常晓林

博士、教授、安全可信智能计算研究室主任

基本信息

办公电话: 电子邮件: xlchang@Bjtu.edu.cn
通讯地址: 邮编:

工作经历

香港科技大学所获得博士学位,2007年加入北京交通大学计算机与信息技术学院。曾在中科院软件所和公司从事网络协议和产品以及安全操作系统的研究、设计和开发。获中国科学院科技进步奖一等奖和二等奖、国家科技进步奖二等奖(计算机网络安全关键技术研制与产品开发)和教育部科技进步一等奖(基于虚拟化技术的可信网络终端系统)、2018年IEEE GLOBECOM (CCF C )最佳论文奖、2021年ICSOC (CCF B )最佳短文奖、2021年华夏建设科学技术二等奖(基于国产密码算法的城市物联网密钥管理系统)、2023年中国发明协会发明创业奖创新奖二等奖(智能网联汽车信息安全关键技术及产业化)、、2024年中国发明协会发明创业奖创新奖二等奖(车载电池与充电设施交工条件下的安全预警方法与故障诊断关键技术及应用)。主持或参加的项目包括国务院信息办重点攻关项目、863项目、中国科学院重大科研项目、欧洲第六框架计划项目、教育部博士点基金、北京自然基金、国家自然基金、国家重点研发等。已在IEEE TDSC、IEEE TSC、IEEE TCC、IEEE TITS、IEEE TVT、IEEE IoT 等领域国际顶级期刊和国际会议上发表论文180余篇。作为第一发明者授权专利有20余项。是多个国际学术期刊的审稿人和国际会议的程序委员,担任中国科学院信工所客座研究员,担任国家自然科学基金和国家重点研发的评审专家以及加拿大自然科学、加拿大工程研究协会(NSERC)基金的海外评审专家,担任IEEE IoTJ Editor.



研究方向

(1)  安全、可信、高效、绿色的分布式系统 元宇宙、云原生服务、端边云服务 规模化块链度量和评估方法、机制和系统研制)      

(2)  积极防御机理分析和系统研制

(3)  数据库透明加密、安全代理、多级访问控制

(4)  安全可证明的区块链共识机制 

(5) 安全可信的智能学习、机密计算   

      


国际合作: 

  Dr. Kishor Trivedi,    Dr. Jianying Zhou    Dr. Jelena Misic,   Dr. Vojislav Misic,    Dr. Ricardo J. Rodríguez

  Dr. Distefano Salvatore,     Dr. Scarpa Marco,    Dr. Fumio Machida,


博士: 

在读:

   康鸿月,王建华,朱颢然,吴兴华韩丽娜,巩艳伟,范俊超

已毕业:   

   白晶(国际关系学院), 杨润垲(京东区块链研究院), 姜丽丽(电信研究院), 陈志(航天二院), 杨扬(铁科院),邢彬,刘博,      张国治(西北师范),姚英英 (北交大)


专利: 

    1. 一种用户可信的机密虚拟机服务的实现方法和系统

    2. 一种面向ZYNQ SoC的FPGA可信执行环境构建方法

    3. 一种基于深度强化学习的大规模城市应急物资分配方法

    4. 面向MEC环境的基于OAuth2.0的单点登录机制

    5. 基于区块链辅助的车载雾数据轻量级匿名接入认证方法

    6. 基于TPM的可信Web网页的实现方法

    7.完整性度量技术在可信虚拟域无缝运行的方法

    8.动态透明的虚拟可信平台模块的实现方法

    9.支持零宕机的可信虚拟域启动文件完整性度量的方法


研究方向

  • 网络安全
  • 网络与信息安全
  • 软件工程
  • 人工智能

招生专业

  • 网络空间安全硕士
  • 网络空间安全博士
  • 网络与信息安全硕士
  • 软件工程硕士
  • 软件工程博士
  • 人工智能博士
  • 网络与信息安全博士

