当前位置: X-MOL首页全球导师 国内导师 › 庄毅

个人简介

教授,博士生导师。研究方向包括:可信计算、无线传感器网络、云计算与大数据智能计算及应用等。长期以来一直担任多个领域的专家组成员。已主持完成了几十项国家、省部级项目和科技合作研发项目。现主持国家自然科学基金、国家十三五预研基金等近20项科研项目。主持的研究项目曾先后获得国防科技进步二等奖一项、省部级科技进步三等奖四项,均为排名第一。作为第一发明人已获得六项国家发明专利授权,另有已公开的国家发明专利二十多项。先后在国内外核心期刊和国际学术会议上发表学术论文一百多篇,其中绝大部分为SCI或EI收录。 发表学术论文,出版专著情况: 已有多篇论文发表在一流期刊或主流期刊。如“Modeling dependability features for Real-Time Embedded Systems”发表在CCF A类《IEEE Transactions on Dependable and Secure Computing》期刊。 获奖情况: 1)基于WSN的动态测量系统,国防科技进步三等奖,2016GFJBJ3356-R01(排名第1) 2)主动式邮件安全网关,国防科技进步三等奖,2009GFJBJ3356-R01(排名第1) 3)基于信息安全的航空设备研制管理系统,航空科技成果奖三等奖,20080166-1(排名第1 ) 4)建模与验模平台研究,国防科技进步二等奖,2007GFJ2216- R01(排名第1) 5)主动式网络信息安全监控系统,江苏省科技进步三等奖,2006-03-061-01(排名第1) 专利情况: 已获得六项发明专利授权,已公开发明专利二十多项。 承担的科研项目情况: 主持研究的部分科研项目如下: (1)国家自然科学基金面上项目,高可信嵌入式软件建模与验证方法的研究 (2)国防共性技术基金,高可信计算环境与可信属性验证技术研究 (3)预研基金项目,高可信软加固技术研究 (4)预研基金项目,H-DE 平台研究 (5)科技研发项目,基于WSN的落区控制技术研究 (6)科技研发项目,软件系统自重构支撑技术研究与应用 (7)科技研发项目,软件流监控技术研究与应用 (8)科技研发项目,云存储终端应用安全分析技术研究 (9)科技研发项目,基于Android的恶意代码检测方法研究 科研项目 [1] 高可信控制系统软件协同开发技术代码自动生成插件研发 [2] 系统安全评估技术及智能联动式安全管理系统开发 [3] **XX15 发控软件流监控研究 [4] 项目开发 [5] XXX协议模糊测试分析软件 [6] 云存储终端应用安全分析技术研究 [7] 多机集群管理软件 [8] 嵌入式软件可信验证方法研究 [9] 民航运营管理教学模拟系统 [10] 项目开发 [11] 项目开发 [12] 项目开发 [13] 项目开发 [14] 项目开发 [15] 项目开发

研究领域

学科研究方向一:计算机科学与技术 云计算 无线传感器网络 大数据智能处理 学科研究方向二:软件工程 可信软件 网络服务 中间件 学科研究方向三:网络空间安全 可信计算

计算机

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1]Hu X, Zhuang Y. PHRiMA: A Permission-Based Hybrid Risk Management Framework for Android Apps[J]. Computers & Security, 2020:101791. [2]Hu X, Zhuang Y, Zhang F. A security modeling and verification method of embedded software based on Z and MARTE[J]. Computers & Security, 2020, 88: 101615. [3]Jiaye Pan, Yi Zhuang, et al. Lightweight and Efficient Hypervisor-based Dynamic Binary Instrumentation and Analysis Method, IEEE Access, Vol. 8, pp. 164593-164610, 2020. [4]WANG Z. Zhuang Y. A Mutual Authentication Based Remote Attestation Scheme for Embedded Systems. IET Information Security.IFS-2019-0027.R2 [5]Jiaye Pan, Yi Zhuang and BingLin Sun. BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. Security and Communication Networks [6]Pan J, Zhuang Y, Sun B. Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs[J]. Security and Communication Networks, 2019. [7]J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang,“Consortium Blockchain-based Malware Detection in Mobile Devices”, IEEE Access, 2018/2/13 [8] Jayi Pan Yi Zhuang. PMCAP: A Threat Model of Process Memory Data on the Windows Operating System,Security & Communication Network,2017(1),1-15 [9] Siru Ni, Yi Zhuang, Gu Jingjing, Ying Huo. A formal model and risk assessment method for Security-Critical Real-Time Embedded Systems. Computers & Security, 2016, 58: 199-215. [10] Siru Ni, Yi Zhuang Modeling dependability features for Real-Time Embedded Systems. IEEE Transactions on Dependable and Secure Computing, 2015,12(2):190-203. [1] 胡镡文,庄毅.PHRiMA: A Permission-Based Hybrid Risk Management Framework for Android Apps[J].Computers & Security,2020 [2] 庄毅,,等.A security modeling and verification method of embedded software based on Z and MARTE.Comput Secur,2020 [3] 潘家晔,庄毅.BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel[J].Security and Communication Networks [4] 倪思如,庄毅.A formal model and risk assessment method for security-critical real-time embedded systems[J].Computers & Security [5] 庄毅,,等.PMCAP: A Threat Model of Process Memory Data on the Windows Operating System.SECURITY AND COMMUNICATION NETWORKS,2017 [6] 汪自旺,庄毅.A Mutual Authentication Based Remote Attestation Scheme for Embedded Systems.IET Information Security [7] 庄毅,,等.Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.Secur. Commun. Networks,2019 [8] 庄毅,,等.Modeling and Validation for Embedded Software Confidentiality and Integrity.2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE),2017 [9] 庄毅,,等.An Enhancement Method for Android Permission Mechanism based on Context.PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING (AMCCE 2017),2017 [10] 庄毅,,等.Ego-network probabilistic graphical model for discovering on-line communities.APPLIED INTELLIGENCE,2018 [11] 庄毅,,等.Multifocus image fusion method based on a convolutional neural network.J. Electron. Imaging,2019 [12] 庄毅,谭慧俊,庄毅等.Fractal characteristics of turbulent-non-turbulent interface in supersonic turbulent boundary layers.JOURNAL OF FLUID MECHANICS,2018 [13] 庄毅,,等.Infrared and visible images fusion method based on discrete wavelet transform.J. Comput.,2017 [14] 庄毅,Zhuang, Yi,庄毅等.Letter: Evolution of coherent vortical structures in a shock wave/turbulent boundary-layer interaction flow.Phys. Fluids,2018

推荐链接
down
wechat
bug