Research
Research interests include:
- Hardware Security: Hardware Trojan detection.
- Artificial Intelligence Security: Robust/Secure/Private AI systems, including training set poisoning; backdoor in the training set; adversarial examples; model theft; recovery of sensitive training data.
- Internet of things security; AIoT Security.
I have published 36 papers in security related journals and international conferences, including IEEE Transactions on Dependable and Secure Computing (CCF A), Computers & Security (CCF B), IEEE Transactions on Vehicular Technolgy, Journal of Information Security and Applications (CCF C), Security and Communication Networks (CCF C), Peer-to-Peer Networking and Applications (CCF C), IET Computers & Digital Techniques, IEEE Access, Chinese Journal of Computers (CCF Chinese A), Acta Electronica Sinica (CCF Chinese A), and so on. In addition, another 5 papers are under review.
I have also published 1 Book, 8 Patents, and
4 Software Copyrights.
Recent Publications:
2020:
1. One-to-N & N-to-One: Two Advanced Backdoor Attacks against Deep Learning Models. IEEE Transactions on Dependable and Secure Computing. 2020, Early access. DOI : 10.1109/TDSC.2020.3028448 . SCI, CCF A, IF 6.864
2. LOPA: A Linear Offset Based Poisoning Attack Method Against Adaptive Fingerprint Authentication System. Computers & Security. 99, 2020, 102046, pp.1-13. SCI, CCF B, IF 3.579
3. NaturalAE: Natural and robust physical adversarial examples for object detectors. Journal of Information Security and Applications. 57 (2021) 102694, 1-12. SCI, CCF C, IF 2.327
4. Backdoors Hidden in Facial Features: A Novel Invisible Backdoor Attack against Face Recognition Systems. Peer-to-Peer Networking and Applications. 2020, pp.1-17, DOI:10.1007/s12083-020-01031-z. SCI, CCF C, IF 2.793
5. Ten years of hardware Trojans: a survey from the attacker's perspective. IET Computers & Digital Techniques. 2020, Vol. 14, Iss. 6, pp. 231-246. SCI
6. DPAEG: A Dependency Parse Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Security and Communication Networks. 2020, Volume 2020, Article ID 5890820:1-15. SCI, CCF C
7. Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access, 2020, Vol 8, pp. 74720-74742. SCI
8. Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2020. EI, CCF C
9. Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems. ACM TURC'20: Proceedings of the ACM Turing Celebration Conference - China. May 2020, Pages 231–235. EI, Selected for extension to journals.
ArXiv (Preprint), 2020:
1. SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. arXiv:2011.13560 (2020)
2. 3D Invisible Cloak. arXiv:2011.13705 (2020)
3. DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations. arXiv:2011.13564 (2020)
4. Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. arXiv:2011.13696 (2020)
2019 and earlier:
Please refer to
Google Scholar, and so on.
Biography
- 2014/5 – now, College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Faculty
- 2011/7 - 2012/7, School of electrical and electronic engineering, Nanyang Technological University, Singapore, Research intern, Supvisor: Prof. Chang Chip-Hong, IEEE Fellow
- 2010/9 - 2014/4, Information and Communication Engineering (Information security), Southeast University, Ph.D, Supvisor: Prof. Hu Aiqun
- 2008/9 - 2010/7, Information and Communication Engineering (Information security), Southeast University, Master, Supvisor: Prof. Hu Aiqun
- 2004/9 - 2008/7, Electronic and Information Engineering, Southwest Jiaotong University, Bachelor
(Special Grade Scholarship for 4 times)
Projects/Fundings in Charge
- National Natural Science Foundation of China;
- National Key Research and Development Program Strategic High Technology
Key Special Project;
- CCF - VENUSTECH Hongyan research plan funding (Only 16 people won that award);
- CCF - NSFOCUS Kunpeng research plan funding (Only 11 people won that award);
- Natural Science Foundation of Jiangsu Province;
- Project of Institute of Chinese Aerospace 503;
- Chinese Postdoctoral Science Foundation;
- Jiangsu Province Postdoctoral Science Foundation;
- Open Project Foundation of Information Technology Research Base of Civil Aviation Administration of China;
- The Fundamental Research Funds for the Central Universities;
- Three Teaching Projects;
Professional services
- Committee member of the Chinese Artificial Intelligence and Security Professional Committee;
- Executive Committee Member of ACM Nanjing branch;
- Committee member of Computer network and distributed computing Specialized Committee of Jiangsu Province;
- Program Chair of the 3rd Chinese Symposium on Hardware Security;
- ACM member, IEEE member, IEICE member, CCF member;
Technical Program Committee (TPC)
- 2015: ICCCS2015;CBD2015;
- 2016: CBD2016;
- 2017: IEEE GLOBECOM2017;
- 2018: IEEE GLOBECOM2018;CBD2018;IEEE COMNETSAT2018;全国硬件安全论坛;
- 2019: IEEE GLOBECOM2019;IEEE COMNETSAT2019;IEEE GCC2019;IEEE MENACOMM'19;SSCC-2019;3ICT'19;CFTC2019;ICCCN2019-BDMLS workshop;CBD 2019;SSCC-CIS-2019;
- 2020: ICCCN-BDMLS workshop2020;CCF CTC2020;CBD2020;ACM TURC 2020;3ICT2020;Globecom2020; ATS 2020
Reviewer
Journal:
- IEEE Transactions on Information Forensics & Security;
- IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;
- IEEE Transactions on Circuits and Systems I: Regular Papers.
- IEEE Transactions on Emerging Topics in Computing;
- IEEE Access;
- ACM Journal on Emerging Technologies in Computing Systems;
- IET Computers & Digital Techniques;
- IET Cyber-Physical Systems: Theory & Applications;
- Computers and Security;
- Journal of Information Security and Applications;
- Integration, the VLSI Journal ;
- Peer-to-Peer Networking and Applications ;
- China Communications;
- International Journal of Distributed Sensor Networks;
- Journal of Semiconductors;
- IETE Journal of Research;
- Information Security Journal: A Global Perspective ;
- International Journal of Automation and Computing ;
- Software: Practice and Experience ;
- 国家自然科学基金 ( 面上、青年 ) ;
- 计算机学报;
Conferences:
- 2013: IEEE WCNC;
- 2015: ICCCS2015, CBD2015;
- 2016: CHES2016, CBD2016;
- 2017: IEEE ISCAS2017, IEEE MWSCAS2017, IEEE ASAP2017, ISPACS2017, CBD2017,IEEE GLOBECOM2017;
- 2018: IEEE GLOBECOM2018, IEEE MWSCAS2018, CBD2018;
- 2019: IEEE ISCAS2019; ISVLSI 2019; IEEE MWSCAS 2019; CFTC2019; IEEE MENACOMM'19; ICCCN2019-BDMLS workshop; MLICOM 2019; IEEE Globecom2019; IEEE COMNETSAT 2019; CBD 2019; 3ICT'19;SSCC-2019;
- 2020: ISCAS2020; ICCCN-BDMLS workshop2020; ACM TURC 2020; CCF CTC2020; Globecom2020; CBD2020; AJCAI2020; 3ICT2020;ATS 2020;

|