删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

西安电子科技大学网络与信息安全学院导师教师师资介绍简介-闫峥

本站小编 Free考研考试/2021-07-10


个人信息
闫峥(博士) (Prof. Zheng YAN, PhD)
“华山****”****,博士生导师
ISN国家重点实验室,网络与信息安全学院

研究方向
信任管理与可信计算
网络与信息安全
攻击检测与防御、恶意软件检测
移动互联网、社交网络安全和隐私保护
物联网和云计算安全、信任和隐私保护
5G/6G 安全、信任与隐私保护
数据挖掘与分析
区块链技术和应用

联系方式
通信地址:陕西西安太白南路2号
邮政编码:710071
邮箱:zyan@xidian.edu.cn
电话:(+86)**
URL:http://web.xidian.edu.cn/yanzheng/


个人简历
闫峥,工学博士。获西安交通大学信息科学与工程学士学位,西安交通大学计算机组织与体系结构硕士学位和新加坡国立大学信息安全硕士学位,赫尔辛基工业大学(即现在的Aalto大学)网络技术副博士学位和电子工程博士学位。1997年8月至1999年3月在新加坡Kent Ridge Digital Labs(即现在的I2R)担任研究****,1999年3月至2000年7月任新加坡Singalab公司软件工程师,2000年7月至2011年任芬兰诺基亚研究中心高级研究员。2011年7月起任西安电子科技大学教授,同时任芬兰Aalto大学荣誉客座和访问教授,芬兰科学院Academy Research Fellow, IET Fellow, IEEE高级会员。陕西省”****“特聘专家。参与和领导了30多项科研项目,其中主持项目20多项,包括两项跨国合作项目、欧盟信息技术高端项目、芬兰科学院资助项目、芬兰国家技术创新局(TEKES)研究项目、科技部重点研发项目(子课题负责)、NSFC项目、中国教育部项目、陕西省自然科学基金重大基础研究项目、诺基亚重大项目、长期研究项目、国际标准支持项目和诺基亚与大学合作项目及技术向产品转换项目。主要研究领域为信任管理和可信计算、信息与网络安全、隐私保护、社交网络、数据挖掘、普适计算和云计算等。发表论文300余篇,其中有240多篇论文被SCI或EI检索,单篇论文最高他引量为920+。独立编著一本关于信任模型和管理的英文专著,独立撰写一部关于实用自治信任管理的英文专著,编辑会议录9部。35项国际发明专利及50项PCT专利,其中独立发明30项。若干授权国际专利已被国际标准采纳,大部分专利技术被工业界采纳或收购,一些专利技术已经被广泛使用。在国际会议及欧美等知名高校特邀报告30余次,介绍自己在信任管理和可信计算方面的研究成果。
担任IEEE IoT Journal (中科院1区),Information Fusion (中科院1区), IEEE Network Magazine (中科院1区),Information Sciences (中科院2区), JNCA (中科院2区), IEEE Access (中科院3区), Soft Computing (中科院3区), SCN (Wiley), KSII TIIS, 网络与信息安全学报, 信息网络安全等15 种期刊领域主编、副主编或编委,曾任 IEEE TII, IEEE JBHI, IEEE TNSE, IEEE Systems Journal, ACM TOMM, Future Generation Computer Systems, Computers & Security, IJCS (Wiley), ACM/Springer MONET, IET Information Security, 等30多个个国际期刊客座编委,及30多个国际期刊(如IEEE TDSC,IEEE TPDS, IEEE TIFS, IEEE TNSM, ACM TIST,IEEE Security & Privacy, IEEE Computer, IEEE Networking, Information Sciences, IEEE Communications Magazine, IEEE Journal of Cloud Computing等)稿件评阅人。作为指导委员会共同主席发起 IEEE Blockchain国际会议,作为大会主席或程序委员会主席主办IFIP Networking 2021, IEEE Blockchain 2018, IEEE TrustCom / BigDataSE / ISPA-2015, EAI MobiMedia2016, IEEE CIT2014, CSS2014, IEEE DASC2012,IEEE CIT2017, NSS2017, ICA3PP2017,TrustID2011/2012/2013, IEEE/IFIP DMIoT2013/2014/2015等国际会议。担任40+个国际会议的组织委员会委员和70+国际会议TPC委员。担任国家科技发明奖网络评委、“863计划”和NSFC项目评委,加拿大自然科学基金和波兰自然科学基金评委。受邀担任海外高校博士答辩委员会主席或委员。与芬兰、加拿大、新加坡、美国、 澳大利亚等国家的多位****有密切的学术合作。最近荣获诺基亚卓越发明人奖(2020),AALTO ELEC Impact Award (2020),2017年IEEE ComSoc TBD 最佳期刊论文奖,2017年和2018年IEEE Access期刊杰出编委,SpaCCS2019最佳论文奖。 入选爱思唯尔2020中国高被引****。




个人信息
闫峥(博士) (Prof. Zheng YAN, PhD)
“华山****”****,博士生导师
ISN国家重点实验室,网络与信息安全学院

研究方向
信任管理与可信计算
网络与信息安全
攻击检测与防御、恶意软件检测
移动互联网、社交网络安全和隐私保护
物联网和云计算安全、信任和隐私保护
5G/6G 安全、信任与隐私保护
数据挖掘与分析
区块链技术和应用

联系方式
通信地址:陕西西安太白南路2号
邮政编码:710071
邮箱:zyan@xidian.edu.cn
电话:(+86)**
URL:http://web.xidian.edu.cn/yanzheng/


个人简历
闫峥,工学博士。获西安交通大学信息科学与工程学士学位,西安交通大学计算机组织与体系结构硕士学位和新加坡国立大学信息安全硕士学位,赫尔辛基工业大学(即现在的Aalto大学)网络技术副博士学位和电子工程博士学位。1997年8月至1999年3月在新加坡Kent Ridge Digital Labs(即现在的I2R)担任研究****,1999年3月至2000年7月任新加坡Singalab公司软件工程师,2000年7月至2011年任芬兰诺基亚研究中心高级研究员。2011年7月起任西安电子科技大学教授,同时任芬兰Aalto大学荣誉客座和访问教授,芬兰科学院Academy Research Fellow, IET Fellow, IEEE高级会员。陕西省”****“特聘专家。参与和领导了30多项科研项目,其中主持项目20多项,包括两项跨国合作项目、欧盟信息技术高端项目、芬兰科学院资助项目、芬兰国家技术创新局(TEKES)研究项目、科技部重点研发项目(子课题负责)、NSFC项目、中国教育部项目、陕西省自然科学基金重大基础研究项目、诺基亚重大项目、长期研究项目、国际标准支持项目和诺基亚与大学合作项目及技术向产品转换项目。主要研究领域为信任管理和可信计算、信息与网络安全、隐私保护、社交网络、数据挖掘、普适计算和云计算等。发表论文300余篇,其中有240多篇论文被SCI或EI检索,单篇论文最高他引量为920+。独立编著一本关于信任模型和管理的英文专著,独立撰写一部关于实用自治信任管理的英文专著,编辑会议录9部。35项国际发明专利及50项PCT专利,其中独立发明30项。若干授权国际专利已被国际标准采纳,大部分专利技术被工业界采纳或收购,一些专利技术已经被广泛使用。在国际会议及欧美等知名高校特邀报告30余次,介绍自己在信任管理和可信计算方面的研究成果。
担任IEEE IoT Journal (中科院1区),Information Fusion (中科院1区), IEEE Network Magazine (中科院1区),Information Sciences (中科院2区), JNCA (中科院2区), IEEE Access (中科院3区), Soft Computing (中科院3区), SCN (Wiley), KSII TIIS, 网络与信息安全学报, 信息网络安全等15 种期刊领域主编、副主编或编委,曾任 IEEE TII, IEEE JBHI, IEEE TNSE, IEEE Systems Journal, ACM TOMM, Future Generation Computer Systems, Computers & Security, IJCS (Wiley), ACM/Springer MONET, IET Information Security, 等30多个个国际期刊客座编委,及30多个国际期刊(如IEEE TDSC,IEEE TPDS, IEEE TIFS, IEEE TNSM, ACM TIST,IEEE Security & Privacy, IEEE Computer, IEEE Networking, Information Sciences, IEEE Communications Magazine, IEEE Journal of Cloud Computing等)稿件评阅人。作为指导委员会共同主席发起 IEEE Blockchain国际会议,作为大会主席或程序委员会主席主办IFIP Networking 2021, IEEE Blockchain 2018, IEEE TrustCom / BigDataSE / ISPA-2015, EAI MobiMedia2016, IEEE CIT2014, CSS2014, IEEE DASC2012,IEEE CIT2017, NSS2017, ICA3PP2017,TrustID2011/2012/2013, IEEE/IFIP DMIoT2013/2014/2015等国际会议。担任40+个国际会议的组织委员会委员和70+国际会议TPC委员。担任国家科技发明奖网络评委、“863计划”和NSFC项目评委,加拿大自然科学基金和波兰自然科学基金评委。受邀担任海外高校博士答辩委员会主席或委员。与芬兰、加拿大、新加坡、美国、 澳大利亚等国家的多位****有密切的学术合作。最近荣获诺基亚卓越发明人奖(2020),AALTO ELEC Impact Award (2020),2017年IEEE ComSoc TBD 最佳期刊论文奖,2017年和2018年IEEE Access期刊杰出编委,SpaCCS2019最佳论文奖。 入选爱思唯尔2020中国高被引****。




科研项目和资金
科研项目由以下资助:
- 中国国家自然科学基金NSFC
- 科技部网络空间安全重点专项
- 芬兰科学院
- 国家教育部
- 陕西省自然科学基金
- 诺基亚、华为等资助。

科研项目成果介绍
NSFC**:基于信任管理的普适社交网安全和隐私保护关键技术研究
普适社交网是指由异构网络支撑的普适存在且支持即时社交活动的社交网络。普适社交网的安全和隐私保护是关系其发展的重要课题,但目前仍缺乏针对性和系统性研究。本项目从普适社交网结构特性和信任在社交中的作用出发,研究基于信任管理的普适社交网安全和隐私保护关键技术。具体包括:研究具有隐私保护的可信信任评估方法,增强信任管理的理论基础;探索基于信任评估和管理的自适应数据访问控制协议,为普适社交网安全通信提供理论基础和关键技术支撑;研制匿名信任认证协议,在保护社交身份隐私的同时支持可信普适社交。研发安全和隐私保护原型系统、实现以上研究所形成的算法和协议,测试其实际性能,并进行应用演示和用户测试。从而解决信任评估自身的信任及隐私保护、数据访问控制的自适应和信任的匿名认证三个难题。项目获得一系列基于信任管理的普适社交网安全和隐私保护算法和协议,具体包括:具有隐私保护的密文数据处理方案、上下文自适应的可验证计算技术、基于数据融合和挖掘的信任评估方法、基于区块链的去中心化信任评估方法、多维信任等级控制的数据访问方案、D2D安全通信协议、中心化/半中心化/去中心化的匿名信任认证方案等。项目执行期间获得最佳期刊和会议论文各一项,发表和录用了30篇论文,中科院二区及以上或CCF-B类及以上21篇,ESI高被引论文一篇、成果已经被他人多次引用。授权国际专利9项,申请PCT国际专利5项和中国发明专利3项,所有国际专利均被工业界采纳。研发完成5个原型验证系统。项目成果为建立可信普适社交环境提供理论和方法参考,应用于普适社交网信任管理、可信通信、隐私保护和攻击检测防御,并为构建自组可信网络提供了可靠依据。
详细项目成果:/yanzheng/files/5fe4902a6047f.pdf




论文成果
共发表论文300+篇,其中有240多篇论文被SCI或EI检索,单篇论文最高他引量为920+。
独立编著一本关于信任模型和管理的英文专著,独立撰写一部关于实用自治信任管理的英文专著。主编国际会议录9部。
拥有35项发明专利及50项PCT专利申请,其中独立发明30项。
若干授权国际专利已被国际标准采纳 。
在国际会议及欧美等知名高校特邀报告30次。

