常晓林

博士、教授、安全可信智能计算研究室主任

基本信息

办公电话: 电子邮件: xlchang@Bjtu.edu.cn
通讯地址: 邮编:

工作经历

香港科技大学所获得博士学位,2007年加入北京交通大学计算机与信息技术学院。曾在中科院软件所和公司从事网络协议和产品以及安全操作系统的研究、设计和开发。获中国科学院科技进步奖一等奖和二等奖、国家科技进步奖二等奖和教育部科技进步一等奖、2018年IEEE GLOBECOM (CCF C )最佳论文奖、2021年ICSOC (CCF B )最佳短文奖、2021住建部华夏科技进步二等奖。主持或参加的项目包括国务院信息办重点攻关项目、863项目、中国科学院重大科研项目、欧洲第六框架计划项目、教育部博士点基金、北京自然基金、国家自然基金、国家重点研发等。已在IEEE TDSC、IEEE TSC、IEEE TCC、IEEE TITS、IEEE TVT、IEEE IoT 等领域国际顶级期刊和国际重要 会议上发表论文130余篇。作为第一发明者授权专利有12项。是多个国际学术期刊的审稿人和国际会议的程序委员,担任中国科学院信工所客座研究员,担任国家自然科学基金和国家重点研发的评审专家以及加拿大自然科学、加拿大工程研究协会(NSERC)基金的海外评审专家, '网络空间安全'期刊副主编, '网信军民融合'期刊编委。


2022 SRDS , Blockchain 程序委员会成员。


研究方向

(1)  安全、可信、高效、绿色的分布式系统 (云原生服务、端边云服务 规模化块链度量和评估方法、机制和系统研制)      

(2)  积极防御机理分析和系统研制

(3)  数据库透明加密、安全代理、多级访问控制

(4)  安全可证明的区块链共识机制 

(5) 安全可信的智能学习   

      


国际合作: 

  Dr. Kishor Trivedi,    Dr. Jianying Zhou    Dr. Jelena Misic,   Dr. Vojislav Misic,    Dr. Ricardo J. Rodríguez

  Dr. Distefano Salvatore,     Dr. Scarpa Marco,    Dr. Fumio Machida,


博士: 

在读:

   康鸿月,王建华,朱颢然,吴兴华韩丽娜,巩艳伟

   王逸翔, co-supervised with Prof. Jiqiang Liu

   白晶, co-supervised with Prof. Zhen Han

已毕业:   

    杨润垲(京东区块链研究院), 姜丽丽(电信研究院), 陈志(航天二院), 杨扬(铁科院),邢彬,刘博,      张国治(西北师范),姚英英 (北交大)


研究方向

  • 网络安全
  • 计算机技术
  • 软件工程
  • 人工智能
  • 网络与信息安全
  • 大数据技术与工程
  • 人工智能技术及应用(计算机学院导师组)

招生专业

  • 网络空间安全硕士
  • 计算机技术硕士
  • 软件工程硕士
  • 人工智能硕士
  • 网络与信息安全硕士
  • 大数据技术与工程硕士
  • 网络空间安全博士
  • 网络与信息安全博士
  • 人工智能博士

科研项目

国家自然基金“面上”:大规模联盟链共识算法效能分析及优化
北京市自然基金“面上”: 区块链激励共识机制量化分析
数据库透明加密与脱敏系统
国家重点研发子课题: 韧性城市智能规划与仿真关键技术及应用: 多系统要素协同的韧性城市自适应规划决策技术

