求真百科歡迎當事人提供第一手真實資料,洗刷冤屈,終結網路霸凌。

常曉林檢視原始碼討論檢視歷史

事實揭露 揭密真相
前往: 導覽搜尋
常曉林
北京交通大學

常曉林,女,北京交通大學教授。

人物簡歷

工作經歷 香港科技大學所獲得博士學位,2007年加入北京交通大學計算機與信息技術學院。曾在中科院軟件所和公司從事網絡協議和產品以及安全操作系統的研究、設計和開發。是多個國際學術期刊的審稿人和國際會議的程序委員,擔任中國科學院信工所客座研究員,擔任國家自然科學基金和國家重點研發的評審專家以及加拿大自然科學、加拿大工程研究協會(NSERC)基金的海外評審專家, '網絡空間安全'期刊副主編, '網信軍民融合'期刊編委。


2022 SRDS , Blockchain 程序委員會成員。

研究方向

(1) 安全、可信、高效、綠色的分布式系統 (雲原生服務、端邊雲服務 、規模化區塊鏈;度量和評估方法、機制和系統研製)

(2) 積極防禦機理分析和系統研製

(3) 數據庫透明加密、安全代理、多級訪問控制

(4) 安全可證明的區塊鏈共識機制

(5) 安全可信的智能學習

科研項目

  • 國家自然基金「面上」:大規模聯盟鏈共識算法效能分析及優化
  • 北京市自然基金「面上」: 區塊鏈激勵共識機制量化分析
  • 數據庫透明加密與脫敏系統
  • 國家重點研發子課題: 韌性城市智能規劃與仿真關鍵技術及應用: 多系統要素協同的韌性城市自適應規劃決策技術
  • 紅果園-"其他部市": 面向資源受限設備的連續消息的輕量級自適應安全簽名方案
  • 國家(工信部等)專項: 移動邊緣計算MEC網絡安全防護技術
  • 邊緣計算技術、標準及認證業務研究
  • 信息系統服務器虛擬化產品檢測規範
  • 國家自然科學基金「聯合基金項目」: 動靜協同的惡意代碼智能分析方法研究
  • 統一身份認證關鍵技術研究
  • 面向軍民融合的多域網絡互聯態勢感知關鍵技術
  • 基于格的輕量級車聯網消息簽名與驗證方案研究
  • 國家自然科學基金「面上」: 智能穿戴網絡數據實時融合算法研究
  • 國家重點研發計劃: 關鍵信息技術產品和服務網絡安全審查關鍵技術研究
  • 國家自然科學基金「面上」: 面向異構雲計算中心IaaS服務的性能分析模型
  • 其它部市: 可信的網絡空間安全保障體系
  • 紅果園省部級"企事業": RSA-768數域篩法大數分解多項式選擇中的多項式根優化研究與工程實現
  • 紅果園: 基於雲計算的涉密信息系統安全保密測評與檢查能力建設
  • 北京交通大學: 典型移動終端多核及虛擬化支持狀況分析及可行方案
  • 北京市自然基金: 收益驅動的多虛擬網絡嵌入和虛擬網絡資源再分配技術研究
  • 教育部: 面向電子病歷共享系統的安全與隱私保護技術研究
  • 博士點基金: 虛擬機系統端擁塞控制的研究1
  • 科技部「863」: 虛擬個人計算機系統的可信支撐技術研究
  • 科技部「863」: 可信計算平台信任鏈建立關鍵技術

