杨明
职称:正高
所在院系:计算机工程系
研究方向:计算机网络、网络安全、物联网
电话:
邮箱:yangming2002@seu.edu.cn
职务:
个人简介

现任东南大学计算机学院教授、博士生导师,江苏省网络与信息安全重点实验室常务副主任计算机网络和信息集成教育部重点实验室副主任,中国通信学会通信安全技术委员会委员、中国指挥与控制学会安全应急共享知识专业委员会委员、江苏省计算机学会网络空间治理专委会副秘书长,主要研究方向为计算机网络、网络安全与隐私保护、物联网等。作为项目负责人承担/完成国家重点研发计划国家自然科学基金国家科技支撑计划国家科技重大专项国家国防科技创新特区课题等项目10余项。在包括IEEE ComMagTPDSINFOCOMUSENIX SecurityCCSNDSS《中国科学》、《软件学报》、《计算机学报》在内的核心期刊和重要国际会议上发表论文100余篇,获得国家发明专利授权10项、软件著作权2项,获得教育部科技进步一等奖1项、江苏省科学技术二等奖1。先后入选“华英文教基金”青年学者奖助计划、东南大学优秀青年教师教学科研资助计划、江苏高校“青蓝工程”优秀青年骨干教师培养计划、江苏省六大人才高峰高层次人才选拔培养资助计划、江苏省333高层次人才培养工程”等。

研究方向
教育经历

[1]    19969-20006月,东南大学计算机科学与工程系,获得计算机科学与技术专业学士学位。

[2]    20009-20021月,东南大学计算机科学与工程系,获得计算机应用技术专业工学硕士学位,研究方向网络安全。

[3]    20023-20073月,东南大学计算机科学与工程学院,获得计算机应用技术专业工学博士学位,研究方向网络安全。

工作经历
科研项目

[1]    国家自然科学基金面上项目,基于公共匿名网络的隐私增强通信技术研究(62072103)202101-202412月,负责人(在研)。

[2]    国家重点研发计划课题,基于健康护照的多元化协同干预智能服务技术研究(2023YFC3605804)202312-202611月,负责人(在研)。

[3]    国家重点研发计划子课题,******430万,20228-20246月,负责人(在研)。

[4]    国家重点研发计划课题,大连接复杂异构条件下的物联网一体化安全机制(2018YFB0803404)384万,201807-202206月,负责人(已结题)。

[5]    国家重点研发计划子课题,面向柔性工业制造的大数据处理与反馈控制技术(2017YFB1003004)201710-202109月,负责人(已结题)。

[6]    国家自然科学青年基金项目,基于主动流量分析的匿名通信追踪技术研究(60903162)20101-201212月,负责人(已结题)。

[7]    国家自然科学基金面上项目,基于侧信道攻击的匿名通信流量识别、分析和追踪技术研究(61272054)201301-201612月,负责人(已结题)。

[8]    国家自然科学基金面上项目,基于指纹攻击的网络实体识别技术研究(61572130)201601-201912月,负责人(已结题)。

[9]    国家科技支撑计划课题,区域医疗卫生海量信息处理、安全与隐私保护等关键技术研究(2010BAI88B03)331万,200910-201409月,负责人(已结题)。

[10]国家新一代宽带无线移动通信网重大专项,宽带移动业务关键技术开放式研究(宽带移动融合)中的子课题异构融合网络和业务中的安全机制研究(2009ZX03004-004-04)200901-201012月,负责人(已结题)。

[11]江苏省重点研发计划重大科技示范项目(社会发展),沿江沿海公共安全智能防控关键技术研究与应用示范(BE2022680)300万,20227-20256月,负责人(在研)