红果园-"其他部市": 面向资源受限设备的连续消息的轻量级自适应安全签名方案
国家(工信部等)专项: 移动边缘计算MEC网络安全防护技术
边缘计算技术、标准及认证业务研究
 信息系统服务器虚拟化产品检测规范
国家自然科学基金“联合基金项目”: 动静协同的恶意代码智能分析方法研究
 统一身份认证关键技术研究
 面向军民融合的多域网络互联态势感知关键技术
基于格的轻量级车联网消息签名与验证方案研究
国家自然科学基金“面上”: 智能穿戴网络数据实时融合算法研究
国家重点研发计划: 关键信息技术产品和服务网络安全审查关键技术研究
国家自然科学基金“面上”: 面向异构云计算中心IaaS服务的性能分析模型 
其它部市: 可信的网络空间安全保障体系
红果园省部级"企事业": RSA-768数域筛法大数分解多项式选择中的多项式根优化研究与工程实现
红果园: 基于云计算的涉密信息系统安全保密测评与检查能力建设
北京交通大学: 典型移动终端多核及虚拟化支持状况分析及可行方案
北京市自然基金: 收益驱动的多虚拟网络嵌入和虚拟网络资源再分配技术研究
教育部: 面向电子病历共享系统的安全与隐私保护技术研究
博士点基金: 虚拟机系统端拥塞控制的研究1
科技部“863”: 虚拟个人计算机系统的可信支撑技术研究
科技部“863”: 可信计算平台信任链建立关键技术

