杨明

发布者:杨明发布时间:2025-04-10浏览次数:346

[1]    Kaizheng Liu, Ming Yang, Zhen Ling, Yue Zhang, Chongqing Lei, Junzhou Luo, Xinwen Fu, RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices[C], accepted to appear in Proceedings of the 31th ACM Conference on Computer and Communications Security, CCS'24, Salt Lake City, USA, October 14-18, 2024. (CCF A)

[2]    Yonghuan Xu, Ming Yang, Zhen Ling, Zixia Liu, Xiaodan Gu, Lan Luo, A De-anonymization Attack Against Downloaders in Freenet[C], in Proceedings of the 43rd IEEE International Conference on Computer Communications, INFOCOM'24, Vancouver, Canada, May 20-23, 2024. (CCF A)

[3]    Kaizheng Liu, Ming Yang, Zhen Ling, Yuan Zhang, Chongqing Lei, Lan Luo, Xinwen Fu, SAMBA: Detecting SSL/TLS API Misuses in IoT Binary Applications[C], in Proceedings of the 43rd IEEE International Conference on Computer Communications, INFOCOM'24, Vancouver, Canada, May 20-23, 2024. (CCF A)

[4]    Shan Wang, Ming Yang, Wenxuan Dai, Yu Liu, Yue Zhang, Xinwen Fu, Deanonymizing Ethereum Users behind Third-Party RPC Services[C], in Proceedings of the 43rd IEEE International Conference on Computer Communications, INFOCOM'24, Vancouver, Canada, May 20-23, 2024. (CCF A)

[5]    Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu. Relation Mining Under Local Differential Privacy[C], accepted to appear in Proceedings of the 33rd USENIX Security Symposium, Security'24, 2024. (CCF A)

[6]    Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu, LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems[C], in Proceedings of the 31th Network and Distributed System Security, NDSS'24, San Diego, California, USA, February 26-March 1, 2024. (CCF A)

[7]    Chunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen, Ming Yang, Xinwen Fu. Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery[C], in Proceedings of the 41st IEEE International Conference on Computer Communications, INFOCOM'22, 2-5 May 2022, Virtual Conference, 1710-1718. (CCF A)

[8]    Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang*, Xinwen Fu. Towards an Efficient Defense against Deep Learning based Website Fingerprinting[C], in Proceedings of the 41st IEEE International Conference on Computer CommunicationsINFOCOM'22, 2-5 May 2022, Virtual Conference, 310-318. (CCF A)

[9]    Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo. TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones[C], in Proceedings of 19th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON'22, 20-23 September 2022 // Virtual Conference, 2022.

[10]Shan Wang, Ming Yang, Bryan Pearson, Tingjian Ge, Xinwen Fu, Wei Zhao. On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm[C], in Proceedings of IEEE Conference on Communications and Network Security, CNS'22, Austin, TX, USA, Pages 317-325, 3–5 October 2022.

[11]Shan Wang, Ming Yang, Tingjian Ge, Yan Luo, Xinwen Fu, BBS: A Blockchain Big-Data Sharing System[C], in Proceedings of IEEE International Conference on Communications, ICC'22, 16–20 May 2022.

[12]Shan Wang, Ming Yang, Yue Zhang, Yan Luo, Tingjian Ge, Xinwen Fu, and Wei Zhao. On Private Data Collection of Hyperledger Fabric[C], in Proceedings of 2021 IEEE 41st International Conference on Distributed Computing Systems, ICDCS'21, Washington DC, USA, 7-10 July 2021, pp. 819-829. IEEE. (CCF B)

[13]Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, and Xinwen Fu. Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks[C], in the 38th IEEE International Conference on Computer Communications, INFOCOM'19, 2019, 1180-1188. (CCF A)

[14]Zhen Ling, Luo Junzhou, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu. SecTap: Secure Back of Device Input System for Mobile Devices[C], in Proceedings of the 37th IEEE International Conference on Computer Communications, INFOCOM'18, Honolulu, HI, USA, 15-19 April 2018. (CCF A)

