翁健

發布時間: 2021-06-02 來源: 太阳集团1088vip

翁健,男,博士、教授、博士生導師、太阳集团app首页息科學技術學院/網絡空間安全學院執行院長、國家傑出青年科學基金獲得者、珠江學者特聘教授。在CRYPTO 2015、Eurocrypt 2014、TCC 2015、Asiacrypt 2013、ACM CCS 2017、PKC 2017、PKC 2016、PKC 2011、CT-RSA 2013、CT-RSA 2012、CT-RSA 2008、SCN 2010、ACSAC 2009、ESORICS 2014、《Designs, Codes and Cryptography》、《Algorithmica》、《Theoretical Computer Science》、《IEEE Transactions on Computers》、《IEEE Transactions on Dependable and Secure Computing》、《IEEE Transactions on Information Forensics and Security》、《IEEE Transactions on Multimedia》等密碼學國際會議和國際期刊上發表了80多篇論文(其中CCF推薦A類和B類會議和期刊50多篇),近五年來論文被引用2900多次。近五年來主持了包括國家重點研發計劃課題、國家自然科學基金面上項目(2項)、國家自然科學基金青年基金項目(1項)、國家自然科學基金重點項目(1項)、教育部新世紀優秀人才支持計劃項目、霍英東教育基金會青年教師基金基礎性研究課題、廣東省應用型研發專項、廣東省高層次人才項目等在内的10多項項目。曾擔任信息安全國際會議SecureComm 2016大會主席、ISPEC 2011程序委員會主席和RFIDsec'13 Asia程序委員會主席,以及Pairing 2013、IWSEC 2013、IWSEC 2012、ISC 2011、WISTP 2011、ISPEC 2013、ISPEC 2012等30多次國際會議程序委員會委員。

主要榮譽

第26屆信息安全國際會議SCIS 2011(會議地點:Kokura, Japan)最佳論文獎

國家傑出青年科學基金獲得者

廣東省珠江學者特聘教授

廣東省高校“千百十工程”國家獎培養對象

中國密碼學會首屆密碼創新獎

2017年全國網絡安全優秀教師

第八屆可證明安全國際會議ProvSec 2014(會議地點:Hong Kong)最佳學生論文獎

第37屆IEEE分布式計算系統國際會議(ICDCS 2017)最佳學生論文獎

部分期刊論文

1. Xin Chen, Jian Weng, Wei Lu, Jiaming Xu. Multi-Gait Recognition Based on Attribute Discovery. IEEE Transactions on Pattern Analysis and Machine Intelligence (IEEE TPAMI), 40(7): 1697-1710, 2018

2. Jia-Si Weng, Jian Weng, Yue Zhang, Weiqi Luo. BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-based VANET. IEEE Transactions on Vehicular Technology, 2018

3. Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Transactions on Dependable and Secure Computing, 15(1): 27-39, 2018

4. Xin Chen, Jian Weng, Wei Lu, Jiaming Xu, Jia-Si Weng. Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE Transactions on Neural Networks and Learning Systems, 29(9): 3938-3952, 2018

5. Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren. Secure Integrated Circuit Design via Hybrid Cloud. IEEE Transactions on Parallel and Distributed Systems, 29(8): 1851-1864, 2018

6. Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Transactions on Smart Grid 9(5): 4490-4502, 2018

7. Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Transactions on Information Forensics and Security, 12(8): 1874-1884, 2017

8. Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren. Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE Transactions on Smart Grid 8(2): 619-626, 2017

9. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li. Lightweight fine-grained search over encrypted data in fog computing, IEEE Transactions on Services Computing, 2018

10. Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu. False Load Attack to Smart Meters by Synchronously Switching Power Circuits, IEEE Transactions on Smart Grid, 2018

11. Yang Yang, Ximeng Liu, Robert H Deng, Jian Weng. Flexible wildcard searchable encryption system, IEEE Transactions on Services Computing, 2017