教学工作

  • 本科生: (1)计算机网络原理  (2) 计算机与网络安全(信息安全、保密技术专业基础课)
  • 研究生/博士:可靠安全系统的分析方法

论文/期刊


Journal Publications

  1.  X. Chang,et al, "Job Completion Time under Migration-based Dynamic Platform Technique", IEEE Trans. Services Computing, 2022.  (主动安全防御)
  2. S Tong, Y Liu, J Mišić, X. Changet al, "Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution based Collaborative Fog Computing Model", to be published in IEEE Trans. Vehicular Technology可信安全的端-边-云服务) 
  3. J. Misic, V. Misic, X. Chang,et al, "Design of Proof-of-Stake PBFT Algorithm for IoT EnvironmentsIEEE Trans. Vehicular Technology, 2022.  (PBFT 共识机制优化)
  4. Y. Wang, Jiqiang Liu, X. Chang, et al,"DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks",Information Sciences,2022.(安全可靠的机器学习)
  5. Wen Wang; Xiaofeng Peng; Ye Yang; Chun Xiao; Shuai Yang; Mingcai Wang; Lingfei Wang; Yanling Wang; Lin Li; X. Chang, 'Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment", IEEE Access, 2022.  (充电桩安全分析)
  6. Haytham Qushtom, Jelena V. Misic, Vojislav B. Misic, X. Chang: Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment‘’ IEEE Trans. Green Commun. Netw. (2022) (物联网联盟链)
  7. J. Misic, V. Misic, X. Chang,et al, "Scalable Self-Sovereign Identity Architecture“ IEEE Network, 2022  (信任管理)
  8. H. Kang, X. Chang,et al, "Improving Dual-UAV Aided Ground-UAV Bi-directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization", IEEE Trans. Vehicular Technology, 2022.  (无人机安全通信)
  9. Y. Wang, Jiqiang Liu, X. Chang, et al,"IWA: Integrated gradient-based white-box attacks for fooling deep neural networks", Journal of Information Security and Applications,2022.(安全可靠的机器学习)
  10. R. Yang, X. Chang, et al, "Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach",  The Computer Journal, 2022  (主动安全防御)
  11. Y. Wang, Jiqiang Liu, X. Chang, et al,"AB-FGSM: AdaBelief Optimizer and FGSM-Based Approach to Generate Adversarial Examples", Journal of Intelligent System,2022.(安全可靠的机器学习)
  12. J Bai, X Chang,  et al,"Quantitative Understanding Serial-Parallel Hybrid SFC Services: A Dependability Perspective", Peer-to-Peer Networking and Applications,2022 (可信安全的端-边-云服务).
  13. S Tong, Y Liu, J Mišić, X. Chang, et al, "Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm", to be published in IEEE Transactions on Intelligent Transportation Systems. 可信安全的端-边-云服务) 
  14. J Bai, X Chang,  et al,"Impact of Service Function Aging on the Dependability for MEC Service Function Chain", to be published IEEE Transactions on Dependable and Secure Computing.  (可信安全的端-边-云服务).
  15. R Yang, X Chang, J Mišić, VB Mišić, H Kang,"Quantitative Comparison of Two Chain-Selection Protocols under Selfish Mining Attack",IEEE Transactions on Network and Service Management,2022  (比特币 以太坊 攻击分析)
  16. V Mišić, J Mišić, X Chang,"Reducing the number of transaction messages in bitcoin", Peer-to-Peer Networking and Applications,2022.   (比特币 以太坊 攻击分析)
  17. L Jiang, X Chang, J Mišić, VB Mišić, J Bai,"Understanding MEC empowered vehicle task offloading performance in 6G networks", Peer-to-Peer Networking and Applications, 2022.
  18. J. Misic, V. Misic, X. Chang,et al, "Optimal multi-tier clustering of permissioned blockchain systems for IoT",IEEE Transactions on Vehicular Technology, 2022.  (PBFT 共识机制优化)
  19. R. Yang,  X. Chang,et al, "On Selfholding Attack Impact on Imperfect PoW Blockchain Networks",IEEE Transactions on Network Science and Engineering, 2021.  (比特币 以太坊 攻击分析)