學術成果

論文/期刊

  • Journal Publications
  • X. Chang,et al, "Job Completion Time under Migration-based Dynamic Platform Technique", IEEE Trans. Services Computing, 2022. (主動安全防禦)
  • S Tong, Y Liu, J Mišić, X. Chang, et al, "Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution based Collaborative Fog Computing Model", to be published in IEEE Trans. Vehicular Technology. ( 可信安全的端-邊-雲服務)
  • J. Misic, V. Misic, X. Chang,et al, "Design of Proof-of-Stake PBFT Algorithm for IoT Environments「 IEEE Trans. Vehicular Technology, 2022. (PBFT 共識機制優化)
  • Y. Wang, Jiqiang Liu, X. Chang, et al,"DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks",Information Sciences,2022.(安全可靠的機器學習)
  • Wen Wang; Xiaofeng Peng; Ye Yang; Chun Xiao; Shuai Yang; Mingcai Wang; Lingfei Wang; Yanling Wang; Lin Li; X. Chang, 'Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment", IEEE Access, 2022. (充電樁安全分析)
  • Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, X. Chang: Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment『』 IEEE Trans. Green Commun. Netw. (2022) (物聯網聯盟鏈)
  • J. Misic, V. Misic, X. Chang,et al, "Scalable Self-Sovereign Identity Architecture「 IEEE Network, 2022 (信任管理)
  • H. Kang, X. Chang,et al, "Improving Dual-UAV Aided Ground-UAV Bi-directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization", IEEE Trans. Vehicular Technology, 2022. (無人機安全通信)
  • Y. Wang, Jiqiang Liu, X. Chang, et al,"IWA: Integrated gradient-based white-box attacks for fooling deep neural networks", Journal of Information Security and Applications,2022.(安全可靠的機器學習)
  • R. Yang, X. Chang, et al, "Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach", The Computer Journal, 2022. (主動安全防禦)
  • Y. Wang, Jiqiang Liu, X. Chang, et al,"AB-FGSM: AdaBelief Optimizer and FGSM-Based Approach to Generate Adversarial Examples", Journal of Intelligent System,2022.(安全可靠的機器學習)
  • J Bai, X Chang, et al,"Quantitative Understanding Serial-Parallel Hybrid SFC Services: A Dependability Perspective", , Peer-to-Peer Networking and Applications,2022. (可信安全的端-邊-雲服務).
  • S Tong, Y Liu, J Mišić, X. Chang, et al, "Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm", to be published in IEEE Transactions on Intelligent Transportation Systems. ( 可信安全的端-邊-雲服務)
  • J Bai, X Chang, et al,"Impact of Service Function Aging on the Dependability for MEC Service Function Chain", to be published IEEE Transactions on Dependable and Secure Computing. (可信安全的端-邊-雲服務).
  • R Yang, X Chang, J Mišić, VB Mišić, H Kang,"Quantitative Comparison of Two Chain-Selection Protocols under Selfish Mining Attack",IEEE Transactions on Network and Service Management,2022. (比特幣 以太坊 攻擊分析)
  • V Mišić, J Mišić, X Chang,"Reducing the number of transaction messages in bitcoin", Peer-to-Peer Networking and Applications,2022. (比特幣 以太坊 攻擊分析)
  • L Jiang, X Chang, J Mišić, VB Mišić, J Bai,"Understanding MEC empowered vehicle task offloading performance in 6G networks", Peer-to-Peer Networking and Applications, 2022.
  • J. Misic, V. Misic, X. Chang,et al, "Optimal multi-tier clustering of permissioned blockchain systems for IoT",IEEE Transactions on Vehicular Technology, 2022. (PBFT 共識機制優化)
  • R. Yang, X. Chang,et al, "On Selfholding Attack Impact on Imperfect PoW Blockchain Networks",IEEE Transactions on Network Science and Engineering, 2021. (比特幣 以太坊 攻擊分析)
