陈晶(武汉大学计算机学院教授)
VLoG
次浏览
更新时间:2023-05-20
陈晶
本词条是多义词,共18个义项
武汉大学计算机学院教授
获优秀指导教师奖
基本信息
国籍 | 中国 |
性别 | 男 |
出生地 | 湖北武汉 |
中文名 | 陈晶 |
职业信息
所属行业 | 教育 |
人物经历
珞珈青年学者、IEEE会员、中国计算机学会会员、中国密码学会会员,研究方向为网络安全、分布式系统安全。
于2010年和2013年作为负责人获得国家自然基金青年项目和面上项目。此外,主持中国博士后特别资助一项,主持湖北省自然科学基金两项,主持教育部重点实验室开放基金一项,华为预研基金一项,武汉大学自主科研项目一项。作为骨干成员参与国家科技攻关计划项目(863),国家重大专项及国家自然基金重点项目等多项。在INFOCOM,IEEE Transactionson Paralleland Distributed System,SECON,Journal of Paralleland Distributed Computing,International Journal of Computationa lIntelligence Systems,Security and Communication Networks,Computer Communications,中国通信,计算机学报,电子学报等国内外高档期刊和会议上发表论文60余篇,其中SCI收录16篇,EI收录25篇。应邀担任2014国家863视频答辩专家,CIS2014,WCSN2014,ICMISS2014,CSMA2015,ICIS2015的TPC,CTCIS2014组委会成员,IEEE Transactionson Wireless Communication,IEEE Transaction sonIndustrial Informatics,Computer Communications,GLOBCOM,计算机学报,通信学报,电子学报等国内外顶级期刊审稿人。获得湖北省科技进步奖1项,出版专著4本,获得发明专利3项,计算机软件著作权2项。
获奖记录
个人获奖情况:
1.全国大学生信息安全竞赛优秀指导教师奖,2011
2.武汉大学优秀学生班级导师,2010
指导学生获奖情况:
1.全国大学生信息安全竞赛一等奖1项,三等奖1项
2.湖北省省级优秀学士学位论文,3人次
主要贡献
参与项目
国家自然科学青年基金“基于生物鲁棒性的无线Mesh网络容错研究”(项目编号:60903196)
1.
国家自然科学青年基金“基于生物鲁棒性的无线Mesh网络容错研究”(项目编号:60903196)
2. 国家自然科学基金项目,“车载网络安全形式化模型与关键技术研究”(No.61173154) 2012-2015
3. 教育部重点实验室开放基金“无线网络安全路由技术研究” (项目编号:AISTC2008_13)
4. 湖北省自然基金“无线网络中基于演化博弈的路由模型研究”(项目编号:2009CDB379)
5. 国家自然科学基金重点项目“可信移动互联网络关键理论与应用研究”(项目编号:60633020)
6. 国家自然科学基金“基于复杂网络理论的Internet可生存性研究”(项目编号:60743003)
8. 武汉吉奥公司:网络流量监控与预警系统。2011
9. 国家科技重大专项“支持多传感应用的中间件平台研发” (项目编号:2010ZX03006-001),2010-2012
10. 中国博士后特别资助项目“移动车载网关键安全技术研究”,2012-2013
主要论文
在《中国通信》、《Computer Communications》、《计算机学报》、《电子学报》等期刊和国际会议上发表论文30余篇。
Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du, Kun He, Lina Wang, Zhiyong Peng. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015 (CCF A类)
Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed System. 2014 (CCF A类)
Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON). 2015 (CCF B类)
Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang. A Multi-objective Optimization Model Based on Immune Algorithm in Wireless Mesh Networks. International Journal of Communication Systems. 2014 (SCI收录)
张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊, corresponding author) Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electronic Commerce Research. 2014 (SSCI收录,corresponding author)
Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)
Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communication. 2012,9(10): 23-32 (SCI收录)
Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收录)
Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收录)
陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433 (权威期刊)
Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014 (SCI收录)
Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters. Journal of Network and Computer Applications. 2013. (SCI收录)
Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair UC-Secure Protocol for Two-Party Computation, Security and Communication Networks. 2013 (SCI收录)
Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing. 2011.71(9): 1249-1260. (CCF B类)
Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收录)
徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. 2010.2(33): 335-344 (权威期刊)
Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit Authenticated Key Agreement Protocol. In proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012: 1299-1303 (CCF C类)