删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

南京大学软件学院导师教师师资介绍简介-XiaoFu

本站小编 Free考研考试/2021-02-15

Xiao Fu



Software Institute




电话:+86-转916


邮箱:fuxiao@nju.edu.cn


地址:


办公地址:Room 916, FeiYimin Building, Nanjing University, Nanjing, 210093, China


邮编:210093





Short Biography
Xiao Fu is currently an associate professor in the Software Institute at Nanjing University. Dr. Fu received her B.E., M.S. and Ph.D. degrees from Nanjing University, China in 2002, 2005 and 2010, respectively, all in the Department of Computer Science and Technology. Her research interests are information security, digital investigation, machine learning and data mining, big data, cloud computing, internet of things, wireless network.
研究兴趣:信息安全、数字取证、机器学习与数据挖掘、大数据、云计算、物联网、无线网络。
Recruitment (招生)
面向2020年计划招生若干名博士生、直博生、学术硕士生、专业硕士生。
欢迎参加2020年考研进入南大软院复试名单的同学申请加盟我的研究组。
欢迎申请2020年保研计划的同学,请即时关注我院主页发布的报名方式。
欢迎有兴趣的本科生加盟我的研究组,提前体验科研工作。
欢迎有兴趣的同学给我邮件。
Teaching
●Database: principles, programming, and performance.Regular course for undergraduates, 2019 - 2020.
●Data Structure.Regular course for undergraduates, 2010 - 2018.
Research
Selected Publication