[12]公安部技术研究计划项目,基于大数据智能应用的社区智慧警务关键技术研究与示范2018JSYJD01),20189-202012月,负责人(已结题)。

[13]南京市科技成果转化专项资金项目,超大规模用户在线行为感知分析集成平台研发及产业化201701204),20176-20196月,负责人(已结题)。

[14]中国电子科技集团公司第三十研究所横向军工项目,******20166-20173月,负责人(已结题)。

[15]中国电子科技集团公司第三十研究所横向军工项目,******201711-201911月,负责人(已结题)。

[16]中国电子科技集团公司第三十研究所横向军工项目,******20196-20205月,负责人(已结题)。

……等等

论文著作

[1]    Kaizheng Liu, Ming Yang, Zhen Ling, Yue Zhang, Chongqing Lei, Junzhou Luo, Xinwen Fu, RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices[C], accepted to appear in Proceedings of the 31th ACM Conference on Computer and Communications Security, CCS'24, Salt Lake City, USA, October 14-18, 2024. (CCF A)

[2]    Yonghuan Xu, Ming Yang, Zhen Ling, Zixia Liu, Xiaodan Gu, Lan Luo, A De-anonymization Attack Against Downloaders in Freenet[C], in Proceedings of the 43rd IEEE International Conference on Computer Communications, INFOCOM'24, Vancouver, Canada, May 20-23, 2024. (CCF A)

[3]    Kaizheng Liu, Ming Yang, Zhen Ling, Yuan Zhang, Chongqing Lei, Lan Luo, Xinwen Fu, SAMBA: Detecting SSL/TLS API Misuses in IoT Binary Applications[C], in Proceedings of the 43rd IEEE International Conference on Computer Communications, INFOCOM'24, Vancouver, Canada, May 20-23, 2024. (CCF A)

[4]    Shan Wang, Ming Yang, Wenxuan Dai, Yu Liu, Yue Zhang, Xinwen Fu, Deanonymizing Ethereum Users behind Third-Party RPC Services[C], in Proceedings of the 43rd IEEE International Conference on Computer Communications, INFOCOM'24, Vancouver, Canada, May 20-23, 2024. (CCF A)

[5]    Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu. Relation Mining Under Local Differential Privacy[C], accepted to appear in Proceedings of the 33rd USENIX Security Symposium, Security'24, 2024. (CCF A)

[6]    Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu, LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems[C], in Proceedings of the 31th Network and Distributed System Security, NDSS'24, San Diego, California, USA, February 26-March 1, 2024. (CCF A)

[7]    Chunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen, Ming Yang, Xinwen Fu. Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery[C], in Proceedings of the 41st IEEE International Conference on Computer Communications, INFOCOM'22, 2-5 May 2022, Virtual Conference, 1710-1718. (CCF A)

[8]    Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang*, Xinwen Fu. Towards an Efficient Defense against Deep Learning based Website Fingerprinting[C], in Proceedings of the 41st IEEE International Conference on Computer CommunicationsINFOCOM'22, 2-5 May 2022, Virtual Conference, 310-318. (CCF A)

[9]    Xiaolin Gu, Wenjia Wu, Naixuan Guo, Wei He, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo. TeRFF: Temperature-aware Radio Frequency Fingerprinting for Smartphones[C], in Proceedings of 19th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON'22, 20-23 September 2022 // Virtual Conference, 2022.

[10]Shan Wang, Ming Yang, Bryan Pearson, Tingjian Ge, Xinwen Fu, Wei Zhao. On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm[C], in Proceedings of IEEE Conference on Communications and Network Security, CNS'22, Austin, TX, USA, Pages 317-325, 3–5 October 2022.

[11]Shan Wang, Ming Yang, Tingjian Ge, Yan Luo, Xinwen Fu, BBS: A Blockchain Big-Data Sharing System[C], in Proceedings of IEEE International Conference on Communications, ICC'22, 16–20 May 2022.