  • Y. Yao, X. Chang,et al, "LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X「 Ad Hoc Networks, 2021 ( 車聯網安全)
  • J. Bai, X. Chang,et al,"Resilience-Driven Quantitative Analysis of Vehicle Platooning Service「 IEEE Transactions on Vehicular Technology, 2021. ( 可信的端-邊-雲服務鏈)
  • H. Kang, X. Chang,et al, "Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks with Extended Forks「 IEEE Transactions on Network Service and Management, 2021 (區塊鏈-比特幣-機理量化分析)
  • Y. Zhang, X. Chang,et al, "Cost-effective Migration-based Dynamic Platform Defense Technique: A CTMDP Approach", Peer-to-Peer Networking and Applications, 2021. (主動安全防禦)
  • J. Misic, Vojislav Misic, X. Chang,et al, "Adapting PBFT for use with blockchain-enabled IoT systems「 IEEE Transactions on Vehicular Technology, 2020 (聯盟鏈 PBFT 共識機制)
  • Y. Wang, Shaohua lv, Jiqiang Liu, X. Chang, et al, "On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection「 CyberSecurity, 2021 ( 安全可靠的機器學習)
  • L. Li, X. Chang, J. Liu, et al, "Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles「 IEEE Transactions on Intelligent Transport System, 2021 ( 比特幣支付, 車聯網)
  • J. Bai, X. Chang,et al,"Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach「 IEEE Transactions on Cloud Computing, 2020 ( 可信安全的端-邊-雲服務)
  • J. Misic, Vojislav Misic, X. Chang,et al, "Performance of Bitcoin network with synchronizing nodes and a mix of regular and compact blocks「 IEEE Transactions on Network Science and Engineering, 2020 (區塊鏈-比特幣-機理量化分析)
  • R. Yang, X. Chang,et al, "Assessing Blockchain Selfish Mining in an Imperfect Network:Honest and Selfish Miner Views", Computers & Security, 2020. (比特幣 以太坊 攻擊分析)
  • L. Jiang, X. Chang,et al, "Model-based Comparison of Cloud-Edge Computing Resource Allocation Policies ", The Computer Journal, 2020 (可信安全的端-邊-雲服務)
  • L. Jiang, X. Chang,et al, "Dependability Analysis of 5G-AKA Authentication Service from Server and User Perspectives ", IEEE Access, 2020 (5G 認證服務分析)
  • Y. Yao, X. Chang,et al, "Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks", IEEE Transactions on Cognitive Communications and Networking, 2020. (雲邊, 5G, C-V2X安全)
  • Y. Zhang, X. Chang,et al, "Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification", IEEE Access, 2020. (惡意代碼智能檢測)
  • Z. Chen, X. Chang,et al, "Numerical evaluation of job finish time under MTD environment", IEEE Access, 2020. (主動安全防禦)
  • J. Bai, X. Chang,et al, "Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views", IEEE Access, 2020. (可信安全的端-邊-雲服務)
  • Y. Yao, X. Chang,et al, "Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing", IEEE Transactions on Vehicular Technology, 2020. (雲邊, 5G, C-V2X安全)
  • J. Misic, Vojislav Misic, X. Chang,et al, "Modeling of Bitcoin's blockchain delivery network「 IEEE Transactions on Network Science and Engineeringg, 2020 (區塊鏈-比特幣-機理量化分析)
  • V. Misic, Jelena Misic,X. Chang, "Data Lifetime Estimation in a Multicast-Based CoAP Proxy,",Open Journal of Internet of Things (OJIOT) 2020
  • L. Jiang, X. Chang,et al, "Performance Analysis of Hyperledger Fabric Platform: A Hierarchical Model Approach ", Peer-to-Peer Networking and Applications, 2020 (區塊鏈-HyperledgerFabric)
  • L. Li, Jiqiang Liu, X. Chang, Tianhao Liu, Jingxian Liu:Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 , 2020. (區塊鏈-比特幣 應用)
  • Y. Wang, Jiqiang Liu, Jelena Misic, Voj. Misic, X. Chang, "Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples", IEEE ACCESS, 2019. (安全可靠的機器學習)
