删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

暨南大学信息科学技术学院导师教师师资介绍简介-吴永东

本站小编 Free考研考试/2021-05-22



名称:吴永东
职称:研究员
研究方向:智能电网信息安全,智能轨道交通信息安全,车联网安全,区块链
电邮:wuyd007@qq.com
联系方式:


教育背景
08/2008 - 06/2010 新加坡国立大学 Management of Technology 硕士
09/1994 - 07/1997 中国科学院自动化所 模式识别与人工智能 博士
09/1991 - 04/1994 北京航空航天大学 飞行器控制制导与仿真 硕士
09/1987 - 07/1991 北京航空航天大学 检测技术与仪器 本科


工作经历
时间:12/1997 – 05/2018
单位:信息通信研究院(I²R), 新加坡
职位:高级科学家(永久),曾担任信息系统安全实验室主任15年

奖励
1.IFIP conference on communication and multimedia security 2012最佳论文
2.Tan Kah Kee Young Inventor Merit award 2005 (no Gold award winner)
3.Tan Kah Kee Young Inventor Silver award 2004 (no Gold award winner)
4.中国航空工业总公司科技进步二等奖, 1997
5.中国航空工业总公司科技进步二等奖, 1997
6.中国航空工业总公司三等功,1997


讲授课程


招生意向


科研成果
专利
1. P**/111996/Singapore, Yongdong Wu, Sumei Sun, Boon-Shyang Lim, Time-Frequency Secret Key Generation Method for Secured Wireless Communication Systems, 28 Mar. 2018, is applying for PCT.
2. P**/Singapore, Feng Bao, Yongdong Wu, Shentat Goh, Method for Long-term Security of Device and Compromised Device Detection , 02 Jan. 2014.
3. US 2011/** Al: CHENG Heng Seng, GUO Huaqun and Yongdong Wu, A Method and System For Tamper Proofing A System Of Interconnected Electronic Devices, 2011.
4. US 6,711,553: Robert Deng, and Yongdong Wu, Method and Apparatus for Digital Content Copy Protection , 23 Mar. 2004.
5. WO 2004/019152: Yongdong Wu, Xiaofeng Wei, and Di Ma, Method and System for deterrence of unauthorised reuse of display content.
6. SG 100155:Yongdong Wu, Method and System for Managing Secret with Biometric Information, US2004/0,148,509 A1, 2005.
7. US 6,910,129: Yongdong Wu, Robert Deng, and Feng Bao, Method and Apparatus for Remote Authentication Based on Exchanging of Signals Representing Biometrics Information, 21 Jun. 2005
8. US 7,315,866: Yongdong Wu, and Robert Deng, Method for Incremental Authentication of Documents, 01 Jan., 2008.

著作
1.Zhuo Wei, Zheng Yan, Swee Won Lo, Yongdong Wu, Yanjiang Yang, Robert H. Deng, Security of Scalable Video Coding: Encryption and Authentication, Chapter x in Cryptographic and Information Security Approaches for Images and Videos to be published by CRC Press, Taylor and Francis Group, 2017.
2.Yongdong Wu, "Chapter 3: Reversible Data Hiding Schemes for JPEG Images", Chapter x in Steganography and Watermarking, Editors: Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang, ISBN: 978-1-62618-317-9, Nova Publisher, 3rd Quarter, 2013.


