习宁
个人信息:Personal Information
教授 博士生导师 研究生导师
主要任职:国家自然基金重大研究计划负责人
其他任职:陕西省网络与系统安全重点实验室无人系统安全方向技术负责人;西安市智能系统安全实验室副主任
性别:男
毕业院校:西安电子科技大学
学历:博士研究生毕业
学位:工学博士学位
在职信息:在岗
所在单位:网络与信息安全学院
学科:网络空间安全
电子邮箱:
扫描关注
- [1]Decentralized Access Control for Secure Microservices Cooperation with Blockchain.ISA Transactions
- [2]Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.IEEE Internet of Things Journal :Pages 14856-14872
- [3]ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV.IEEE Internet of Things Journal :Pages 22903-22913
- [4]Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.Computer Networks
- [5]Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.IEEE Transactions on Industrial Informatics :Pages 7935-7945
- [6]Self-Anomaly-Detection Model Training via Initialized Meta Model.International Conference on Networking and Network Applications :pages 471-476
- [7]Android Malware Detection via Graph Representation Learning.Mobile Information Systems
- [8]UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things.Remote Sensing
- [9]Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain.International Symposium on Quality of Service
- [10]NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android.International Conference on Networking and Network Applications :pages 327-333
- [11]A Lightweight Android Malware Detection Framework Based on Knowledge Distillation.Network and System Security :pages 116–130
- [12]Information flow based defensive chain for data leakage detection and prevention: a survey.Computing Research Repository
- [13]Android Malware Detection Based on Call Graph via Graph Neural Network.International Conference on Networking and Network Applications
- [14]A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models.Network and System Security :pages 63–78
- [15]Information flow control on encrypted data for service composition among multiple clouds.Distributed Parallel Databases,36 :pages511–527
- [16]Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.TrustCom/BigDataSE 2019: 200-207
- [17]Compositional Information Flow Verification for Inter Application Communications in Android System.Lecture Notes in Computer Science (2019):239–252
- [18]A Fully Anonymous Authentication Scheme Based on Medical Environment
- [19]Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.Entropy
- [20]Composable information flow verification for service chain based on model checking.Tongxin Xuebao/Journal on Communications.2014,35 (11):23-31