12. Minxin Du, Qian Wang, Meiqi He, Jian Weng. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage, IEEE Transactions on Information Forensics and Security 13 (9), 2320-2332, 2018

13. Zhijun Zhang, Lunan Zheng, Jian Weng, Yijun Mao, Wei Lu, Lin Xiao. A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation. IEEE Transactions on Cybernetics, pp. 1-14, 2018

14. Yongdong Wu, Zhuo Wei, Jian Weng, Robert H Deng. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Transactions on Vehicular Technology 67 (6), 5287-5301

15. Zhe Liu, Jian Weng, Xinyi Huang, Zhi Hu, Lu Zhou. Efficient Elliptic Curve Cryptography for Embedded Devices. ACM Transactions on Embedded Computing Systems, 2016

16. Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren. You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Transactions on Dependable and Secure Computing, 2018

17. Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert Deng. Vulnerabilities, Attacks and Countermeasures in Balise-based Train Control Systems, IEEE Transactions on Intelligent Transportation Systems, 18 (4), 814-823, 2017

18. Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K Liu, Xun Yi. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Transactions on Dependable and Secure Computing, 2018

19. Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S Wong. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Transactions on Cloud Computing, 2018

部分CCF推薦會議論文

1. Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond. Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, LNCS 9216, pp. 77-92, Springer-Verlag, 2015

2. Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao. Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. In Proc. of 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2014), LNCS 8441, pp. 77–92, 2014

3. Lingguang Lei,Yi He,Kun Sun,Jiwu Jing,Yuewu Wang,Qi Li,Jian Weng. Vulnerable Implicit Service: A Revisit.ACM CCS2017:1051-1063

4. Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. In Proc. of Twelfth IACR Theory of Cryptography Conference (TCC 2015), LNCS 9014, pp. 7-35, Springer-Verlag, 2015.

5. Yu Yu and Xiangxue Li and Jian Weng. Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters. 19th Annual International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), K. Sako and P. Sarkar (Eds.), LNCS 8270, pp. 261–279, Spring-Verlag, 2013

6. Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng. CCA-Secure Keyed-Fully Homomorphic Encryption. In: 19th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2016), pp. 70-98, 2016.

7. Jian Weng, Yunlei Zhao, Goichiro Hanaoka. On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy

8. Jie Chen, Junqing Gong, Jian Weng.Tightly Secure IBE Under Constant-Size Master Public Key. In: 19th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2017),pp. 207-231.

9. Yanjiang, Jianying Zhou, Jian Weng and Feng Bao. A New Approach for Anonymous Password Authentication. 25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 2009

10. Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou: Verifiable Computation over Large Database with Incremental Updates. In 19th European Symposium on Research in Computr Security (ESORICS 2014), 2014: 148-162, 2014

11. Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng. Verifiable Computation on Outsourced Encrypted Data. In 19th European Symposium on Research in Computer Security (ESORICS 2014), 2014: 273-291, 2014

12. Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng. Authorized Keyword Search on Encrypted Data. In 19th European Symposium on Research in Computr Security (ESORICS 2014), 2014: 419-435, 2014

13. Junzuo Lai, Robert Deng, Yingjiu Li and Jian Weng. Fully Secure Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts and Fast Decryption. In Proc. of ACM ASIACCS 2014, ACM Press, pp. 239-248, 2014

14. Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai. Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack. Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 2009

15. Yanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang and Jianying Zhou. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. ACM ASIACCS 2016, pp. 141-151.

16. Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng and Kui Ren. Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. ACM ASIACCS 2016, pp. 59-70

17. Kai He, Jian Weng, Jia'Nan Liu, Joseph Liu, Robert Deng and Wei Liu. Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACM ASIACCS 2016, 247-255

18. Wenjie Yang, Jian Weng, Futai Zhang. New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ICICS 2017: 236-247

19. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai: Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222(Best Paper Award)