[15]Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu, Secure Fingertip Mouse for Mobile Devices, in Proceedings of the 35th IEEE International Conference on Computer Communications, INFOCOM'16, San Francisco, CA, USA, April 10-15, 2016. (CCF A)

[16]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery[C], in Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM'12, March 25-30, 2012, Orlando, Florida, USA, 2381-2389. (CCF A)

[17]Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu. A Novel Network Delay Based Side-Channel Attack: Modeling and Defense[C], in Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM'12, March 25-30, 2012, Orlando, Florida, USA, 2390-2398. (CCF A)

[18]Yaowen Liu, Ming Yang, Zhen Ling, and Junzhou Luo. Implicit Authentication for Mobile Device based on 3D Magnetic Finger Motion Pattern[C], in Proceedings of the 2017 IEEE 21st International Conference on Computer supported Cooperative Work in Design, CSCWD2017, Wellington, New Zealand, April 26-28, 2017, 325-330. (Best Application Paper Award)

[19]Wu Wenjia, Luo Junzhou, Yang Ming, Yang Laurence T. Joint Interface Placement and Channel Assignment in Multi-channel Wireless Mesh Networks[C], in Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with ApplicationsISPA'12, July 10-13, 2012, pp395-402, Leganes, Madrid, Spain, 2012 (EI)

[20]Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang*. Mobile applications identification using autoencoder based electromagnetic side channel analysis[J]. Journal of Information Security and Applications, 2023,75:103481.

[21]Jinghui Zhang, Zhengjia Xu, Junhe Li, Qiangsheng Dai, Zhen Ling, Ming Yang*. Wi-Fi device identification based on multi-domain physical layer fingerprint [J]. Computer Communications, 15 April 2023, 204:118-129.

[22]Jinghui Zhang, Zichao Li, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang*. Sensor-based implicit authentication through learning user physiological and behavioral characteristics[J]. Computer Communications, 2023, 208:244-255.

[23]Jinghui Zhang, Xinyang Li, Junhe Li, Qiangsheng Dai, Zhen Ling, and Ming Yang*. Bluetooth Low Energy Device Identification Based on Link Layer Broadcast Packet Fingerprinting[J]. Tsinghua Science and Technology, 2023, 28(5):862-872.

[24]Xiaodan Gu, Ming Yang, Bingchen Song, Wei Lan, Zhen Ling. A practical multi-tab website fingerprinting attack[J], Journal of Information Security and Applications, 2023, 79: 103627.

[25]Weidu Ye, Junzhou Luo, Wenjia Wu, Feng Shan, Ming Yang. MUTAA: An online trajectory optimization and task scheduling for UAV-aided edge computing[J], Computer Networks, 2022, 218: 109405.

[26]Wenjia Wu, Shengyu Sun, Feng Shan, Ming Yang, Junzhou Luo. Energy-Constrained UAV Flight Scheduling for IoT Data Collection with 60 GHz Communication[J], IEEE Transactions on Vehicular Technology, 2022, 71(10): 10991-11005.

[27]Wenjia Wu, Yujing Liu, Jiazhi Yao, Xiaolin Fang, Feng Shan, Ming Yang, Zhen Ling, Junzhou Luo. Learning-aided client association control for high-density WLANs[J], Computer Networks, 2022, 212: 109043.

[28]Xiaolin Fang, Fan Hu, Ming Yang, Tongxin Zhu, Ran Bi, Zenghui Zhang, Zhiyuan Gao. Small object detection in remote sensing images based on super-resolution[J], Pattern Recognition Letters, Volume 153, 2022: 107-112.

[29]Tongxin Zhu, Zhipeng Cai, Xiaolin Fang, Junzhou Luo, Ming Yang. Correlation Aware Scheduling for Edge-Enabled Industrial Internet of Things[J], IEEE Transactions on Industrial Informatics, 18.11 (2022): 7967-7976.