科研项目


  • 网络安全攻防靶场关键技术研究,2024-2025
  • 车网互动智能算法数据安全防御技术, 2024-2025
  • 中国铁路云架构及基础设施能力构建深化研究
  • 红果园省部级"企事业"(新): 应急响应服务, 2024-2024
  • 红果园省部级"企事业"(新): 隐私计算平台安全测试工具性能测试, 2023-2024
  • 红果园国家级“科技委”: XXX数据安全关键技术研究, 2022-2024
  • 红果园省部级"企事业"(新): 区块链网络体系架构及区块链模拟系统研究技术服务, 2023-2024
  • 国家自然科学基金“面上”: 大规模联盟链共识算法效能分析及优化, 2023-2026
  • 北京市自然基金“面上”: 区块链激励共识机制效能量化分析技术, 2022-2023
  • 铁路总公司(原铁道部): 面向多层域轨道交通“四网融合”的数据治理和可信交互关键技术研究(2), 2021-2025
  • 国家重点研发计划-任务: 多系统要素协同的韧性城市自适应规划决策技术, 2020-2024
  • 国家(工信部等)专项: 移动边缘计算MEC网络安全防护技术, 2020-2021
  • 国家自然科学基金“联合基金项目”: 动静协同的恶意代码智能分析方法研究, 2019-2021
  • 国家重点研发计划: 关键信息技术产品和服务网络安全审查关键技术研究, 2016-2019
  • 北京交通大学: 信息云大数据分析系统, 2016-2016
  • 国家自然科学基金“面上”: 面向异构云计算中心IaaS服务的性能分析模型, 2016-2019
  • 红果园: 基于云计算的涉密信息系统安全保密测评与检查能力建设, 2013-2014
  • 北京市自然基金: 收益驱动的多虚拟网络嵌入和虚拟网络资源再分配技术研究, 2012-2013
  • 教育部: 面向电子病历共享系统的安全与隐私保护技术研究, 2012-2013
  • 基于可信计算的涉密终端安全防护技术的研究
  • 红果园: 可信计算密码平台, 2009-2010
  • 科技部“863”: 虚拟个人计算机系统的可信支撑技术研究, 2008-2009
  • 科技部“863”: 可信计算平台信任链建立关键技术, 2007-2009