[12]Shan Wang, Ming Yang, Yue Zhang, Yan Luo, Tingjian Ge, Xinwen Fu, and Wei Zhao. On Private Data Collection of Hyperledger Fabric[C], in Proceedings of 2021 IEEE 41st International Conference on Distributed Computing Systems, ICDCS'21, Washington DC, USA, 7-10 July 2021, pp. 819-829. IEEE. (CCF B)

[13]Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, and Xinwen Fu. Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks[C], in the 38th IEEE International Conference on Computer Communications, INFOCOM'19, 2019, 1180-1188. (CCF A)

[14]Zhen Ling, Luo Junzhou, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu. SecTap: Secure Back of Device Input System for Mobile Devices[C], in Proceedings of the 37th IEEE International Conference on Computer Communications, INFOCOM'18, Honolulu, HI, USA, 15-19 April 2018. (CCF A)

[15]Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu, Secure Fingertip Mouse for Mobile Devices, in Proceedings of the 35th IEEE International Conference on Computer Communications, INFOCOM'16, San Francisco, CA, USA, April 10-15, 2016. (CCF A)

[16]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery[C], in Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM'12, March 25-30, 2012, Orlando, Florida, USA, 2381-2389. (CCF A)

[17]Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu. A Novel Network Delay Based Side-Channel Attack: Modeling and Defense[C], in Proceedings of the 31th IEEE International Conference on Computer Communications, INFOCOM'12, March 25-30, 2012, Orlando, Florida, USA, 2390-2398. (CCF A)

[18]Yaowen Liu, Ming Yang, Zhen Ling, and Junzhou Luo. Implicit Authentication for Mobile Device based on 3D Magnetic Finger Motion Pattern[C], in Proceedings of the 2017 IEEE 21st International Conference on Computer supported Cooperative Work in Design, CSCWD2017, Wellington, New Zealand, April 26-28, 2017, 325-330. (Best Application Paper Award)

[19]Wu Wenjia, Luo Junzhou, Yang Ming, Yang Laurence T. Joint Interface Placement and Channel Assignment in Multi-channel Wireless Mesh Networks[C], in Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with ApplicationsISPA'12, July 10-13, 2012, pp395-402, Leganes, Madrid, Spain, 2012 (EI)

[20]Jinghui Zhang, Boxi Liang, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang*. Mobile applications identification using autoencoder based electromagnetic side channel analysis[J]. Journal of Information Security and Applications, 2023,75:103481.

[21]Jinghui Zhang, Zhengjia Xu, Junhe Li, Qiangsheng Dai, Zhen Ling, Ming Yang*. Wi-Fi device identification based on multi-domain physical layer fingerprint [J]. Computer Communications, 15 April 2023, 204:118-129.

[22]Jinghui Zhang, Zichao Li, Hancheng Zhang, Wei Zhang, Zhen Ling, Ming Yang*. Sensor-based implicit authentication through learning user physiological and behavioral characteristics[J]. Computer Communications, 2023, 208:244-255.

[23]Jinghui Zhang, Xinyang Li, Junhe Li, Qiangsheng Dai, Zhen Ling, and Ming Yang*. Bluetooth Low Energy Device Identification Based on Link Layer Broadcast Packet Fingerprinting[J]. Tsinghua Science and Technology, 2023, 28(5):862-872.

[24]Xiaodan Gu, Ming Yang, Bingchen Song, Wei Lan, Zhen Ling. A practical multi-tab website fingerprinting attack[J], Journal of Information Security and Applications, 2023, 79: 103627.

[25]Weidu Ye, Junzhou Luo, Wenjia Wu, Feng Shan, Ming Yang. MUTAA: An online trajectory optimization and task scheduling for UAV-aided edge computing[J], Computer Networks, 2022, 218: 109405.

[26]Wenjia Wu, Shengyu Sun, Feng Shan, Ming Yang, Junzhou Luo. Energy-Constrained UAV Flight Scheduling for IoT Data Collection with 60 GHz Communication[J], IEEE Transactions on Vehicular Technology, 2022, 71(10): 10991-11005.

[27]Wenjia Wu, Yujing Liu, Jiazhi Yao, Xiaolin Fang, Feng Shan, Ming Yang, Zhen Ling, Junzhou Luo. Learning-aided client association control for high-density WLANs[J], Computer Networks, 2022, 212: 109043.