  20. Y. Yao, X. Chang,et al, "LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X“ Ad Hoc Networks, 2021  ( 车联网安全)
  21. J. Bai, X. Chang,et al,"Resilience-Driven Quantitative Analysis of Vehicle Platooning Service“  IEEE Transactions on  Vehicular Technology, 2021.  ( 可信的端-边-云服务链)
  22. H. Kang, X. Chang,et al, "Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks with Extended ForksIEEE Transactions on  Network Service and Management, 2021  (区块链-比特币-机理量化分析)
  23. Y. Zhang,  X. Chang,et al, "Cost-effective Migration-based Dynamic Platform Defense Technique: A CTMDP Approach",  Peer-to-Peer Networking and Applications, 2021.  (主动安全防御)
  24. J. Misic, Vojislav Misic, X. Chang,et al, "Adapting PBFT for use with blockchain-enabled IoT systems“ IEEE Transactions on  Vehicular Technology, 2020  (联盟链 PBFT 共识机制)
  25. Y. Wang, Shaohua lv, Jiqiang Liu, X. Chang,  et al, "On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection“ CyberSecurity, 2021  ( 安全可靠的机器学习)                        
  26. L. Li, X. Chang, J. Liu, et al, "Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles“ IEEE Transactions on Intelligent Transport System, 2021  ( 比特币支付, 车联网)
  27. J. Bai, X. Chang,et al,"Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach“ IEEE Transactions on Cloud Computing, 2020  ( 可信安全的端-边-云服务) 
  28. J. Misic, Vojislav Misic,   X. Chang,et al, "Performance of Bitcoin network with synchronizing nodes and a mix of regular and compact blocks“ IEEE Transactions on Network Science and Engineering, 2020  (区块链-比特币-机理量化分析) 
  29. R. Yang,  X. Chang,et al, "Assessing Blockchain Selfish Mining in an Imperfect Network:Honest and Selfish Miner Views", Computers & Security, 2020 (比特币 以太坊 攻击分析)
  30. L. Jiang,  X. Chang,et al, "Model-based Comparison of Cloud-Edge Computing Resource Allocation Policies ", The Computer Journal, 2020   (可信安全的端-边-云服务)
  31. L. Jiang,  X. Chang,et al, "Dependability Analysis of 5G-AKA Authentication Service from Server and User Perspectives ", IEEE Access, 2020  (5G 认证服务分析)
  32. Y. Yao, X. Chang,et al, "Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks", IEEE Transactions on Cognitive Communications and Networking, 2020 (云边, 5G, C-V2X安全)
  33. Y. Zhang,  X. Chang,et al, "Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification", IEEE Access, 2020.  (恶意代码智能检测)
  34. Z. Chen,  X. Chang,et al, "Numerical evaluation of job finish time under MTD environment", IEEE Access, 2020.  (主动安全防御)
  35. J. Bai,  X. Chang,et al, "Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views", IEEE Access, 2020.   (可信安全的端-边-云服务)
  36. Y. Yao, X. Chang,et al, "Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing", IEEE Transactions on Vehicular Technology, 2020.  (云边, 5G, C-V2X安全)
  37. J. Misic, Vojislav Misic, X. Chang,et al, "Modeling of Bitcoin's blockchain delivery network“ IEEE Transactions on Network Science and Engineeringg, 2020  (区块链-比特币-机理量化分析)
  38.  V. Misic, Jelena Misic,X. Chang, "Data Lifetime Estimation in a Multicast-Based CoAP Proxy,",Open Journal of Internet of Things (OJIOT) 2020
  39. L. Jiang,  X. Chang,et al, "Performance Analysis of Hyperledger Fabric Platform: A Hierarchical Model Approach ", Peer-to-Peer Networking and Applications, 2020  (区块链-HyperledgerFabric)