教学工作

  • 本科生: (1)计算机网络原理  (2) 计算机与网络安全(信息安全、保密技术专业基础课)
  • 研究生/博士:可靠安全系统的分析方法

论文/期刊


Journal Publications

  1. Y. Gong, X. Chang,  et al, "Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods“ CyberSecurity, 2024. 
  2. H. Zhu, X. Chang,et al,'Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network'IEEE Transactions on Network Science and Engineering, 2024.
  3. Y. Wang, X. Chang, et al,'Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC' , IEEE TC, 2024.
  4. J Wang, X. Chang , et al. 'PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning’ IEEE IoT. 2024 (安全机器学习安全,中科院一区)
  5. J Wang, X. Chang , et al. 'PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack’ IEEE IoT. 2024 (安全机器学习安全,中科院一区)
  6. J Bai, X Chang,  et al,"Impact of Service Function Aging on the Dependability for MEC Service Function Chain", IEEE Trans. Dependable and Secure Computing, 2023  (可信安全的端-边-云服务,中科院一区).
  7. H Qushtom, J V. Misic, VB. Misic, X. Chang 'A Two-Stage PBFT Architecture with Trust and Reward Incentive Mechanism’ IEEE IoT. 2023 (区块链,中科院一区)
  8. J Bai, X Chang,  et al,"Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach", to be published in IEEE Trans. Vehicular Technology.  (可信安全的端-边-云服务,中科院二区).
  9. J Bai, X Chang,  et al,"Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT", to be published in IEEE Trans. Cloud Computing.  (可信安全的端-边-云服务,,中科院二区).
  10. Y Li, L Li, X Chang, et al, 'Availability and Reliability of Service Function Chain: A Quantitative Evaluation View', International Journal of Computational Intelligence Systems, 2023,  (可信安全的端-边-云服务,中科院四区).
  11. J Bai, X Chang,  et al,"Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT", to be published in IEEE Trans. Services Computing.  (可信安全的端-边-云服务,中科院一区).
  12. J Bai, X Chang,  et al,"Towards UAV-based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach",  IEEE Trans. Vehicular Technology, 2023 (可信安全的端-边-云服务,中科院二区).
  13. H. kang, X Chang,  et al,"Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach", IEEE IoT Journal, 2023 (云边端-UAV, 5G, C-V2X安全)
  14. V Mišić, J MišićX Chang,  et al,"A Two-Stage PBFT Architecture with Trust and Reward Incentive Mechanis"IEEE IoT Journal, 2023 (区块链,中科院一区 )
  15. Y. Yao, X. Chang,et al, "Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks", IEEE Access, 2022. (云边, 5G, C-V2X安全)
  16. H Zhu, X Chang, et.al., "Revisiting FAW attack in an imperfect PoW blockchain system", Peer-to-Peer Networking and Applications,2022.(区块链安全,中科院三区
  17. H Qushtom, J V. Misic, VB. Misic, X. ChangEfficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment’ IEEE Trans. Green Commun. Netw. (2022) (物联网联盟链,,中科院三区)
  18. H Qushtom, J Mišić, VB Mišić, X Chang, et.al., "A high performance two-layer consensus architecture for blockchain-based IoT systems", Peer-to-Peer Networking and Applications,2022.区块链安全,中科院三区
  19. J Fan, X Chang, et.al., "DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logisticsm", Peer-to-Peer Networking and Applications,2022.区块链安全,中科院三区
  20. X. Chang,et al, "Job Completion Time under Migration-based Dynamic Platform Technique", IEEE Trans. Services Computing, 2022.  (主动安全防御,中科院一区)
  21. S Tong, Y Liu, J Mišić, X. Changet al, "Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution based Collaborative Fog Computing Model", to be published in IEEE Trans. Vehicular Technology可信安全的端-边-云服务,中科院二区)
  22. S Tong, Y Liu, J Mišić, X. Changet al, "Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm", to be published in IEEE Transactions on Intelligent Transportation Systems. 可信安全的端-边-云服务,中科院一区) 
  23. J. Misic, V. Misic, X. Chang,et al, "Optimal multi-tier clustering of permissioned blockchain systems for IoT", IEEE Trans. Vehicular Technology, 2022.  (PBFT 共识机制优化,中科院二区)
  24. J. Misic, V. Misic, X. Chang,et al, "Design of Proof-of-Stake PBFT Algorithm for IoT EnvironmentsIEEE Trans. Vehicular Technology, 2022.  (PBFT 共识机制优化,,中科院二区)
  25. J. Misic, V. Misic, X. Chang,et al, "Scalable Self-Sovereign Identity Architecture“ IEEE Network, 2022  (信任管理,中科院一区)
  26.  V Mišić, J Mišić, X Chang,"Reducing the number of transaction messages in bitcoin", Peer-to-Peer Networking and Applications,2022.   (比特币 以太坊 攻击分析,中科院三区)