●Yuzhe Chen, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, Cloud Storage Forensics BaiduNetDisk WeiYun and 115yun on a Wireless Network, in Proc. of GLOBECOM 2020, Taiwan, China, December 2020. (EI/ISTP, CCF Rank C)
●Yun Luo, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, Forensic Model for DDoS Attack, in Proc. of IEEE GLOBECOM 2020,Taiwan,China, December 2020. (EI/ISTP, CCF Rank C)
●Fei Ye, Yunzhi Zheng, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizan, TamForen: A Tamper-Proof Cloud Forensic Framework, accepted by Transactions on Emerging Telecommunications Technologies. (SCI index)
●Meng Chen, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, Cloud Database Encryption Technology Based on Combinatorial Encryption. Globecom 2019. (EI/ISTP, CCF Rank C)
●Xiaoyu Ma, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environmen. Globecom 2019. (EI/ISTP, CCF Rank C)
●Sixian Sun, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, Detecting and Preventing ARP Attack in SDN-Based Cloud Environment. Infocom 2020 workshop. (EI/ISTP Index)
●Xuanyu Liu, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, Monitoring User-Intent of Cloud-based Networked Applications in Cognitive Networks. Globecom 2018. (EI/ISTP, CCF Rank C)
Xiao Fu*, Rui Yang, Xiaojiang Du, Bin Luo, Mohsen Guizan,.Timing Channel in IaaS:How to Identify and Investigate. IEEE Access, 7:1-11, 2018.(SCI index)
●Sixian Sun, Xiao Fu*, Hao Ruan, Xiaojiang Du, Bin Luo, Mohsen Guizan, Real-timeBehaviorAnalysisandIdentificationforAndroidApplications. IEEE Access, 6: 38041 – 38051, 2018. (SCI index)
●Xuanyu Liu, Xiao Fu*, Bin Luo, Xiaojiang Du. Distributed Cloud Forensic System with Decentralization and Multi-participation. Eai International Wireless Internet Conference. 2017
●Jiayun Xie, Xiao Fu*, Xiaojiang Du, Bin Luo.AutoPatchDroid: a framework for patching inter-app vulnerablities in android application. ICC 2017.(EI/ISTP, CCF Rank C)
●Xie Jiayun, Fu Xiao*, Luo Bin.Survey on android protection mechanism(in Chinese) [J].Computer Engineering, 2018, 44(2):163-170,176.
●Hao Ruan, Xiao Fu*, Xiaojiang Du, Bin Luo. Analyzing Android Application in Real-Time at Kernel Level. ICCCN 2017. (EI/ISTP, CCF Rank C)
●Rui Yang, Xiao Fu*, Xiaojiang Du, Bin Luo. Investigating Timing-based Side Channel Attacks in IaaS. Mobimedia 2016. (EI/ISTP, CCF Rank C)
●Yingxin Cheng, Xiao Fu*, Xiaojiang Du, Bin Luo, Mohsen Guizani. A Lightweight Live Memory Forensic Approach Based on Hardware Virtualization. Information Sciences, 2017, 379(2): 23-41. (SCI,二区)
●Ziqi Wang, Rui Yang, Xiao Fu*, Xiaojiang Du, Bin Luo. A Shared Memory based Cross-VM Side Channel Attacks in IaaS Cloud. InfoCom 2016 workshop. (EI/ISTP, CCF Rank A)
Xiao Fu*, Yun Gao, Bin Luo, Xiaojiang Du, Mohsen Guizani. Security Threats to Hadoop: Data Leakage Attacks and How to Investigate Them. IEEE Network, 2017, 31(2): 67-71. (SCI,二区)
Xiao Fu, Xiaojiang Du*, Bin Luo*. Data correlation-based analysis methods for automatic memory forensic. Security and Communication Networks. Volume 8, Issue 18, 4213-4226, December 2015. (SCI, CCF Rank C)
●Yun Gao, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani. Haddle: a framework for investigating data leakage attacks in Hadoop. Globalcom 2015. (EI/ISTP, CCF Rank C)
●Gao Yun, Fu Xiao*, Luo Bin, A Survey of Cloud Forensics (in Chinese) [J]. Application Research of Computers. Volume 33, Issue1,1-6, January 2016.
Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Yuhua Wang and Zhitao Guan. Correlating Processes for Automatic Memory Evidences Analysis. InfoCom 2015 workshop. (EI/ISTP, CCF rank A)
●Yiheng Duan, Xiao Fu*, Bin Luo, Ziqi Wang, Jin Shi, Xiaojiang Du. Detective: Automatically Identify and Analyze Malware Processes in Forensic Scenarios via Dynamic-Link Libraries. ICC 2015, London, UK, June 8-12, 2015. (EI/ISTP, CCF rank C)
●Li Junxiao, Fu Xiao*, Luo Bin, Xie Jiayun. A Survey on Android Malware and Detection Techniques (in Chinese) [J], Accepted, will be published in Application Research of Computers, 2015.
●Yingxin Cheng, Xiao Fu*, Bin Luo, Rui Yang, and Hao Ruan. Investigating the Hooking Behavior: A page-level Memory Monitoring Method for Live Forensics. ISC 2014, Hongkong, China, Oct 12-14, 2014. (EI/ISTP, CCF rank C)
●Qian Qin,Zhang Jian, Zhang Kun, Fu Xiao*,Mao Bing. Technical Study of Reducing Redundant Data for Intrusion Detection and Intrusion Forensics (in Chinese)[J], Computer Science, 2014,41(11A):252-258.
●Qian Qin, Dong Buyun, Tangzhe, Fu Xiao*, Mao Bing. Study on the Situation and Development of Memory Forensics (in Chinese) [J], Computer Engineering, 2014,40(8):95-102.
●Ji Yuchen, Fu Xiao*, Shi Jin, Zhao Zhihong, Luo Bin. Study on Event Reconstruction of Computer Intrusion Forensic (in Chinese) [J], Computer Engineering, 2014,40(1):315-321.
●Jian Zhang, Fu Xiao *, Bin Luo, Zhi-Hong Zhao and Xiaojiang Du. A Method to Automatically Filter Log Evidences for Intrusion Forensics, ICDCS 2013 workshop, Philadelphia, USA, July 8-11, 2013. (EI/ISTP, CCF rank A)
●Dong Buyun, Fang Pei, Fu Xiao*, Luo Bin, Zhao Zhihong. Design and Implementation of HDFS over Infiniband with RDMA, 11th International Conference on Wired/Wireless Internet Communications, St.Petersburg,Russia, June 5-7, 2013. (EI/ISTP Index)
Fu Xiao, Shi Jin, Xie Li. Layered Intrusion Scenario Reconstruction Method for Automated Evidence Analysis (in Chinese)[J], Journal of Software, 2011, 22(5): 996-1008. (EI Index,一级学报)
Fu Xiao, Xie Li. Filtering Intrusion Forensic Data Based on Attack Signatures, Journal of Computer Research and Development (in Chinese)[J], 2011,48(6): 964-973. (EI Index,一级学报)
Fu Xiao, Shi Jin, Xie Li. A Novel Data Mining-Based Method for Alert Reduction and Analysis, Journal of Network, 2010, 5(1):88-97. (EI Index)
Fu Xiao, Xie Li. Security Alert Correlation: A Survey, Computer Science (in Chinese)[J], 2010,37(5):9-14.
Fu Xiao, Cai Shengwen, Xie Li. Survey of Network Security Management (in Chinese)[J], Computer Science, 2009,36(2):15-19.
Fu Xiao, Xie Li. ODARM: A Outlier Detection-based Alert Reduction Model. In: ABM Shawkat Ali and Yang Xiang. Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches, USA: IGI Global, November 2009.
Fu Xiao, Xie Li. Using Outlier Detection to Reduce False Positives in Intrusion Detection, IEEE International Conference on Network and System Security, Shanghai, China, Oct. 18-20, 2008. (EI/ISTP Index)