  40. L. Li, Jiqiang Liu, X. Chang, Tianhao Liu, Jingxian Liu:Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 , 2020. (区块链-比特币 应用)
  41. Y. Wang, Jiqiang Liu, Jelena Misic,  Voj. Misic, X. Chang,   "Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples", IEEE ACCESS, 2019.   (安全可靠的机器学习)
  42. R. Yang,  X. Chang,et al, "Performance Modeling of Linux Network System with Open vSwitch", Peer-to-Peer Networking and Applications, 2019 (主动安全防御)
  43. Y. Yao, X. Chang,et al, "BLA:Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services", IEEE IoT Journal, 2019.  (云边, 5G, C-V2X安全)
  44. Y. Shi,, X. Chang,et al, "Quantitative security analysis of a dynamic network system under lateral movement-based attacks", Reliability Engineering & System Safety, 2019.  (网络安全态势量化分析)
  45. Y. Yao, X. Chang,et al, "Reliable and Secure Vehicular Fog Service Provision", IEEE IoT Journal, 2019. (云边, 5G, C-V2X安全)
  46. Y. Yao, X. Chang,et al, "CLAM: Lightweight Certificateless Anonymous Authentication Mechanism for Vehicular Cloud Services", Cyber-Physical Systems, 2018. (云边, 5G, C-V2X安全)
  47. B. Liu, X. Chang, Zhen Han, Kishor Trivedi, Ricardo J. Rodrgues, "Model-based Sensitivity Analysis of IaaS Cloud Availability", Future Generation Computer Systems, 2018.   (可信安全的端-边-云服务)
  48. Z. Chen, X. Chang, Zhen Han, Lin Li, "Survivability Modeling and Analysis of Cloud Service in Distributed Data", The Computer Journal, 2018.   (可信安全的端-边-云服务)
  49. X. Chang, et al, "Modeling and Analysis of High Availability Techniques in a Virtualized System",  The Computer Journal, 2018  (可信安全的端-边-云服务)
  50. X. ChangR.F. Xia,  J.K. Muppala, K.S. Trivedi,  jiqiang Liu, "Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload",  IEEE Transactions on Cloud Computing, 2018   (云-边服务量化分析)
  51. X. ChangJose M. Martinez, Kishor S. Trivedi, "Transient Performance Analysis of Smart Grid with Dynamic Power Distribution"Information Sciences, 42298-10, 2018. 
  52. Guozhi zhang, Jiqiang Liu, X. Chang,   et al,  "Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content Centric Networking", IEEE ACCESS, 2017 (信息中心网络)
  53. Yang Yang, X. Chang, jiqiangliu ,lin Li, "Towards Robust Green Virtual Cloud Data Center Provisioning," IEEE Transactions on Cloud Computing, 5(2)168-181, 2017. (云-边网络切片、服务链)
  54. X.ChangBin WangJogesh K. MuppalaJiqiang LiuModeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue. IEEE Trans. Services Computing 9(3)408-420 (2016)  (可信安全的端-边-云服务)
  55. Bin Wang, X. Chang*, jiqiangliu ,  "Modeling Heterogeneous Virtual Machines on IaaS Data Centers",  IEEE Communication Letter, 2015.  (可信安全的端-边-云服务)
  56. Bin Xing, Zhen Han, X. Chang, jiqiangliu ,  "OB-IMA: Out-of-the-Box Integrity Measurement Approach for Guest Virtual Machines",  Concurrency and Computation: Practice and Experience,   2015.  (可信计算)
  57. X. Chang, et al.,  "Performance Evaluation of Artificial Intelligence Algorithms for Virtual Network Embedding," Engineering Applications of Artificial Intelligence, 2013.   (云-边网络切片、服务链)
  58. X. Chang,and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services," Computer Communications,2006.
  59. X. Chang,and J. K. Muppala, "A stable queue-based adaptive AQM mechanism,"  Computer Networks, 2006.
  60. X. Chang, and J. K. Muppala, "On Improving Bandwidth Assurance in AF-based DiffServ Network Using a Control Theoretic Approach," Computer Networks, 2005.