代表性著作(部分)
1.X.Q. Liang, Z. Yan*, X.F. Chen, L.T. Yang, W.J. Lou, Y.T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, 2019, Doi: 10.1109/TII.2019.**. (IF: 7.377, 中科院SCI1区)
2. X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. (IF: 22.973, 中科院SCI1区)
3. X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. (IF: 10.716, 中科院SCI1区) https://doi.org/10.1016/j.inffus.2018.10.013
4. P. Wang, N. Wang, M. Dabaghchian, K. Zeng, Z. Yan, “Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE Infocom 2019. (CCF A)
5. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi:10.1016/j.ins.2018.02.037(IF: 5.524,中科院SCI 2)
6.W.X. Ding,Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Transactions on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.** (IF: 6.404, CCF A)
7.M.J. Wang,Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 7.377, 中科院SCI 1) Doi: 10.1109/TII.2017.**
8.W. Feng,Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.** (IF: 9.515,中科院SCI1区)
9.Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, Vol. 36, pp. 172-184, July 2017. (IF: 10.716,中科院SCI1区)
10.Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.** (IEEE ComSoc TCBD 2017最佳期刊论文奖)
11.Z. Yan*, P. Zhang, A.V. Vasilakos, “A Survey on Trust Management for Internet of Things”, Journal of Network and Computer Applications, 42 (2014), pp. 120–134, 2014.Doi: 10.1016/j.jnca.2014.01.014i (IF: 5.273,ESI高被引, 中科院SCI 2)
12.Z. Yan*, M.J. Wang, “Protect Pervasive Social Networking based on Two Dimensional Trust Levels”, IEEE Systems Journal, Vol. 11, Issue 1, pp. 207-218, March 2017. Doi: 10.1109/JSYST.2014.**. (IF: 4.463, 中科院SCI 2)
13.Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”, IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011. (IF: 6.404, CCF A)

成果及引用详见:
GoogleScholar
https://scholar.google.com/citations?user=Q0FDt9gAAAAJ&hl=zh-CN&oi=sra

2018/2019年部分成果
X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.** (IF: 5.43)
Z. Yan*, J. Liu, L. T. Yang, W. Pedrycz, “Data Fusion in Heterogeneous Networks”, Information Fusion, vol. 53, pp. 1-3, 2020. Doi: 10.1016/j.inffus.2019.06.007
Zheng Yan*, Venu Govindaraju, Qinghua Zheng, Yan Wang, “Special Session on Trusted Computing”, IEEE Access, 2019.
X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007
D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, 2019. Doi: 10.1109/JIOT.2019.**
S.S Liu, A. Liu*, Z. Yan*, W. Feng, “Efficient LBS Queries with Mutual Privacy Preservation in IoV”, Vehicular Communications, 2019. Doi: https://doi.org/10.1016/j.vehcom.2019.03.001
Yulei Wu, Zheng Yan*, Kim-Kwang Raymond Choo, Laurence T. Yang, “Special Session: Internet-of-Things (IoT) Big Data Trust Management”, IEEE Access, 2019.
Rafik Hamza, Zheng Yan*, Khan Muhammad, Paolo Bellavista, Faiza Titouna, “A privacy-preserving cryptosystem for IoT E-healthcare”, Information Sciences, 2019. https://doi.org/10.1016/j.ins.2019.01.070
R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.**
W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019.
X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.** (IF: 20.23)
W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001
X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022
L.T. Yang, "HO-OTSVD: A Novel Tensor Decomposition and Its Incremental Computation for Cyber-Physical-Social Networks (CPSN)", IEEE Transactions on Network Science and Engineering, 2018. (accepted)
B. B. Gupta, Tyson Brooks, Zheng Yan*, Shingo Yamaguchi, Yogachandran Rahulamathavan, Special Issue on Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing, IEEE Access, 2018.
Jianfei Ruan, Z. Yan*, Bo Dong, Qinghua Zheng, Buyue Qian, “Identifying Suspicious Groups of Affiliated-Transaction-based Tax Evasion in Big Data”, Information Sciences, 407, pp. 508-532, 2019. Doi: 10.1016/j.ins.2018.11.00
X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013
H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, 2018. Doi: 10.1109/JIOT.2018.**
H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002
Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, Yintang Yang, “Blockchain-based Secure Time Protection Scheme in IoT”, IEEE Internet of Things Journal, 2018. Doi: 10.1109/JIOT.2018.**
Jun Feng, Laurence T. Yang, Qing Zhu, Yang Xiang, Jinjun Chen, Zheng Yan, “Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems”, IEEE Transactions on Sustainable Computing, 2018. Doi: 10.1109/TSUSC.2018.**
F.Y. Tian, Z. Yan*, X. Q. Liang, P. Zhang, “Trusted Cooperation among Virtual Base Stations in C-RAN”, IEEE Access, Vol. 6, Issue 1, pp. 57787-57801, Dec. 2018. Doi: 10.1109/ACCESS.2018.** (IF: 3.557)
S.S. Liu, L.F. Zhang, Z. Yan*, "Predict Pairwise Trust based on Machine Learning in Online Social Networks: A Survey", IEEE Access, vol. 6, issue 1, pp. 51297-51318, December 2018. Doi: 10.1109/ACCESS.2018.**
Zheng Yan*, Kai Zeng, Yu Xiao, Thomas Hou, Pierangela Samarati, Special Issue on Trust, Security and Privacy in Crowdsourcing, IEEE Internet of Things Journal, Vol. 5, Issue 4, pp. 2880-2883, 2018. Doi: 10.1109/JIOT.2018.**
Z. Yan*, L. Peng, “Trust Evaluation Based on Blockchain in Pervasive Social Networking,” IEEE Blockchain Technical Briefs, Sept. 2018.
D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018. Doi: 10.1016/j.jnca.2018.05.004 (IF: 3.5)
Haoran Yuan, Xiaofeng Chen, Tao Jiang, Xiaoyu Zhang, Zheng Yan, Yang Xiang, “DedupDUM: Secure and scalable data deduplication with dynamic user management”, Information Sciences, 2018. DOI: 10.1016/j.ins.2018.05.024
Zheng Yan*, Yuqing Zhang, Raymond Choo, Yang Xiang, “Editorial: Security Measurements of Cyber Networks”, Security and Communication Networks (Wiley), vol. 2018, article ID **, 3 pages, 2018. https://doi.org/10.1155/2018/**
G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID **, 16 pages, 2018. https://doi.org/10.1155/2018/**/.
K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001 (IF: 1.748)
Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518 (IF: 1.133)
H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies”, IEEE Access, vol. 6, issue 1, pp. 18345-18365, Dec. 2018. Doi: 10.1109/ACCESS.2018.** (IF: 3.224)
Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 4.305)
Qingchen Zhang, Laurence T. Yang, Z. Yan, Zhikui Chen, Peng Li, “An Efficient Deep Learning Model to Predict Cloud Workload for Industry Informatics”, IEEE Transactions on Industrial Informatics”, Vol. 14, No. 7, pp.3170-3178, July 2018. Doi: 10.1109/TII.2018.** (IF: 6.764)
G. Liu, Z. Yan*, W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 3.500)
L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.**
N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, Vol. 3, Issue 1, 23 page, article 9, Sept. 2018. (https://doi.org/10.1145/**)
W.X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Trans on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.** (IF: 4.410)
M.J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 6.764) Doi: 10.1109/TII.2017.**
Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng, “AutoPrivacy: Automatic Privacy Protection and Tagging Suggestion for Mobile Social Photo”, Computers and Security, Vol. 76, pp. 341-353, Jan. 2018. https://doi.org/10.1016/j.cose.2017.12.002 (IF: 2.849)
Jun Feng, Laurence T. Yang, Guohui Dai, Jinjun Chen, and Zheng Yan, “An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Cyber-Physical-Social Big Data Reduction”, IEEE Trans. on Big Data, 2017. Doi: 10.1109/TBDATA.2018.**
X.Q. Liang, Z. Yan*, “A Survey on Game Theoretical Methods in Human-Machine Networks”, Future Generation Computer Systems, 92(2019), pp. 674-693, 2019. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, and Zheng Yan, “Machine Learning-based Malicious Application Detection of Android”, 5(1), pp. 25591-25601, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.**
W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “A Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.** (IF: 7.596) (invited)


2017年部分成果
1.W.X. Ding,Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Trans on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.** (IF: 2.926)
2.M.J. Wang,Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, 2017. (IF: 6.764) Doi: 10.1109/TII.2017.**
3.Zhuo Wei, Yongdong Wu,Zheng Yan, Yanjiang Yang, Qingqi Pei, Yajuan Xie, Jian Weng, “AutoPrivacy: Automatic Privacy Protection and Tagging Suggestion for Mobile Social Photo”, Computers and Security, 2017. (accepted)
4.Jun Feng, Laurence T. Yang, Guohui Dai, Jinjun Chen, andZheng Yan, “An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Cyber-Physical-Social Big Data Reduction”, IEEE Trans. On Big Data, 2017. (accepted)
5.X.Q. Liang,Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks , Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
6.Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, andZheng Yan, “Machine Learning-based Malicious Application Detection of Android”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.**
7.W. Feng,Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.** (IF: 7.596)
8.F.Y. Tian, P. Zhang,Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.**
9.W.X. Ding,Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017. Doi: 10.1016/j.ins.2017.05.004
10.Rui Li, Qinghua Zheng, Xiuqi Li,Zheng Yan, “Multi-Objective Optimization for Rebalancing Virtual Machine Placement”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
11.Y.L. Fu,Z. Yan, H. Li, X.L. Xin, J. Cao, “A Secure SDN based Multi-RANs Architecture for Future 5G Networks”, Computers and Security, 2017. (accepted) (IF: 2.849)
12.Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.**
13.Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
14.P. Yan,Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
15.X.X.Yu,Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
16.Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
17.M.J. Wang,Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
18.W. Feng,Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017.

2016年部分成果
1.Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
2.Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (IF: 2.331)
3.Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.**
4.C.Y. Huang,Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications based on Trust in a Distributed Way”, IEEE Access, 2016.
5.L.J. Gao,Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
6.F. Tong,Z. Yan*, A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
7.Z. Yan*, R.H. Deng, V. Varadharajan, “Cryptography and Data Security in Cloud Computing”, Information Sciences, 2016. (IF: 4.098)
8.Z. Yan*, V. Niemi, L.T. Yang, “Key Technologies for 5G, the Next Generation of Mobile Networks and Services”, International Journal of Communication Systems, 2016. Doi: 10.1002/dac.3226
9.J. Liu,Z. Yan, A.V. Vasilakos, and L.T. Yang,“Data Mining in Cyber, Physical and Social Computing”, IEEE Systems Journal, 2016.
10.W.X. Ding,Z. Yan*, R. H. Deng, “A Survey on Future Internet Security Architectures”, IEEE Access, 2016. Doi: 10.1109/ACCESS.2016.** (IF: 1.27) (invited)
11.Z. Yan*, J. Liu, R.H. Deng, F. Herrera, “Trust Management for Multimedia Big Data”, ACM Transactions on Multimedia Computing Communications and Applications, vol. 12, no. 4s, Article 57, 2 pages, August 2016. Doi: http://dx.doi.org/10.1145/** (IF: 2.46)
12.L.F. Zhang,Z. Yan*, R. Kantola, “Privacy-Preserving Trust Management for Unwanted Traffic Control”, Future Generation Computer Systems, 2016. Doi: 10.1016/j.future.2016.06.036 (IF: 2.43)
13.Z. Yan*, M.J. Wang, Y.X. Li, A.V. Vasilakos, “Encrypted Data Management with Deduplication in Cloud Computing”, IEEE Cloud Computing Magazine, 3(2), pp. 28-35, 2016.
14.M.J. Wang,Z. Yan*, “A Survey on Security in D2D Communications”, Mobile Networks and Applications, Springer, 2016. Doi: 10.1007/s11036-016-0741-5 (IF: 1.538)
15.Z. Yan*, W. Feng, P. Wang, “Anonymous Authentication for Trustworthy Pervasive Social Networking”, IEEE Transactions on Computational Social Systems, 2(3), pp. 88-98, Feb. 2016. Doi:10.1109/TCSS.2016.**
16.Zhuo Wei,Z. Yan, Yongdong, Wu, R. H. Deng, “Trustworthy Authentication on Scalable Surveillance Video with Background Model Support”, ACM Transactions on Multimedia Computing Communications and Applications, accepted, 2016. (IF: 2.46)
17.L. Kuang, L.T. Yang, S.C. Rho,Z. Yan, K. Qiu, “An Efficient Tensor-based fr[ant]amework for Software-defined Big Data Center”, ACM Transactions on Multimedia Computing Communications and Applications, 2016. (IF: 2.46)




