当前位置: X-MOL首页全球导师 国内导师 › 方黎明

个人简介

方黎明,教授,国家重点研发计划青年首席科学家。在密码学、隐私计算、人工智能安全、区块链等领域具有长期的技术积累,承担了国家重点研发计划(青年科学家)、国家自然科学基金(面上、青年)、工信部工业互联网创新发展工程、江苏省重点研发计划等十余项,申请发明专利二十余项,在科学出版社出版专著一本。担任多个SCI期刊的客座编辑,在Theoretical Computer Science、IEEE Transactions on Dependable and Secure Computing、IEEE Transactions on Information Forensics and Security、IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems、IEEE Transactions on Parallel and Distributed Systems、IEEE Transactions on Industrial Informatics、IEEE Transactions on Fuzzy Systems、ACM Transactions on Data Science、ACM Transactions on Multimedia Computing, Communications and Applications、IEEE Internet of Things J.、Designs Codes and Cryptography、ICDE等国际著名期刊和会议上发表论文80余篇。 科研成果获奖及专利: 1、 方黎明、朱泽升、恽昕宇,一种基于多维度特征和模糊粗糙集的恶意域名检测方法及检测系统,发明专利, 专利申请日:2022.2.17, 中国, 申请号:202210145317.9 2、 方黎明、恽昕宇、朱泽升,一种基于流量指纹和图数据特征的安卓恶意软件检测方法及检测系统,发明专利, 专利申请日:2022.2.17, 中国, 申请号:202210144962.9 3、 方黎明; 李阳; 恽昕宇, 一种基于隐式登录指示符传递的图形认证方法, 发明专利, 专利申请日:2020.12.24, 中国, 申请号:202011545496.5 4、 方黎明; 恽昕宇; 李阳, 一种可抵抗多重攻击的基于生物行为特征的登录认证方法, 发明专利, 专利申请日:2020.12.24, 中国, 申请号:202011548482.6 5、 方黎明; 李明慧; 李阳, 一种基于地理位置的可认证的二维码支付方法, 发明专利, 专利申请日: 2020-12-18, 中国, 申请号: 202011456138.4 6、 方黎明; 刘哲; 刘亮; 葛春鹏; 沈立; 胡跃龙; 殷常春; 李阳, 一种细粒度策略的条件代理可重构加密方法, 发明专利, 专利申请日: 2019-11-18, 中国, 申请号: 201911127494.9 7、 方黎明; 李阳; 恽昕宇, 一种基于图形的登录认证方法, 发明专利, 专利申请日: 2019-11-15, 中国, 申请号: 201911117292.6 8、 方黎明; 刘哲; 刘亮; 葛春鹏; 沈立; 胡跃龙; 张涵一; 李明慧, 一种模糊条件的代理广播可重构加密方法, 发明专利, 专利申请日: 2018-12-19, 中国, 申请号: 201811553447.6 9、 方黎明; 来容易; 黄志球; 王建东; 刘亮; 吴孙慈, 一种无须安全信道的带关键词搜索公钥加密方法, 发明专利, 专利申请日: 2018-05-11, 中国, 申请号: 201810227500.7 10、 程桂花; 闫军; 代宗波; 钟显恒; 方黎明, 一种基于BCSA优化支持向量机的电梯故障诊断方法, 发明专利, 专利申请日:2017-07-11, 中国, 申请号: CN201710559561.9 11、 方黎明;葛春鹏;陈小杰, 一种基于可搜索密文的智能家居安全访问方法及其系统, 发明专利, 专利申请日:2012-10-19, 中国, 申请号: 201210399443.3 12、 方黎明;葛春鹏, 一种基于运动检测的智能家居监控方法及其系统, 发明专利, 专利申请日:2012-08-28, 中国, 申请号: 201210309639.9 13、 方黎明;陈小杰, 一种万能遥控器关联方法及其系统, 发明专利, 专利申请日:2012-08-29, 中国, 申请号: 201210311865.0 14、 范渊; 方黎明; 张小孟; 莫金友等, 一种无线网络攻击定位方法, 发明专利, 专利申请日:2017-03-16, 中国, 申请号: CN201710157892.X 15、 范渊、方黎明; 张小孟; 莫金友等, 入侵检测系统中基于多属性哈希去重的网络日志存储方法, 发明专利, 专利申请日:2017-03-16, 中国, 申请号: CN201710167463.0 16、 金晓东; 孙博; 黄步添; 王建东; 方黎明, 基于服刑人员行为特征集成学习模型的危险倾向预测方法, 发明专利, 专利申请日:20140822, 中国, 申请号: CN201410416208. 17、 邹朋成; 金晓东; 黄步添; 王建东; 陈海燕; 方黎明等, 一种监狱服刑人员危险性倾向的智能分析预警方法, 发明专利, 专利申请日:20140822, 中国, 申请号: CN201410245760.9 18、 任勇军;顾彬;方黎明;王建东, 基于sniffer的无线传感网的入侵检测方法, 发明专利, 专利申请日:2010-07-28, 中国, 申请号: 201010238738.3 19、 应华;方黎明, 一种信息加密的无线灯联网系统及其加密通讯方法, 发明专利, 专利申请日:2011-06-23, 中国, 申请号: 201110171229.8 20、 任勇军;方黎明;葛春鹏;王建东, 基于可搜索密文的WSN数据安全处理方法, 发明专利, 专利申请日:2010-07-28, 中国, 申请号:201010238740.0 21、 方黎明; 葛春鹏, 一种基于多agent的智能家居学习系统及方法, 发明专利, 专利申请日:2013-02-01, 中国, 申请号:201310040235.9 22、 王建东; 孙婷; 方黎明; 朱新峰; 孙茂圣; 王丽娜,基于AES加密的机场噪声预测数据网络传输方法, 发明专利, 专利申请日:2013-06-8, 中国, 申请号: CN201310226583.5 23、 赵国安;刘玉龙;薛琳强;方黎明;郁斌;田明, 无线传感器网络中执行非对称密码的方法, 发明专利, 专利申请日:2010-04-29, 中国, 申请号: 201010159400.9 24、 方黎明, 徐圣, 陈小杰, 一种智能家居网关, 实用新型, 中国, 申请号: 201220435047.7 25、 方黎明,葛春鹏, 一种智能家居监控系统, 实用新型, 中国, 申请号: 201220430638.5 26、 方黎明, 应华, 