研究论文
近年期刊论文 (自 2011年起)
1.Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, and Robert H. Deng, Situation-aware Authenticated Video Broadcasting over Train-trackside WiFi Networks, IEEE Internet of Things Journal (Accepted), 2018. (IF=5.863, 中科院期刊一区)
2.Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, and Niekie Liu, False Load Attack to Smart Meters by Synchronously Switching Power Circuits, IEEE Transactions on Smart Grid, (accepted) 2018 (IF = 7.364). (中科院期刊一区)
3.Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, and Robert H. Deng, Resonance Attacks on Load Frequency Control of Smart Grids, IEEE Transactions on Smart Grid, 9(5):4490-4502, Sept. 2018 (IF=7.364). (中科院期刊一区)
4.Yongdong Wu, Zhuo Wei, Jian Weng, and Robert H. Deng, Position Manipulation Attacks to Balise-based Train Automatic Stop Control, IEEE Transactions on Vehicular Technology, 67(6):5287-5301, 2018. (IF=4.432). (中科院期刊二区)
5. Yongdong Wu, Binbin Chen, Zhigang Zhao and Yao Cheng, Attack and Countermeasure on Interlock-based Device Pairing Schemes, IEEE Transactions on Information Forensics and Security, 13(3): 745-757, March 2018 (IF=5.824, CCF-A类).
6. Yongdong Wu, J. Weng, Z. Tang, X. Li, and Robert Huijie Deng, Vulnerabilities, attacks, and countermeasures in balise-based train control systems, IEEE Transactions on Intelligent Transportation Systems, 18(4):814-823, April 2017 (IF=4.051) (中科院期刊二区)
7.Yongdong Wu, Zhigang Zhao, Feng Bao and Robert H. Deng, Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks, IEEE Transactions on Information Forensics and Security, 10(1):168-177, Jan. 2015. (IF=5.824,CCF-A类).
8. Yongdong Wu, Zhuo Wei, and Robert H. Deng, Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks, IEEE Transactions on Multimedia, 15(4):778-788, June 2013. (IF = 3.977). (中科院期刊二区)
9.Zhuo Wei, Yongdong Wu, Zheng Yan, Yanjiang Yang, Qingqi Pei, Yajuan Xie, Jian Weng, AutoPrivacy: Automatic Privacy Protection and Tagging Suggestion for Mobile Social Photo Corresponding, Computers & Security, Accepted, 2018 (IF = 2.650,CCF-B类)
10.Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, and Robert H. Deng, HIBS-KSharing: Hierarchical Identity-based Signature Key Sharing for Automotive, vol.5, pp.16314-16323, IEEE Access, Aug. 2017 (IF = 3.577). (中科院期刊三区)
11. Zhuo Wei, Zheng Yan, Yongdong Wu, Robert Huijie Deng, Trustworthy Authentication on Scalable Surveillance Video with Background Model Support, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 12, no. 4, Article 64, page 1-20, September,2016. (CCF-B类)
12. Xin Kang, Yongdong Wu, Incentive Mechanism Design for Heterogenous Peer-to-Peer Networks: A Stackelberg Game Approach, IEEE Transactions on Mobile Computing, 14(5):1018-1030, 2015. (IF = 3.822,CCF-A类).
13. Xin Kang, Yongdong Wu, A Trust-based Pollution Attack Prevention Scheme in Peer-to-Peer Streaming Networks, Computer Networks, vol.72: 62-73, 2014 (IF= 2.516,CCF-B类).
14. Zhuo Wei, Yongdong Wu, Robert H. Deng, and Xuhua Ding, A Hybrid Scheme for Authenticating Scalable Video Codestreams, IEEE Transactions on Information Forensics and Security, 9(4):543-553, April, 2014. (CCF-A类).
15.Robert H. Deng, Xuhua Ding, Zhuo Wei, and Yongdong Wu,Efficient Block-Based Transparent Encryption for H.264/SVC Bitstreams, Multimedia Systems Journal, 20(2): 165-178, March, 2014.
16. Zhuo Wei, Yongdong Wu, Xuhua DING, Robert H. Deng, A Scalable and Format-Compliant Encryption Scheme for H.264/SVC Bitstreams, Signal Processing: Image Communication, 27(9):1011-1024, 2012.
17. Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen and Maode Ma, UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications, IEEE Transactions on Smart Grid, 2(4):707-714, 2011. (中科院期刊一区)
会议论文
1.Yongdong Wu and Zhigang Zhao, Standard-compliant and Authenticated Telegrams in Subway Train-Balise Communications, Submission to IEEE Globecom 2018.
