1.基本情况:
教育背景:
1982.7:西安交通大学计算机科学与技术学士学位;
1984.12:美国马里兰大学(University of Maryland)计算机工程硕士学位;
1990.12:美国马里兰大学(University of Maryland)计算机工程博士学位。
任职情况:
1982.7-1983.8:西安交通大学计算机教研室助教;
1984.6-1990.2:美国马里兰大学电子与计算机工程系助研;
1990.2-1993.12:美国IBM Corp.资深计算机科学家;
1993.12-1996.12:美国MCI Communications Inc.高级工程师;
1996.12-1997.8:美国GRIC Communications Inc.首席工程师;
1997.8-2003.9:美国Fujitsu Labs of America高级研究员;
2003.8至今:北京工业大学教授、博士生导师,软件学院副院长(2003.10-2011.1)。
2. 主要研究方向:
计算机网络、信息安全、互联网测试架构与技术、无线通信技术。
3.在研课题:
(1) 面向开放式网络的动态博弈访问控制模型与方法研究;
(2) 无线传感器网络中安全节点定位与时钟同步的研究;
(3) 面向Android智能移动终端的数字取证关键技术研究;
(4)互联网测试架构与技术的研究;
(5) 低碳高端智慧园区云平台研发。
4. 研究成果与奖励:
截至2013年9月:
(1)获美国发明专利12项,获中国发明专利25项、实用新型专利1项,在审中国发明专利20项,获中国软件著作权18项;
(2)出版译著3部(Android取证实战、计算机取证、Linux防火墙)、教材2部(信息安全导论、电子商务概论);
(3)2004年以来,在国内外期刊和国际会议上共发表研究论文186篇,其中已被SCI/EI/ISTP收录156篇;
(4) 主讲的本科生课程《信息安全概论》2010年被评为国家双语教学示范课程,2012年被评为北京工业大学教学名师。
5.发表的部分学术论文:
[1]AnAccess Authentication Protocol for Trusted Handoffin Wireless Mesh Networks,Computer Standards & Interfaces, In Press. (SCI, EI)
[2]On the Accuracy of Packet Delay Estimation in Distributed Service Networks,Journal of Network and Systems Management, 21(4), Dec. 2013, pp. 623-649. (SCI, EI)
[3]On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things,International Journal of Distributed Sensor Networks, 2013(2013), Sept. 2013, pp. 1-13. (SCI, EI)
[4]A New Trusted Roaming Protocol in Wireless Mesh Networks,International Journal of Sensor Networks, 14(2), Sept. 2013, pp. 109-119. (SCI)
[5]Enabling End-to-End Secure Communication between Wireless Sensor Networks and the Internet,World Wide Web, 16(4), July 2013, pp. 515-540. (SCI, EI)
[6]A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario,International Journal of Distributed Sensor Networks, 2012(2012), Dec. 2012, pp. 1-12. (SCI, EI)
[7]Secure Localization in Wireless Sensor Networks with
[8]An Access Control Method based on Scenario Trust,International Journal of Computational Intelligence Systems, 5(5), Sept. 2012, pp. 942-952. (SCI, EI)
[9]Secure Sensor Localization in Wireless Sensor Networks based on Neural Network,International Journal of Computational Intelligence Systems, 5(5), Sept. 2012, pp. 914-923. (SCI, EI)
[10]Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification,International Journal of Computational Intelligence Systems, 4(5), Sept. 2011, pp. 768-776.(SCI)
[11]Privacy Protection through Appropriate Interaction Patterns,ChinaCommunications, 8(4), July 2011, pp. 141-152. (SCI)
[12]EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks,EURASIP Journal on Wireless Communications and Networking, 2011(2011), Jan. 2011. (SCI, EI)
[13]Towards Critical Region Reliability Support for Grid Workflows,Journal of Parallel and Distributed Computing, 69(12), Dec. 2009, pp. 989-995. (SCI, EI)
[14]A Distributed Decision-Making Mechanism for Wireless P2P Networks,Journal of Communications and Networks, 11(4), Aug. 2009, pp. 359-367. (SCI)
[15]Group-based Intrusion Detection System in Wireless Sensor Networks,Computer Communications, 31(18), Dec. 18, 2008, pp. 4324-4332. (SCI, EI)
6.联系方式:
电话:;手机:**;邮箱:jhe@bjut.edu.cn