  27. Y. Wang, Jiqiang Liu, X. Chang, et al,"DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks",Information Sciences,2022.(安全可靠的机器学习)
  28. Y. Wang, Jiqiang Liu, X. Chang, et al,"AB-FGSM: AdaBelief Optimizer and FGSM-Based Approach to Generate Adversarial Examples", Journal of Intelligent System,2022.(安全可靠的机器学习,中科院一区)
  29. Wen Wang; Xiaofeng Peng; Ye Yang; Chun Xiao; Shuai Yang; Mingcai Wang; Lingfei Wang; Yanling Wang; Lin Li; X. Chang, 'Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment", IEEE Access, 2022.  (充电桩安全分析)
  30. H. Kang, X. Chang,et al, "Improving Dual-UAV Aided Ground-UAV Bi-directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization", IEEE Trans. Vehicular Technology, 2022.  (无人机安全通信,中科院二区)
  31. R. Yang, X. Chang, et al, "Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach",  The Computer Journal, 2022  (主动安全防御,中科院四区)
  32. R Yang, X Chang, J Mišić, VB Mišić, H Kang,"Quantitative Comparison of Two Chain-Selection Protocols under Selfish Mining Attack",IEEE Transactions on Network and Service Management,2022  (比特币 以太坊 攻击分析,中科院二区)
  33. J Bai, X Chang,  et al,"Quantitative Understanding Serial-Parallel Hybrid SFC Services: A Dependability Perspective", Peer-to-Peer Networking and Applications,2022 (可信安全的端-边-云服务,中科院三区).
  34. L Jiang, X Chang, J Mišić, VB Mišić, J Bai,"Understanding MEC empowered vehicle task offloading performance in 6G networks", Peer-to-Peer Networking and Applications, 2022. (中科院三区
  35. R. Yang,  X. Chang,et al, "On Selfholding Attack Impact on Imperfect PoW Blockchain Networks",IEEE Transactions on Network Science and Engineering, 2021.  (比特币 以太坊 攻击分析,中科院二区)
  36. Y. Yao, X. Chang,et al, "LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X“ Ad Hoc Networks, 2021  ( 车联网安全,中科院二区)
  37. J. Bai, X. Chang,et al,"Resilience-Driven Quantitative Analysis of Vehicle Platooning Service“  IEEE Transactions on  Vehicular Technology, 2021.  ( 可信的端-边-云服务链,中科院二区)
  38. H. Kang, X. Chang,et al, "Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks with Extended ForksIEEE Transactions on  Network Service and Management, 2021  (区块链-比特币-机理量化分析,中科院二区)
  39. Y. Zhang,  X. Chang,et al, "Cost-effective Migration-based Dynamic Platform Defense Technique: A CTMDP Approach",  Peer-to-Peer Networking and Applications, 2021.  (主动安全防御,中科院三区)
  40. J. Misic, Vojislav Misic, X. Chang,et al, "Adapting PBFT for use with blockchain-enabled IoT systems“ IEEE Transactions on  Vehicular Technology, 2020  (联盟链 PBFT 共识机制,中科院二区)
  41. Y. Wang, Shaohua lv, Jiqiang Liu, X. Chang,  et al, "On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection“ CyberSecurity, 2021  ( 安全可靠的机器学习)                        
  42. L. Li, X. Chang, J. Liu, et al, "Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles“ IEEE Transactions on Intelligent Transport System, 2021  ( 比特币支付, 车联网,中科院一区)
  43. J. Bai, X. Chang,et al,"Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach“ IEEE Transactions on Cloud Computing, 2020  ( 可信安全的端-边-云服务,中科院二区) 
  44. J. Misic, Vojislav Misic,   X. Chang,et al, "Performance of Bitcoin network with synchronizing nodes and a mix of regular and compact blocks“ IEEE Transactions on Network Science and Engineering, 2020  (区块链-比特币-机理量化分析,中科院二区) 
  45. R. Yang,  X. Chang,et al, "Assessing Blockchain Selfish Mining in an Imperfect Network:Honest and Selfish Miner Views", Computers & Security, 2020 (比特币 以太坊 攻击分析,中科院二区)
  46. L. Jiang,  X. Chang,et al, "Model-based Comparison of Cloud-Edge Computing Resource Allocation Policies ", The Computer Journal, 2020   (可信安全的端-边-云服务,中科院四区)
  47. L. Jiang,  X. Chang,et al, "Dependability Analysis of 5G-AKA Authentication Service from Server and User Perspectives ", IEEE Access, 2020  (5G 认证服务分析)
  48. Y. Yao, X. Chang,et al, "Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks", IEEE Transactions on Cognitive Communications and Networking, 2020 (云边, 5G, C-V2X安全,中科院二区)
  49. Y. Zhang,  X. Chang,et al, "Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification", IEEE Access, 2020.  (恶意代码智能检测,中科院三区)
  50. Z. Chen,  X. Chang,et al, "Numerical evaluation of job finish time under MTD environment", IEEE Access, 2020.  (主动安全防御,中科院三区)
  51. J. Bai,  X. Chang,et al, "Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views", IEEE Access, 2020.   (可信安全的端-边-云服务,中科院三区)