Conference and Poster Publication

  1. J Mišić, VB Mišić, X Chang,"Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting", IEEE GlobeCom,2022.(CCF C)
  2. H Zhu, X Chang, et.al., "How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach", IEEE ICC,2022.(CCF C)
  3. J Mišić, VB Mišić, X Chang,"Proof of Stake Voting in Multiple Entry PBFT System", IEEE ICC,2022.(CCF C)
  4. V Mišić, J Mišić, X Chang,"Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems", IEEE ICC,2022.(CCF C)
  5. J Wang, X Chang, et.al.,"Assessing Anonymous and Selfish Free-Rider Attacks in Federated Learning", IEEE ISCC,2022.(CCF C)
  6. R Yang, X Chang, et.al.,"Evaluating fork after withholding (FAW) attack in Bitcoin", CF,2022.(CCF C)
  7. H Kang, X. Chang, et. al, Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven,  IEEE  ICSOC 2021  (UAV)  (CCF B)
  8. J Wang, X Chang, J Mišić, VB Mišić, Y Wang, J Zhang,"Mal-LSGAN: An Effective Adversarial Malware Example Generation Model", IEEE GLOBECOM,2021.(CCF C)
  9. VB Mišić, J Mišić, X Chang, "Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications",IEEE GLOBECOM,2021(CCF C)
  10. Jelena V. Misic, Vojislav B. Misic, X. Chang, Trade-offs in large blockchain-based IoT system design,  IEEE  GLOBECOM 2021  (区块链-比特币-机理量化分析) (CCF C)
  11. J. Wang, J. Zhang, Jelena V. Misic, Vojislav B. Misic, Yixiang, X. ChangMal-LSGAN: An Effective Adversarial Malware Example Generation Model,  IEEE  GLOBECOM 2021  (深度学习安全)(CCF C)
  12. Jelena V. Misic, Vojislav B. Misic, X. ChangCoping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications,  IEEE  GLOBECOM 2021  (区块链-比特币-机理量化分析)(CCF C)
  13. Vojislav B. Misic, Jelena V. Misic, X. Chang, The Impact of Vote Counting Policy on the Performance of PBFT,  IEEE  CCECE 2021  (区块链-比特币-机理量化分析) 
  14. Jelena V. Misic,Vojislav B. Misic,  X. ChangVoting Control in Multiple Entry PBFT Blockchain Systems for IoT,  IEEE  CCECE 2021  (区块链-比特币-机理量化分析)
  15. YingYingYao, Zhendong Zhao X. Chang, et.al, A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System . IEEE ICC 2021  (机器学习 隐私保护) (CCF C)
  16. Jelena V. Misic, Vojislav B. Misic, X. Chang:A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording . IEEE  ICC 2021  (区块链-比特币-机理量化分析) (CCF C)
  17. Jelena V. Misic, Vojislav B. Misic, X. Chang:Multiple entry point PBFT for IoT systems.  IEEE  GLOBECOM 2020  (区块链-比特币-机理量化分析) (CCF C)
  18. Vojislav B. Misic, Jelena V. Misic, X. Chang: Making Transaction Propagation More Efficient: Deferred Transaction Relay in BitcoinIEEE  GLOBECOM 2020  (区块链-比特币-机理量化分析) (CCF C)
  19. Zhi Chen,   X. Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang, Zhen Han: Model-based Perofrmance Evaluation of An Moving Target Defense System. IEEE  GLOBECOM 2020  (网络安全态势量化分析)(CCF C)
  20. Haoran Zhu, Jing Bai, X. Chang, et. al, ”Stochastic Model-based Quantitative Analysis of Edge UPF Service Dependability ", ICA3PP 2020  (移动边缘计算)(CCF C)
  21. Yang Yang, X. Chang, et. al, ”PIM-Assisted MEC 3C Resource Allocation for Computation Offloading”, ICA3PP 2020(移动边缘计算)(CCF C)
  22. Jelana Misic, Vojislav Misic, X. Chang, et. al, ”Comparison of single- and multiple entry point PBFT for IoT blockchain systems ", IEEE VTC-fall 2020  (区块链-比特币-机理量化分析)(CCF C)
  23. Jelana Misic, Vojislav Misic, X. Chang, et. al, ”On the Benefits of Compact Blocks in Bitcoin ", IEEE ICC 2020  (区块链-比特币-机理量化分析)(CCF C)
  24. Hongyue Kang, Bo Liu, X. Chang,, et. al "Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks", IEEE ICNC 2020 (网络安全态势量化分析)
  25. Runkai Yang,  X. Chang,Vojislav Misic, Jelana Misic, et al, "Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF", IEEE GlobeCom 2019.  (网络安全态势量化分析)(CCF C)
  26. Jelena V. Misic, Vojislav B. Misic, X. Chang: On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. IEEE  GLOBECOM 2019: 1-6  (区块链-比特币-机理量化分析) (CCF C)