[28]Xiaolin Fang, Fan Hu, Ming Yang, Tongxin Zhu, Ran Bi, Zenghui Zhang, Zhiyuan Gao. Small object detection in remote sensing images based on super-resolution[J], Pattern Recognition Letters, Volume 153, 2022: 107-112.

[29]Tongxin Zhu, Zhipeng Cai, Xiaolin Fang, Junzhou Luo, Ming Yang. Correlation Aware Scheduling for Edge-Enabled Industrial Internet of Things[J], IEEE Transactions on Industrial Informatics, 18.11 (2022): 7967-7976.

[30]Kaizheng Liu, Ming Yang*, Zhen Ling*, Huaiyu Yan, Yue Zhang, Xinwen Fu. On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems[J], IEEE Internet of Things Journal, April 2021, 8(8): 6815-6827.

[31]Weidu Ye, Junzhou Luo, Feng Shan, Wenjia Wu, and Ming Yang, Offspeeding: Optimal energy-efficient flight speed scheduling for UAV-assisted edge computing[J], Computer Networks, vol.183, p.107577, 2020. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128620312196.

[32]Yiting Zhang, Ming Yang*, Zhen Ling, Yaowen Liu, Wenjia Wu. FingerAuth: 3D Magnetic Finger Motion Pattern based Implicit Authentication for Mobile Devices[J], Future Generation Computer Systems (FGCS), Volume 108, July 2020, Pages 1324-1337.

[33]Xiaodan Gu, Ming Yang*, Yiting Zhang, Peilong Pan, and Zhen Ling. Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment[J], Security and Communication Networks, Volume 2018, Article ID 6124160, pp.1-15.(SCI)

[34]Taolin Guo, Junzhou Luo, Kai Dong, Ming Yang. Differentially private graph-link analysis based social recommendation[J], Information Sciences, 643-464, 2018:214-226. (CCF B)

[35]Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu and Wei Yu. De-anonymizing and Countermeasures in Anonymous Communication Networks[J], IEEE Communications Magazine, DOI: 10.1109/MCOM.2015.7081076, April 2015, 53(4): 60-66. (SCI, Impact Factor 10.435)

[36]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation[J], IEEE Transactions on Parallel and Distributed Systems (TPDS), DOI: 10.1109/TPDS.2013.249, July 2015, 26(7):1887-1899. (CCF A)

[37]Ming Yang, Shan Wang, Zhen Ling, Yaowen Liu, Zhenyu Ni. Detection of malicious behavior in android apps through API calls and permission uses analysis[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.4172, 10 October 2017, 29(19): e4172.

[38]Qiyuan Gong, Ming Yang, Zhouguo Chen, Wenjia Wu, Junzhou Luo. A framework for utility enhanced incomplete microdata anonymization[J], Cluster Computing, June 2017, 20(2): 1749-1764.

[39]Ming Yang, Xiaodan Gu, Zhen Ling, Changxin Yin, Junzhou Luo. An active de-anonymizing attack against tor web traffic[J], Tsinghua Science and Technology, December 2017, 22(6): 702-713.

[40]Xiaodan Gu, Ming Yang, Congcong Shi, Zhen Ling and Junzhou Luo. A novel attack to track users based on the behavior patterns[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.3891, March 2017, 29(6): 1-18.

[41]Qiyuan Gong, Junzhou Luo, Ming Yang, Weiwei Ni, Xiao-Bai Li. Anonymizing 1:M microdata with high utility[J], Knowledge-Based Systems, DOI: 10.1016/j.knosys.2016.10.012, January 2017, 115(2017): 15-26.

[42]Gaofeng He, Ming Yang, Junzhou Luo, Xiaodan Gu. A novel application classification attack against Tor[J], Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.3593, December 2015, 27(18): 5640–5661.

[43]Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu. How to block Tor's hidden bridges: detecting methods and countermeasures[J], The Journal of Supercomputing, DOI: 10.1007/s11227-012-0788-4, Dec 2013, 66(3):1285-1305.