  52. Y. Yao, X. Chang,et al, "Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing", IEEE Transactions on Vehicular Technology, 2020.  (云边, 5G, C-V2X安全,中科院二区)
  53. J. Misic, Vojislav Misic, X. Chang,et al, "Modeling of Bitcoin's blockchain delivery network“ IEEE Transactions on Network Science and Engineeringg, 2020  (区块链-比特币-机理量化分析,中科院二区)
  54.  V. Misic, Jelena Misic,X. Chang, "Data Lifetime Estimation in a Multicast-Based CoAP Proxy,",Open Journal of Internet of Things (OJIOT) 2020
  55. L. Jiang,  X. Chang,et al, "Performance Analysis of Hyperledger Fabric Platform: A Hierarchical Model Approach ", Peer-to-Peer Networking and Applications, 2020  (区块链-HyperledgerFabric,中科院三区)
  56. L. Li, Jiqiang Liu, X. Chang, Tianhao Liu, Jingxian Liu:Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 , 2020. (区块链-比特币 应用,中科院一区)
  57. Y. Wang, Jiqiang Liu, Jelena Misic,  Voj. Misic, X. Chang,   "Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples", IEEE ACCESS, 2019.   (安全可靠的机器学习,中科院三区)
  58. R. Yang,  X. Chang,et al, "Performance Modeling of Linux Network System with Open vSwitch", Peer-to-Peer Networking and Applications, 2019 (主动安全防御,中科院三区)
  59. Y. Yao, X. Chang,et al, "BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services", IEEE IoT Journal, 2019.  (云边, 5G, C-V2X安全,中科院一区)
  60. Y. Shi,, X. Chang,et al, "Quantitative security analysis of a dynamic network system under lateral movement-based attacks", Reliability Engineering & System Safety, 2019.  (网络安全态势量化分析,中科院二区)
  61. Y. Yao, X. Chang,et al, "Reliable and Secure Vehicular Fog Service Provision", IEEE IoT Journal, 2019. (云边, 5G, C-V2X安全,中科院一区)
  62. Y. Yao, X. Chang,et al, "CLAM: Lightweight Certificateless Anonymous Authentication Mechanism for Vehicular Cloud Services", Cyber-Physical Systems, 2018. (云边, 5G, C-V2X安全)
  63. B. Liu, X. Chang, Zhen Han, Kishor Trivedi, Ricardo J. Rodrgues, "Model-based Sensitivity Analysis of IaaS Cloud Availability", Future Generation Computer Systems, 2018.   (可信安全的端-边-云服务,中科院二区)
  64. Z. Chen, X. Chang, Zhen Han, Lin Li, "Survivability Modeling and Analysis of Cloud Service in Distributed Data", The Computer Journal, 2018.   (可信安全的端-边-云服务,中科院四区)
  65. X. Chang, et al, "Modeling and Analysis of High Availability Techniques in a Virtualized System",  The Computer Journal, 2018  (可信安全的端-边-云服务,中科院四区)
  66. X. ChangR.F. Xia,  J.K. Muppala, K.S. Trivedi,  jiqiang Liu, "Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload",  IEEE Transactions on Cloud Computing, 2018   (云-边服务量化分析,中科院)
  67. X. ChangJose M. Martinez, Kishor S. Trivedi, "Transient Performance Analysis of Smart Grid with Dynamic Power Distribution"Information Sciences, 42298-10, 2018. 
  68. Guozhi zhang, Jiqiang Liu, X. Chang,   et al,  "Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content Centric Networking", IEEE ACCESS, 2017 (信息中心网络)
  69. Yang Yang, X. Chang, jiqiangliu ,lin Li, "Towards Robust Green Virtual Cloud Data Center Provisioning," IEEE Transactions on Cloud Computing, 5(2)168-181, 2017. (云-边网络切片、服务链,中科院)
  70. X.ChangBin WangJogesh K. MuppalaJiqiang LiuModeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue. IEEE Trans. Services Computing 9(3)408-420 (2016)  (可信安全的端-边-云服务,中科院一区)
  71. Bin Wang, X. Chang*, jiqiangliu ,  "Modeling Heterogeneous Virtual Machines on IaaS Data Centers",  IEEE Communication Letter, 2015.  (可信安全的端-边-云服务,中科院二区
  72. Bin Xing, Zhen Han, X. Chang, jiqiangliu ,  "OB-IMA: Out-of-the-Box Integrity Measurement Approach for Guest Virtual Machines",  Concurrency and Computation: Practice and Experience,   2015.  (可信计算)
  73. X. Chang, et al.,  "Performance Evaluation of Artificial Intelligence Algorithms for Virtual Network Embedding," Engineering Applications of Artificial Intelligence, 2013.   (云-边网络切片、服务链,中科院二区)
  74. X. Chang,and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services," Computer Communications,2006.
  75. X. Chang,and J. K. Muppala, "A stable queue-based adaptive AQM mechanism,"  Computer Networks, 2006.
  76. X. Chang, and J. K. Muppala, "On Improving Bandwidth Assurance in AF-based DiffServ Network Using a Control Theoretic Approach," Computer Networks, 2005.