荣誉获奖

Aalto ELEC Impact Award 2020, Aalto University, Feb 15th 2021
Education Award of Research Institute of China Electronics Technology Group (second level), 2021
Elsevier 2020 highly cited Chinese researcher
Distinguished Inventor Award for significant technology contributions to Nokia’s IPR portfolio in the field of trustworthy networking and communications, 2020
The Best Paper Award, SpaCCS2019, Atlanta, USA (184 submissions with 20.1% acceptance rate)
IEEE Outstanding Leadership Award at IEEE SmartWorld Congress, August 2019, UK
The Best Faculty of Xidian University 2018-2019
Eureka Innovation Award to Sigmona, EU (project award) (2019)
Outstanding Associate Editor of 2018 for IEEE Access
Outstanding Leadership Award at IEEE Blockchain, August 2018
Associate Editor of the Month for IEEE Access, July 2018
The 2017 Best Journal Paper Award of IEEE ComSoc TCBD (Technical Committee on Big Data)
Outstanding Associate Editor of 2017 for IEEE Access
Outstanding Service Award at SpaCCS2017
Distinguished Leadership Award at NSS/ICA3PP/IEEE CIT-2017
Eureka Excellence Award - Celtic-Plus Sigmona project (2017)
IEEE Distinguished Leadership Award at IEEE TrustCom/BigDataSE/ISPA2015
Huashan Talent Young Professor Award of Xidian University (2015 - 2017)
Outstanding Leadership Award at IEEE CIT 2014
Outstanding Service Award for IEEE RACIT2014 organization
Outstanding Service Award for IEEE DTWSM2014 organization
Outstanding Leadership Award at IEEE HPCC/ICESS/CSS 2014
The Best Faculty of Xidian University 2013-2014
Excellent Individual from Abroad in Shaanxi Province, China 2014
Outstanding Leadership Award at IEEE TrustCom 2013
Outstanding Leadership Award at IEEE iThings 2012
Outstanding Service Award at IEEE TrustCom 2012
“100 Expert Plan” Award of Shaanxi Province, China (2011)
Sisu Award, Nokia Research Center, Helsinki (2010)
Best Organizer Award for special track organization in UIC/ATC2010 (2010)
EU ITEA Bronze Achievement Award - Trust4All project (2008)
Best Student Paper Award at ATC07 (2007)
Research Fellowship Prize of Singapore Science & Technology Bureau (1997 - 1999)




在读
姓名 研究方向 联系方式
博士 2014级 冯伟 物联网安全、移动众包隐私保护、区块链 bjxsakya@qq.com
2015级 于熙洵 可验证计算 @qq.com
王永峰 移动感知,隐私保护 d2000d@163.com
2016级 靖旭阳 网络攻击检测与防御,网络流量分类,粒计算,Sketches xuyangjing91@163.com
刘高 安全参数采集与度量 gaoliu9865@gmail.com
2017级 王普 5GWirelessCommunicationSecurity,UAVSecurity,PhysicalLayerSecurity,EnergyHarvesting wangpu03@gmail.com
梁雪芹 GameTheory Dearliangxq@126.com
2018级 谢皓萌 IoTandBlockchain QQ:
章芮 声纹认证与隐私保护 cumt_zhangrui@126.com
2019级 高立君
张家蕾
2020级 费书凡 Blockchain and TEE fsf348@126.com
王杰 机器学习,信任管理 @qq.com

硕士 2018级 孙伟 IntelSGXSecurity zhgsunwei12188@126.com
赵东昇 5Gauthentication mjhzds@163.com
魏文涛 IntelSGXTechnology @qq.com
王雪睿 AttacksDetectioninAuthenticationSystems wangxueruimay@163.com
赵晶晶 网络攻击检测与防御,网络流量分类 pulyjuly66@outlook.com
钱薪任 proofsofretrievablity @qq.com
彭立 隐私保护 pengli_email@163.com
张文铭 安全协议的形式化证明、网络流量分类 @qq.com
2019级 李想 区块链中的隐私保护,联邦学习 xiangli@stu. xidian.edu.cn
董慧栋 网络数据路由,可信计算应用 @qq.com
韩荣 game theory @qq.com
白慧 可验证计算和智能路由 baih1027@163.com
翁浩
王利 无人机安全 @qq.com
韩慧
2020级 刘康德 AI和区块链的结合 kangde9730L@163.com
刘国仓 区块链隐私保护 lgc@bupt.edu.cn
韩昊翔 区块链,云数据完整性审计 @qq.com
兰佳禾 生物认证 @qq.com
吴菲 机器学习 ,数据真值发现 **@163.com
谢晓萱 5G,AI xiexiaoxuanchris@163.com

就业情况
博士 2013级 王明君(西电师资博士后)
2014级 丁文秀(西电师资博士后)

硕士 2011级 陈亮(中电20所) 史高娃(联通)
2012级 唐畏(深圳腾讯) 史汪洋
马思玄(北京建行) 党田力(华为)
陈寒凌(深圳腾讯) 王雨露(交通银行)
2013级 李宁(南京中兴) 童飞(北京腾讯、杭州阿里)
马玉坦(中国移动) 黄朝银(深圳腾讯)
高立君(北京恒丰) 周家臻
2014级 卞姗姗(上海诺基亚贝尔) 许广武(中国航天信息)
赵思慧(中国人寿数据中心) 朱玉权(中国船舶重工集团723研究所)
程艳晓(北京中国电信)
2015级 徐坤(百度) 颜平(中国网安公司)
姚震(招银网络科技) 吴宸梓(西安中兴)
陈寒露(招银网络科技) 田俸羽(微众银行)
2016级 蔺华庆(百度在线网络技术(北京)有限公司) 贺丽梅(度小满科技(北京)有限公司)
李国权(杭州 浙江仟和网络科技有限公司(点我达)) 周栋浩(北京字节跳动科技有限公司)
2017级 孟曈 李怡霖
刘丹 杨雪涛
王静雯 MUHAMMADJEHANZAIBYOUSUF
胡蕊
芬兰阿尔托大学 李雪韵(华为) 沈悦(美国)
张丽芳(芬兰) 陈玉(美国 San Jose State University)





教学经历
· 课程创立者及教学:“信任管理”,西安电子科技大学,硕士及博士研究生课程,使用独立撰写英文专著(自2015年始,定期硕士/博士课程);
教材:闫峥,“移动环境下的信任管理——可用和自主模型”,IGI Global,Hershey,Pennsylvania,USA,2013;
· 课程主导及教学: “移动安全及信任”,西安电子科技大学,教授硕士和博士研究生,英语课程 (2014, 2016);
· Security and Privacy in Mobile Networks 移动网络中的安全和隐私(全英)(本科)(2018,2019)
· Security in Mobile Communications 移动通信安全(全英)(本科)(2017)
· Security and Privacy in Mobile Networks 移动网络中的安全和隐私(全英)(参讲人)
· 课程教学: “通信网络的路由S-38.2121,芬兰阿尔托大学,硕士研究生级别 (10-12.2013/2014);
· 课程创立者: “信任管理基础”,西安电子科技大学,本科级别课程 (2013-);
· 导师:CSE-E5000 研讨会,关于 “软件系统、技术和安全(2015秋);
· 研究生研讨会导师:“网络安全”T-110: 5291 ,芬兰阿尔托大学,博士研究生级别(09.2011-12.2011, 09.2012-12.2012, 09.2013-12.2013);
· 组织博士研讨会:“信任和识别”,芬兰阿尔托大学,博士研究生级别(02.2011-06.2011);
· 导师/助教:赫尔辛基理工大学,博士研究生级别(2002-2004);
· 指导15位本科生的毕业论文及21位硕士毕业论文(2010年至今)。




招生信息
博士生需求(PhD students):
需要信息和网络安全,信任管理,可信计算,密码学背景的博士研究生若干名。希望学生有良好的数学和英语基础,上进行心强,认真勤奋。
硕士生需求(Master students):
需要对信息和网络安全,信任管理和可信计算,密码学有兴趣的硕士研究生若干名。希望学生有良好的编程和系统实现能力,上进行心强,认真勤奋。
注: 有意攻读我的博士和硕士的学生请Email联系。
需求:需要对5G安全、大数据分析和区块链技术有兴趣的学生。
暑期实习需求和题目如下(愿意在我团队暑期实习的请联系 zyan@xidian.edu.cn, 或电话联系**)
1. 网络大数据分析。题目1: “基于自定义约束模糊聚类的网络流量分析方法”; 题目2: “基于神经网络的距离度量学习”
2. 数据隐私保护算法实现
3. 基于神经网络的外包计算可验证执行
4. 区块链技术和应用


上研预读
《The Basic of Information Security》
《The Elements of Style》




校际合作
· 与芬兰阿尔托大学成立中芬西电-阿尔托下一代无线通信与安全国际联合实验室 (2017-今),开展硕士和博士生联合培养。
· 芬兰阿尔托大学 (05.2009 - date): 作为硕士班学生的硕士论文导师。我的三位学生的毕业论文得到了最高分且各有6-8篇出版物。一位学生参与博士项目并取得了全额奖学金:Human Computer Interaction Group, EPFL, Lausanne, Switzerland.
· 西安交通大学 (07.2011 - date): 与郑庆华教授、刘均教授的团队在数据挖掘、入侵检测和恶意代码检测等方向上进行合作。 Co-edited a number of SI, e.g., in Information Fusion, ACM TOMM, etc.
· 洛桑联邦理工学院(05.2009 - 10.2010): 与Prof. Jean-Pierre Hubaux, EPFL, Lausanne的团队合作关于普适社交网络中以数据为中心的信任管理的课题。 共同培养一名博士研究生。
· 华中科技大学 (07.2009 - date): 与华中科技大学合作培养两名博士研究生,还有几项论文出版物的合作。与2010年10月受邀去华中科技大学作关于“在移动环境中建立信任”的演讲。
· 新加坡管理大学 (09.2009 - 09.2010): 作为诺基亚联系人与新加坡管理大学合作诺基亚的捐赠项目“移动设备在基于射频识别技术的供应链管理中的应用”。针对移动互联网服务提出了一种移动用户数据隐私保护解决方案,并共同培养一名博士研究生。该项目产出了一系列联合出版成果。
· 中国人民大学 (01.2007 – 12.2008): 作为一个人机信任交互项目的领导者和理论研究者,领导诺基亚研究中心(赫尔辛基)与中国人民大学的合作。协调诺基亚安全与信任研究与中国学术界的合作与知识交流 (e.g., Tsinghua Univ.). 该项目探讨了基于心理学的用户驱动的信任模型和管理方法,以此设计开发一个可用的信任管理系统,例如针对移动应用和服务的,以及针对普适社交网络的。该项目产出了一系列联合论文。


国际交流
· Invited AXA Prof. Robert H. Deng, Fellow of Singapore Academy of Engineering, IEEE Fellow, to visit Xidian University in June 2019.
- Invited Prof. Mohammed Atiquzzaman (University of Oklahoma, USA) to visit Xidian University in May 2019.
- Invited Prof. Valtteri Niemi, University of Helsinki to teach in Xidian University in May 2019.
· Invited IEEE life fellow Prof. Stephen S. Yau (Arizona State University, US) to visit Xidian University in May 2012;
· Invited Prof. Yan Wang (Macquarie University, Australia) to visit Xidian University in Dec. 2011;
· Invited Nokia IR directors Mr. Harri Hongasalo (Finland) and Mr. Gordon Huang (US) to visit Xidian University in Dec. 2011;
· Invited Prof. Valtteri Niemi (Nokia Fellow) (University of Turku, Finland) to visit Xidian University in 11. 2011 and 09.2013.
· Invited Prof. Raimo Kantola (Aalto University), Prof. Laurence T. Yang (St. Francis Xavier University, Canada) and IEEE fellow Prof. Wenjing Lou (Virginia Tech, US), Prof. Valtteri Niemi to visit Xidian, based on ‘111’ program sponsored by the Ministry of Education of China and the State Administration of Foreign Experts Affairs of China (Grant No. B08038) and High-end Foreign Experts Recruitment Program of China. (2013)
· Invited IEEE fellow/IET fellow Prof. Hsiao-Hwa Chen (National Cheng Kung University, Taiwan), IEEE fellow/SCS fellow Prof. Mohammad S. Obaidat (Monmouth University, USA), IEICE fellow/IPSJ fellow Prof. Hideko S. Kunii (Shibaura Institute of Technology, Japan), Prof. Mohammed Atiquzzaman (University of Oklahoma, USA), Prof. Zhiyong Liu (Chinese Academy of Sciences, China), Prof. Jinjun Chen (University of Technology Sydney, Australia), Dr. Alvin Chin (Microsoft, China), Dr. Chonggang Wang (IntelDigital, USA), Prof. Daming Wei (University of Aizu and Tohoku University, Japan), Prof. Christian Prehofer (fortiss, Germany) to visit the State Key Lab of ISN, Xidian University in Sept. 2014.
· Invited Prof. Witold Pedrycz (Univ. of Alberta, Canada), Prof. Thomas Hou (VirginiaTech, US), Prof. Honggang Wang (UMass Dartmouth, US), Prof. Jian Ren (Michigan State Univ., US), Dr. (Anand Prasad) to visit the State Key Lab of ISN, Xidian University in June 2016. Invited A. Prof. Kai Zeng (George Mason Univ. US) and A. Prof. Rui Zhang (Univ. of Delaware) to visit Xidian in Dec. 2016.
- Invited A. Prof. Kai Zeng (George Mason Univ. US) and A. Prof. Rui Zhang (Univ. of Delaware) to visit Xidian in Dec. 2016.
- Invited Prof. Valtteri Niemi (University of Helsinki, Finland), Prof. Xiangjian He (University of Technology Sydney), Prof. Atiquzaaman (University of Oklahoma) to visit Xidian in June 2017.
- Invited Prof. Elisa Bertino (Purdue University, USA), Prof. Francisco Herrera (University of Granada, Spain), Prof. Shiwen Mao (Auburn University, USA), Prof. Laurence T. Yang (St. Francis Xavier University, Canada), Dr. Anand Prasad (NEC, Japan) to offer keynotes at NSS/ICA3PP/IEEE CIT2017
- Coordinated international education cooperation and exchange between Aalto University and Xidian University. 2 PhD students (Feng Wei and Liang Xueqin) are sponsored by Aalto University to visit Aalto for 2 years. (2017)
- Coordinated international education cooperation and exchange between Aalto University and Xidian University. 2 Post-doc, 4 PhD students, 2 master students and 1 bachelor student are sponsored by Aalto University to visit Aalto for 3 months to 2 years. (2018, 2019)