Patent

● 伏晓、刘轩宇、骆斌。在智能家居环境中通过误导网络嗅探工具从而保护用户隐私的系统及方法。申请号或专利号:0.1
● 伏晓、叶飞、郑韵芝、骆斌。一种用于分布式云取证可信度验证系统及其方法。申请号或专利号:4.5
● 伏晓、骆云、骆斌。一种用于DDoS攻击的取证方法及系统。申请号或专利号:5.4
● 伏晓,林丽,骆斌,刘轩宇。一种非侵入式的智能音箱安全取证系统及其方法。申请号或专利号:3.0
● 伏晓,陈濛,骆斌。基于组合加密的云数据库加密方法。申请号或专利号:1.5
● 伏晓,马啸雨,骆斌。云环境下基于入侵检测系统反馈的防火墙及其实现方法。申请号或专利号:8.1
● 伏晓,孙思娴,骆斌。基于SDN云环境检测和缓解ARP攻击的系统及方法。申请号或专利号:7.X
● 骆斌,卢坚,伏晓。一种基于规则的通用文本信息抽取和信息生成方法。申请号或专利号:9.5
● 骆斌、李睿、伏晓。一种面向交通事故责任纠纷案件的法条推荐方法。申请号或专利号:8.0
● 伏晓,刘轩宇,骆斌。应用于云计算环境的基于用户意图检测的取证系统及方法。申请号或专利号:7.X
● 伏晓,谢佳筠,骆斌。基于安卓程序应用间攻击的自动化补丁系统及方法。申请号或专利号:8.5。(授权)
● 伏晓,杨瑞,骆斌。基于内存活动的边信道攻击取证系统及方法。申请号或专利号:1.8。(授权)
● 伏晓,王子祺,骆斌,杨瑞,周业茂。基于共享内存的云取证证据获取方法及系统。申请号或专利号:7.5。(授权)
● 伏晓,阮豪,骆斌,周业茂。基于内核的安卓程序实时行为分析方法及系统。申请号或专利号:8.X。(授权)
● 伏晓,高运,骆斌。用于Hadoop平台数据泄露攻击的自动检测取证方法。申请号或专利号:6.1。(授权)
● 伏晓,端一恒,骆斌。一种在取证场景下自动检测恶意进程的方法。申请号或专利号:5.1。(授权)
● 伏晓,端一恒,骆斌。一种在取证场景下自动分析未知恶意程序特征的方法。申请号或专利号:0.9。(授权)
● 伏晓,骆斌。一种基于数据关联的自动内存证据分析方法。申请号或专利号:5.0。(授权)
● 伏晓,程盈心,骆斌、杨瑞、阮豪。一种基于硬件虚拟化的模块化计算机取证系统及其方法。申请号或专利号:8.0。(授权)
● 伏晓,程盈心,骆斌、杨瑞、阮豪。一种用于收集和截获计算机内存行为的蜜罐机制及其方法。申请号或专利号:3.9。(授权)
● 伏晓,端一恒,周业茂,骆斌等。一种通用设备故障检测维修方法。申请号或专利号:4.0。(授权)
● 伏晓,张瑊,骆斌,赵志宏。用于BSM安全审计日志的冗余及无用数据删减方法。申请号或专利号:6.8。(授权)

Funding
● 项目名称:“超级账号”关键技术咨询服务
项目来源:思目创意设计产业江苏有限公司,金额:200万
持续时间:2018.1-2020.12,项目角色:项目负责人
● 项目名称:天津市金融工作局司法数据交换系统
项目来源:天津市金融工作局,金额:10万
持续时间:2017.11-2019.11,项目角色:项目负责人
● 项目名称:基于内存取证的实时自动证据分析技术研究
项目来源:国家自然科学基金委项目,金额:20万
持续时间:2012.1-2014.12,项目角色:项目负责人
● 项目名称:化学应急箱组装备运用研究
项目来源:中国人民解放军73921部队,项目金额:6万
持续时间:2015.1-2015.12,项目角色:项目负责人
● 项目名称:发烟车综合故障检测软件
项目来源:中国人民解放军73017部队,项目金额:6万
持续时间:2014.8-2014.12,项目角色:项目负责人
● 项目名称:江苏法院数字审委会系统
项目来源:江苏省高级人民法院,项目金额:49万
持续时间:2013.8-2014.12,项目角色:项目负责人
● 项目名称:执行案件信息数据交换系统
项目来源:江苏省高级人民法院,项目金额:40万
持续时间:2013.8-2014.12,项目角色:项目负责人
● 项目名称:故障通用检测系统
项目来源:中国人民解放军73921部队,项目金额:6万
持续时间:2013.5-2013.12,项目角色:项目负责人
● 项目名称:天津市法院审判指标评估体系系统
项目来源:天津市高级人民法院,项目金额:33万
持续时间:2013.5-2014.12,项目角色:项目负责人
● 项目名称:江苏法院案件稳定风险评估系统
项目来源:江苏省高级人民法院,项目金额:45万
持续时间:2012.1-2018.12,项目角色:项目负责人











相关话题/南京大学 软件学院