[44]Ming Yang, Bo Liu, Wei Wang, Junzhou Luo, Xiaojun Shen. Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks[J], Journal of Universal Computer Science (JUCS), 2014, 20(13): 1855-1874.

[45]Xiaogang Wang, Ming Yang, Junzhou Luo. A novel sequential watermark detection model for efficient traceback of secret network attack flows[J], Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2013.01.015i, Nov. 2013, 36(6): 1660-1670.

[46]Junzhou Luo, Xiaogang Wang, Ming Yang. An interval centroid based spread spectrum watermarking scheme for multi-flow traceback[J], Journal of Network and Computer Applications, January 2012, 35(1): 60-71.

[47]Xiaogang Wang, Junzhou Luo, Ming Yang, Zhen Ling. A potential HTTP-based application-level attack against Tor[J], Future Generation Computer Systems, January 2011, 27(1):67-77.

[48]Junzhou Luo, Wenjia Wu, Yang Ming. Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks[J], Journal of Universal Computer Science, 2011, 17(14): 2064-2083.

[49]Junzhou Luo, Ming Yang. Analysis of Security Protocols Based on Challenge- Response[J], Science in China Series F, February 2007, 50(2):137-153.

[50]凌振, 杨彦, 刘睿钊, 张悦, 贾康, 杨明*. 基于Toast重复绘制机制的口令攻击技术[J], 软件学报, 20226, 33(6): 2047-2060.

[51]罗军舟, 杨明*, 凌振, 吴文甲, 顾晓丹. 匿名通信与暗网研究综述[J]. 计算机研究与发展, 20191, 56(1): 103-130.

[52]罗军舟, 杨明, 凌振, 吴文甲, 顾晓丹. 网络空间安全体系与关键技术[J]. 中国科学: 信息科学, 20168, 46(8): 939-968.

[53]龚奇源, 杨明*, 罗军舟. 面向关系-事务数据的数据匿名方法[J]. 软件学报, 201611, 27(11): 2828-2842.

[54]张怡婷,傅煜川,杨明,罗军舟. 基于PBAC模型和IBE的医疗数据访问控制方案[J]. 通信学报, 201512, 36(12): 200-211.

[55]顾晓丹, 杨明, 罗军舟, 蒋平. 针对SSH匿名流量的网站指纹攻击方法研究[J]. 计算机学报, 20154, 38(4): 833-845.

[56]何高峰, 杨明, 罗军舟, 张璐, 马媛媛. 洋葱路由追踪技术中时间特征的建模与分析[J], 计算机学报, 20142, 37(2): 356-372.

[57]吴文甲, 杨明, 罗军舟. 无线Mesh网络中满足带宽需求的路由器部署方法[J], 计算机学报, 20142, 37(2): 344-355.

[58]何高峰, 杨明, 罗军舟, 张璐. Tor匿名通信流量在线识别方法[J], 软件学报, 20133, 24(3): 540-556.

[59]龚奇源, 杨明, 罗军舟. 面向缺失数据的数据匿名方法[J], 软件学报, 201312, 24(12): 2883-2896.

[60]王维, 杨明, 罗军舟, 刘波. 多射频无线Mesh网络组播端到端时延建模与优化[J], 计算机学报, 20127, 35(7): 1358-1369.

[61]王维, 杨明, 罗军舟, 吴文甲. 基于网络编码的多射频Mesh网组播时延建模与分析[J], 计算机研究与发展, 20126, 49(6): 1174-1184.

[62]吴文甲, 杨明, 罗军舟, 王维. 干扰约束和负载均衡的无线Mesh网络网关部署策略[J], 计算机学报, 20125, 35(5): 883-897.

[63]张璐, 罗军舟, 杨明, 何高峰. 基于时隙质心流水印的匿名通信追踪技术[J], 软件学报, 201110, 22(10): 2358-2371.

[64]张璐, 罗军舟, 杨明, 何高峰. 包间隔流关联技术中的同步问题研究[J], 计算机研究与发展, 20119, 48(9): 1643-1651.