  • R. Yang, X. Chang,et al, "Performance Modeling of Linux Network System with Open vSwitch", Peer-to-Peer Networking and Applications, 2019. (主動安全防禦)
  • Y. Yao, X. Chang,et al, "BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services", IEEE IoT Journal, 2019. (雲邊, 5G, C-V2X安全)
  • Y. Shi,, X. Chang,et al, "Quantitative security analysis of a dynamic network system under lateral movement-based attacks", Reliability Engineering & System Safety, 2019. (網絡安全態勢量化分析)
  • Y. Yao, X. Chang,et al, "Reliable and Secure Vehicular Fog Service Provision", IEEE IoT Journal, 2019. (雲邊, 5G, C-V2X安全)
  • Y. Yao, X. Chang,et al, "CLAM: Lightweight Certificateless Anonymous Authentication Mechanism for Vehicular Cloud Services", Cyber-Physical Systems, 2018. (雲邊, 5G, C-V2X安全)
  • B. Liu, X. Chang, Zhen Han, Kishor Trivedi, Ricardo J. Rodrgues, "Model-based Sensitivity Analysis of IaaS Cloud Availability", Future Generation Computer Systems, 2018. (可信安全的端-邊-雲服務)
  • Z. Chen, X. Chang, Zhen Han, Lin Li, "Survivability Modeling and Analysis of Cloud Service in Distributed Data", The Computer Journal, 2018. (可信安全的端-邊-雲服務)
  • X. Chang, et al, "Modeling and Analysis of High Availability Techniques in a Virtualized System", The Computer Journal, 2018. (可信安全的端-邊-雲服務)
  • X. Chang, R.F. Xia, J.K. Muppala, K.S. Trivedi, jiqiang Liu, "Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload", IEEE Transactions on Cloud Computing, 2018 (雲-邊服務量化分析)
  • X. Chang, Jose M. Martinez, Kishor S. Trivedi, "Transient Performance Analysis of Smart Grid with Dynamic Power Distribution", Information Sciences, 422: 98-10, 2018.
  • Guozhi zhang, Jiqiang Liu, X. Chang, et al, "Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content Centric Networking", IEEE ACCESS, 2017. (信息中心網絡)
  • Yang Yang, X. Chang, jiqiangliu ,lin Li, "Towards Robust Green Virtual Cloud Data Center Provisioning," IEEE Transactions on Cloud Computing, 5(2): 168-181, 2017. (雲-邊網絡切片、服務鏈)
  • X.Chang, Bin Wang, Jogesh K. Muppala, Jiqiang Liu: Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue. IEEE Trans. Services Computing 9(3): 408-420 (2016) (可信安全的端-邊-雲服務)
  • Bin Wang, X. Chang*, jiqiangliu , "Modeling Heterogeneous Virtual Machines on IaaS Data Centers", IEEE Communication Letter, 2015. (可信安全的端-邊-雲服務)
  • Bin Xing, Zhen Han, X. Chang, jiqiangliu , "OB-IMA: Out-of-the-Box Integrity Measurement Approach for Guest Virtual Machines", Concurrency and Computation: Practice and Experience, 2015. (可信計算)
  • X. Chang, et al., "Performance Evaluation of Artificial Intelligence Algorithms for Virtual Network Embedding," Engineering Applications of Artificial Intelligence, 2013. (雲-邊網絡切片、服務鏈)
  • X. Chang,and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services," Computer Communications,2006.
  • X. Chang,and J. K. Muppala, "A stable queue-based adaptive AQM mechanism," Computer Networks, 2006.
  • X. Chang, and J. K. Muppala, "On Improving Bandwidth Assurance in AF-based DiffServ Network Using a Control Theoretic Approach," Computer Networks, 2005.
  • Conference and Poster Publication
  • J Mišić, VB Mišić, X Chang,"Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting", IEEE GlobeCom,2022.(CCF C)
  • H Zhu, X Chang, et.al., "How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach", IEEE ICC,2022.(CCF C)
