照片路径有误
  • 姓名:陈晶
  • 主页:
  • 性别:男
  • 职称:教授
  • 学历学位:博士
  • 电话:15997495212
  • 办公地点:
  • E-mail:chenjing@whu.edu.cn
  • 硕/博士生导师:博士生导师
  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 发表论文
  • 研究课题
  • 研究团队
  • 获奖信息
  • 学术服务

 

 

    网络安全、信息安全、大数据安全、云安全、隐私保护、计算机网络、无线网络
    陈晶,男,博士,外围投注365教授,博士生导师,珞珈青年学者。
    IEEE会员、中国计算机学会会员、中国密码学会会员,研究方向为网络安全、云安全、大数据安全、隐私保护、无线网络。
    2003年7月毕业于武汉理工大学,获工学学士学位。
    2008年3月毕业于华中科技大学计算机学院计算机科学专业,获工学博士学位。
  陈晶,男,博士,外围投注365教授,博士生导师,珞珈青年学者。
  IEEE会员、中国计算机学会会员、CCF YOCSEF武汉副主席、中国密码学会会员,研究方向为网络安全、云安全、大数据安全、隐私保护、无线网络。
  2003年7月毕业于武汉理工大学,获工学学士学位。
  2008年3月毕业于华中科技大学计算机学院计算机科学专业,获工学博士学位。
  作为负责人获得3项国家自然科学基金、2项湖北省自然科学基金、1项中国博士后特别资助,1项教育部重点实验室开放基金,1项华为预研基金。作为骨干成员参与国家科技攻关计划项目(863),国家重大专项及国家自然基金重点项目、国家中小企业创新基金等多项。
  在INFOCOM, SECON, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Computers, IEEE Transactions on Mobile Computing, Security and Communication Networks, Computer Communications, TrustCom, 中国通信,计算机学报,电子学报等国内外高档期刊和会议上发表论文70余篇。
  应邀担任国家863视频答辩专家、国家自然科学基金网评专家,CIS2014, WCSN2014,ICMISS 2014,CSMA2015,ICIS2015,CoCoNet2015的TPC,CTCIS2014组委会成员,IEEE Transactions on Information Forensic & Security, IEEE Transactions on Wireless Communication, IEEE Transactions on Vehicular Technology,IEEE Transactions on Industrial Informatics, Computer Communications, GLOBCOM,计算机学报,通信学报,电子学报等国内外顶级期刊审稿人。
  获得湖北省科技进步奖2项,出版专著4本,获得发明专利4项,计算机软件著作权3项。
1. 网络安全
2. 网络安全实验
3. Internet应用及安全

[1] Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue. Checks and Balances: A Tripartite Public Key Infrastructure for Secure Web-based Connections. In proc. of International Conference on Computer Communications (INFOCOM 2017). 2017 (CCF A类)
[2] Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang. Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Transactions on Mobile Computing. 2016. DOI: 10.1109/TMC.2016.2604820 (CCF A类)
[3] Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Transactions on Computers. 2016. DOI: 10.1109/TC.2016.2560812 (SCI收录, CCF A类, corresponding author)
[4] Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du, Kun He, Lina Wang, Zhiyong Peng. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015 (CCF A类)
[5] Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed System. 2014 (CCF A类)
[6] Jing Chen, Kun He, Quan Yuan, Ruiying Du, Jie Wu. Distributed Greedy Coding-Aware Deterministic Routing for Multi-flow in Wireless Networks. Computer Networks. 2016. DOI: 10.1016/j.comnet.2016.05.027       (SCI收录,CCF B类)
[7] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression Access Control for Video on Demand in Cloud. Information Science, 2016. DOI: 10.1016/j.ins.2016.08.018  (SCI收录, CCF B类)
[8] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON 2015). 2015 (CCF B类)
[9] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Transactions on Cloud Computing. 2016
[10] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security and Communication Networks. 2016   (SCI收录, CCF C类)
[11] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman privacy-preserving scheme in weighted social networks. Security and Communication Networks. 2016   (SCI收录, CCF C类)
[12] Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electronic Commerce Research. 2014 (SSCI收录,corresponding author)
[13] Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)
[14] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[15] Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communication. 2012,9(10): 23-32 (SCI收录)
[16] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[17] Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收录)
[18] 张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊, corresponding author)
[19] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[20] Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收录)
[21] 陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433 (权威期刊)
[22] 沙乐天,傅建明,陈晶,黄诗勇. 一种面向敏感信息处理的敏感度度量方法 [J]. 计算机研究与发展, 2014, 51(5): 1050-1060. (权威期刊) 
[23] 李拴保,傅建明,张焕国,陈晶,王晶,任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报. 2014, 35(9): 99-111 (权威期刊)
[24] Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014 (SCI收录)
[25] Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters. Journal of Network and Computer Applications. 2013. (SCI收录)
[26]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair UC-Secure Protocol for Two-Party Computation, Security and Communication Networks. 2013 (SCI收录)
[27] Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing. 2011.71(9): 1249-1260. (CCF B类)
[28] Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收录)
[29] 徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. 2010.2(33): 335-344 (权威期刊) 
[30] Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit Authenticated Key Agreement Protocol. In proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012: 1299-1303 (CCF C类)
[31] 张宇, 陈晶, 杜瑞颖,等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 第3期(03):512-517.  (权威期刊) 
[32] 张宇, 杜瑞颖, 陈晶等.对一个基于身份签密方案的分析与改进[J].通信学报,2015,第11期,36(11):174-179. (权威期刊) 
[33] Zhou Shungan, Du Ruiying, Chen Jing, Deng Hua, Shen Jian, Zhang Huanguo. SSEM: Secure Scalable and Efficient Multi-owner Data Sharing in Clouds. China Communications. 2016: 231-243
[34] Zhou Shungan, Du Ruiying, Chen Jing, Shen Jian, Deng Hua, Zhang Huanguo. FACOR: Flexible Access Control with Outsourceable Revocation in Mobile Clouds. China Communications. 2016: 136-150
[35] Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng. ESDR: an Efficient and Secure Data Repairing Paradigm in Cloud Storage. Security and Communication Networks. 2016. DOI: 10.1002/sec.1571
1. 国家自然科学基金面上项目“无线Mesh网络中跨层安全关键技术研究”               2013-2016
2. 国家自然科学基金,“面向移动终端的情境隐私保护理论与方法研究”                 2016-2019
3. 国家自然科学基金项目,“车载网络安全形式化模型与关键技术研究”                 2012-2015
4. 湖北省自然科学基金项目,“移动互联网高效安全认证与传输技术研究”            2014-2015
5. 国家科技重大专项 “支持多传感应用的中间件平台研发”                                       2010-2012 
6. 国家中小企业创新基金,“基于云计算的网络虚拟磁盘系统”                                2012-2013
7. 中国博士后特别资助项目“移动车载网关键安全技术研究”                                    2012-2013

欢迎加入我们的团队!
个人获奖情况:
    1. 湖北省科技进步二等奖 2016
    2. 湖北省科技进步三等奖 2013
    3. 全国大学生信息安全竞赛优秀指导教师奖 2011、2016

指导学生获奖情况:
    1.全国大学生信息安全竞赛一等奖2项,三等奖1项
    2.湖北省省级优秀学士学位论文,3人次