学术服务与任职
IET Fellow, IEEE高级会员,担任13个期刊的编委(9个为SCI检索),三十个国际期刊的首席客座编辑,三个会议指导委员会的会员,三十多个国际会议和研讨会的主席或项目主席,五十多个国际会议技术计划委员会的成员,多个顶级期刊的评论员。受邀在国际会议及高校中做过十余次演讲。摘取部分经历如下:
编辑和编委会成员(部分):
Information Fusion (Elsevier) (IF: 10.716, 中科院1区), area editor (IoT, sensor, security & privacy), editorial board member (at present)
IEEE Internet of Things Journal (IF: 9.515, 中科院1区), associate editor (2016-date)
IEEE Network Magazine (IF: 8.808, 中科院1区), technical editor (09.2020 - 09.2022)
Information Sciences (Elsevier) (IF: 5.524, 中科院2区), associate editor (at present);
Journal of Network and Computer Applications (Elsevier) (IF: 5.273, 中科院2区), editorial board member (2017-2018)
IEEE Access (IF: 4.098,中科院2区), associate editor (at present)
Soft Computing (Springer) (IF: 2.472,中科院3区) (at present)
Entropy (IF: 2.494), topic editor (at present)
Security and Communication Networks (IF: 1.067), associate editor (at present)
KSII Transactions on Internet and Information Systems (IF: 0.452), area editor (at present)
Human-centric Computing and Information Sciences, associate editor (at present)
Chinese Journal of Network and Information Security 网路与信息安全学报 (at present)
信息网络安全 (at present)
Leading guest editor: IEEE Transactions on Industrial Informatics (IF: 7.377), IEEE Journal of Biomedical and Health Informatics (3.850), IEEE Transactions on Network Science and Engineering, ACM Transactions on Multimedia Computing, Communications and Applications (IF: 2.46); Information Fusion (Elsevier) (IF: 5.667); Information Sciences (IF: 4.832); Future Generation Computer Systems (Elsevier) (IF: 3.997); IEEE Systems Journal (IEEE) (IF: 3.882); Computers & Security (Elsevier) (IF: 2.849); Journal of Network and Computer Applications (IF: 3.5); Mobile Networks and Applications (Springer) (MONET) (IF: 3.259); IET Information Security (IF: 1.037); IJCS: IJISP; etc.
会议组委会成员(部分):
IFIP Networking 2021 (Leading TPC chair)
IEEE TrustCom/BigDataSE/CSE/EUC/iSCI 2020 (vice-program co-chair, special issue co-chair)
IEEE CyberC 2020 (publicity chair)
IEEE ICC (Session chair – Blockchain)
IEEE ATC 2019(leading general chair)
IEEE INFOCOM 2019 (session chair - Security in Wireless Networks)
IEEE Blockchain 2018 (general chair, steering committee co-chair)
IEEE BigDataSE 2018 (program chair)
IEEE Blockchain 2018 (general co-chair)
NSS2017 (program chair)
IEEE CIT 2017 (organization/general chair, steering committee member)
IEEE ICA3PP 2017 (general co-chair)
SpaCCS 2017 (program co-chair, steering committee member)
The 2nd IEEE International Conference on Data Science in Cyberspace 2017 (publication chair)
EAI MobiMedia2016 (general chair, steering committee member)
2016 4th International Conference on Cloud Computing and Intelligent Systems (publicity chair)
IEEE TrustCom 2015 (program co-chair, panel co-chair)
IEEE BigDataSE 2015 (general co-chair)
IEEE RATSP 2015 (general co-chair)
IEEE CIT 2014 (general co-chair)
CSS 2014 (program chair)
IEEE DTWSM 2014/2015/2016 (program co-chair)
IEEE RACIT 2014 (program chair)
IEEEGBM2014(program co-chair)
BWCAA2014(track chair)
Cute-2013 (vice program co-chair)
IEEE/IFIP EUC 2013 (workshop co-chair, vice program co-chair)
IEEE/IFIP DMIoT 2013 (program co-chair)
DataTrust-13 (publicity co-chair)
IEEE DASC 2012 (program co-chair)
IEEE iThings 2012 (vice program co-chair)
IEEE iThings/CPSCom/GreenCom 2012 panel session chair
IEEE TrustCom 2011/2012: workshop co-chair (A class)
IEEE TrustID 2011/2012/2013 (program chair)
UIC/ATC 2010: special track chair (B class)
ATC 2009 publicity co-chair (B class)
IEEE MINES 2009/2010: workshops co-chair, special track technical chair
信任地位:技术委员会成员及基金和奖项评委
Academic tenure track committee of School of Telecommunications Engineering, Xidian University(2013-date)
Academic tenure track committee of School of Cyber Engineering, Xidian University(2015-date)
PhD program grant of Chinese Education Ministry(2012)
National Science and Technology Innovation Award of China
National Award of Science and Technology of China
Innovation Foundation of China (Scientific and Technical Ministry of China)
Fok Ying Tung Education Foundationof Chinese Education Ministry
IEEE Communications & Information Security Technical Committee
National “863 projects” of Chinese Scientific and Technology Ministry (2014)
Steering committee of IEEE International Conference on Computer and Information Technology
Steering committee of International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS)
Steering committee of EAI Mobile Multimedia Communications (EAI MobiMedia)
NSFC project reviewer(2016, 2017)
论文答辩委员会(部分):
PhD jury member: Telecom Sud_Paris, UNIVERSITE PIERRE ET MARIE CURIE - PARIS6, France (03.2010).
PhD dissertation opponent, University of Turku, Finland (08.2013).
PhD dissertation pre-examiner, University of Oulu, Finland (12.2013-02.2014)
PhD dissertation pre-examiner, University of Tampere, Finland (08.2016)
会议技术委员会成员(部分):
IEEE GlobeCom (2012, 2015); MobiSec (2009, 2010); ICSOC (2009 - 2019); ACM MobileHCI (2009, 2010); ACM SAC TRECK (2008 - 2011); IEEE VTC (2011); IEEE WiMob (2010 - 2012); ICA3PP (2010); IEEE CPSCom (2011); ISPEC (2013, 2016); NordSec2017; IEEE DSC2017, IEEE ICCCN (2018); CoCoNet (2018); IFIPTM (2019), SECRYPT (2019, 2020); IEEE Blockchain (2019); IEEE ATC (2019); IEEE ICC (2020, 2021); IEEE ICDCS 2020; IEEE CNS2020, International Conference on Security and Privacy in Digital Economy (SPDE2020), ACM CSAC2019/2018, IEEE DSC2020; IEEE INFOCOM 2021; IEEE TrustCom2021, etc.
受邀演讲报告(部分):
Trustworthy Mobile Crowdsourcing Based on Blockchain, talk in Huawei, Helsinki, June 10, 2020.
Trust Management and its Enhanced Security with Privacy, Seminar of Security, Trust and Privacy, Aalto University, Finland, February. 13, 2020.
Invited Talk: Network Data Collection, Composition and Analytics for Cyber Security, IWCSS 2019, in conjunction with the iSCI 2019 and DependSys 2019 International Joint Conferences, GuangZhou, China, November 12-15, 2019.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, invited talk at GuangZhou University, GuangZhou, China, November 11, 2019.
Keynote: Network Data Collection, Fusion, Mining and Analytics for Cyber Security, the Second International Conference on Machine Learning for Cyber Security (ML4CS), Xi’an, China, September 19, 2019.
Summit Keynote: Blockchain: Advances, Challenges & Applications, IEEE World Congress on Cybermatics, Atlanta, USA, July 16, 2019.
Panelist: AutoSource: Autonomous Mobile Crowdsourcing with Decentralized Trust Management, IEEE World Congress on Services, Milan, Italy, July 9, 2019.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, invited talk at Arizona State University, Phoenix, USA, September 14, 2018.
Summit Keynote: Privacy-Preserving Data Processing with Flexible Access Control, the 2018 IEEE International Congress on Cybermatics, Halifax, Canada, August 1, 2018.
Panellist: Trust Management Enhanced Security with Privacy, IEEE ISPA/IEEE IUCC/SpaCCS2017, Guang Zhou, China, Dec. 14, 2017.
Trust Management Enhanced Security with Privacy in Cloud Computing, JiNan University, China, Dec. 16, 2017.
Trust Management Enhanced Security with Privacy in Pervasive Social Networking, GuangZhou University, China, Dec. 14, 2017.
Secure Computations and Deduplication Management over Encrypted Data in Cloud Computing, Aalto University, Finland, Nov. 30, 2017.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, Aalto University, Finland, Oct. 6, 2017.
Unwanted Traffic Control based on Trust Management, EAI MobiMedia2017, ChongQing, July 2017.
Trust and Trust Management, Invited Talk at Fujian Normal University, June 2016.
Cloud Data Security and Privacy Protection based on Trust Management, Invited Talk at Fujian Normal University, June 2016.
Trust

受邀讲演和报告
特邀报告
Invited Talk: Highly Efficient Network Security Analysis Based on Sketches. The 5th International Workshop on Cyberspace Security (IWCSS 2021), Guangzhou, China, June 18-21, 2021.
Panelist: IEEE International Conference on Blockchain and Cryptocurrency, Virtual Conference, Sydney, Australia, May 6, 2021.
Data Collection, Fusion and Analytics towards Network Trust Measurement, Huawei workshop: Trust on Future Networks, Helsinki, January 8, 2021.
Invited Talk: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain, IEEE TrustCom/IEEE BigDataSE/IEEE CSE/IEEE EUC/IEEE iSCI 2020, GuangZhou, China, Dec. 29 – Jan. 2, 2020.
Trustworthy Mobile Crowdsourcing Based on Blockchain, talk for Huawei, Helsinki, June 10, 2020.
Trust Management and its Enhanced Security with Privacy, Seminar of Security, Trust and Privacy, Aalto University, Finland, February 13, 2020.
Invited Talk: Network Data Collection, Composition and Analytics for Cyber Security, IWCSS 2019, in conjunction with the iSCI 2019 and DependSys 2019 International Joint Conferences, GuangZhou, China, November 12-15, 2019.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, invited talk at GuangZhou University, GuangZhou, China, November 11, 2019.
Keynote: Network Data Collection, Fusion, Mining and Analytics for Cyber Security, the Second International Conference on Machine Learning for Cyber Security (ML4CS), Xi’an, China, September 19, 2019.
Summit Keynote: Blockchain: Advances, Challenges & Applications, IEEE World Congress on Cybermatics, Atlanta, USA, July 16, 2019.
Panelist: AutoSource: Autonomous Mobile Crowdsourcing with Decentralized Trust Management, IEEE World Congress on Services, Milan, Italy, July 9, 2019.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, invited talk at Arizona State University, Phoenix, USA, September 14, 2018.
Summit Keynote: Privacy-Preserving Data Processing with Flexible Access Control, the 2018 IEEE International Congress on Cybermatics, Halifax, Canada, August 1, 2018.
Panelist: Trust Management Enhanced Security with Privacy, IEEE ISPA/IEEE IUCC/SpaCCS2017, Guang Zhou, China, December 14, 2017.
Trust Management Enhanced Security with Privacy in Cloud Computing, invited talk at JiNan University, China, December 16, 2017.
Trust Management Enhanced Security with Privacy in Pervasive Social Networking, invited talk. at GuangZhou University, China, December 14, 2017.
Invited Talk: Secure Computations and Deduplication Management over Encrypted Data in Cloud Computing, Aalto-Shanghai Workshop, Finland, November 30, 2017.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, talk at Aalto University, Finland, October 6, 2017.
Keynote: Unwanted Traffic Control Based on Trust Management, EAI MobiMedia2017, Chong Qing, China, July 13, 2017.
Controlling Unwanted Traffic with Trust Management, invited talk at Sydney University Technology, Sydney, Australia, July 2017.
Trust and Trust Management, invited Talk at Fujian Normal University, China, June 2016.
Cloud Data Security and Privacy Protection Based on Trust Management, invited Talk at Fujian Normal University, China, June 2016.
Invited Talk: Trust Management in Pervasive Social Networking, International Symposium on Companion Technology 2015 (ISCT 2015), Ulm, Germany, September 24, 2015.
Panelist, Emotion and Trust, International Symposium on Companion Technology 2015 (ISCT 2015), Ulm, Germany, September 24, 2015.
Keynote: Trust Management for Mobile Applications, IEEE TrustSoft, Helsinki, August 20, 2015.
Applications of Usable and Autonomic Trust Management, Invited Talk at Beijing International Study University, China, April 10, 2014.
Usable Trust Management and Applications, invited talk at Virginia Polytechnic Institute and State University (VirginiaTech), USA, October 18, 2013.
The Basic of Cloud Computing, invited lecture, invited lecture at NTNU, Norway, October 2012.
Usable and Autonomic Trust Management, invited talk at Xi’an Jiaotong University and Xidian University, Xi’an, China, December 2012.
Trust Management in Mobile Environments – Usable and Autonomic Models, invited talk at Xi’an University of Post and Telecommunications, Xi’an, China, December 2012.
Invited Talk: A Trust Behavior based Recommender System for Software Usage, IEEE PhoneCom 2011, Dalian, China, October 19, 2011.
Invited Talk: Usable Trust Management for Mobile Applications, Future Internet SHOK Results Seminar, February 15, 2011. http://www.futureinternet.fi/seminar_2011.htm
Building Trust in Mobile Environments, invited talk at Huazhong University of Science and Technology, China, October, 2010.
Human-Machine Trust Interaction: Towards User Driven Trust Modeling and Management, invited talk at Renmin University of China, China, May 2008.
Keynote: Autonomic Trust Management for a Component Software Platform, AIC\\\\'07, Greece, August 24, 2007.