[65]罗军舟, 吴文甲, 杨明. 移动互联网: 终端、网络与服务[J], 计算机学报, 201111, 34(11): 2029-2051.

[66]杨明, 罗军舟. 安全协议关联性分析[J], 通信学报, 20067, 27(7):39-45.

[67]杨明, 罗军舟. 基于认证测试的安全协议分析[J], 软件学报, 20061, 17(1): 148-156.

[68]罗军舟, 杨明. 基于挑战-响应的安全协议分析[J], 中国科学: 信息科学, 200612, 36(12): 1421-1441.

专利

[1]    杨明,曹长巍,顾晓丹,陈琪. 一种基于Tor隐藏服务描述符的存储型隐蔽信道方案,国家发明专利,专利号:ZL202111368351.4,授权公告日:20240119日(受理号:202111368351.420211118日)。

[2]    杨明,曹长巍,吴文甲,陈琪. 基于Tor隐藏服务域名状态的存储型隐蔽信道方案,国家发明专利,专利号:ZL202111368354.8,授权公告日:20240206日(受理号:202111368354.820211118日)。

[3]    杨明,夏国正,顾晓丹,陆逸凡. 一种移动终端辅助的智能家居设备位置感知方法,国家发明专利,专利号:ZL202211094202.8,授权公告日:2022129日(受理号:202211094202.8202298日)。

[4]    杨明, 王姗, 吴嘉楠, 吴文甲, 凌振. 一种基于第三方流量HTTP报文的移动应用识别方法, 国家发明专利, 专利号: ZL201810670461.8, 授权公告日: 2021112日(受理号:201810670461.82018626日)

[5]    杨明,周佳欢,罗军舟,吴文甲,凌振. 一种基于内容关联的Web追踪自动检测方法,国家发明专利,专利号:ZL 2017 1 1282970.5,授权公告日:2021326日(受理号:201711282970.52017127日)

[6]    杨明,潘培龙,罗军舟,凌振. 一种基于应用程序流量分布式分析的主机实时识别方法,国家发明专利,专利号:ZL 2017 1 0249904.1,授权公告日:2020811日(受理号:201710249904.12017417日)

[7]    杨明,倪振宇,罗军舟,吴文甲,凌振. 一种基于运行环境状态的Android权限细粒度访问控制方法,国家发明专利,专利号:ZL 2014 1 0431653.5,授权公告日:20161026日(受理号:201410431653.52014828日)

[8]    杨明,罗军舟,倪俊辉,马成平,任新才. 基于用户反馈的行业拼写错误检查方法,国家发明专利,专利号:ZL 2014 1 0149427.8,授权公告日:2015422日(受理号:201410149427.82014414日)

[9]    杨明,罗军舟,吴文甲,王维. 无线Mesh网络网关负载均衡的方法,国家发明专利,专利号:ZL 2011 1 0137952.4,授权公告日:2013424(受理号:201110137952.42011526)。

[10]杨明,罗军舟,王维,吴文甲. AC-AP架构无线Mesh网组播通信方法,国家发明专利,专利号:ZL 2011 1 0138107.9,授权公告日:2013731(受理号:201110138107.92011526)。

获奖情况

2008年,获华英文教基金青年学者奖助。

2010年,作为主要完成人获2009年度教育部科学技术进步一等奖。

2011年,获东南大学第十八届青年教师授课竞赛二等奖(一等奖空缺)。

2013年,获东南大学优秀青年教师教学科研资助。

2016年,入选江苏高校青蓝工程优秀青年骨干教师培养计划。

2017年,作为主要完成人获2016年度江苏省科学技术二等奖。

2019年,入选江苏省六大人才高峰高层次人才选拔培养资助计划。

2022年,入选江苏省333高层次人才培养工程

  • 联系方式
  • 通信地址:南京市江宁区东南大学路2号东南大学九龙湖校区计算机学院
  • 邮政编码:211189
  • ​办公地点:东南大学九龙湖校区计算机楼
  • 学院微信公众号