• 教师
  • 学生

师资队伍

教师名录

陈晶

邮          箱:chenjing@whu.edu.cn

职          称:教授

办公室地址:

实验室地址:

个人简介

陈晶,男,博士,武汉大学国家网络安全学院教授,博士生导师。中国计算机学会会员、中国密码学会会员,研究方向为网络安全、分布式系统安全。主持国家自然科学基金重点项目1项,国家重点研发计划课题1项,国家自然科学基金4项,湖北省自然科学基金2项,华为预研基金1项,中国信息安全测评中心项目1项,教育部重点实验室开放基金1项。作为骨干成员参与国家973、863、国家重大专项及国家自然基金重点项目等多项在INFOCOM、TIFS、TMC、TC、TPDS、TSC、SCN、中国通信、计算机学报、软件学报、电子学报等国内外高档期刊和会议上发表论文100余篇。应邀担任中国云安全联盟理事、国家智能装备创新联盟理事、CCF YOCSEF武汉副主席、湖北省网络安全协会理事、湖北省检察院信息化咨询专家;担任国家重点研发计划、863计划视频答辩专家、国家自然科学基金网评专家;担任ICA3PP2017 big data track主席、CIS2014、 WCSN2014、ICMISS 2014、CSMA2015、ICIS2015、CoCoNet2015、CTCIS2016、CECNET2019、ICACCI2019的TPC,CTCIS2014、ACM TURC 2017、2018、2019宣传主席,IEEE Transactions on Information Forensics and Security、IEEE Transactions on Networking、 IEEE Transactions on Vehicular Technology、IEEE Transactions on Industrial Informatics、计算机学报、通信学报、电子学报等国内外顶级期刊审稿人。获得湖北省科技进步奖2项,出版专著4本,获得发明专利8项,计算机软件著作权4项。

研究方向

大数据安全、云安全、应用密码学、移动安全、身份认证与管理、区块链

教育背景

2003年7月毕业于武汉理工大学,获工学学士学位。

2008年3月毕业于华中科技大学计算机学院计算机科学专业,获工学博士学位。

工作经验

2008-至今 武汉大学

教授课程

  1. 网络空间安全导论

  2. 网络安全

发表论文

[1] Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn. Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Transactions on Dependable and Secure Computing. 2019 (SCI收录, CCF A类)

[2] Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, and Ruiying Du. Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Transactions on Dependable and Secure Computing. 2019 (SCI收录, CCF A类)

[3] Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn. Uncovering the Face of Android Ransomware: Characterization and Real-time Detection. IEEE Transactions on Information Forensic & Security. 2018, 13(5): 1286- 1300 (SCI收录, CCF A类)

[4] Jing Chen, Shixiong Yao, Quan Yuan, Shouling Ji, Ruiying Du. CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. INFOCOM. 2018 (CCF A类)

[5]Jing Chen, Kun He, Quan Yuan, Min Chen, Ruiying Du, and Yang Xiang. Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services. IEEE Transactions on Mobile Computing. 2018, DOI: 10.1109/TMC.2018.2811481 (SCI收录, CCF A类)

[6] Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue. Checks and Balances: A Tripartite Public Key Infrastructure for Secure Web-based Connections. In proc. of International Conference on Computer Communications (INFOCOM 2017). 2017 (CCF A类)

[7] Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang. Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Transactions on Mobile Computing. 2016. DOI: 10.1109/TMC.2016.2604820 (CCF A 类)

[8] Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Transactions on Computers. 2016. DOI: 10.1109/TC.2016.2560812 (SCI收录, CCF A类, corresponding author)

[9] Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du, Kun He, Lina Wang, Zhiyong Peng. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015 (CCF A类)

[10] Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed System. 2014 (CCF A类)

[11] Jing Chen, Kun He, Lan Deng, Ruiying Du, Quan Yuan, Yang Xiang, Jie Wu. EliMFS: Achieving Efficient, Leakage-resilient, and Multi-keyword Fuzzy Search on Encrypted Cloud Data. IEEE Transactions on Services Computing. 2017 (SCI收录, CCF B类)

[12] Jing Chen, Kun He, Quan Yuan, Ruiying Du, Jie Wu. Distributed Greedy Coding-Aware Deterministic Routing for Multi-flow in Wireless Networks. Computer Networks. 2016. DOI: 10.1016/j.comnet.2016.05.027 (SCI收录,CCF B类)

[13] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression Access Control for Video on Demand in Cloud. Information Science, 2016. DOI: 10.1016/j.ins.2016.08.018 (SCI收录, CCF B类)

[14] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON 2015). 2015 (CCF B类)

[15] Long Hu, Yongfeng Qian, Jing Chen, Xiaobo Shi, Jing Zhang, Shiwen Mao. Photo crowdsourcing based privacy-protected healthcare. IEEE Transactions on Sustainable Computing. 2017