徐圣,一种节能插座控制电路, 实用新型, 中国, 申请号: 201220643650.4 承担国家及省部级科研项目情况: 1、人工智能安全防御与评估技术,科技部重点研发青年科学家项目,300万,项目编号:2021YFB3100700,2021.12-2024.11,主持,国家级项目 2、支持多关键词复杂匹配的可搜索代理重加密研究 ,国家自然科学基金(面上项目),项目编号:61872181,2019.1-2021.12,主持,国家级项目 3、人工智能安全理论及验证平台,国家重点研发计划,552万,2021.1-2023.12,课题共同负责人 4、安全可控体系恶意代码分析设备,工信部工业互联网创新发展工程,招标编号:TC200H02X, 120万,2020.10-2021.10,南航负责人,省部级项目; 5、工业互联网威胁诱捕技术及设备,工信部工业互联网创新发展工程,招标编号:TC190H46H, 120万,2019.9-2021.5,南航负责人,省部级项目; 6、支持国密标准的自主可控区块链防伪追溯的文化艺术品展示与交易平台研发,江苏省重点研发计划(产业前瞻),项目编号:1015-PBA20002,2020.7-2023.6,负责人,省部级项目; 7、可搜索公钥加密关键安全性问题的研究,国家自然科学基金(青年基金),项目编号:61300236,2014.1-2016.12,主持,国家级项目; 8、轻量化密码算法技术合作项目,华为技术有限公司,160万,2020.07-2021.1,在研 9、区块链发票系统中隐私保护加密算法研发,深圳市腾讯计算机系统有限公司,50万,2020.08--2021.01,在研 10、带多关键字搜索的公钥加密的研究,江苏省基础研究(自然科学基金),项目编号:BK20130809,2013.9-2016.12,主持,省部级项目; 11、基于多关键字的条件代理重加密的研究,中国博士后面上基金一等资助,项目编号:2013M530254,主持,省部级项目; 12、支持多关键词匹配的可搜索公钥加密的研究,中国博士后科学基金特别资助,主持,省部级项目; 13、支持复杂匹配搜索的可搜索公钥加密的研究,江苏省博士后基金, 编号:1302137C,主持,省部级项目; 14、支持多条件复杂匹配的代理重加密研究,国家自然科学基金(青年基金),项目编号:61702236,2017.1-2019.12,参与,国家级项目 15、XX项目,十三五总装预研基金项目,2016.1-2020.12, 参与,国家级项目; 16、云计算演化环境中的隐私建模与检测方法研究,国家自然科学基金(面上项目),项目编号:61272083,81万,2013.1-2016.12,参与,国家级项目; 17、面向机场感知的噪声监测及其环境评估,国家自然基金重点项目,项目编号:61139002,280万,2011-2014,参与,国家级项目; 18、基于服务架构的民航公众信息服务平台,科技部, 863重点项目,项目编号:2006AA12A106,260万,2007-2009,参与,国家级项目; 19、参与直升机/无人机战术信息网络安全技术的研究,航空科学基金, 2005-2007,参与,省部级项目; 20、项目:ARC Future Fellowship FT0991397;参与 教育经历 2005.9 -- 2012.3 南京航空航天大学 计算机应用技术 博士研究生毕业 工学博士学位 2001.9 -- 2005.6 南京航空航天大学 计算机科学与技术 大学本科毕业 工学学士学位 工作经历 2013.1 -- 2017.8南京航空航天大学 方黎明,教授,国家重点研发计划青年首席科学家、南京航空航天大学智能与安全实验室副主任、高安全系统的软件开发与验证技术工信部重点实验室学术带头人、香港城市大学博士后、CCF区块链专委会委员、江苏省计算机学会区块链专委会委员、江苏省人工智能学会智能与安全专委会秘书长,浙江省科技进步奖评审专家、湖北省科技项目评审专家。担任国际会议WASA 2021组织委员会主席,Inscrypt 2019组织委员会主席,担任CryptoIC 2019组织委员会主席,担任SpaCCS 2020国际会议秘书长,担任十多个国际会议程序委员会委员,主要研究方向人工智能安全、隐私计算、区块链、密码学。 授课信息 新兴安全技术 /2020-2021 /春学期 /24课时 /0.0学分 /162K0120.02 信息安全导论 /2020-2021 /秋学期 /16课时 /0.0学分 /16202060 操作系统原理与实践 /2018-2019 /秋学期 /48课时 /0.0学分 /16103610

研究领域

网络空间安全 人工智能安全,隐私计算、密码学、区块链等

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1].Liming Fang, Hanyi Zhang, Minghui Li, Chunpeng Ge, Liang Liu, Zhe Liu: A Secure and Fine-grained Scheme for Data Security in Industrial IoT Platforms for Smart City, IEEE Internet of Things Journal, 2020, 7(9): 7982-7990. (中科院一区, IF: 9.515) [2].Liming Fang, Minghui Li, Zhe Liu, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge. A Secure and Authenticated Mobile Payment Protocol Against Off-site Attack Strategy. IEEE Transactions on Dependable and Secure Computing, 2021. (CCF A, IF: 6.211, 已录用) [3].Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang, Revocable Attribute-Based Encryption with Data Integrity in Clouds, IEEE Transactions on Dependable and Secure Computing, 2021. (CCF A, IF: 6.211, 已录用) [4].Liming Fang, Yang Li, Zhe liu, Changchun Yin, Minghui Li, Zehong Cao. A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks. IEEE Transactions on Industrial Informatics. 2021, 17(6): 4260-4269.(中科院一区期刊,IF=9.112) [5].Chunpeng Ge, Zhe Liu, Jinyue Xia, Liming Fang. Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3), 1214-1226. DOI: 10.1109/TDSC.2019.2899300 (CCF A类, IF:6.404) [6].Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang, A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds, IEEE Transactions on Dependable and Secure Computing, 2021. DOI: 10.1109/TDSC.2021.3076580. (CCF A, IF: 6.211, 已录用) [7].Liming Fang, Changchun Yin, Juncen Zhu, Chunpeng Ge, M. Tanveer, Alireza Jolfaei, Zehong Cao*: Privacy Protection for Medical Data Sharing in Smart Healthcare, ACM Transactions on Multimedia Computing, Communications, and Applications, 2020, 16(3s): 1-18. (CCF B类) [8].Liming Fang, Bo Zhao, Yang Li, Zhe Liu, Chunpeng Ge, Weizhi Meng. Countermeasure Based on Smart Contracts and AI Against DoS/DDoS Attack in 5G Circumstances. IEEE Network. 2020, 34(6): 54-61. (中科院一区, IF: 7.503) [9].Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, Liming Fang*;WebEnclave: Protect Web Secrets from browser extensions with Software Enclave, IEEE Transactions on Dependable and Secure Computing, 2021. (CCF A, IF: 6.211, 已录用) [10].Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, Muhammad Tanveer. THP: A Novel authentication scheme to prevent multiple attacks in SDN-based IoT network[J]. IEEE Internet of Things Journal, 2019, 7(7): 5745-5759. DOI: 10.1109/JIOT.2019.2944301 (中科院一区, IF: 9.515) [11].Liming Fang, Changchun Yin, Lu Zhou, Yang Li, Chunhua Su, Jinyue Xia. A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine[J]. Information Sciences, 2020, 507: 143-160. DOI: 10.1016/j.ins.2019.08.020 (中科院一区, IF: 5.524) [12].Chunpeng Ge, Zhe Liu, Liming Fang, Huangding Ling, Aiping Zhang, Changchun Yin. A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection with Electroluminescence Images. IEEE Transactions on Parallel and Distributed Systems. 2020. DOI: 10.1109/TPDS.2020.3046018. (CCF A类) [13].Chunpeng Ge, Willy Susilo, Zhe Liu, Jinyue Xia, Liming Fang, Pawel Szalachowski: Secure Keyword Search and Data Sharing Mechanism for Cloud Computing, IEEE Transactions on Dependable and Secure Computing, 2020, DOI: 10.1109/TDSC.2020.2963978 (CCF A类, IF:6.404) [14].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Public Key Encryption with Keyword Search Secure Against Keyword Guessing Attacks without Random Oracle. Information Sciences. 2014, 238:221–241. DOI: 10.1016/j.ins.2013.03.008 (中科院一区, IF: 5.524) [15].Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, Liming Fang, Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining, IEEE International Conference on Data Engineering (ICDE’21), April 19-22, 2021, Chania, Crete, Greece. (CCF A) [16].Weiting Zhang, Hanyi Zhang, Liming Fang*, Zhe Liu, and Chunpeng Ge. A Secure Revocable Fine-grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems. IEEE Internet of Things Journal, 2021.(中科院一区期刊,IF=9.112) [17].Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqing Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Reheem Beyah. A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Transactions on Dependable and Secure Computing, 2020. (CCF A类, IF: 6.211) [18].Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, Zehong Cao. HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM. ACM Transactions on Data Science, 2020, 1(4): 1-18. DOI: 10.1145/3385189. [19].Yushu Zhang, Ping Wang, Liming Fang, Xing He, Hao Han, Bing Chen. Secure Transmission of Compressed Sampling Data Using Edge Clouds. IEEE Transactions on Industrial Informatics, 2020,16(10):6641-6651. DOI: 10.1109/TII.2020.2966511 (中科院一区, IF: 7.737) [20].Zhuo Su, Dongyan Wang, Yixiao Yang, Yu Jiang, Wanli Chang, Liming Fang, Wen Li, Jiaguang Sun. Code Synthesis for Dataflow Based Embedded Software Design, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, DOI: 10.1109/TCAD.2021.3055487 (CCF A类) [21].Liming Fang, Xinyu Yun, Changchun Yin, Weiping Ding, Lu Zhou, Zhe Liu, Chunhua Su. ANCS: Automatic NXDomain Classification System based on Incremental Fuzzy Rough Sets Machine Learning, IEEE Transactions on Fuzzy Systems, 2020, 29(4): 742-756. DOI: 10.1109/TFUZZ.2020.2965872 (中科院一区, IF: 8.759). [22].Chunpeng Ge, Zhe Liu, Liming Fang. A blockchain based decentralized data security mechanism for the Internet of Things[J]. Journal of Parallel and Distributed Computing, 2020, 141: 1-9. [23].Chunpeng Ge, Changchun Yin, Zhe Liu, Liming Fang, Juncen Zhu, Huading Lin. A privacy preserve big data analysis system for wearable wireless sensor network[J]. Computers & Security, 2020, 96: 101887. (CCF B类) [24].Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen and Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security, 2017, 12(6): 1382-1392. DOI: 10.1109/TIFS.2017.2659640 (CCF A类, IF: 6.211) [25].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 2012, 462(4): 39-58. DOI: 10.1016/j.tcs.2012.08.017 (IF: 0.718, CCF B类) [26].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Hierarchical Conditional Proxy Re-encryption. Computer Standards and Interfaces, 2012, 34(4):380-389. DOI: 10.1016/j.csi.2012.01.002 (SCI, IF: 2.441) [27].Yang Li, Xinyu Yun, Liming Fang, Chunpeng Ge. An Efficient Login Authentication System against Multiple Attacks in Mobile Devices. Symmetry, 2021, 13(1): 125 (2021). [28].ChangChun Yin, Hao Wang, Lu Zhou, Liming Fang. 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 277-284. (CCF C类) [29].Minghui Li, Yang Li, Liming Fang. IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 475-482. (CCF C类) [30].Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren. Fuzzy Conditional Proxy Re-encryption. SCIENCE CHINA Information Sciences. 2013, 56(5): 1-13. DOI: 10.1007/s11432-012-4623-6 (CCF B类, IF: 2.731) [31].