最新成果
X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.** (IF: 7.377)
D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, Vol. 6, No. 3, pp. 4946-4967, June 2019. Doi: 10.1109/JIOT.2019.** (IF: 9.515)
X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007 (IF: 5.273)
R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.** (IF: 4.098)
W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019. (IF: 5.768)
X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.** (IF: 22.973)
W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001 (IF: 10.716)
X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022 (IF: 5.524)
X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013 (IF: 10.716)
H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 2205-2224, April 2019. Doi: 10.1109/JIOT.2018.** (IF: 9.515)
H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002 (IF: 5.273)
D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018.
G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID **, 16 pages, 2018. https://doi.org/10.1155/2018/**/.
K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001
Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518
H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies, IEEE Access. (Accepted) (IF: 3.224)
Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 5.524)
G. Liu, Z. Yan*, A. W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 5.273)
L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.**
N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
15/11/2017, Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.** achieves **The 2017 IEEE ComSoc TCBD Best Journal Paper Award**
01/11/2017, X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks, Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
20/10/2017, W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.** (IF: 7.596) 中科院1区
05/10/2017, Congratulations to Tian Fengyu, Yan Ping and Xie Haomeng to achieve National Scholarship Awards.
01/10/2017, N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
04/09/2017, Z. Yan*, H. M. Xie, P. Zhang, B. B. Gupta, “Flexible Data Access Control in D2D Communications”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
01/09/2017, Congratulations to Ding Wenxiu to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜丁文秀同学当选!
25/08/2017, 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络,申请号3.X,申请日期:25.08.2017.
06/05/2017, F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.**
06/05/2017, W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017 (accepted)
02/05/2017, Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.**
Finish the editorial of special issue in Information Fusion. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
18/04/2017, P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
17/04/2017, X.X. Yu,Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
SW Copyright application
1. 徐坤,闫峥,党田力,基于用户信任行为的App信任值生成仿真软件(TruBeRepec客户端) V1.0,04.20172. 王普,闫峥,史汪洋,藺华庆,李宁, FlexiFile:个人云数据访问控制系统, 03.2017.3. 许广武,闫峥, 基于可信计算的虚拟化网络功能中信任保障系统软件V1.0, 03.2017.03/02/2017, W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017. (accepted)
31/012017, Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
19/01/2017, M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
25/12/2016, C.Y. Huang, Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications based on Trust in a Distributed Way”, IEEE Access, 2016. (Accepted)
19/12/2016, Prof. Zheng Yan was invited to serve as an editorial board member of Journal of Network and Computer Applications(IF: 2.331)
29/11/2016, achieved a US patent grant. Zheng Yan, An Approach of Secure Recognization for Pervasive Face-to-Face Social Communications,Country/type of grant: United States, Grant date 29-Nov-2016, Patent Number is **.
21/11/2016, L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
17/11/2016, Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (accepted) (IF: 2.331)
15/11/2016, Congratulations to Ding Wenxiu to achieve national scholarship!
15/11/2016, Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
30/10/2016, Congratulations to Wang Mingjun to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜王明君同学当选!
13/10/2016, F. Tong,Z. Yan*,A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
11/10/2016, achieved a US patent invented by Yan Zheng.Zheng Yan,A method to securely access instant community data based on trust levels, contexts and time clock, Country/type of grant: United States, Grant date 11-Oct-2016, Patent Number is **. Nokia Code: 77844, priority patent application number: PCT/CN2012/071982, Application date: 06-Mar-2012.


科研指导
工作报告模板.docx
学硕选课推荐
专硕选课推荐




Profile
Professor Zheng YAN, PhD
The State Key Lab on Integrated Services Networks
School of Cyber Engineering
Xidian University

Research Interests
Information security and privacy
Trust modeling and management, trusted computing
Network security, intrusion detection, malware detection
Trust, security and privacy in social networking and IoT
Cloud computing security, trust and privacy
5G/6G security, trust and privacy
Security related data analytics
Big data trust management
Blockchain and its applications

Contact Information
Address: No.2 South TaiBai Road, POX 91, Xi\\\\'an, 710071, China
Email: zyan@xidian.edu.cn
Tel: (+86)**


Introduction
Zheng Yan received the B. Eng in electrical engineering and M. Eng in computer science and engineering from Xi’an Jiaotong University in 1994 and 1997. She received a second M. Eng in information security from National University of Singapore in 2000. She received the Licentiate of Science and the Doctor of Science in Technology in electrical engineering from Helsinki University of Technology in 2005 and 2007. She is currently a professor at the Xidian University, Xi\'an, China and a Finnish Academy Fellow/ docent/visiting professor in Aalto University, Finland. She joined the Nokia Research Center, Helsinki in 2000, working as a senior researcher until 2011. She authored more than 300 publications and solely authored 2 books. She is the inventor of 44 patents and 50 PCT patent applications, 30 of which were solely invented and 80+ of them were adopted by industry. She was invited to offer more than 30 talks or keynotes in international conferences or universities. Her research interests are in trust, security and privacy; and data analytics. Prof. Yan is an area/associate editor of Information Sciences, Information Fusion, IEEE Network Magazine, IEEE IoT Journal, JNCA, Security and Communication Networks, etc., a special issue guest editor of more than 30 journals, such as IEEE TII, IEEE JBHI, IEEE TNSE, ACM TOMM, Information Fusion, IEEE Systems Journal, Future Generation Computer Systems, Computers & Security, IJCS, ACM/Springer MONET, and IET Information Security, etc., and acts as a reviewer for many top journals. She is a funding steering committee co-chair of IEEE Blockchain conference. Serving as a leader role, she is the organizer of IFIP Networking 2021, IEEE TrustCom/BigDataSE/ISPA-2015, EAI MobiMedia2016, IEEE CIT2014/2017, CSS2014, ICA3PP2017, NSS2017, etc. She serves as a steering committee or organization committee member for more than 30 conferences and a TPC member for more than 50 conferences, e.g., IEEE Infocom, IEEE ICDCS, IEEE GlobeCom, IEEE ICC,ACM MobileHCI, ACM SAC, etc. She is a fellow of IET and a senior member of the IEEE.




Research
Investigated, led and participated in more than 30 research projects, including International cooperation projects, Chinese national key projects, NSFC, Academy of Finland projects, Industry sponsored projects, EU ITEA and Finnish TEKES projects, etc. Selected grants are listed below:
PI of National Nature Science Foundation of China (NSFC) project “Trust Management in a Trustless Environment”, Grant No. **, (01.2021 - 12.2024);
PI of “Trustworthy Integrated Heterogeneous Networks”, sponsored by Huawei, Singapore (10.2020 – 09.2023);
PI of “5G Heterogeneous Network Security and Privacy with Trustworthy Mobile Terminals”, sponsored by Nokia, Finland (02.2020 - 01.2023);
PI of ISN state key lab self-designed project “Trust Management and Privacy Preservation in Mobile Crowdsourcing” (01.2020 - 12.2021);
PI of Academy of Finland Research Fellow grant, “Digitalizing Trust for Securing Pervasive Social Networking”, Grant No. 308087 & 314203& 335262(09.2017 - 08.2022);
PI of National Nature Science Foundation of China (NSFC) project “Security and Privacy in Pervasive Social Networking based on Trust Management”, Grant No. **, (01.2017 - 12.2020);
PI of Security, Trust and Privacy in the Next Generation Mobile Communication Networks and Systems (STP5G), sponsored by Nokia, Finland (02.2017 - 01.2020);
PI of the open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation, P.R. China, “Data Flow Control in Data Link based on Blockchain”, Grant No. CLDL-**, (12.2018 - 11.2020);
PI of open project of the Key Lab of Information Network Security, “Mobile Crowdsourcing Security Architecture in a Trustless Environment”, Grant No. C18614, (9.2018 - 8.2020);
Co-PI of the National Key Research and Development Program of China (Grant No. 2016YFB**); project PI of “Large-Scale Heterogeneous Network System Security Data Collection and Composition”, Grant No. 2016YFB**, (07.2016 - 06.2019);
PI of the Key Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China, “Mobile App Trust Management based on User Behaviours”, Grant No. 2016ZDJC-06, (2016.01 - 2018.12);
PI of “Trust Management in Pervasive Social Networking”, the Fundamental Research Funds for the Central Universities, Grant No. JBG161509, (01.2017 - 12.2017);
Co-PI of National Nature Science Foundation of China (NSFC) Key Project “Composite Security in 5G Mobile Communication Systems”, Grant No. U**, (2016.01 - 2019.12);
Co-PI of National Nature Science Foundation of China (NSFC) project “Delay-Disruption Tolerant Key Distribution and Bundle Authentication with Short Tags in Space-based Networks”, Grant No. **, (01.2015 - 12.2018);
PI of ISN state key lab self-designed project “Cloud Data Security and Privacy based on Trust Management” (11.2015 - 12.2016);
Co-PI of NSFC International Exchange and Cooperation Project “The 14th IEEE International Conference on Computer and Information Technology”, Grant No. , (09.2014);
PI of K. C. Wong Education Foundation, Hong Kong, (03.2014);
PI of “Trust in Cyber Physical and Social Computing”, sponsored by Nokia, (02.2014 - 01.2017);
PI of “Mobile Application Trust Management based on Trust Behaviors”, PhD Research Fund of Chinese Education Ministry, Grant No. 20**6 (01.2014 - 12.2016);
PI of “Usable and Autonomic Trust Management for Software”, Shaanxi Research Grant for Excellent Researchers from Abroad, Shaanxi Province, Grant No. 680F1303, (12.2013);
PI of “Usable and Autonomic Trust Management for Software”, Initial Research Grant for Researchers from Abroad, Chinese Education Ministry, Grant No. 20**6, (06.2013);
PI of “Trustworthy Pervasive Social Computing and Services”, sponsored by Nokia, (12.2012 - 11.2013);
PI of the open project grant of the State Key Lab of ISN, Xidian University, Chinese Ministry of Science of Technology (2012 - 2013) (2013 - 2016);
PI of “Trust Management for Mobile Applications”, the Fundamental Research Funds for the Central Universities, (01.2012 - 12.2013);
PI of “Trust, Security and Privacy in Pervasive Social Networking”, sponsored by Nokia, (11.2011 - 10.2012);
Winner of Initial Research Grand of Xidian University based on the “100 plan” of Shaanxi province, (10.2011 - 07.2016).
· Winner of Initial Research Grand of Xidian University based on the “100 plan” of Shaanxi province. (10.2011-07.2016).




Publications
300+ peer-reviewed scientific and technical articles including 170+ English journal articles; 2 solely authored books; 9 conference proceedings, and 16 book chapters. 210+ journal and conference papers were first or correspondingly authored. Many paper articles were published in highly reputable journals and conferences, such as IEEE TII, IEEE TDSC, IEEE TVT, IEEE TPDS, IEEE TCYB, ACM TOMM, ACM TPCS, IEEE IoT, IEEE TCC, IEEE TBD, IEEE TCSS, JCSS, Information Sciences, Information Fusion, IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, etc.(refer to full publication list)
44 granted patents (35 US/EP/JP patents) and 50 PCT patent applications, 30 of which were solely invented. A co-author of Nokia’s proposal for DVB-CPCM standard. Several granted patents have been adopted by international standards (e.g., ISO/IEC M3W, TCG, and DVB-CPCM);
More than 30 invited talks at conference and reputable universities; one talk at Future Internet SHOK Review Seminar in Feb. 2011, Finland.


