近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
[1]Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu and Wei Yu. De-anonymizing and Countermeasures in Anonymous Communication Networks[J], IEEE Communications Magazine, DOI: 10.1109/MCOM.2015.7081076, April 2015, 53(4): 60-66. (SCI, Impact Factor 10.435)
[2]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation[J], IEEE Transactions on Parallel and Distributed Systems (TPDS), DOI: 10.1109/TPDS.2013.249, July 2015, 26(7): 1887-1899. (SCI)
[3]YitingZhang, MingYang, ZhenLing, YaowenLiu, WenjiaWu. FingerAuth: 3D Magnetic Finger Motion Pattern based Implicit Authentication for Mobile Devices[J], Future Generation Computer Systems (FGCS), https://doi.org/10.1016/j.future.2018.02.006, February 2018.
[4]Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, Zhenyu Ni. Detection of malicious behavior in android apps through API calls and permission uses analysis[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.4172, 10 October 2017, 29(19): e4172. (SCI)
[5]Qiyuan Gong, Ming Yang, Zhouguo Chen, Wenjia Wu, Junzhou Luo. A framework for utility enhanced incomplete microdata anonymization[J], Cluster Computing, June 2017, 20(2): 1749-1764. (SCI)
[6]Ming Yang, Xiaodan Gu, Zhen Ling, Changxin Yin, Junzhou Luo. An active de-anonymizing attack against tor web traffic[J], Tsinghua Science and Technology, December 2017, 22(6): 702-713. (SCI)
[7]Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling and Junzhou Luo. A novel attack to track users based on the behavior patterns[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.3891, March 2017, 29(6): 1-18. (SCI)
[8]Qiyuan Gong, Junzhou Luo, Ming Yang, Weiwei Ni, Xiao-Bai Li. Anonymizing 1:M microdata with high utility[J], Knowledge-Based Systems, DOI: 10.1016/j.knosys.2016.10.012, January 2017, 115(2017): 15-26. (SCI)
[9]Wenjia Wu, Junzhou Luo, Ming Yang, Xiaolin Fang. Energy-efficient activation of nodes and radios in multi-radio WLAN mesh networks[J], International Journal of Sensor Networks, 2017, 23(3): 187-200. (SCI)
[10]Gaofeng He, Ming Yang, Junzhou Luo, Xiaodan Gu. A novel application classification attack against Tor[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.3593, December 2015, 27(18): 5640–5661. (SCI)
[11]Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu. How to block Tor's hidden bridges: detecting methods and countermeasures[J], The Journal of Supercomputing, DOI: 10.1007/s11227-012-0788-4, Dec 2013, 66(3):1285-1305. (SCI)
[12]Ming Yang, Bo Liu, Wei Wang, Junzhou Luo, Xiaojun Shen. Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks[J], Journal of Universal Computer Science (JUCS), 2014, 20(13): 1855-1874. (SCI)
[13]Xiaogang Wang, Ming Yang, Junzhou Luo. A novel sequential watermark detection model for efficient traceback of secret network attack flows[J], Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2013.01.015i, Nov. 2013, 36(6): 1660-1670. (SCI)
[14]Junzhou Luo, Xiaogang Wang, Ming Yang. An interval centroid based spread spectrum watermarking scheme for multi-flow traceback[J], Journal of Network and Computer Applications, January 2012, 35(1): 60-71. (SCI)
[15]Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling. A potential HTTP-based application-level attack against Tor[J], Future Generation Computer Systems, January 2011, 27(1):67-77. (SCI)
[16]Junzhou Luo, Wenjia Wu, Yang Ming. Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks[J], Journal of Universal Computer Science, 2011, 17(14): 2064-2083. (SCI)
[17]Junzhou Luo, Ming Yang. Analysis of Security Protocols Based on Challenge- Response[J], Science in China Series F, February 2007, 50(2):137-153. (SCI)
[18]Zhen Ling, Luo Junzhou, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu. SecTap: Secure Back of Device Input System for Mobile Devices[C], in Proceedings of the 37th IEEE International Conference on Computer Communications, INFOCOM'18, Honolulu, HI, USA, 15-19 April 2018. (CCF A类会议)
[19]Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu, Secure Fingertip Mouse for Mobile Devices, in Proceedings of the 35th IEEE International Conference on Computer Communications, INFOCOM'16, San Francisco, CA, USA, April 10-15, 2016. (CCF A类会议)
[20]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery[C], in Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM'12, March 25-30, 2012, Orlando, Florida, USA, 2381-2389. (CCF A类会议)
[21]Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu. A Novel Network Delay Based Side-Channel Attack: Modeling and Defense[C], in Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM'12, March 25-30, 2012, Orlando, Florida, USA, 2390-2398. (CCF A类会议)
[22]Yaowen Liu, Ming Yang, Zhen Ling, and Junzhou Luo. Implicit Authentication for Mobile Device based on 3D Magnetic Finger Motion Pattern[C], in Proceedings of the 2017 IEEE 21st International Conference on Computer supported Cooperative Work in Design, CSCWD2017, Wellington, New Zealand, 2017, 325-330. (Best Application Paper Award)
[23]Qiyuan Gong, Ming Yang, Zhouguo Chen, and Junzhou Luo. Utility Enhanced Anonymization for Incomplete Microdata[C], In Proceedings of IEEE 20th International Conference on Computer Supported Cooperative Work in Design, CSCWD2016, Nanchang, China, May 4-6, 2016.