  • J Mišić, VB Mišić, X Chang,"Proof of Stake Voting in Multiple Entry PBFT System", IEEE ICC,2022.(CCF C)
  • V Mišić, J Mišić, X Chang,"Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems", IEEE ICC,2022.(CCF C)
  • J Wang, X Chang, et.al.,"Assessing Anonymous and Selfish Free-Rider Attacks in Federated Learning", IEEE ISCC,2022.(CCF C)
  • R Yang, X Chang, et.al.,"Evaluating fork after withholding (FAW) attack in Bitcoin", CF,2022.(CCF C)
  • H Kang, X. Chang, et. al, Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven, IEEE ICSOC 2021 (UAV) (CCF B)
  • J Wang, X Chang, J Mišić, VB Mišić, Y Wang, J Zhang,"Mal-LSGAN: An Effective Adversarial Malware Example Generation Model", IEEE GLOBECOM,2021.(CCF C)
  • VB Mišić, J Mišić, X Chang, "Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications",IEEE GLOBECOM,2021(CCF C)
  • Jelena V. Misic, Vojislav B. Misic, X. Chang, Trade-offs in large blockchain-based IoT system design, IEEE GLOBECOM 2021 (區塊鏈-比特幣-機理量化分析) (CCF C)
  • J. Wang, J. Zhang, Jelena V. Misic, Vojislav B. Misic, Yixiang, X. Chang, Mal-LSGAN: An Effective Adversarial Malware Example Generation Model, IEEE GLOBECOM 2021 (深度學習安全)(CCF C)
  • Jelena V. Misic, Vojislav B. Misic, X. Chang, Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications, IEEE GLOBECOM 2021 (區塊鏈-比特幣-機理量化分析)(CCF C)
  • Vojislav B. Misic, Jelena V. Misic, X. Chang, The Impact of Vote Counting Policy on the Performance of PBFT, IEEE CCECE 2021 (區塊鏈-比特幣-機理量化分析)
  • Jelena V. Misic,Vojislav B. Misic, X. Chang, Voting Control in Multiple Entry PBFT Blockchain Systems for IoT, IEEE CCECE 2021 (區塊鏈-比特幣-機理量化分析)
  • YingYingYao, Zhendong Zhao X. Chang, et.al, A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System . IEEE ICC 2021 (機器學習 隱私保護) (CCF C)
  • Jelena V. Misic, Vojislav B. Misic, X. Chang:A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording . IEEE ICC 2021 (區塊鏈-比特幣-機理量化分析) (CCF C)
  • Jelena V. Misic, Vojislav B. Misic, X. Chang:Multiple entry point PBFT for IoT systems. IEEE GLOBECOM 2020 (區塊鏈-比特幣-機理量化分析) (CCF C)
  • Vojislav B. Misic, Jelena V. Misic, X. Chang: Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin. IEEE GLOBECOM 2020 (區塊鏈-比特幣-機理量化分析) (CCF C)
  • Zhi Chen, X. Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang, Zhen Han: Model-based Perofrmance Evaluation of An Moving Target Defense System. IEEE GLOBECOM 2020 (網絡安全態勢量化分析)(CCF C)
  • Haoran Zhu, Jing Bai, X. Chang, et. al, 」Stochastic Model-based Quantitative Analysis of Edge UPF Service Dependability ", ICA3PP 2020. (移動邊緣計算)(CCF C)
  • Yang Yang, X. Chang, et. al, 」PIM-Assisted MEC 3C Resource Allocation for Computation Offloading」, ICA3PP 2020. (移動邊緣計算)(CCF C)
  • Jelana Misic, Vojislav Misic, X. Chang, et. al, 」Comparison of single- and multiple entry point PBFT for IoT blockchain systems ", IEEE VTC-fall 2020. (區塊鏈-比特幣-機理量化分析)(CCF C)
  • Jelana Misic, Vojislav Misic, X. Chang, et. al, 」On the Benefits of Compact Blocks in Bitcoin ", IEEE ICC 2020. (區塊鏈-比特幣-機理量化分析)(CCF C)
  • Hongyue Kang, Bo Liu, X. Chang,, et. al "Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks", IEEE ICNC 2020. (網絡安全態勢量化分析)
  • Runkai Yang, X. Chang,Vojislav Misic, Jelana Misic, et al, "Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF", IEEE GlobeCom 2019. (網絡安全態勢量化分析)(CCF C)
  • Jelena V. Misic, Vojislav B. Misic, X. Chang: On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. IEEE GLOBECOM 2019: 1-6 (區塊鏈-比特幣-機理量化分析) (CCF C)