Conference and Poster Publication

  1. J. Wang, X Chang, et.al., "Towards Well-trained Model Robustness in Federated Learning: An Adversarial-Example-Generation-Efficiency Perspective", IEEE ICC,2024.(CCF C)
  2. H Zhu, X Chang, et.al., "On Dependability of Heterogeneous Distributed Oracle System in Blockchain", IEEE ICC,2024.(CCF C)
  3. Y. Gong, X Chang,"SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data", IEEE GlobeCom,2023.(CCF C)
  4. J Mišić, VB Mišić, X Chang,"PBFT with Gated Prioritized Block Cycles", IEEE ICC,2023.(CCF C)
  5. J Mišić, VB Mišić, E Amini, Z. Mohtajollah, X Chang,"Fast Cycle Multiple Entry PBFT Consensus",IEEE ICC,2023.(CCF C)
  6. Y. Yao, X Chang, et.al., "DIDs-assisted Secure Cross-metaverse Authentication Scheme for MEC-enabled Metaverse", IEEE ICC,2023.(CCF C)
  7. H Zhu, X Chang, et.al., "Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain", IEEE ICC,2023.(CCF C)
  8. M. Fu, X Chang, et.al., "Evaluating Checkpointing Capability Against Eclipse-Based Stake-Bleeding Attack in PoS Blockchain", ISPA 2022 .(CCF C)
  9. J Mišić, VB Mišić, X Chang,"Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting", IEEE GlobeCom,2022.(CCF C)
  10. H Zhu, X Chang, et.al., "How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach", IEEE ICC,2022.(CCF C)
  11. J Mišić, VB Mišić, X Chang,"Proof of Stake Voting in Multiple Entry PBFT System", IEEE ICC,2022.(CCF C)
  12. V Mišić, J Mišić, X Chang,"Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems", IEEE ICC,2022.(CCF C)
  13. J Wang, X Chang, et.al.,"Assessing Anonymous and Selfish Free-Rider Attacks in Federated Learning", IEEE ISCC,2022.(CCF C)
  14. R Yang, X Chang, et.al.,"Evaluating fork after withholding (FAW) attack in Bitcoin", CF,2022.(CCF C)
  15. H Kang, X. Chang, et. al, Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven,  IEEE  ICSOC 2021  (UAV)  (CCF B)
  16. J Wang, X Chang, J Mišić, VB Mišić, Y Wang, J Zhang,"Mal-LSGAN: An Effective Adversarial Malware Example Generation Model", IEEE GLOBECOM,2021.(CCF C)
  17. VB Mišić, J Mišić, X Chang, "Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications",IEEE GLOBECOM,2021(CCF C)
  18. Jelena V. Misic, Vojislav B. Misic, X. Chang, Trade-offs in large blockchain-based IoT system design,  IEEE  GLOBECOM 2021  (区块链-比特币-机理量化分析) (CCF C)
  19. J. Wang, J. Zhang, Jelena V. Misic, Vojislav B. Misic, Yixiang, X. ChangMal-LSGAN: An Effective Adversarial Malware Example Generation Model,  IEEE  GLOBECOM 2021  (深度学习安全)(CCF C)
  20. Jelena V. Misic, Vojislav B. Misic, X. ChangCoping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications,  IEEE  GLOBECOM 2021  (区块链-比特币-机理量化分析)(CCF C)
  21. Vojislav B. Misic, Jelena V. Misic, X. Chang, The Impact of Vote Counting Policy on the Performance of PBFT,  IEEE  CCECE 2021  (区块链-比特币-机理量化分析) 
  22. Jelena V. Misic,Vojislav B. Misic,  X. ChangVoting Control in Multiple Entry PBFT Blockchain Systems for IoT,  IEEE  CCECE 2021  (区块链-比特币-机理量化分析)
  23. YingYingYao, Zhendong Zhao X. Chang, et.al, A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System . IEEE ICC 2021  (机器学习 隐私保护) (CCF C)
  24. Jelena V. Misic, Vojislav B. Misic, X. Chang:A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording . IEEE  ICC 2021  (区块链-比特币-机理量化分析) (CCF C)
  25. Jelena V. Misic, Vojislav B. Misic, X. Chang:Multiple entry point PBFT for IoT systems.  IEEE  GLOBECOM 2020  (区块链-比特币-机理量化分析) (CCF C)
  26. Vojislav B. Misic, Jelena V. Misic, X. Chang: Making Transaction Propagation More Efficient: Deferred Transaction Relay in BitcoinIEEE  GLOBECOM 2020  (区块链-比特币-机理量化分析) (CCF C)
  27. Zhi Chen,   X. Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang, Zhen Han: Model-based Perofrmance Evaluation of An Moving Target Defense System. IEEE  GLOBECOM 2020  (网络安全态势量化分析)(CCF C)
  28. Haoran Zhu, Jing Bai, X. Chang, et. al, ”Stochastic Model-based Quantitative Analysis of Edge UPF Service Dependability ", ICA3PP 2020  (移动边缘计算)(CCF C)
  29. Yang Yang, X. Chang, et. al, ”PIM-Assisted MEC 3C Resource Allocation for Computation Offloading”, ICA3PP 2020(移动边缘计算)(CCF C)
  30. Jelana Misic, Vojislav Misic, X. Chang, et. al, ”Comparison of single- and multiple entry point PBFT for IoT blockchain systems ", IEEE VTC-fall 2020  (区块链-比特币-机理量化分析)(CCF C)
  31. Jelana Misic, Vojislav Misic, X. Chang, et. al, ”On the Benefits of Compact Blocks in Bitcoin ", IEEE ICC 2020  (区块链-比特币-机理量化分析)(CCF C)
  32. Hongyue Kang, Bo Liu, X. Chang,, et. al "Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks", IEEE ICNC 2020 (网络安全态势量化分析)
  33. Runkai Yang,  X. Chang,Vojislav Misic, Jelana Misic, et al, "Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF", IEEE GlobeCom 2019.  (网络安全态势量化分析)(CCF C)
  34. Jelena V. Misic, Vojislav B. Misic, X. Chang: On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. IEEE  GLOBECOM 2019: 1-6  (区块链-比特币-机理量化分析) (CCF C)
  35. Vojislav Misic, Jelana Misic, X. Chang ”On forks and fork characteristics in a Bitcoin-like distribution network", 2019 IEEE International Conference on Blockchain  (区块链-比特币-机理量化分析)(CCF C)
  36. Vojislav Misic, Jelana Misic, X. Chang ”Towards a Blockchain-Based Healthcare Information System", 2019 IEEE ICCC.  (区块链应用)
  37. Bo Liu, X. Chang, et. al, "Evaluating Performance of Active Containers on PaaS Fog Under Batch Arrivals: A Modeling Approach,"  IEEE ISCC 2019.(CCF C)
  38. Yixiang Wang, Jiqiang Liu, X. Chang, "Assessing Transferability of Adversarial Examples against Malware Detection Classifiers,"  IEEE CF 2019.  (安全可靠的机器学习)(CCF C)
  39. Jelana Misic, Vojislav Misic, X. Chang, et. al, ”Block delivery time in Bitcoin distribution network ", IEEE ICC 2019.  (区块链-比特币-机理量化分析)(CCF C)
  40. Yang Yang, X. Chang, et. al, ” Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework”, ICSP 2018. (云-边网络切片、服务链)(CCF C)