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Interactive conditional proxy re-encryption with fine grain policy. Journal of Systems and Software, 2011, 84(12): 2293-2302. DOI: 10.1016/j.jss.2011.06.045 (IF: 2.559, CCF B类) [32].Chunpeng Ge, Changchun Yin, Zhe Liu, Liming Fang, Juncen Zhu, Huading Ling, A privacy preserve big data analysis system for wearable wireless sensor network, Computers & Security, 2020. DOI: 10.1016/j.cose.2020.101887 (CCF B类,IF: 3.062) [33].Liming Fang, Liang Liu, Jinyue Xia, Maosheng Sun: A Secure Multimedia Data Sharing Scheme for Wireless Network. Security and Communication Networks, 2018. DOI: 10.1155/2018/5037892 (IF: 1.376, CCF C类) [34].Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang. Privacy preserving cloud data sharing system with flexible control, Computers and Electrical Engineering. 2018. DOI: 10.1016/j.compeleceng.2018.02.048 (JCR: Q2, IF: 2.189) [35].Liming Fang, Minghui Li, Lu Zhou, Hanyi Zhang, Chunpeng Ge. A Fine-Grained User-Divided Privacy- Preserving Access Control Protocol in Smart Watch. Sensors, 19(9): 2109 (2019). DOI: 10.3390/s19092109 (JCR: Q2, IF: 3.031) [36].Chunpeng Ge, Liming Fang, and Jinyue Xia. "Key-Private Identity-Based Proxy Re-encryption." Computers, Materials & Continua, 2020, 63(2): 633-647. DOI: https://doi.org/10.32604/cmc.2020.06217 (SCI, IF: 3.024) [37].Chunpeng, Ge, Zhe Liu, and Liming Fang. "A blockchain based decentralized data security mechanism for the Internet of Things." Journal of Parallel and Distributed Computing, 2020. DOI: 10.1016/j.jpdc.2020.03.005 (JCR: Q2, IF: 1.819) [38].Bo Zhao, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, Chunhua Su. Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors, 2019. DOI: 10.3390/s19143091 (JCR: Q2, IF: 3.031) [39].Liang Liu, Zhaoyang Han, Liming Fang, Zuchao Ma. Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves. Sensors, 19(3): 618 (2019). DOI: 10.3390/s19030618 (JCR: Q2, IF:3.031) [40].Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang. Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing. IJES 11(2): 115-124 (2019). DOI: 10.3390/s19030618 [41].Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi: A CCA-Secure Key-Policy Attribute-based Proxy Re-encryption in the Adaptive Corruption Model for Dropbox Data Sharing System. Designs, Codes & Crptography, 2018. DOI: 10.1007/s10623-018-0462-9 (IF: 1.224, CCF B类) [42].Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang. Identity-based conditional proxy re-encryption with fine grain policy, Computer Standard & Interface. 2017, 52: 1-9. DOI: 10.1016/j.csi.2016.12.005 (SCI, IF: 2.441) [43].Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang: A proxy broadcast re-encryption for cloud data sharing. Multimedia Tools Appl, 2018, 77(9): 10455-10469. DOI: 10.1007/s11042-017-4448-9 (SCI, IF: 2.101 ) [44].Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. A Key-Policy Attribute-based Proxy Re-encryption without Random Oracles, Computer Journal, 2016, 59(7): 970-982. DOI: 10.1093/comjnl/bxv100 (SCI, CCF B类) [45].Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo: A ciphertext policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience. 2015, 27(8): 2004-2027. DOI: 10.1002/cpe.3397 (SCI, IF: 1.167) [46].Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong: A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559. (EI/ISTP) [47].