  • Vojislav Misic, Jelana Misic, X. Chang 」On forks and fork characteristics in a Bitcoin-like distribution network", 2019 IEEE International Conference on Blockchain (區塊鏈-比特幣-機理量化分析)(CCF C)
  • Vojislav Misic, Jelana Misic, X. Chang 」Towards a Blockchain-Based Healthcare Information System", 2019 IEEE ICCC. (區塊鏈應用)
  • Bo Liu, X. Chang, et. al, "Evaluating Performance of Active Containers on PaaS Fog Under Batch Arrivals: A Modeling Approach," IEEE ISCC 2019.(CCF C)
  • Yixiang Wang, Jiqiang Liu, X. Chang, "Assessing Transferability of Adversarial Examples against Malware Detection Classifiers," IEEE CF 2019. (安全可靠的機器學習)(CCF C)
  • Jelana Misic, Vojislav Misic, X. Chang, et. al, 」Block delivery time in Bitcoin distribution network ", IEEE ICC 2019. (區塊鏈-比特幣-機理量化分析)(CCF C)
  • Yang Yang, X. Chang, et. al, 」 Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework」, ICSP 2018. (雲-邊網絡切片、服務鏈)(CCF C)
  • Guozhi Zhang, Jiqiang Liu, X. Chang, et. al, 」 Interest Relevance-Based Caching Design in Content-centric Networking」, ICA3PP 2018. (信息中心網絡)(CCF C)
  • Jelena Misic, Vojislav Misic, X. Chang, 」Kernel based estimation of domain parameters at IoT proxy「,IEEE GlobeCom 2018.(CCF C)
  • Vojislav Misic, Jelena Misic, X. Chang, 」Efficient traffic reduction in IoT domains using Bernoulli scheduling of proactive cache refresh「,IEEE GlobeCom 2018(CCF C)
  • X. Chang, et. al, 」Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System「,IEEE ICCCN 2018 (安全可靠的機器學習)(CCF C)
  • Bo Liu, X. Chang, et. al, "Performance Analysis Model for Fog Services under Multiple Resource Types," IEEE DSA 2017. (可信安全的端-邊-雲服務)
  • Lin Li, Yingying Yao, X. Chang, "Plaintext-dependent selective image encryption scheme based on chaotic maps and DNA coding",IEEE DSA 2017.
  • Harish Sukhwani1,Jose M. Martinez1, X.Chang, Kishor S. Trivedi,Andy Rindos,"Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)" IEEE SRDS 2017, poster. (區塊鏈- HyperledgerFabric) (CCF B)
  • Xiaodan Li, X.Chang, et al, "A Novel Approach for Software Vulnerability Classfication", IEEE RAMS 2017.
  • Zibo zhou, X.Chang, et al, "Resource-aware Virtual Network Parallel Embedding Based on Genetic Algorithm", IEEE PDCAT 2016. (雲-邊網絡切片、服務鏈)
  • T.J. Wang, X.Chang, et al, "Performability Analysis for IaaS Cloud Data Center", IEEE PDCAT 2016. (可信安全的端-邊-雲服務)
  • X.Chang, et al, "Model-based Survivability Analysis of a Virtualized System", IEEE LCN 2016. (網絡安全態勢量化分析) (CCF C)
  • Ricardo J. Rodrgues, X.Chang, Xiaodan Li, Kishor Trivedi, "Survivability Analysis of a Computer System under an Advanced Persistent Threat", Proc. Of the 3rd Workshop on Graphical Models for Security (GraMSec), @IEEE Computer Security Foundations Symposium. 2016. (網絡安全態勢量化分析)
  • Xuanni DU ,X.Chang, "Performance of AI Algorithms for Mining Meaningful Roles " IEEE WCCI-CEC, 2014
  • Yang Yang ,X.Chang, et al., "Effective and Efficient AI-based Approaches to Cloud Resource Provisioning" In Proc. IEEE ICON, 2013. (雲-邊網絡切片、服務鏈)
  • Wenbo wang,X.Chang, et al., "Simulated Annealing Based Resource Allocation for Cloud Data Centers" In Proc. GECCO, 2013. (雲-邊網絡切片、服務鏈)
  • X.Chang, et al., "Green Cloud Virtual Network Provisioning Based Ant Colony Optimization" In Proc. GECCO-GreenGEC 2013, . (雲-邊網絡切片、服務鏈)
  • X.Chang, et al., "Network State Aware Virtual Network Parallel Embedding"? In Proc. IEEE IPCCC 2012. (雲-邊網絡切片、服務鏈)(CCF C)