[30]Kaizheng Liu, Ming Yang*, Zhen Ling*, Huaiyu Yan, Yue Zhang, Xinwen Fu. On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems[J], IEEE Internet of Things Journal, April 2021, 8(8): 6815-6827.

[31]Weidu Ye, Junzhou Luo, Feng Shan, Wenjia Wu, and Ming Yang, Offspeeding: Optimal energy-efficient flight speed scheduling for UAV-assisted edge computing[J], Computer Networks, vol.183, p.107577, 2020. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128620312196.

[32]Yiting Zhang, Ming Yang*, Zhen Ling, Yaowen Liu, Wenjia Wu. FingerAuth: 3D Magnetic Finger Motion Pattern based Implicit Authentication for Mobile Devices[J], Future Generation Computer Systems (FGCS), Volume 108, July 2020, Pages 1324-1337.

[33]Xiaodan Gu, Ming Yang*, Yiting Zhang, Peilong Pan, and Zhen Ling. Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment[J], Security and Communication Networks, Volume 2018, Article ID 6124160, pp.1-15.(SCI)

[34]Taolin Guo, Junzhou Luo, Kai Dong, Ming Yang. Differentially private graph-link analysis based social recommendation[J], Information Sciences, 643-464, 2018:214-226. (CCF B)

[35]Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu and Wei Yu. De-anonymizing and Countermeasures in Anonymous Communication Networks[J], IEEE Communications Magazine, DOI: 10.1109/MCOM.2015.7081076, April 2015, 53(4): 60-66. (SCI, Impact Factor 10.435)

[36]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation[J], IEEE Transactions on Parallel and Distributed Systems (TPDS), DOI: 10.1109/TPDS.2013.249, July 2015, 26(7):1887-1899. (CCF A)

[37]Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, Zhenyu Ni. Detection of malicious behavior in android apps through API calls and permission uses analysis[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.4172, 10 October 2017, 29(19): e4172.

[38]Qiyuan Gong, Ming Yang, Zhouguo Chen, Wenjia Wu, Junzhou Luo. A framework for utility enhanced incomplete microdata anonymization[J], Cluster Computing, June 2017, 20(2): 1749-1764.

[39]Ming Yang, Xiaodan Gu, Zhen Ling, Changxin Yin, Junzhou Luo. An active de-anonymizing attack against tor web traffic[J], Tsinghua Science and Technology, December 2017, 22(6): 702-713.

[40]Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling and Junzhou Luo. A novel attack to track users based on the behavior patterns[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.3891, March 2017, 29(6): 1-18.

[41]Qiyuan Gong, Junzhou Luo, Ming Yang, Weiwei Ni, Xiao-Bai Li. Anonymizing 1:M microdata with high utility[J], Knowledge-Based Systems, DOI: 10.1016/j.knosys.2016.10.012, January 2017, 115(2017): 15-26.

[42]Gaofeng He, Ming Yang, Junzhou Luo, Xiaodan Gu. A novel application classification attack against Tor[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.3593, December 2015, 27(18): 5640–5661.

[43]Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu. How to block Tor's hidden bridges: detecting methods and countermeasures[J], The Journal of Supercomputing, DOI: 10.1007/s11227-012-0788-4, Dec 2013, 66(3):1285-1305.

[44]Ming Yang, Bo Liu, Wei Wang, Junzhou Luo, Xiaojun Shen. Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks[J], Journal of Universal Computer Science (JUCS), 2014, 20(13): 1855-1874.

[45]Xiaogang Wang, Ming Yang, Junzhou Luo. A novel sequential watermark detection model for efficient traceback of secret network attack flows[J], Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2013.01.015i, Nov. 2013, 36(6): 1660-1670.

[46]Junzhou Luo, Xiaogang Wang, Ming Yang. An interval centroid based spread spectrum watermarking scheme for multi-flow traceback[J], Journal of Network and Computer Applications, January 2012, 35(1): 60-71.

[47]Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling. A potential HTTP-based application-level attack against Tor[J], Future Generation Computer Systems, January 2011, 27(1):67-77.