  41. Guozhi Zhang, Jiqiang Liu, X. Chang, et. al, ” Interest Relevance-Based Caching Design in Content-centric Networking”, ICA3PP 2018.  (信息中心网络)(CCF C)
  42. Jelena Misic, Vojislav Misic, X. Chang, ”Kernel based estimation of domain parameters at IoT proxy“,IEEE GlobeCom 2018.(CCF C)
  43. Vojislav Misic, Jelena Misic, X. Chang, ”Efficient traffic reduction in IoT domains using Bernoulli scheduling of proactive cache refresh“,IEEE GlobeCom 2018(CCF C)
  44. X. Chang, et. al, ”Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System“,IEEE ICCCN 2018  (安全可靠的机器学习)(CCF C)
  45. Bo Liu, X. Chang, et. al, "Performance Analysis Model for Fog Services under Multiple Resource Types,"  IEEE DSA 2017. (可信安全的端-边-云服务)
  46. Lin Li, Yingying Yao, X. Chang, "Plaintext-dependent selective image encryption scheme based on chaotic maps and DNA coding",IEEE DSA 2017.
  47. Harish Sukhwani1,Jose M. Martinez1, X.Chang, Kishor S. Trivedi,Andy Rindos,"Performance Modeling of PBFT Consensus Process for  Permissioned Blockchain Network (Hyperledger Fabric)"  IEEE SRDS 2017, poster.  (区块链- HyperledgerFabric) (CCF B)
  48. Xiaodan Li, X.Chang, et al, "A Novel Approach for Software Vulnerability Classfication", IEEE RAMS 2017. 
  49. Zibo zhou, X.Chang, et al, "Resource-aware Virtual Network Parallel Embedding Based on Genetic Algorithm", IEEE PDCAT 2016. (云-边网络切片、服务链)
  50. T.J. Wang, X.Chang, et al, "Performability Analysis for IaaS Cloud Data Center", IEEE PDCAT 2016. (可信安全的端-边-云服务)
  51. X.Chang, et al, "Model-based Survivability Analysis of a Virtualized System", IEEE LCN 2016.  (网络安全态势量化分析(CCF C)
  52. Ricardo J. Rodrgues, X.Chang, Xiaodan Li, Kishor Trivedi, "Survivability Analysis of a Computer System under an Advanced Persistent Threat", Proc. Of the 3rd Workshop on Graphical Models for Security (GraMSec), @IEEE Computer Security Foundations Symposium. 2016.  (网络安全态势量化分析)
  53. Xuanni DU ,X.Chang, "Performance of AI Algorithms for Mining Meaningful Roles " IEEE WCCI-CEC, 2014 
  54. Yang Yang ,X.Chang, et al., "Effective and Efficient AI-based Approaches to Cloud Resource Provisioning" In Proc. IEEE ICON, 2013.  (云-边网络切片、服务链)
  55. Wenbo wang,X.Chang, et al., "Simulated Annealing Based Resource Allocation for Cloud Data Centers" In Proc. GECCO, 2013.   (云-边网络切片、服务链)
  56. X.Chang, et al., "Green Cloud Virtual Network Provisioning Based Ant Colony Optimization" In Proc. GECCO-GreenGEC  2013, .   (云-边网络切片、服务链)
  57. X.Chang, et al., "Network State Aware Virtual Network Parallel Embedding"? In Proc. IEEE IPCCC 2012.  (云-边网络切片、服务链)(CCF C)
  58. B. Wang, X.Chang, et al., "Reducing Power Consumption in Embedding Virtual Infrastructures" In Proc. IEEE Globecom Workshop ManSec 2012.   (云-边网络切片、服务链)
  59. X.Chang, et al., "Migration Cost Aware Virtual Network Re-Embedding in Presence of Resource Failures" In Proc. IEEE ICON 2012.  (云-边网络切片、服务链)
  60. X.M. Mi, X.Chang, et al., "Embedding Virtual Infrastructure Based on Genetic Algorithm" In Proc. IEEE PDCAT 2012.  (云-边网络切片、服务链)
  61. X.Chang, et al., "Robust and Efficient Response to TCG TOCTOU Attacks In TPVM" In Proc. IEEE PDCAT 2012.  (可信计算)
  62. X.M. Mi, X.Chang, et al., "An Integrated Approach To Virtual Network EmbeddingWith Sharing Physical Nodes" In Proc. IEEE MINES 2012.   (云-边网络切片、服务链)
  63. X.Chang, "ZRTP-based Trusted Transmission of VoIP Traffic and Formal Verification," In Proc. IEEE MINES 2012.  (可信计算)
  64. X.Chang, et al., "Defeating TCG TOCTOU Attacks In T" In Proc. IEEE MINES 2010.  (可信计算)
  65. X.Chang, Bin Xing, Jiqiang Liu, "LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack" In Proc. 28th IEEE IPCCC 2009.   (可信计算)(CCF C)
  66. X. Chang, " Analysis of Interrupt coalescing in? Gigabit Ethernet Networks”, In Proc. IEEE ICC 2008.  (Linux )(CCF C)
  67. X. Chang, Jogesh. K. Muppala, P.C Zou, and X.K. Li,"A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks”, In Proc. IEEE LCN 2007.  (Linux )(CCF C)
  68. X. Chang, Jogesh K. Muppala, P.C. Zou, Z.Y. Zheng, and X.K. Li, "A Queue-based Adaptive Approach to Improve System Performance in Gigabit Ethernet Networks,” In Proc. 26 IEEE IPCCC 2007 (Linux )(CCF C)
  69. X. Chang, X. Lin and J. K. Muppala,"A Control-Theoretic Approach to Improving Fairness in DCF Based WLANs," In Proc. 25th IEEE IPCCC, 2006.(CCF C)
  70. X. Chang, and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services,” In Proc. 24th IEEE IPCCC,2005.(CCF C)
  71. X. Chang, and J. K. Muppala,"Applying Adaptive Virtual Queue to Improve the Performance of the Assured Forwarding Service," In Proc. IEEE ICC,2005.(CCF C)
  72. X. Chang, X. Lin and J. K. Muppala, "An Adaptive Queue Management Mechanism for Improving TCP Fairness in the Infrastructure WLAN," In Proc. 16th Ann. International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2005), Berlin, Germany, Sep. 2005.(CCF C)
  73. X. Lin, X. Chang, and J. K. Muppala,"VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN," In Proc. 5th International IEEE Workshop on Wireless Local Networks (WLN 2005), Sydney, Australia, Nov. 2005.
  74. X. Chang, and J. K. Muppala, "A Robust Nonlinear PI Controller for Improving AQM Performance," In Proc. IEEE ICC,2004. (CCF C)
  75. X. Chang, and J. K. Muppala, "An Integral Sliding Mode based AQM for Stable Queue Length," In Proc. IEEE GLOBECOM, 2004.(CCF C)
  76. X. Chang, and J.K. Muppala, "A Robust PI Controller for Improving Performance in the AF-based Differentiated Services Network," In Proc. 23rd IEEE IPCCC,2004. (CCF C)
  77. X. Chang, and J. K. Muppala, "Adaptive Marking Threshold for Improving Performance of Assured Forwarding Services (based on local knowledge)," In Proc. IEEE Globecom, 2003.(CCF C)
  78. X. Chang, and J. K. Muppala,"Adaptive Marking Threshold for Assured Forwarding Services (based on router cooperation)," In Proc. IEEE ICCCN, 2003.(CCF C)
  79. S. Qing, X. Chang,J.Zhang,"Design and implementation of Secure e-commerce protocol iKPI," In Proc. 1st CCICS, 1999.


