个人简介
教授,博士生导师。研究方向包括:可信计算、无线传感器网络、云计算与大数据智能计算及应用等。长期以来一直担任多个领域的专家组成员。已主持完成了几十项国家、省部级项目和科技合作研发项目。现主持国家自然科学基金、国家十三五预研基金等近20项科研项目。主持的研究项目曾先后获得国防科技进步二等奖一项、省部级科技进步三等奖四项,均为排名第一。作为第一发明人已获得六项国家发明专利授权,另有已公开的国家发明专利二十多项。先后在国内外核心期刊和国际学术会议上发表学术论文一百多篇,其中绝大部分为SCI或EI收录。
发表学术论文,出版专著情况:
已有多篇论文发表在一流期刊或主流期刊。如“Modeling dependability features for Real-Time Embedded Systems”发表在CCF A类《IEEE Transactions on Dependable and Secure Computing》期刊。
获奖情况:
1)基于WSN的动态测量系统,国防科技进步三等奖,2016GFJBJ3356-R01(排名第1)
2)主动式邮件安全网关,国防科技进步三等奖,2009GFJBJ3356-R01(排名第1)
3)基于信息安全的航空设备研制管理系统,航空科技成果奖三等奖,20080166-1(排名第1 )
4)建模与验模平台研究,国防科技进步二等奖,2007GFJ2216- R01(排名第1)
5)主动式网络信息安全监控系统,江苏省科技进步三等奖,2006-03-061-01(排名第1)
专利情况:
已获得六项发明专利授权,已公开发明专利二十多项。
承担的科研项目情况:
主持研究的部分科研项目如下:
(1)国家自然科学基金面上项目,高可信嵌入式软件建模与验证方法的研究
(2)国防共性技术基金,高可信计算环境与可信属性验证技术研究
(3)预研基金项目,高可信软加固技术研究
(4)预研基金项目,H-DE 平台研究
(5)科技研发项目,基于WSN的落区控制技术研究
(6)科技研发项目,软件系统自重构支撑技术研究与应用
(7)科技研发项目,软件流监控技术研究与应用
(8)科技研发项目,云存储终端应用安全分析技术研究
(9)科技研发项目,基于Android的恶意代码检测方法研究
科研项目
[1] 高可信控制系统软件协同开发技术代码自动生成插件研发
[2] 系统安全评估技术及智能联动式安全管理系统开发
[3] **XX15 发控软件流监控研究
[4] 项目开发
[5] XXX协议模糊测试分析软件
[6] 云存储终端应用安全分析技术研究
[7] 多机集群管理软件
[8] 嵌入式软件可信验证方法研究
[9] 民航运营管理教学模拟系统
[10] 项目开发
[11] 项目开发
[12] 项目开发
[13] 项目开发
[14] 项目开发
[15] 项目开发
研究领域
学科研究方向一:计算机科学与技术
云计算 无线传感器网络 大数据智能处理
学科研究方向二:软件工程
可信软件 网络服务 中间件
学科研究方向三:网络空间安全
可信计算
计算机
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
[1]Hu X, Zhuang Y. PHRiMA: A Permission-Based Hybrid Risk Management Framework for Android Apps[J]. Computers & Security, 2020:101791.
[2]Hu X, Zhuang Y, Zhang F. A security modeling and verification method of embedded software based on Z and MARTE[J]. Computers & Security, 2020, 88: 101615.
[3]Jiaye Pan, Yi Zhuang, et al. Lightweight and Efficient Hypervisor-based Dynamic Binary Instrumentation and Analysis Method, IEEE Access, Vol. 8, pp. 164593-164610, 2020.
[4]WANG Z. Zhuang Y. A Mutual Authentication Based Remote Attestation Scheme for Embedded Systems. IET Information Security.IFS-2019-0027.R2
[5]Jiaye Pan, Yi Zhuang and BingLin Sun. BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. Security and Communication Networks
[6]Pan J, Zhuang Y, Sun B. Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs[J]. Security and Communication Networks, 2019.
[7]J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang,“Consortium Blockchain-based Malware Detection in Mobile Devices”, IEEE Access, 2018/2/13
[8] Jayi Pan Yi Zhuang. PMCAP: A Threat Model of Process Memory Data on the Windows Operating System,Security & Communication Network,2017(1),1-15
[9] Siru Ni, Yi Zhuang, Gu Jingjing, Ying Huo. A formal model and risk assessment method for Security-Critical Real-Time Embedded Systems. Computers & Security, 2016, 58: 199-215.
[10] Siru Ni, Yi Zhuang Modeling dependability features for Real-Time Embedded Systems. IEEE Transactions on Dependable and Secure Computing, 2015,12(2):190-203.
[1] 胡镡文,庄毅.PHRiMA: A Permission-Based Hybrid Risk Management Framework for Android Apps[J].Computers & Security,2020
[2] 庄毅,,等.A security modeling and verification method of embedded software based on Z and MARTE.Comput Secur,2020
[3] 潘家晔,庄毅.BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel[J].Security and Communication Networks
[4] 倪思如,庄毅.A formal model and risk assessment method for security-critical real-time embedded systems[J].Computers & Security
[5] 庄毅,,等.PMCAP: A Threat Model of Process Memory Data on the Windows Operating System.SECURITY AND COMMUNICATION NETWORKS,2017
[6] 汪自旺,庄毅.A Mutual Authentication Based Remote Attestation Scheme for Embedded Systems.IET Information Security
[7] 庄毅,,等.Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.Secur. Commun. Networks,2019
[8] 庄毅,,等.Modeling and Validation for Embedded Software Confidentiality and Integrity.2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE),2017
[9] 庄毅,,等.An Enhancement Method for Android Permission Mechanism based on Context.PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING (AMCCE 2017),2017
[10] 庄毅,,等.Ego-network probabilistic graphical model for discovering on-line communities.APPLIED INTELLIGENCE,2018
[11] 庄毅,,等.Multifocus image fusion method based on a convolutional neural network.J. Electron. Imaging,2019
[12] 庄毅,谭慧俊,庄毅等.Fractal characteristics of turbulent-non-turbulent interface in supersonic turbulent boundary layers.JOURNAL OF FLUID MECHANICS,2018
[13] 庄毅,,等.Infrared and visible images fusion method based on discrete wavelet transform.J. Comput.,2017
[14] 庄毅,Zhuang, Yi,庄毅等.Letter: Evolution of coherent vortical structures in a shock wave/turbulent boundary-layer interaction flow.Phys. Fluids,2018