  • B. Wang, X.Chang, et al., "Reducing Power Consumption in Embedding Virtual Infrastructures" In Proc. IEEE Globecom Workshop ManSec 2012. (雲-邊網絡切片、服務鏈)
  • X.Chang, et al., "Migration Cost Aware Virtual Network Re-Embedding in Presence of Resource Failures" In Proc. IEEE ICON 2012. (雲-邊網絡切片、服務鏈)
  • X.M. Mi, X.Chang, et al., "Embedding Virtual Infrastructure Based on Genetic Algorithm" In Proc. IEEE PDCAT 2012. (雲-邊網絡切片、服務鏈)
  • X.Chang, et al., "Robust and Efficient Response to TCG TOCTOU Attacks In TPVM" In Proc. IEEE PDCAT 2012. (可信計算)
  • X.M. Mi, X.Chang, et al., "An Integrated Approach To Virtual Network EmbeddingWith Sharing Physical Nodes" In Proc. IEEE MINES 2012. (雲-邊網絡切片、服務鏈)
  • X.Chang, "ZRTP-based Trusted Transmission of VoIP Traffic and Formal Verification," In Proc. IEEE MINES 2012. (可信計算)
  • X.Chang, et al., "Defeating TCG TOCTOU Attacks In T" In Proc. IEEE MINES 2010. (可信計算)
  • X.Chang, Bin Xing, Jiqiang Liu, "LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack" In Proc. 28th IEEE IPCCC 2009. (可信計算)(CCF C)
  • X. Chang, " Analysis of Interrupt coalescing in? Gigabit Ethernet Networks」, In Proc. IEEE ICC 2008. (Linux )(CCF C)
  • X. Chang, Jogesh. K. Muppala, P.C Zou, and X.K. Li,"A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks」, In Proc. IEEE LCN 2007. (Linux )(CCF C)
  • X. Chang, Jogesh K. Muppala, P.C. Zou, Z.Y. Zheng, and X.K. Li, "A Queue-based Adaptive Approach to Improve System Performance in Gigabit Ethernet Networks,」 In Proc. 26 IEEE IPCCC 2007 (Linux )(CCF C)
  • X. Chang, X. Lin and J. K. Muppala,"A Control-Theoretic Approach to Improving Fairness in DCF Based WLANs," In Proc. 25th IEEE IPCCC, 2006.(CCF C)
  • X. Chang, and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services,」 In Proc. 24th IEEE IPCCC,2005.(CCF C)
  • X. Chang, and J. K. Muppala,"Applying Adaptive Virtual Queue to Improve the Performance of the Assured Forwarding Service," In Proc. IEEE ICC,2005.(CCF C)
  • X. Chang, X. Lin and J. K. Muppala, "An Adaptive Queue Management Mechanism for Improving TCP Fairness in the Infrastructure WLAN," In Proc. 16th Ann. International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2005), Berlin, Germany, Sep. 2005.(CCF C)
  • X. Lin, X. Chang, and J. K. Muppala,"VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN," In Proc. 5th International IEEE Workshop on Wireless Local Networks (WLN 2005), Sydney, Australia, Nov. 2005.
  • X. Chang, and J. K. Muppala, "A Robust Nonlinear PI Controller for Improving AQM Performance," In Proc. IEEE ICC,2004. (CCF C)
  • X. Chang, and J. K. Muppala, "An Integral Sliding Mode based AQM for Stable Queue Length," In Proc. IEEE GLOBECOM, 2004.(CCF C)
  • X. Chang, and J.K. Muppala, "A Robust PI Controller for Improving Performance in the AF-based Differentiated Services Network," In Proc. 23rd IEEE IPCCC,2004. (CCF C)
  • X. Chang, and J. K. Muppala, "Adaptive Marking Threshold for Improving Performance of Assured Forwarding Services (based on local knowledge)," In Proc. IEEE Globecom, 2003.(CCF C)
  • X. Chang, and J. K. Muppala,"Adaptive Marking Threshold for Assured Forwarding Services (based on router cooperation)," In Proc. IEEE ICCCN, 2003.(CCF C)
  • S. Qing, X. Chang,J.Zhang,"Design and implementation of Secure e-commerce protocol iKPI," In Proc. 1st CCICS, 1999.