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Proc. of CANS 2009. LNCS 5888, Heidelberg: Springer, 2009: 248-258. (EI/ISTP) [48].Yongjun Ren, Yaping Cheng, Jin Wang, Liming Fang: Data protection based on multifunction digital watermark in wireless sensor network. ICCST 2015: 37-41. (EI/ISTP) [49].Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang: Reliable access control for multi-authority in cloud storage. ICCST 2015: 113-116. (EI/ISTP) [50].Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Outsourced data tagging via authority and delegable auditing for cloud storage. ICCST 2015: 131-134 . (EI/ISTP) [51].Yongjun Ren, Jin Han, Jin Wang, Liming Fang: Privacy-preserving proof of storage in large group. ICCST 2015: 269-272. (EI/ISTP) [52].Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang: Leakage Resilient Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 706-709. [53].Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang: Attributed Based Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 710-713. [54].Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang: Oriented Group Provable Data Possession in Public Cloud. IIH-MSP 2014: 775-778. [55].Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. IIH-MSP 2014: 779-782. [56].Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 795-798 [57].Liming Fang, Willy Susilo, Jiandong Wang. Anonymous Conditional Proxy Re-encryption without Random Oracle. Proc. of ProvSec 2009. LNCS 5848, pp. 47-60. Heidelberg: Springer, 2009: 47-60. (EI) [58].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. International Journal of Digital Content Technology and its Applications. 2010, 4(9):151-160. (EI) [59].Liming Fang, Chunpeng Ge, Jiandong Wang, Yongjun Ren. Decryptable Public Key Encryption with Keyword Search Schemes. International Journal of Digital Content Technology and its Applications, 2010, 4(9):141-150. (EI) [60].Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. Chosen-Ciphertext Secure Fuzzy Identity-Based Encryption without ROM. Journal of Shanghai Jiaotong University, 2008, 13(6):646-650. (EI) [61].Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM. Proc. of 2008 International Conference on Computational Intelligence and Security, Vol. 1, 2008: 326-330. (EI) [62].Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian: Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptology ePrint Archive 2008: 139 (2008) [63].Liming Fang, Jinyue Xia: Full Security: Fuzzy Identity Based Encryption. IACR Cryptology ePrint Archive 2008: 307 (2008) [64].Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren: Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480(EI) [65].Guoan Zhao, Canghai Tan, Yongjun Ren, Liming Fang: An efficient unlinkable secret handshake protocol without ROM.WCNIS 2010: 486-490(EI) [66].Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu: Weighted Margin Multi-Class Core Vector Machines. CIS (1) 2008: 235-239(EI) [67].Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang. Identity-Based Key Issuing Protocol for Ad Hoc Networks. IEEE International Conference on Computational Intelligence and Security, 2007.12 (EI) [68].任勇军, 王建东, 庄毅, 方黎明. 基于属性的认证密钥协商协议. 兰州大学学报, 2010, 46(2): 103-110. [69].卞仕柱, 王建东, 任勇军, 方黎明, 夏金月. 强安全高效的认证密钥交换协议. 计算机工程, 2010, 36(07): 136-139. [70].夏金月, 王建东, 方黎明, 任勇军, 卞仕柱. ECK2007模型与其他密钥协商协议模型安全强弱关系的形式化证明. 南京航空航天大学学报英文版, 2008, 4(7): 282-288. (EI) [71].Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian: Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptology ePrint Archive 2008: 479 (2008) [72].任勇军, 王建东, 庄毅, 方黎明. 基于双线性对的秘密重分配方案. 兰州大学学报, 2008, 44(1): 82-85. [73].任勇军, 王建东, 庄毅, 方黎明. 一种动态的Ad Hoc网络密钥管理方案.南京航空航天大学学报, 2007, 39(9): 810-813. (EI) [74].任勇军, 王建东, 庄毅, 方黎明. 基于身份的Ad Hoc网络密钥分发协议. 武汉大学学报, 2007, 40(5): 133-136. [1].Liming Fang, Hanyi Zhang, Minghui Li, Chunpeng Ge, Liang Liu, Zhe Liu: A Secure and Fine-grained Scheme for Data Security in Industrial IoT Platforms for Smart City, IEEE Internet of Things Journal, 2020, 7(9): 7982-7990. (中科院一区, IF: 9.515) [2].Liming Fang, Minghui Li, Zhe Liu, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge. A Secure and Authenticated Mobile Payment Protocol Against Off-site Attack Strategy. IEEE Transactions on Dependable and Secure Computing, 2021. (CCF A, IF: 6.211, 已录用) [3].Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang, Revocable Attribute-Based Encryption with Data Integrity in Clouds, IEEE Transactions on Dependable and Secure Computing, 2021. (CCF A, IF: 6.211, 已录用) [4].Liming Fang, Yang Li, Zhe liu, Changchun Yin, Minghui Li, Zehong Cao. A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks. IEEE Transactions on Industrial Informatics. 2021, 17(6): 4260-4269.(中科院一区期刊,IF=9.112) [5].Chunpeng Ge, Zhe Liu, Jinyue Xia, Liming Fang. Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3), 1214-1226. DOI: 10.1109/TDSC.2019.2899300 (CCF A类, IF:6.404) [6].Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang, A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds, IEEE Transactions on Dependable and Secure Computing, 2021. DOI: 10.1109/TDSC.2021.3076580. (CCF A, IF: 6.211, 已录用) [7].Liming Fang, Changchun Yin, Juncen Zhu, Chunpeng Ge, M. Tanveer, Alireza Jolfaei, Zehong Cao*: Privacy Protection for Medical Data Sharing in Smart Healthcare, ACM Transactions on Multimedia Computing, Communications, and Applications, 2020, 16(3s): 1-18. (CCF B类) [8].Liming Fang, Bo Zhao, Yang Li, Zhe Liu, Chunpeng Ge, Weizhi Meng. Countermeasure Based on Smart Contracts and AI Against DoS/DDoS Attack in 5G Circumstances. IEEE Network. 2020, 34(6): 54-61. (中科院一区, IF: 7.503) [9].Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, Liming Fang*;WebEnclave: Protect Web Secrets from browser extensions with Software Enclave, IEEE Transactions on Dependable and Secure Computing, 2021. (CCF A, IF: 6.211, 已录用) [10].Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, Muhammad Tanveer. THP: A Novel authentication scheme to prevent multiple attacks in SDN-based IoT network[J]. IEEE Internet of Things Journal, 2019, 7(7): 5745-5759. DOI: 10.1109/JIOT.2019.2944301 (中科院一区, IF: 9.515) [11].Liming Fang, Changchun Yin, Lu Zhou, Yang Li, Chunhua Su, Jinyue Xia. A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine[J]. Information Sciences, 2020, 507: 143-160. DOI: 10.1016/j.ins.2019.08.020 (中科院一区, IF: 5.524) [12].Chunpeng Ge, Zhe Liu, Liming Fang, Huangding Ling, Aiping Zhang, Changchun Yin. A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection with Electroluminescence Images. IEEE Transactions on Parallel and Distributed Systems. 2020. DOI: 10.1109/TPDS.2020.3046018. (CCF A类) [13].Chunpeng Ge, Willy Susilo, Zhe Liu, Jinyue Xia, Liming Fang, Pawel Szalachowski: Secure Keyword Search and Data Sharing Mechanism for Cloud Computing, IEEE Transactions on Dependable and Secure Computing, 2020, DOI: 10.1109/TDSC.2020.2963978 (CCF A类, IF:6.404) [14].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Public Key Encryption with Keyword Search Secure Against Keyword Guessing Attacks without Random Oracle. Information Sciences. 2014, 238:221–241. DOI: 10.1016/j.ins.2013.03.008 (中科院一区, IF: 5.524) [15].Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, Liming Fang, Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining, IEEE International Conference on Data Engineering (ICDE’21), April 19-22, 2021, Chania, Crete, Greece. (CCF A) [16].Weiting Zhang, Hanyi Zhang, Liming Fang*, Zhe Liu, and Chunpeng Ge. A Secure Revocable Fine-grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems. IEEE Internet of Things Journal, 2021.(中科院一区期刊,IF=9.112) [17].Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqing Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Reheem Beyah. A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Transactions on Dependable and Secure Computing, 2020. (CCF A类, IF: 6.211) [18].Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, Zehong Cao. HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM. ACM Transactions on Data Science, 2020, 1(4): 1-18. DOI: 10.1145/3385189. [19].Yushu Zhang, Ping Wang, Liming Fang, Xing He, Hao Han, Bing Chen. Secure Transmission of Compressed Sampling Data Using Edge Clouds. IEEE Transactions on Industrial Informatics, 2020,16(10):6641-6651. DOI: 10.1109/TII.2020.2966511 (中科院一区, IF: 7.737) [20].Zhuo Su, Dongyan Wang, Yixiao Yang, Yu Jiang, Wanli Chang, Liming Fang, Wen Li, Jiaguang Sun. Code Synthesis for Dataflow Based Embedded Software Design, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, DOI: 10.1109/TCAD.2021.3055487 (CCF A类) [21].Liming Fang, Xinyu Yun, Changchun Yin, Weiping Ding, Lu Zhou, Zhe Liu, Chunhua Su. ANCS

学术兼职

南京航空航天大学智能与安全实验室副主任、密码学与应用安全实验室主任、高安全系统的软件开发与验证技术工信部重点实验室学术带头人,香港城市大学博士后,CCF区块链专委会委员、江苏省计算机学会区块链专委会委员、江苏省人工智能学会智能与安全专委会秘书长,浙江省科技进步奖评审专家、湖北省科技项目评审专家、江苏省科技项目评审专家。担任国际会议ProvSec 2022,WASA 2021,Inscrypt 2019,CryptoIC 2019组织委员会主席,担任SpaCCS 2020国际会议秘书长,担任十多个国际会议程序委员会委员

推荐链接
down
wechat
bug