu Peng and Yajing Zhao, On Instantiation and Integration Commutability of Design Pattern, the Computer Journal, Oxford University Press. Volume 54, Issue 1,Pages 164-184, January 2011.

推荐链接
down
wechat
bug