[16] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Transactions on Cloud Computing. 2016

[17] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security and Communication Networks. 2016 (SCI收录, CCF C类)

[18] Jing Chen, Yingying Fang, Kun He, Ruiying Du. Charge-depleting of the batteries makes smartphones recognizable. In proc. of International Conference on Parallel and Distributed Systems(ICPADS 2017). 2017 (CCF C类)

[19] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman privacy-preserving scheme in weighted social networks. Security and Communication Networks. 2016 (SCI收录, CCF C类)

[20] Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electronic Commerce Research. 2014 (SSCI收录,corresponding author)

[21] Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)

[22] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)

[23] Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communication. 2012,9(10): 23-32 (SCI收录)

[24] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)

[25] Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收录)

[26] 张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊, corresponding author)

[27] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)

[28] Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收录)

[29] 基于证据链生成的Android勒索软件检测方法. 王持恒,陈晶,陈祥云,杜瑞颖. 计算机学报. 2018 (权威期刊)

[30] 基于宿主权限的移动广告漏洞攻击技术研究. 王持恒,陈晶,苏涵,何琨,杜瑞颖. 软件学报. 2018 (权威期刊)

[31] 刘冬,陈晶,杜瑞颖,何琨. 基于情景感知的低交互双因素认证系统. 电子学报. 2017.07 (权威期刊)

[32] 陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433 (权威期刊)

[33] 沙乐天,傅建明,陈晶,黄诗勇. 一种面向敏感信息处理的敏感度度量方法 [J]. 计算机研究与发展, 2014, 51(5): 1050-1060. (权威期刊)

[34] 李拴保,傅建明,张焕国,陈晶,王晶,任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报. 2014, 35(9): 99-111 (权威期刊)

[35] Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014 (SCI收录)

[36] Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters. Journal of Network and Computer Applications. 2013. (SCI收录)

[37]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair UC-Secure Protocol for Two-Party Computation, Security and Communication Networks. 2013 (SCI收录)

[38] Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing. 2011.71(9): 1249-1260. (CCF B类)

[39] Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收录)

[40] 徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. 2010.2(33): 335-344 (权威期刊)

[41] Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit Authenticated Key Agreement Protocol. In proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012: 1299-1303 (CCF C类)

[42] 张宇, 陈晶, 杜瑞颖,等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 第3期(03):512-517. (权威期刊)

[43] 张宇, 杜瑞颖, 陈晶等.对一个基于身份签密方案的分析与改进[J].通信学报,2015,第11期,36(11):174-179. (权威期刊)

[44] Zhou Shungan, Du Ruiying, Chen Jing, Deng Hua, Shen Jian, Zhang Huanguo. SSEM: Secure Scalable and Efficient Multi-owner Data Sharing in Clouds. China Communications. 2016: 231-243

[45] Zhou Shungan, Du Ruiying, Chen Jing, Shen Jian, Deng Hua, Zhang Huanguo. FACOR: Flexible Access Control with Outsourceable Revocation in Mobile Clouds. China Communications. 2016: 136-150

[46] Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng. ESDR: an Efficient and Secure Data Repairing Paradigm in Cloud Storage. Security and Communication Networks. 2016.

[47] Cong Wu, Kun He, Jing Chen, Ruiying Du. ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. IEEE International Conference on Communications (ICC 2019). 2019

课题科研

  1. 国家自然科学基金通用技术联合基金“多源异构数据的使用授权与鉴权体系研究”2019-2021

  2. 国家自然科学基金面上项目“基于情境感知的移动互联网认证技术研究” 2018-2021

  3. 教育部联合基金青年人才项目 2019-2020

  4. 国家自然科学基金面上项目“无线Mesh网络中跨层安全关键技术研究” 2013-2016

  5. 国家自然科学基金,“面向移动终端的情境隐私保护理论与方法研究” 2016-2019

  6. 国家自然科学基金项目,“车载网络安全形式化模型与关键技术研究” 2012-2015

  7. 湖北省自然科学基金项目,“移动互联网高效安全认证与传输技术研究” 2014-2015

  8. 国家科技重大专项 “支持多传感应用的中间件平台研发” 2010-2012

研究团队

教授2人、博士后1人、博士生8人、硕士生25人

获奖信息

  1. 湖北省科技进步二等奖. 2016

  2. 湖北省科技进步三等奖. 2013

  3. 湖北省教学成果一等奖. 2017

  4. 全国信息安全竞赛一等奖. 2016

  5. 全国信息安全竞赛一等奖. 2017

  6. 全国信息安全竞赛一等奖. 2018

  7. 全国信息安全竞赛一等奖. 2019

邮箱 chenjing@whu.edu.cn 职称 教授
办公室地址 实验室地址