Selected Recent Journal Publications
X. Y. Jing, Z. Yan*, Y. H. Shen, W. Pedrycz, J. Yang, “A Group-based Distance Learning Method for Semi-supervised Fuzzy Clustering”, IEEE Transactions on Cybernetics, 2020. Doi: 0.1109/TCYB.2020.**. (IF: 11.470)
X. Q. Liang, Z. Yan*, R. H. Deng, Q. H. Zheng, “Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication with Game Theory”, IEEE Transactions on Parallel and Distributed Systems, Vol. 32, Issue 3, pp. 587-600, 2020. Doi: 10.1109/TPDS.2020.** (CCF A, IF: 4.640)
X.Q. Liang, Z. Yan*, X.F. Chen, L.T. Yang, W.J. Lou, Y.T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, 2019, Doi: 10.1109/TII.2019.**, Early Access. (SCI, EI) (中科院一区/JCR一区, IF: 7.377)
X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. (IF: 20.23, 中科院SCI1区)
X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. (IF: 6.639, 中科院SCI1区) https://doi.org/10.1016/j.inffus.2018.10.013
P. Wang, N.Wang, M.Dabaghchian, K.Zeng, Z.Yan, “Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE Infocom 2019. (CCF A)
Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018. Doi:10.1016/j.ins.2018.02.037(IF: 4.305,中科院SCI 2)
W.X. Ding,Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access Control”, IEEE Transactions on Dependable and Secure Computing, 2017. Doi: 10.1109/TDSC.2017.** (IF: 4.410, CCF A)
M.J. Wang,Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, Vol. 14, issue 8, pp. 3637-3647, August 2018. (IF: 6.764, 中科院SCI 1) Doi: 10.1109/TII.2017.**
W. Feng,Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August, 2018. Doi: 10.1109/JIOT.2017.** (IF: 7.596,中科院SCI1区)
Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, Vol. 36, pp. 172-184, July 2017. (IF: 4.353,中科院SCI1区)
Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.** (IEEE ComSoc TCBD 2017最佳期刊论文奖)
Z. Yan*, P. Zhang, A.V. Vasilakos, “A Survey on Trust Management for Internet of Things”, Journal of Network and Computer Applications, 42 (2014), pp. 120–134, 2014.Doi: 10.1016/j.jnca.2014.01.014i (IF: 3.50,ESI高被引, 中科院SCI 2)
Z. Yan*, M.J. Wang, “Protect Pervasive Social Networking based on Two Dimensional Trust Levels”, IEEE Systems Journal, Vol. 11, Issue 1, pp. 207-218, March 2017. Doi: 10.1109/JSYST.2014.**. (IF: 3.882, 中科院SCI 2)
Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”, IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011. (IF: 2.926, CCF A)

Citations
GoogleScholar
https://scholar.google.com/citations?user=Q0FDt9gAAAAJ&hl=zh-CN&oi=sra




Honors
Aalto ELEC Impact Award 2020, Aalto University, Feb 15th 2021
Education Award of Research Institute of China Electronics Technology Group (second level), 2021
Elsevier 2020 highly cited Chinese researcher
Distinguished Inventor Award of Nokia for significant technology contributions to Nokia’s IPR portfolio in the field of trustworthy networking and communications, 2020.
The Best Paper Award, SpaCCS2019, Atlanta, USA (184 submissions with 20.1% acceptance rate)
IEEE Outstanding Leadership Award at IEEE SmartWorld Congress, August 2019, UK
The Best Faculty of Xidian University 2018-2019
Celtic-Plus Innovation Award to Sigmona, EU (project award) (2018)
Outstanding Associate Editor of 2018 for IEEE Access
IEEE Outstanding Leadership Award at IEEE Blockchain, August 2018, Canada
Associate Editor of the Month for IEEE Access, July 2018
Academy of Finland Fellowship, 2017
The 2017 Best Journal Paper Award of IEEE ComSoc TCBD (Technical Committee on Big Data) (one best paper award issued per year)
Outstanding Associate Editor of 2017 for IEEE Access
Outstanding Service Award at SpaCCS2017
Distinguished Leadership Award at NSS/ICA3PP/IEEE CIT-2017
EU Eureka Celtic-Plus Excellence Award for Network Technologies - Celtic-Plus Sigmona project (2017)
IEEE Distinguished Leadership Award at IEEE TrustCom/BigDataSE/ISPA2015
Huashan Talent Young Professor Award of Xidian University (2015 - 2017)
Outstanding Leadership Award at IEEE CIT 2014
Outstanding Service Award for IEEE RACIT2014 organization
Outstanding Service Award for IEEE DTWSM2014 organization
Outstanding Leadership Award at IEEE HPCC/ICESS/CSS 2014
The Best Faculty of Xidian University 2013-2014
Excellent Individual from Abroad in Shaanxi Province, China 2014
Outstanding Leadership Award at IEEE TrustCom 2013
Outstanding Leadership Award at IEEE iThings 2012
Outstanding Service Award at IEEE TrustCom 2012
“100 Expert Plan” Award of Shaanxi Province, China (2011)
Sisu Award, Nokia Research Center, Helsinki (2010)
Best Organizer Award for special track organization in UIC/ATC2010 (2010)
EU ITEA Bronze Achievement Award - Trust4All project (2008)
Best Student Paper Award at ATC07 (2007)
Research Fellowship Prize of Singapore Science & Technology Bureau (1997 - 1999)




Students
姓名 研究方向 联系方式
博士 2014级 冯伟 IoT Security bjxsakya@qq.com
2015级 于熙洵 Verifiable Computing @qq.com
王永峰 Mobile Awareness, Privacy Preserving d2000d@163.com
2016级 靖旭阳 Network Attack Detection and Defense, Network Traffic Classification, Granular Computing, Sketches xuyangjing91@163.com
刘高 Data Collection and Attack Detection for Security Measurement gaoliu9865@gmail.com
2017级 王普 5G Wireless Communication Security,UAV Security, Physical Layer Security, Energy Harvesting wangpusec@gmail.com
梁雪芹 GameTheory Dearliangxq@126.com
2018级 谢皓萌 IoT and Blockchain QQ:
章芮 Voice Authentication and Privacy Protection cumt_zhangrui@126.com

硕士 2016级 贺丽梅 Anonymous Trust Authentication helimei@163.com
李国权 Security Big Data Collection and Fusion to_lgq@163.com
蔺华庆 Security Data Collection and Analysis answerlinhq@gmail.com
周栋浩 Data Collection in SDN littlecarry@163.com
2017级 孟曈 DataFusion,MachineLearning @qq.com
刘丹 EdgeComputing,DataAnalytics **@163.com
王静雯 TrustEvaluation,MachineLearning wjwen0914@163.com
胡蕊 ProvenanceManagement @qq.com
李怡霖 PrivacyPreservation upclin@qq.com
杨雪涛 Blockchain **@163.com
MUHAMMADJEHANZAIBYOUSUF 5GNetworkSlicingSecurity yjehanzaib@hotmail.com

2018级 孙伟 Intel SGX Security zhgsunwei12188@126.com
赵东昇 5G authentication mjhzds@163.com
魏文涛 Intel SGX Technology @qq.com
王雪睿 Attacks Detection in Authentication Systems wangxueruimay@163.com
赵晶晶 pulyjuly66@outlook.com
钱薪任 proofs of retrievablity @qq.com
彭立 Privacy Preservation pengli_email@163.com
张文铭 Formal Proof of Security Protocol @qq.com


Graduated Students
博士 2013级 王明君(西电师资博士后)
2014级 丁文秀(西电师资博士后)

硕士 2011级 陈亮(中电20所) 史高娃(联通)
2012级 唐畏(深圳腾讯) 史汪洋
马思玄(北京建行) 党田力(华为)
陈寒凌 王雨露(交通银行)
2013级 李宁(南京中兴) 童飞(北京腾讯)
马玉坦(中国移动) 黄朝银(深圳腾讯)
高立君(北京恒丰) 周家臻
2014级 卞姗姗(上海诺基亚贝尔) 许广武(中国航天信息)
赵思慧(中国人寿数据中心) 朱玉权(中国船舶重工集团723研究所)
程艳晓(北京中国电信)
2015级 徐坤(百度) 颜平(中国网安公司)
姚震(招银网络科技) 吴宸梓(西安中兴)
陈寒露(招银网络科技) 田俸羽(微众银行)
AaltoUniversity 李雪韵(华为) 沈悦(美国)
张丽芳(芬兰) 陈玉(美国UniversityofCalifornia)




Teaching
Course developer and runner: “Trust Management” in Xidian University, master and PhD lectures with a solely written English book (since 2015, regular master/PhD course);
Zheng Yan, “Trust Management in Mobile Environments – Usable and Autonomic Models”, IGI Global, Hershey, Pennsylvania,USA, 2013;
Course master and runner: “Mobile Security and Trust” in Xidian University, master and PhD lectures, English course (2014, 2016);
Security and Privacy in Mobile Networks, English course, bachelor level(2018,2019)
Security in Mobile Communications, English course, bachelor level (2017)
Course runner: “Routing in Communication Networks”S-38.2121 in Aalto University, master level (10-12.2013/2014);
Course developer: “The Basic of Trust Management” in Xidian University, bachelor level course (2013-);
Tutor: CSE-E5000 Seminar on “Software Systems, Technologies and Security”(Fall 2015);
Tutor of postgraduate seminar on “Network Security”T-110: 5291 in Aalto University, PhD level (09.2011-12.2011, 09.2012-12.2012, 09.2013-12.2013);
PhD student seminar runner: “Trust and Identity”, in Aalto University, PhD level (02.2011- 06.2011);
Tutor/Teaching Assistant: Helsinki University of Technology, PhD level (2002-2004).
Supervised 12 bachelor theses and 16 master theses (2010-date)
Supervised 16 master theses (2010-date)






University Cooperation
Aalto University (05.2009 - date): Acted as the master thesis instructor of master program students. Three students instructed by me have graduated with the highest thesis score and each has 6-8 publications. One student got a full scholarship to join a PhD programme in Human Computer Interaction Group, EPFL, Lausanne, Switzerland.
Xi’an Jiaotong University (07.2011 - date): Cooperation with the team of Prof. Qinghua Zheng and Prof. Jun Liu on data mining, intrusion detection and malware detection. Co-edited a number of SI, e.g., in Information Fusion, ACM TOMM, etc.
EPFL (05.2009 - 10.2010): Cooperation with the team of Prof. Jean-Pierre Hubaux, EPFL, Lausanne, on data centric trust management in pervasive social networking. Co-instructed a PhD student.
Huazhong Univ. of Science and Technology (07.2009 - date): Run the cooperation with Huazhong Univ. of Science and Technology, China, acted as the instructors of two PhD students, cooperated several paper publications. Invited to visit HUST in Oct. 2010 and gave a speech on “Building Trust in Mobile Environments”.
Singapore Management University (09.2009 - 09.2010): Acted as a Nokia contact for the cooperation with Singapore Management University for the Nokia donated project “The Use of Mobile Devices in RFID-based Supply Chain Management”. Developed a mobile user data privacy preservation solution for mobile internet services, co-instructed a PhD student. The project worked out a couple of joint publications. Visting SMU in Jan-Feb 2016 as a visting professor.
Renmin University of China (01.2007 – 12.2008): Acted as a project manager and principle investigator of human-machine trust interaction and led the cooperation between Nokia Research Center (Helsinki) and Renmin University of China. Coordinated the cooperation and knowledge exchange between Nokia security and trust research and Chinese academia (e.g., Tsinghua Univ.). This project explores a user driven trust modeling and management methodology based on a psychometrical method in order to design and develop a usable trust management system, e.g., for mobile applications and services, and pervasive social networking. This cooperation worked out a number of joint papers.