中文论文、

  1. 王建华;黎琳;赵镇东;常晓林;王爱丽;刘宇;耿欣 ,‘一种基于全同态加密算法的神经网络预测方案’, 人工智能, 2022. (安全可靠的机器学习)
  2. 张嘉楠,  常晓林  ,et al, "深度学习的对抗攻击方法综述",网络空间安全, 2020.  (安全可靠的机器学习)
  3. 赵镇东, 常晓林 ,et al, "深度学习对抗样本的防御方法综述", 网络空间安全, 2020.  (恶意代码智能检测)
  4. 赵镇东  常晓林 et al, "机器学习中的隐私保护综述", 信息安全学报, 2019 (安全可靠的机器学习)
  5. Yutong Cai,   常晓林 ,et al, "动态平台技术防御攻击的瞬态效能量化分析", 信息安全学报, 2019 (目标移动防御)
  6. 邢 彬,  韩 臻,  常晓林,  刘吉强, "基于虚拟机监控技术的可信虚拟域",  信息安全学报,2016.  (可信计算)
  7.  常晓林 , 冯登国, Sihan Qing, "A Single Sign on Protocol for Multiple Servers," 软件学报, China, 2002.


专著/译著


专利

第一发明人专利
  • 基于TPM的可信Web网页的实现方法 常晓林
  • 一种响应Xen客户硬件虚拟域可信计算TOCTOU攻击的方法 常晓林
  • 一种可扩展的可信SSH的实现方法 常晓林
  • 一种远程动态验证客户端软件完整性的方法 常晓林
  • 一种保护平台信息的可信QpenSSH的实现方法 常晓林
  • 一种有效的可信OpenSSH的实现方法 常晓林
  • 一种基于可信计算实现可信SSH的方法 常晓林
  • 一种响应TOCTOU攻击的轻量级方法 常晓林
  • 完整性度量技术在可信虚拟域无缝运行的方法 常晓林
  • 一种针对TPM可信计算的TOCTOU攻击响应方法 常晓林
  • 自适应的保障可信客户虚拟域正常启动的方法 常晓林

软件著作权

获奖与荣誉

R&D Awards

  • Ministry of Education Science and Technology Progress Award(The First Class in 2010 )- , P.R. China 教育部科技进步一等奖

  • National Science and Technology Progress Award (The Second Class in 2000 )- MOST, P.R. China, 国家科技进步二等奖

  • Science and Technology Progress Award (The Second Class in 1997, The first Class in 1999)- CAS, P.R. China, 中科院科技进步一等奖,二等奖

社会兼职