  27. Vojislav Misic, Jelana Misic, X. Chang ”On forks and fork characteristics in a Bitcoin-like distribution network", 2019 IEEE International Conference on Blockchain  (区块链-比特币-机理量化分析)(CCF C)
  28. Vojislav Misic, Jelana Misic, X. Chang ”Towards a Blockchain-Based Healthcare Information System", 2019 IEEE ICCC.  (区块链应用)
  29. Bo Liu, X. Chang, et. al, "Evaluating Performance of Active Containers on PaaS Fog Under Batch Arrivals: A Modeling Approach,"  IEEE ISCC 2019.(CCF C)
  30. Yixiang Wang, Jiqiang Liu, X. Chang, "Assessing Transferability of Adversarial Examples against Malware Detection Classifiers,"  IEEE CF 2019.  (安全可靠的机器学习)(CCF C)
  31. Jelana Misic, Vojislav Misic, X. Chang, et. al, ”Block delivery time in Bitcoin distribution network ", IEEE ICC 2019.  (区块链-比特币-机理量化分析)(CCF C)
  32. Yang Yang, X. Chang, et. al, ” Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework”, ICSP 2018. (云-边网络切片、服务链)(CCF C)
  33. Guozhi Zhang, Jiqiang Liu, X. Chang, et. al, ” Interest Relevance-Based Caching Design in Content-centric Networking”, ICA3PP 2018.  (信息中心网络)(CCF C)
  34. Jelena Misic, Vojislav Misic, X. Chang, ”Kernel based estimation of domain parameters at IoT proxy“,IEEE GlobeCom 2018.(CCF C)
  35. Vojislav Misic, Jelena Misic, X. Chang, ”Efficient traffic reduction in IoT domains using Bernoulli scheduling of proactive cache refresh“,IEEE GlobeCom 2018(CCF C)
  36. X. Chang, et. al, ”Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System“,IEEE ICCCN 2018  (安全可靠的机器学习)(CCF C)
  37. Bo Liu, X. Chang, et. al, "Performance Analysis Model for Fog Services under Multiple Resource Types,"  IEEE DSA 2017. (可信安全的端-边-云服务)
  38. Lin Li, Yingying Yao, X. Chang, "Plaintext-dependent selective image encryption scheme based on chaotic maps and DNA coding",IEEE DSA 2017.
  39. Harish Sukhwani1,Jose M. Martinez1, X.Chang, Kishor S. Trivedi,Andy Rindos,"Performance Modeling of PBFT Consensus Process for  Permissioned Blockchain Network (Hyperledger Fabric)"  IEEE SRDS 2017, poster.  (区块链- HyperledgerFabric) (CCF B)
  40. Xiaodan Li, X.Chang, et al, "A Novel Approach for Software Vulnerability Classfication", IEEE RAMS 2017. 
  41. Zibo zhou, X.Chang, et al, "Resource-aware Virtual Network Parallel Embedding Based on Genetic Algorithm", IEEE PDCAT 2016. (云-边网络切片、服务链)
  42. T.J. Wang, X.Chang, et al, "Performability Analysis for IaaS Cloud Data Center", IEEE PDCAT 2016. (可信安全的端-边-云服务)
  43. X.Chang, et al, "Model-based Survivability Analysis of a Virtualized System", IEEE LCN 2016.  (网络安全态势量化分析(CCF C)
  44. Ricardo J. Rodrgues, X.Chang, Xiaodan Li, Kishor Trivedi, "Survivability Analysis of a Computer System under an Advanced Persistent Threat", Proc. Of the 3rd Workshop on Graphical Models for Security (GraMSec), @IEEE Computer Security Foundations Symposium. 2016.  (网络安全态势量化分析)
  45. Xuanni DU ,X.Chang, "Performance of AI Algorithms for Mining Meaningful Roles " IEEE WCCI-CEC, 2014 
  46. Yang Yang ,X.Chang, et al., "Effective and Efficient AI-based Approaches to Cloud Resource Provisioning" In Proc. IEEE ICON, 2013.  (云-边网络切片、服务链)
  47. Wenbo wang,X.Chang, et al., "Simulated Annealing Based Resource Allocation for Cloud Data Centers" In Proc. GECCO, 2013.   (云-边网络切片、服务链)
  48. X.Chang, et al., "Green Cloud Virtual Network Provisioning Based Ant Colony Optimization" In Proc. GECCO-GreenGEC  2013, .   (云-边网络切片、服务链)
  49. X.Chang, et al., "Network State Aware Virtual Network Parallel Embedding"? In Proc. IEEE IPCCC 2012.  (云-边网络切片、服务链)(CCF C)
  50. B. Wang, X.Chang, et al., "Reducing Power Consumption in Embedding Virtual Infrastructures" In Proc. IEEE Globecom Workshop ManSec 2012.   (云-边网络切片、服务链)