International Exchange
Invited AXA Prof. Robert H. Deng, Fellow of Singapore Academy of Engineering, IEEE Fellow, to visit Xidian University in June 2019.
Invited Prof. Mohammed Atiquzzaman (University of Oklahoma, USA) to visit Xidian University in May 2019.
Invited Prof. Valtteri Niemi, University of Helsinki to teach in Xidian University in May 2019.
Invited IEEE life fellow Prof. Stephen S. Yau (Arizona State University, US) to visit Xidian University in May 2012;
Invited Prof. Yan Wang (Macquarie University, Australia) to visit Xidian University in Dec. 2011;
Invited Nokia IR directors Mr. Harri Hongasalo (Finland) and Mr. Gordon Huang (US) to visit Xidian University in Dec. 2011;
Invited Prof. Valtteri Niemi (Nokia Fellow) (University of Turku, Finland) to visit Xidian University in 11. 2011 and 09.2013;
Invited Prof. Raimo Kantola (Aalto University), Prof. Laurence T. Yang (St. Francis Xavier University, Canada) and IEEE fellow Prof. Wenjing Lou (Virginia Tech, US), Prof. Valtteri Niemi to visit Xidian, based on ‘111’ program sponsored by the Ministry of Education of China and the State Administration of Foreign Experts Affairs of China (Grant No. B08038) and High-end Foreign Experts Recruitment Program of China (2013);
Invited IEEE fellow/IET fellow Prof. Hsiao-Hwa Chen (National Cheng Kung University, Taiwan), IEEE fellow/SCS fellow Prof. Mohammad S. Obaidat (Monmouth University, USA), IEICE fellow/IPSJ fellow Prof. Hideko S. Kunii (Shibaura Institute of Technology, Japan), Prof. Mohammed Atiquzzaman (University of Oklahoma, USA), Prof. Zhiyong Liu (Chinese Academy of Sciences, China), Prof. Jinjun Chen (University of Technology Sydney, Australia), Dr. Alvin Chin (Microsoft, China), Dr. Chonggang Wang (IntelDigital, USA), Prof. Daming Wei (University of Aizu and Tohoku University, Japan), Prof. Christian Prehofer (fortiss, Germany) to visit the State Key Lab of ISN, Xidian University in Sept. 2014;
Invited IEEE Fellow, Prof. Witold Pedrycz (Univ. of Alberta, Canada), IEEE Fellow, Prof. Thomas Hou (VirginiaTech, US), Prof. Honggang Wang (UMass Dartmouth, US), Prof. Jian Ren (Michigan State Univ., US), Dr. (Anand Prasad) to visit the State Key Lab of ISN, Xidian University in June 2016;
Coordinated international education cooperation and exchange between Aalto University and Xidian University.




Acadamic Activities & Services
I am serving and served as an area editor or an associate editor for 15 journals, a leading guest editor of over 30 reputable international journals, a founding steering committee chair of IEEE Blockchain, a steering committee member of IEEE CIT and SpaCCS international conferences, a general chair or technical program committee (TPC) chair of 30+ international conferences and workshops, a TPC member of 50+ international conferences, and a reviewer of numerous top journals (e.g., many IEEE/ACM Transactions, journals and letters). I have given about 30 invited talks in international conferences and universities (refer to my publication list). Selected forums below:
Editor & Editorial Board Member
Information Fusion (Elsevier, IF: 10.716), editorial board member (01.2017 - date), area editor on IoT and Sensor, Security & Privacy (05.2019 – date)
IEEE Network Magazine (IF: 8.808), Technical editor (09.2020 – 09.2022)
IEEE Internet of Things Journal (IF: 9.515), associate editor (01.2016 – 12.2017, 01-2020 – 12.2021);
Information Sciences (Elsevier, IF: 5.524), associate editor (09.2016 - date);
Journal of Network and Computer Applications (Elsevier, IF: 5.273), editorial board member (2017 - date)
IEEE Access (IF: 4.098), associate editor (01.2016 - date);
Entropy (IF: 2.494), topic editor (10.2020 – 10.2022)
Digital Communications Networks, associate editor (01.2020 - date)
IEEE Blockchain Technical Briefs, editorial board member (2018 - date)
Soft Computing (Springer, IF: 2.784), editorial board member (01.2017 - date)
Security and Communication Networks (Wiley) (IF: 1.376), associate editor (10.2014 - date)
KSII Transactions on Internet and Information Systems (IF: 0.711), editor (01.2014 – 12.2016) area editor (01.2017 - date)
Chinese Journal of Network and Information Security, editor (01.2016 - date)
Human-centric Computing and Information Sciences (Elsevier), associate editor (01.2016 – 12.2018)
Information and Network Security (Chinese), editor (2015 - 2021)
International Journal of Cloud Applications and Computing, associate editor (at present)
International Journal of Software Science and Computational Intelligence (IJSSCI), International Advisory Board member (01.2018 – date)
Guest editor: IEEE Transactions on Industrial Informatics (IF: 7.377), IEEE Journal of Biomedical and Health Informatics (4.217), IEEE Transactions on Network Science and Engineering, ACM Transactions on Multimedia Computing, Communications and Applications (IF: 2.25); Future Generation Computer Systems (Elsevier) (IF: 5.768); IEEE Systems Journal (IEEE) (IF: 4.463); Vehicular Communications (Elsevier) (IF: 3.530), Computers & Security (Elsevier) (IF: 3.062); Mobile Networks and Applications (Springer) (MONET) (IF: 2.390); IET Information Security (IF: 0.949); IJCS: IJISP; etc.
Conference Organization Committee Member (selected)
IFIP Networking 2021 (Leading TPC chair)
The 13th International Workshop on Cyberspace Security and Artificial Intelligence (CAI-2021), in conjunction with the IEEE ISPA 2021 conference (http://www.cloud-conf.net/ispa2021/) (steering committee member)
IEEE Congress on Cybermatics 2020 (opening session chair)
IEEE TrustCom/BigDataSE/CSE/EUC/iSCI 2020 (vice-program co-chair, special issue co-chair)
IEEE CyberC 2020 (publicity chair)
IEEE ICC (Session chair – Blockchain)
IEEE ATC2019 (leading general chair)
IEEE INFOCOM 2019 (session chair - 4F Security in Wireless Networks)
IEEE Blockchain 2018 (leading general chair, steering committee co-chair)
IEEE BigDataSE 2018 (TPC chair)
MobiSec2018 (publication chair)
NSS 2017 (leading TPC chair)
IEEE CIT 2017 (general co-chair)
IEEE ICA3PP 2017 (general co-chair)
SpaCCS 2017 (TPC co-chair)
IEEE RACIT2017 (general co-chair)
EAI MobiMedia 2016 (leading general chair)
IEEE TrustCom 2015 (leading TPC chair, panel co-chair)
IEEE BigDataSE 2015 (general co-chair)
IEEE RATSP 2015 (general co-chair)
IEEE CIT 2014 (leading general chair)
CSS 2014 (TPC chair)
IEEE DTWSM 2014/2015/2016/2017 (program co-chair)
IEEE RACIT 2014 (program chair)
IEEE GBM 2014 (program co-chair)
Cute-2013 (vice program co-chair)
IEEE/IFIP EUC 2013 (workshop co-chair, vice program co-chair)
IEEE/IFIP DMIoT 2013 (program co-chair)
IEEE DASC 2012 (program co-chair)
IEEE iThings 2012 (vice program co-chair)
IEEE iThings/CPSCom/GreenCom 2012 (panel chair)
IEEE TrustCom 2011/2012 (workshop co-chair)
IEEE TrustID 2011/2012/2013 (leading program chair)
IEEE Computer Society Technical Committee on Scalable Computing
IEEE Computer Society Special Technical Community on Blockchain
Conference Technical Program Committee Member (selected)
IEEE GlobeCom (2012, 2015); MobiSec (2009, 2010); ICSOC (2009 - 2019); ACM MobileHCI (2009, 2010); ACM SAC TRECK (2008 - 2011); IEEE VTC (2011); IEEE WiMob (2010 - 2012); ICA3PP (2010); IEEE CPSCom (2011); ISPEC (2013, 2016); NordSec2017; IEEE DSC2017, IEEE ICCCN (2018); CoCoNet (2018); IFIPTM (2019), SECRYPT (2019, 2020); IEEE Blockchain (2019); IEEE ATC (2019); IEEE ICC (2020, 2021); IEEE ICDCS 2020; IEEE CNS2020, International Conference on Security and Privacy in Digital Economy (SPDE2020), ACM CSAC2019/2018, IEEE DSC2020; IEEE INFOCOM 2021-2022; IEEE TrustCom2020-2021, etc.
Book Review
Springer, 05.2017, book title: CABology: Value of Cloud, Analytic and Big Data Trio Wave
Positions of Trust: Technical committee membership and referee of grants and awards
Academic tenure track committee of School of Telecommunications Engineering, Xidian University(2013-date)
Academic tenure track committee of School of Cyber Engineering, Xidian University(2015-date)
PhD program grant of Chinese Education Ministry(2012)
National Science and Technology Innovation Award of China
National Award of Science and Technology of China
Innovation Foundation of China (Scientific and Technical Ministry of China)
Fok Ying Tung Education Foundationof Chinese Education Ministry
IEEE Communications & Information Security Technical Committee
National “863 projects” of Chinese Scientific and Technology Ministry (2014)
Steering committee of IEEE International Conference on Computer and Information Technology
Steering committee of International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS)
Steering committee of EAI Mobile Multimedia Communications (EAI MobiMedia)
NSFC project reviewer(2016 - present)
Publication Chair of Technical Committee on Blockchain and Distributed Ledger Technologies (DLT) at IEEE Technology and Engineering Management Society (TEMS)
Dissertation opponentand pre-examiner(selected)
PhD dissertation pre-examiner, “Network Demand Aware Task Offloading in Fog Computing”, Indian Institute of Technology (BHU) Varanasi, India (2020)
PhD dissertation opponent, Xi’an Jiaotong University, China (12.2016), Wujing Tech Univ. China (12.2018)
PhD dissertation pre-examiner, University of South Australia, Australia (11.2016 - 01.2017)
PhD dissertation pre-examiner, University of Tampere, Finland (08.2016)
PhD dissertation pre-examiner, University of Oulu, Finland (12.2013 - 02.2014)
PhD dissertation opponent, University of Turku, Finland (08.2013)
PhD jury member: Telecom Sud_Paris, UNIVERSITE PIERRE ET MARIE CURIE - PARIS6, France (03.2010).
Many such activities in China (2011 - date)
Journal referee
·IEEE Communications Magazine (2016)
·ACM Transactions on Intelligent Systems and Technology (TIST) (2011) (A class)
· IEEE Transactions on Intelligent Transportation Systems (TITS) (2016)
·IEEE Transactions on Parallel and Distributed Systems (2013, 2014, 2015) (A class)
·IEEE Transactions on Dependable and Secure Computing (2012, 2015, 2016) (A class)
·IEEE Transactions on Network and Service Management (2014)
·IEEE Transactions on Information Forensics & Security(2014, 2015)
·IEEE Transactions on Cloud Computing(2015)
·IEEE Transactions on Cybernetics (2015)
·IEEE Transactions on Computers (2015)
·IEEE Transactions on Knowledge and Data Engineering (2015)
·IEEE Communications Magazine (2015)
·IEEE Journal of Cloud Computing (2015)
·IEEE Security & Privacy (2012) (A class)
·IEEE Networking (2013)
·IEEE Systems Journal (2014, 2015)
·IEEE Sensors Journal (2016)
·Information Fusion (2014)
·Future Generation Computer Systems (2015)
·Journal of Network and Computer Applications (2010, 2015) (A class)
·Information Sciences (2011, 2014) (A class)
·Journal of Computer System Science (2013)
·IEEE Computer (2012)
·Technological and Economic Development of Economy (TTED) (2013)
·Computer Communications (2010) (B class)
·Journal of Personal and Ubiquitous Computing (2008) (B class)
·Computing (Springer) (2013)
·Wireless Networks (2007, 2013) (B class)
·IET Communications (2010, 2011) (B class)
·IET Information Security (2012) (B class)
·Journal of Communications (2010)
·Journal of Information Science and Engineering (2010)
·Journal of Multimedia (2011)
·Journal of Ambient Intelligence and Humanized Intelligence (2011)
·Journal of Service Oriented Computing and Applications SOCA (2012, 2014)
·Journal of Human-centric Computing and Information Sciences (2012)
·Journal of Applied Science and Engineering (JASE) (2013)
·China Communications(2013)
·计算机学报 Chinese Journalof Computer (2013, 2014)
·Simulation Modelling Practice and Theory (2014)
·Expert Systems With Applications (2014)
·International Journal of Communication Systems (2015)