2.Yongdong Wu, Vivy Suhendra, Hendra Saputra and Zhigang Zhao, Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation, IEEE International Conference on Internet of Things, Chengdu, 2016
3. Yongdong Wu, Bo Qiu, Zhuo Wei, and Jian Weng, Secure Subway Train-to-Train Communications via GSM-R Communication Systems, IEEE 83rd Vehicular Technology Conference, May, 2016
4. Yongdong Wu, Zhigang Zhao and Xuejun Wen, Transparently Secure Smartphone-based Social Networking, IEEE WCNC, Shanghai, 2013.
5. Yongdong Wu, Robert H. Deng, A Pollution Attack to Public-key Watermarking Schemes, IEEE ICME, Melbourne, 2012.
6. Yongdong Wu, Vivy Suhendra, Huaqun Guo, A Gateway-based Access Control Scheme for Collaborative Clouds, IARIA ICIMP, Stuttgart, Germany, 2012.
7. Yongdong Wu, Zhigang Zhao, Enhancing the Security of On-line Transactions with CAPTCHA Keyboard, IFIP SEC, pp.531-536, Crete, Greece, 2012.
8. Yongdong Wu and Robert H. Deng, Zero-Error Watermarking JPEG Images by Shuffling Huffman Tree Nodes, VCIP, Tainan, 2011.
9. Yongdong Wu and Szeling Yeo, Obscure Spread Spectrum Watermarking, ICME, Spain, 2011.
10. Huaqun Guo, Fan Yu, Zonghua Zhang, Wai-Choong Wong, Maode Ma, Yongdong Wu, HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication, ICC 2011.
11.Yao Cheng, Mingyuan Gao, Hendra Saputra, Leng Meng Goh, and Yongdong Wu, Secure Smart Metering Based on LoRa Technology, IEEE Conference on Identity, Security and Behaviour Analysis (ISBA), 2018.
12.Zhuo Wei, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng and Robert H. Deng, IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving, ISPEC 2017.
13.Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, and Yongdong Wu, PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network, Advanced Data Mining and Applications, Singapore, 2017
14.Sumei Sun, Yongdong Wu, Boon Shyang Lim, and Hieu Duy Nguyen, A High Bit-Rate Shared Key Generator with Time-Frequency Features of Wireless Channels, IEEE Globecom, Singapore, 2017
15.Vivy Suhendra,Yongdong Wu, Hendra Saputra, Zhigang Zhao, and Feng Bao, Lightweight Key Management Protocols for Smart Grids, IEEE International Conference on Internet of Things, Chengdu, 2016
16. Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, and Yongdong Wu,Multidimensional Context Awareness in Mobile Devices, MMM Part II, pp.38-49, 2015
17. Zhuo Wei, R.H. Deng, Jialie Shen, Yongdong Wu, Xuhua Ding, SweeWon Lo, Technique for Authenticating H.264/SVC Codestreams In Surveillance Applications, IEEE ICME, 2013.
18. Xin Kang, Yongdong Wu, Game-Theoretic Approach for Cooperation Stimulation in Peer-to-Peer Streaming Networks, IEEE ICC, pp. 2283-2287, Budapest, 2013.
19. Junzuo Lai, Xuhua Ding and Yongdong Wu, Accountable Trapdoor Sanitizable Signatures, ISPEC, LNCS 7863, pp.117-132, Lanzhou, China 2013.
20. Guo Huaqun, Chen-Khong Tham, Marc Armand, Wai-Choong Wong, and YongdongWu, Privacy in Machine-to-Machine Communications: A state-of-the-art survey, ICCS 2012.
21. AlokPathak, Wai-ChoongWong, HuaqunGuo, and YongdongWu, Remote Tracking Protocol with Predictive Localization Algorithm, International Conference on Networks (ICON) 2012.
22. Zhuo Wei, Xuhua Ding, Robert Huijie Deng, and Yongdong Wu, No Tradeo? Between Con?dentiality and Performance: An Analysis on H.264/SVC Partial Encryption, IFIP Communications and Multimedia Security, LNCS 7394, pp. 72–86, Canterbury, UK, 2012.
23. Xin Kang, Yongdong Wu, Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach, IFIP SEC, pp.537-542, Crete, Greece, 2012.
24. Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao, Node Importance Evaluation Method based on Principal Component Analysis and Grey Relational Analysis in Complex Networks, IEEE International conference on Network, 2011.
25. Hui Fang, Yongdong Wu, Yin Huang and Shuhong Wang, Multi-Stage Binary Code Obfuscation Using Improved Virtual Machine, ISC, LNCS 7001,pp.168-181, Xi'an, 2011.




相关话题/暨南大学 信息科学技术学院