中文論文

  • 王建華;黎琳;趙鎮東;常曉林;王愛麗;劉宇;耿欣 ,『一種基於全同態加密算法的神經網絡預測方案』, 人工智能, 2022. (安全可靠的機器學習)
  • 張嘉楠, 常曉林 ,et al, "深度學習的對抗攻擊方法綜述",網絡空間安全, 2020. (安全可靠的機器學習)
  • 趙鎮東, 常曉林 ,et al, "深度學習對抗樣本的防禦方法綜述", 網絡空間安全, 2020. (惡意代碼智能檢測)
  • 趙鎮東, 常曉林 et al, "機器學習中的隱私保護綜述", 信息安全學報, 2019. (安全可靠的機器學習)
  • Yutong Cai, 常曉林 ,et al, "動態平台技術防禦攻擊的瞬態效能量化分析",信息安全學報, 2019. (目標移動防禦)
  • 邢 彬, 韓 臻, 常曉林, 劉吉強, "基於虛擬機監控技術的可信虛擬域", 信息安全學報,2016. (可信計算)
  • 常曉林 , 馮登國, Sihan Qing, "A Single Sign on Protocol for Multiple Servers," 軟件學報, China, 2002.

專利

  • 第一發明人專利
  • 基於TPM的可信Web網頁的實現方法 常曉林
  • 一種響應Xen客戶硬件虛擬域可信計算TOCTOU攻擊的方法 常曉林
  • 一種可擴展的可信SSH的實現方法 常曉林
  • 一種遠程動態驗證客戶端軟件完整性的方法 常曉林
  • 一種保護平台信息的可信QpenSSH的實現方法 常曉林
  • 一種有效的可信OpenSSH的實現方法 常曉林
  • 一種基於可信計算實現可信SSH的方法 常曉林
  • 一種響應TOCTOU攻擊的輕量級方法 常曉林
  • 完整性度量技術在可信虛擬域無縫運行的方法 常曉林
  • 一種針對TPM可信計算的TOCTOU攻擊響應方法 常曉林
  • 自適應的保障可信客戶虛擬域正常啟動的方法 常曉林

獲獎情況

R&D Awards

Ministry of Education Science and Technology Progress Award(The First Class in 2010 )- , P.R. China 教育部科技進步一等獎

National Science and Technology Progress Award (The Second Class in 2000 )- MOST, P.R. China, 國家科技進步二等獎

Science and Technology Progress Award (The Second Class in 1997, The first Class in 1999)- CAS, P.R. China, 中科院科技進步一等獎,二等獎

社會兼職

國際會議program committee member:

2020: PRDC, ISPA, ISSRE WoSAR, Globecom

研究成果

  • (1)移動目標防禦的機理分析
  • (2)網絡系統安全度量方法的研究
  • (3)網絡虛擬資源和雲數據中心虛擬資源分配
  • (4)基於隨機演化模型的智能電網的可生存分析
  • (5)大規模異構雲計算中心IaaS服務的性能與可用性分析[1]

參考資料