Invited Talks
Invited Talk: Highly Efficient Network Security Analysis Based on Sketches. The 5th International Workshop on Cyberspace Security (IWCSS 2021), Guangzhou, China, June 18-21, 2021.
Panelist: IEEE International Conference on Blockchain and Cryptocurrency, Virtual Conference, Sydney, Australia, May 6, 2021.
Data Collection, Fusion and Analytics towards Network Trust Measurement, Huawei workshop: Trust on Future Networks, Helsinki, January 8, 2021.
Invited Talk: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain, IEEE TrustCom/IEEE BigDataSE/IEEE CSE/IEEE EUC/IEEE iSCI 2020, GuangZhou, China, Dec. 29 – Jan. 2, 2020.
Trustworthy Mobile Crowdsourcing Based on Blockchain, talk for Huawei, Helsinki, June 10, 2020.
Trust Management and its Enhanced Security with Privacy, Seminar of Security, Trust and Privacy, Aalto University, Finland, February 13, 2020.
Invited Talk: Network Data Collection, Composition and Analytics for Cyber Security, IWCSS 2019, in conjunction with the iSCI 2019 and DependSys 2019 International Joint Conferences, GuangZhou, China, November 12-15, 2019.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, invited talk at GuangZhou University, GuangZhou, China, November 11, 2019.
Keynote: Network Data Collection, Fusion, Mining and Analytics for Cyber Security, the Second International Conference on Machine Learning for Cyber Security (ML4CS), Xi’an, China, September 19, 2019.
Summit Keynote: Blockchain: Advances, Challenges & Applications, IEEE World Congress on Cybermatics, Atlanta, USA, July 16, 2019.
Panelist: AutoSource: Autonomous Mobile Crowdsourcing with Decentralized Trust Management, IEEE World Congress on Services, Milan, Italy, July 9, 2019.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, invited talk at Arizona State University, Phoenix, USA, September 14, 2018.
Summit Keynote: Privacy-Preserving Data Processing with Flexible Access Control, the 2018 IEEE International Congress on Cybermatics, Halifax, Canada, August 1, 2018.
Panelist: Trust Management Enhanced Security with Privacy, IEEE ISPA/IEEE IUCC/SpaCCS2017, Guang Zhou, China, December 14, 2017.
Trust Management Enhanced Security with Privacy in Cloud Computing, invited talk at JiNan University, China, December 16, 2017.
Trust Management Enhanced Security with Privacy in Pervasive Social Networking, invited talk. at GuangZhou University, China, December 14, 2017.
Invited Talk: Secure Computations and Deduplication Management over Encrypted Data in Cloud Computing, Aalto-Shanghai Workshop, Finland, November 30, 2017.
Digitalizing Trust for Securing Pervasive Social Networking with Privacy Preservation, talk at Aalto University, Finland, October 6, 2017.
Keynote: Unwanted Traffic Control Based on Trust Management, EAI MobiMedia2017, Chong Qing, China, July 13, 2017.
Controlling Unwanted Traffic with Trust Management, invited talk at Sydney University Technology, Sydney, Australia, July 2017.
Trust and Trust Management, invited Talk at Fujian Normal University, China, June 2016.
Cloud Data Security and Privacy Protection Based on Trust Management, invited Talk at Fujian Normal University, China, June 2016.
Invited Talk: Trust Management in Pervasive Social Networking, International Symposium on Companion Technology 2015 (ISCT 2015), Ulm, Germany, September 24, 2015.
Panelist, Emotion and Trust, International Symposium on Companion Technology 2015 (ISCT 2015), Ulm, Germany, September 24, 2015.
Keynote: Trust Management for Mobile Applications, IEEE TrustSoft, Helsinki, August 20, 2015.
Applications of Usable and Autonomic Trust Management, Invited Talk at Beijing International Study University, China, April 10, 2014.
Usable Trust Management and Applications, invited talk at Virginia Polytechnic Institute and State University (VirginiaTech), USA, October 18, 2013.
The Basic of Cloud Computing, invited lecture, invited lecture at NTNU, Norway, October 2012.
Usable and Autonomic Trust Management, invited talk at Xi’an Jiaotong University and Xidian University, Xi’an, China, December 2012.
Trust Management in Mobile Environments – Usable and Autonomic Models, invited talk at Xi’an University of Post and Telecommunications, Xi’an, China, December 2012.
Invited Talk: A Trust Behavior based Recommender System for Software Usage, IEEE PhoneCom 2011, Dalian, China, October 19, 2011.
Invited Talk: Usable Trust Management for Mobile Applications, Future Internet SHOK Results Seminar, February 15, 2011. http://www.futureinternet.fi/seminar_2011.htm
Building Trust in Mobile Environments, invited talk at Huazhong University of Science and Technology, China, October, 2010.
Human-Machine Trust Interaction: Towards User Driven Trust Modeling and Management, invited talk at Renmin University of China, China, May 2008.
Keynote: Autonomic Trust Management for a Component Software Platform, AIC\'07, Greece, August 24, 2007.




New Achievements
X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on Encrypted Cloud Data Deduplication” IEEE Transactions on Industrial Informatics, 2019. Doi: 10.1109/TII.2019.** (IF: 7.377)
D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing”, IEEE Internet of Things Journal, Vol. 6, No. 3, pp. 4946-4967, June 2019. Doi: 10.1109/JIOT.2019.** (IF: 9.515)
X.Y. Jing, J.J. Zhao, Q.H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer Applications, Vol. 142, pp. 15-24, Sept. 2019. Doi: 10.1016/j.jnca.2019.06.007 (IF: 5.273)
R. Zhang, Z. Yan*, “A Survey on Biometric Authentication: towards Secure and Privacy-Preserving Identification”, IEEE Access, Vol. 7, No. 1, pp. 5994-6009, 2019. Doi: 10.1109/ACCESS.2018.** (IF: 4.098)
W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on Blockchain”, Future Generation Computer Systems, vol. 95, pp. 649-666, June 2019. (IF: 5.768)
X.Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A Survey”, IEEE Communications Surveys and Tutorials, vol. 21, issue 1, pp. 586-618, first quarter 2019. Doi: 10.1109/COMST.2018.** (IF: 22.973)
W.X Ding, X.Y. Jing, Z. Yan*, L.T. Yang, “A Survey on Data Fusion in Internet of Things: Towards Secure and Privacy-Preserving Fusion”, Information Fusion, vol. 51, pp. 129-144, 2019. Doi: 10.1016/j.inffus.2018.12.001 (IF: 10.716)
X.X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”, Information Sciences, Vol. 479, pp. 372-385, April 2019. Doi: 10.1016/j.ins.2018.12.022 (IF: 5.524)
X.Y. Jing, Z. Yan*, X.Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS Flooding Attacks with a Novel Reversible Sketch”, vol. 51, pp. 100-113, Information Fusion, Nov. 2019. https://doi.org/10.1016/j.inffus.2018.10.013 (IF: 10.716)
H.M. Xie, Z. Yan*, Z. Yao, M. Atiquzzaman, “Data Collection for Security Measurement in Wireless Sensor Networks: A Survey”, IEEE Internet of Things Journal, Vol. 6, No. 2, pp. 2205-2224, April 2019. Doi: 10.1109/JIOT.2018.** (IF: 9.515)
H.Q. Lin, Z. Yan*, Y.L. Fu, “Adaptive Security-Related Data Collection with Context Awareness”, Journal of Network and Computer Applications, Vol. 126, pp. 88-103, Jan. 2019. Doi: 10.1016/j.jnca.2018.11.002 (IF: 5.273)
D.H. Zhou, Z. Yan*, Y.L. Fu, Z. Yao, “A Survey on Network Data Collection”, Journal of Network and Computer Applications, Vo. 116, pp. 9-23, Aug. 2018.
G.Q. Li, Z. Yan, Y.L. Fu*, H.L. Chen, “Data Fusion for Network Intrusion Detection: A review", Security and Communication Networks, 2018. vol. 2018, Article ID **, 16 pages, 2018. https://doi.org/10.1155/2018/**/.
K. Xu, W.D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018. Doi: 10.1016/j.jocs.2018.04.001
Z. Yao, Z. Yan*, “A Trust Management Framework for Software-Defined Network Applications”, Concurrency and Computation Practice and Experiences, 2018. Doi: 10.1002/cpe.4518
H.Q. Lin, Z. Yan*, Y. Chen, L.F. Zhang, “A Survey on Network Security-Related Data Collection Technologies, IEEE Access. (Accepted) (IF: 3.224)
Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in Pervasive Social Networking”, Information Sciences, 2018. Doi: 10.1016/j.ins.2018.02.037 (IF: 5.524)
G. Liu, Z. Yan*, A. W. Pedryczc, “Data Collection for Attack Detection and Security Measurement in Mobile Ad Hoc Networks: A Survey”, Journal of Network and Computer Applications, Vol. 105, pp. 105-122, march 2018. Doi: https://doi.org/10.1016/j.jnca.2018.01.004 (IF: 5.273)
L.M. He, Z. Yan*, M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey”, IEEE Access, Vol. 6, Issue 1, pp. 4220-4242, 2018. Doi: 10.1109/ACCESS.2018.**
N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
15/11/2017, Z. Yan*, W.X. Ding, X.X. Yu, H.Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in Cloud”, IEEE Transactions on Big Data, vol. 2, no. 2, pp. 138-150, April-June 2016. Doi: 10.1109/TBDATA.2016.** achieves **The 2017 IEEE ComSoc TCBD Best Journal Paper Award**
01/11/2017, X.Q. Liang, Z. Yan*, A Survey on Game Theoretical Methods in Human-Machine Networks, Future Generation Computer Systems, 2017. (invited paper) (IF: 3.997) Doi: 10.1016/j.future.2017.10.051
20/10/2017, W. Feng, Z. Yan*, H.R. Zhang, K. Zeng, Y. Xiao, T. Hou, “Survey on Security, Privacy and Trust in Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2017. Doi: 10.1109/JIOT.2017.** (IF: 7.596) 中科院1区
05/10/2017, Congratulations to Tian Fengyu, Yan Ping and Xie Haomeng to achieve National Scholarship Awards.
01/10/2017, N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE”, ACM Trans. on Cyber-Physical Systems, 2017. (accepted)
04/09/2017, Z. Yan*, H. M. Xie, P. Zhang, B. B. Gupta, “Flexible Data Access Control in D2D Communications”, Future Generation Computer Systems, 2017. (accepted) (IF: 3.997)
01/09/2017, Congratulations to Ding Wenxiu to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜丁文秀同学当选!
25/08/2017, 陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络,申请号3.X,申请日期:25.08.2017.
06/05/2017, F.Y. Tian, P. Zhang, Z. Yan*, “A Survey on C-RAN Security”, IEEE Access, 2017. Doi: 10.1109/ACCESS.2017.**
06/05/2017, W.X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”, Information Sciences, 2017 (accepted)
02/05/2017, Z. Yan*, L.F. Zhang, W.X. Ding, Q.H. Zheng, “Heterogeneous Data Storage Management with Deduplication in Cloud Computing”, IEEE Transactions on Big Data, 2017. Doi: 10.1109/TBDATA.2017.**
04/2017 finish the editorial of a special issue in Information Fusion. Z. Yan*, J. Liu, L.T. Yang, N. Chawla, “Big Data Fusion in Internet of Things, Information Fusion”, April, 2017. Doi: 10.1016/j.inffus.2017.04.005
18/04/2017, P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal, 2017. DOI: 10.1007/s11219-017-9368-4
17/04/2017, X.X. Yu,Z. Yan*, A.V. Vasilakos,“A Survey of Verifiable Computation”, Mobile Networks and Applications, Springer, 2017. (accepted)
SW Copyright application
1. 徐坤,闫峥,党田力,基于用户信任行为的App信任值生成仿真软件(TruBeRepec客户端) V1.0,04.20172. 王普,闫峥,史汪洋,藺华庆,李宁, FlexiFile:个人云数据访问控制系统, 03.2017.3. 许广武,闫峥, 基于可信计算的虚拟化网络功能中信任保障系统软件V1.0, 03.2017.03/02/2017, W. Feng, Z. Yan*, H.M. Xie, "Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature", IEEE Access, 2017.(accepted)
31/01/2017, Z Yan*, X.X. Yu, W.X. Ding, Context-Aware Verifiable Cloud Computing, IEEE Access, 2016. (accepted)
19/01/2017, M.J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, Springer, 2017. (accepted)
03/01/2017, Prof. Zheng Yan was invited to serve as an editorial board member of Information Fusion (IF: 4.353)
19/12/2016, Prof. Zheng Yan was invited to serve as an editorial board member of Journal of Network and Computer Applications(IF: 2.331)
29/11/2016, achieved a US patent grant. Zheng Yan, An Approach of Secure Recognization for Pervasive Face-to-Face Social Communications,Country/type of grant: United States, Grant date 29-Nov-2016, Patent Number is **.
21/11/2016, L.J. Gao, Z. Yan*, L.T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation", IEEE Transactions on Cloud Computing, 2016. (accepted)
17/11/2016, Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”, Journal of Network and Computer Applications, 2016. Doi: 10.1016/j.jnca.2016.11.016. (accepted) (IF: 2.331)
15/11/2016, Congratulations to Ding Wenxiu to achieve national scholarship!
15/11/2016, Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”, Information Fusion, 2016. (accepted) (IF: 4.353)
30/10/2016,Congratulations to Wang Mingjun to achieve the scholarship granted by Network Security Fundation!中国互联网发展基金会网络安全专项基金 网络安全奖学金评选结果公示,恭喜王明君同学当选!
13/10/2016, a paper about mobile malware detection authored by Tong Fei and Yan Zheng was accepted byJournal of Parallel and Distributed Computing.F. Tong,Z. Yan*,A Hybrid Approach of Mobile Malware Detection in Android, Journal of Parallel and Distributed Computing, 2016. Doi: 10.1016/j.jpdc.2016.10.012 (IF: 1.320)
11/10/2016, achieved a US patent invented by Yan Zheng.Zheng Yan,A method to securely access instant community data based on trust levels, contexts and time clock, Country/type of grant: United States, Grant date 11-Oct-2016, Patent Number is **. Nokia Code: 77844, priority patent application number: PCT/CN2012/071982, Application date: 06-Mar-2012.


Research Guidance
工作报告模板.docx


相关话题/西安电子科技大学 网络