庄毅
近期热点
资料介绍
个人简历
教授,博士生导师。研究方向包括:可信计算、无线传感器网络、云计算与大数据智能计算及应用等。长期以来一直担任多个领域的专家组成员。已主持完成了几十项国家、省部级项目和科技合作研发项目。现主持国家自然科学基金、国家十三五预研基金等近20项科研项目。主持的研究项目曾先后获得国防科技进步二等奖一项、省部级科技进步三等奖四项,均为排名第一。作为第一发明人已获得六项国家发明专利授权,另有已公开的国家发明专利二十多项。先后在国内外核心期刊和国际学术会议上发表学术论文一百多篇,其中绝大部分为SCI或EI收录。发表学术论文,出版专著情况:已有多篇论文发表在一流期刊或主流期刊。如“Modeling dependability features for Real-Time Embedded Systems”发表在CCF A类《IEEE Transactions on Dependable and Secure Computing》期刊。获奖情况:1)基于WSN的动态测量系统,国防科技进步三等奖,2016GFJBJ3356-R01(排名第1)2)主动式邮件安全网关,国防科技进步三等奖,2009GFJBJ3356-R01(排名第1)3)基于信息安全的航空设备研制管理系统,航空科技成果奖三等奖,20080166-1(排名第1 )4)建模与验模平台研究,国防科技进步二等奖,2007GFJ2216- R01(排名第1)5)主动式网络信息安全监控系统,江苏省科技进步三等奖,2006-03-061-01(排名第1)专利情况:已获得六项发明专利授权,已公开发明专利二十多项。承担的科研项目情况:主持研究的部分科研项目如下:(1)国家自然科学基金面上项目,高可信嵌入式软件建模与验证方法的研究(2)国防共性技术基金,高可信计算环境与可信属性验证技术研究(3)预研基金项目,高可信软加固技术研究(4)预研基金项目,H-DE 平台研究(5)科技研发项目,基于WSN的落区控制技术研究(6)科技研发项目,软件系统自重构支撑技术研究与应用(7)科技研发项目,软件流监控技术研究与应用(8)科技研发项目,云存储终端应用安全分析技术研究(9)科技研发项目,基于Android的恶意代码检测方法研究科研项目[1] 高可信控制系统软件协同开发技术代码自动生成插件研发[2] 系统安全评估技术及智能联动式安全管理系统开发[3] **XX15 发控软件流监控研究[4] 项目开发[5] XXX协议模糊测试分析软件[6] 云存储终端应用安全分析技术研究[7] 多机集群管理软件[8] 嵌入式软件可信验证方法研究[9] 民航运营管理教学模拟系统[10] 项目开发[11] 项目开发[12] 项目开发[13] 项目开发[14] 项目开发[15] 项目开发研究领域
学科研究方向一:计算机科学与技术云计算 无线传感器网络 大数据智能处理学科研究方向二:软件工程可信软件 网络服务 中间件学科研究方向三:网络空间安全可信计算"计算机"近期论文
[1]Hu X, Zhuang Y. PHRiMA: A Permission-Based Hybrid Risk Management Framework for Android Apps[J]. Computers & Security, 2020:101791.[2]Hu X, Zhuang Y, Zhang F. A security modeling and verification method of embedded software based on Z and MARTE[J]. Computers & Security, 2020, 88: 101615.[3]Jiaye Pan, Yi Zhuang, et al. Lightweight and Efficient Hypervisor-based Dynamic Binary Instrumentation and Analysis Method, IEEE Access, Vol. 8, pp. 164593-164610, 2020. [4]WANG Z. Zhuang Y. A Mutual Authentication Based Remote Attestation Scheme for Embedded Systems. IET Information Security.IFS-2019-0027.R2[5]Jiaye Pan, Yi Zhuang and BingLin Sun. BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. Security and Communication Networks [6]Pan J, Zhuang Y, Sun B. Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs[J]. Security and Communication Networks, 2019.[7]J Gu, B Sun, X Du, J Wang, Y Zhuang, Z Wang,“Consortium Blockchain-based Malware Detection in Mobile Devices”, IEEE Access, 2018/2/13[8] Jayi Pan Yi Zhuang. PMCAP: A Threat Model of Process Memory Data on the Windows Operating System,Security & Communication Network,2017(1),1-15[9] Siru Ni, Yi Zhuang, Gu Jingjing, Ying Huo. A formal model and risk assessment method for Security-Critical Real-Time Embedded Systems. Computers & Security, 2016, 58: 199-215.[10] Siru Ni, Yi Zhuang Modeling dependability features for Real-Time Embedded Systems. IEEE Transactions on Dependable and Secure Computing, 2015,12(2):190-203.[1] 胡镡文,庄毅.PHRiMA: A Permission-Based Hybrid Risk Management Framework for Android Apps[J].Computers & Security,2020[2] 庄毅,,等.A security modeling and verification method of embedded software based on Z and MARTE.Comput Secur,2020[3] 潘家晔,庄毅.BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel[J].Security and Communication Networks[4] 倪思如,庄毅.A formal model and risk assessment method for security-critical real-time embedded systems[J].Computers & Security[5] 庄毅,,等.PMCAP: A Threat Model of Process Memory Data on the Windows Operating System.SECURITY AND COMMUNICATION NETWORKS,2017[6] 汪自旺,庄毅.A Mutual Authentication Based Remote Attestation Scheme for Embedded Systems.IET Information Security[7] 庄毅,,等.Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.Secur. Commun. Networks,2019[8] 庄毅,,等.Modeling and Validation for Embedded Software Confidentiality and Integrity.2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE),2017[9] 庄毅,,等.An Enhancement Method for Android Permission Mechanism based on Context.PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING (AMCCE 2017),2017[10] 庄毅,,等.Ego-network probabilistic graphical model for discovering on-line communities.APPLIED INTELLIGENCE,2018[11] 庄毅,,等.Multifocus image fusion method based on a convolutional neural network.J. Electron. Imaging,2019[12] 庄毅,谭慧俊,庄毅等.Fractal characteristics of turbulent-non-turbulent interface in supersonic turbulent boundary layers.JOURNAL OF FLUID MECHANICS,2018[13] 庄毅,,等.Infrared and visible images fusion method based on discrete wavelet transform.J. Comput.,2017[14] 庄毅,Zhuang, Yi,庄毅等.Letter: Evolution of coherent vortical structures in a shock wave/turbulent boundary-layer interaction flow.Phys. Fluids,2018 相关热点
最新收录
- 杉本愛莉鈴(杉本爱莉铃 06-04
- 天野花乃(Kano Amano) 06-04
- 椛岛光 06-01
- 星乃梦奈(ほしの ゆな 06-01
- 沖田奈奈 沖田奈々(Nana 06-01
- 藤仁依那 藤にいな(Niina 06-01
- 矢田步美 矢田あゆみ(Ay 06-01
- 妹岳夏目 妹岳なつめ(Na 06-01
- 麻仓香穗里 麻仓かほり 06-01
- 立花广美 (立花ひろみ H 05-31