[24]Wu Wenjia, Luo Junzhou, Yang Ming, Yang Laurence T. Joint Interface Placement and Channel Assignment in Multi-channel Wireless Mesh Networks[C], in Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications,ISPA'12, July 10-13, 2012, pp395-402, Leganes, Madrid, Spain, 2012 (EI)
[25]Ming Yang, Junzhou Luo, Wenjia Wu. Modeling and Analysis of the Performance and Security for Anonymous Communication[C], in Proceedings of the 4th International Conference on Pervasive Computing and Applications, Tamkang University, Taiwan, December 3-5, 2009. (EI)
[26]罗军舟,杨明,凌振,吴文甲,顾晓丹. 网络空间安全体系与关键技术[J]. 中国科学: 信息科学, 2016年8月, 46(8): 939-968. (EI)
[27]龚奇源,杨明,罗军舟. 面向关系-事务数据的数据匿名方法[J]. 软件学报, 2016年11月, 27(11): 2828−2842. (EI)
[28]张怡婷,傅煜川,杨明,罗军舟. 基于PBAC模型和IBE的医疗数据访问控制方案[J]. 通信学报, 2015年12月, 36(12): 200-211. (EI)
[29]顾晓丹,杨明,罗军舟,蒋平. 针对SSH匿名流量的网站指纹攻击方法研究[J]. 计算机学报, 2015年4月, 38(4): 833-845. (EI)
[30]何高峰,杨明,罗军舟,张璐,马媛媛. 洋葱路由追踪技术中时间特征的建模与分析[J], 计算机学报, 2014年2月, 37(2): 356-372. (EI)
[31]吴文甲,杨明,罗军舟. 无线Mesh网络中满足带宽需求的路由器部署方法[J], 计算机学报, 2014年2月, 37(2): 344-355. (EI)
[32]何高峰,杨明,罗军舟,张璐. Tor匿名通信流量在线识别方法[J], 软件学报, 2013年3月, 24(3): 540-556. (EI)
[33]龚奇源,杨明,罗军舟. 面向缺失数据的数据匿名方法[J], 软件学报, 2013年12月, 24(12): 2883-2896. (EI)
[34]王维,杨明,罗军舟,刘波. 多射频无线Mesh网络组播端到端时延建模与优化[J], 计算机学报, 2012年7月, 35(7): 1358-1369. (EI)
[35]王维,杨明,罗军舟,吴文甲. 基于网络编码的多射频Mesh网组播时延建模与分析[J], 计算机研究与发展, 2012年6月, 49(6): 1174-1184. (EI)
[36]吴文甲,杨明,罗军舟,王维. 干扰约束和负载均衡的无线Mesh网络网关部署策略[J], 计算机学报, 2012年5月, 35(5): 883-897. (EI)
[37]张璐,罗军舟,杨明,何高峰. 基于时隙质心流水印的匿名通信追踪技术[J], 软件学报, 2011年10月, 22(10): 2358-2371. (EI)
[38]张璐,罗军舟,杨明,何高峰. 包间隔流关联技术中的同步问题研究[J], 计算机研究与发展, 2011年9月, 48(9): 1643-1651. (EI)
[39]罗军舟,吴文甲,杨明. 移动互联网: 终端、网络与服务[J], 计算机学报, 2011年11月, 34(11): 2029-2051. (EI)
[40]杨明,罗军舟. 安全协议关联性分析[J], 通信学报, 2006年7月, 27(7):39-45. (EI)
[41]杨明,罗军舟. 基于认证测试的安全协议分析[J], 软件学报, 2006年1月, 17(1): 148-156.(EI)
[42]罗军舟,杨明. 基于挑战-响应的安全协议分析[J], 中国科学: 信息科学, 2006年12月, 36(12): 1421-1441.