[48]Junzhou Luo, Wenjia Wu, Yang Ming. Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks[J], Journal of Universal Computer Science, 2011, 17(14): 2064-2083.

[49]Junzhou Luo, Ming Yang. Analysis of Security Protocols Based on Challenge- Response[J], Science in China Series F, February 2007, 50(2):137-153.

[50]凌振, 杨彦, 刘睿钊, 张悦, 贾康, 杨明*. 基于Toast重复绘制机制的口令攻击技术[J], 软件学报, 20226, 33(6): 2047-2060.

[51]罗军舟, 杨明*, 凌振, 吴文甲, 顾晓丹. 匿名通信与暗网研究综述[J]. 计算机研究与发展, 20191, 56(1): 103-130.

[52]罗军舟, 杨明, 凌振, 吴文甲, 顾晓丹. 网络空间安全体系与关键技术[J]. 中国科学: 信息科学, 20168, 46(8): 939-968.

[53]龚奇源, 杨明*, 罗军舟. 面向关系-事务数据的数据匿名方法[J]. 软件学报, 201611, 27(11): 2828-2842.

[54]张怡婷,傅煜川,杨明,罗军舟. 基于PBAC模型和IBE的医疗数据访问控制方案[J]. 通信学报, 201512, 36(12): 200-211.

[55]顾晓丹, 杨明, 罗军舟, 蒋平. 针对SSH匿名流量的网站指纹攻击方法研究[J]. 计算机学报, 20154, 38(4): 833-845.

[56]何高峰, 杨明, 罗军舟, 张璐, 马媛媛. 洋葱路由追踪技术中时间特征的建模与分析[J], 计算机学报, 20142, 37(2): 356-372.

[57]吴文甲, 杨明, 罗军舟. 无线Mesh网络中满足带宽需求的路由器部署方法[J], 计算机学报, 20142, 37(2): 344-355.

[58]何高峰, 杨明, 罗军舟, 张璐. Tor匿名通信流量在线识别方法[J], 软件学报, 20133, 24(3): 540-556.

[59]龚奇源, 杨明, 罗军舟. 面向缺失数据的数据匿名方法[J], 软件学报, 201312, 24(12): 2883-2896.

[60]王维, 杨明, 罗军舟, 刘波. 多射频无线Mesh网络组播端到端时延建模与优化[J], 计算机学报, 20127, 35(7): 1358-1369.

[61]王维, 杨明, 罗军舟, 吴文甲. 基于网络编码的多射频Mesh网组播时延建模与分析[J], 计算机研究与发展, 20126, 49(6): 1174-1184.

[62]吴文甲, 杨明, 罗军舟, 王维. 干扰约束和负载均衡的无线Mesh网络网关部署策略[J], 计算机学报, 20125, 35(5): 883-897.

[63]张璐, 罗军舟, 杨明, 何高峰. 基于时隙质心流水印的匿名通信追踪技术[J], 软件学报, 201110, 22(10): 2358-2371.

[64]张璐, 罗军舟, 杨明, 何高峰. 包间隔流关联技术中的同步问题研究[J], 计算机研究与发展, 20119, 48(9): 1643-1651.

[65]罗军舟, 吴文甲, 杨明. 移动互联网: 终端、网络与服务[J], 计算机学报, 201111, 34(11): 2029-2051.

[66]杨明, 罗军舟. 安全协议关联性分析[J], 通信学报, 20067, 27(7):39-45.

[67]杨明, 罗军舟. 基于认证测试的安全协议分析[J], 软件学报, 20061, 17(1): 148-156.

[68]罗军舟, 杨明. 基于挑战-响应的安全协议分析[J], 中国科学: 信息科学, 200612, 36(12): 1421-1441.

  • 联系方式
  • 通信地址:南京市江宁区东南大学路2号东南大学九龙湖校区计算机学院
  • 邮政编码:211189
  • ​办公地点:东南大学九龙湖校区计算机楼
  • 学院微信公众号