  51. X.Chang, et al., "Migration Cost Aware Virtual Network Re-Embedding in Presence of Resource Failures" In Proc. IEEE ICON 2012.  (云-边网络切片、服务链)
  52. X.M. Mi, X.Chang, et al., "Embedding Virtual Infrastructure Based on Genetic Algorithm" In Proc. IEEE PDCAT 2012.  (云-边网络切片、服务链)
  53. X.Chang, et al., "Robust and Efficient Response to TCG TOCTOU Attacks In TPVM" In Proc. IEEE PDCAT 2012.  (可信计算)
  54. X.M. Mi, X.Chang, et al., "An Integrated Approach To Virtual Network EmbeddingWith Sharing Physical Nodes" In Proc. IEEE MINES 2012.   (云-边网络切片、服务链)
  55. X.Chang, "ZRTP-based Trusted Transmission of VoIP Traffic and Formal Verification," In Proc. IEEE MINES 2012.  (可信计算)
  56. X.Chang, et al., "Defeating TCG TOCTOU Attacks In T" In Proc. IEEE MINES 2010.  (可信计算)
  57. X.Chang, Bin Xing, Jiqiang Liu, "LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack" In Proc. 28th IEEE IPCCC 2009.   (可信计算)(CCF C)
  58. X. Chang, " Analysis of Interrupt coalescing in? Gigabit Ethernet Networks”, In Proc. IEEE ICC 2008.  (Linux )(CCF C)
  59. X. Chang, Jogesh. K. Muppala, P.C Zou, and X.K. Li,"A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks”, In Proc. IEEE LCN 2007.  (Linux )(CCF C)
  60. X. Chang, Jogesh K. Muppala, P.C. Zou, Z.Y. Zheng, and X.K. Li, "A Queue-based Adaptive Approach to Improve System Performance in Gigabit Ethernet Networks,” In Proc. 26 IEEE IPCCC 2007 (Linux )(CCF C)
  61. X. Chang, X. Lin and J. K. Muppala,"A Control-Theoretic Approach to Improving Fairness in DCF Based WLANs," In Proc. 25th IEEE IPCCC, 2006.(CCF C)
  62. X. Chang, and J. K. Muppala, "The Effects of AQM on The Performance of Assured Forwarding Services,” In Proc. 24th IEEE IPCCC,2005.(CCF C)
  63. X. Chang, and J. K. Muppala,"Applying Adaptive Virtual Queue to Improve the Performance of the Assured Forwarding Service," In Proc. IEEE ICC,2005.(CCF C)
  64. X. Chang, X. Lin and J. K. Muppala, "An Adaptive Queue Management Mechanism for Improving TCP Fairness in the Infrastructure WLAN," In Proc. 16th Ann. International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2005), Berlin, Germany, Sep. 2005.(CCF C)
  65. X. Lin, X. Chang, and J. K. Muppala,"VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN," In Proc. 5th International IEEE Workshop on Wireless Local Networks (WLN 2005), Sydney, Australia, Nov. 2005.
  66. X. Chang, and J. K. Muppala, "A Robust Nonlinear PI Controller for Improving AQM Performance," In Proc. IEEE ICC,2004. (CCF C)
  67. X. Chang, and J. K. Muppala, "An Integral Sliding Mode based AQM for Stable Queue Length," In Proc. IEEE GLOBECOM, 2004.(CCF C)
  68. X. Chang, and J.K. Muppala, "A Robust PI Controller for Improving Performance in the AF-based Differentiated Services Network," In Proc. 23rd IEEE IPCCC,2004. (CCF C)
  69. X. Chang, and J. K. Muppala, "Adaptive Marking Threshold for Improving Performance of Assured Forwarding Services (based on local knowledge)," In Proc. IEEE Globecom, 2003.(CCF C)
  70. X. Chang, and J. K. Muppala,"Adaptive Marking Threshold for Assured Forwarding Services (based on router cooperation)," In Proc. IEEE ICCCN, 2003.(CCF C)
  71. S. Qing, X. Chang,J.Zhang,"Design and implementation of Secure e-commerce protocol iKPI," In Proc. 1st CCICS, 1999.


中文论文、

  1. 王建华;黎琳;赵镇东;常晓林;王爱丽;刘宇;耿欣 ,‘一种基于全同态加密算法的神经网络预测方案’, 人工智能, 2022. (安全可靠的机器学习)
  2. 张嘉楠,  常晓林  ,et al, "深度学习的对抗攻击方法综述",网络空间安全, 2020.  (安全可靠的机器学习)
  3. 赵镇东, 常晓林 ,et al, "深度学习对抗样本的防御方法综述", 网络空间安全, 2020.  (恶意代码智能检测)
  4. 赵镇东  常晓林 et al, "机器学习中的隐私保护综述", 信息安全学报, 2019 (安全可靠的机器学习)
  5. Yutong Cai,   常晓林 ,et al, "动态平台技术防御攻击的瞬态效能量化分析", 信息安全学报, 2019 (目标移动防御)
  6. 邢 彬,  韩 臻,  常晓林,  刘吉强, "基于虚拟机监控技术的可信虚拟域",  信息安全学报,2016.  (可信计算)
  7.  常晓林 , 冯登国, Sihan Qing, "A Single Sign on Protocol for Multiple Servers," 软件学报, China, 2002.


专著/译著


专利

第一发明人专利
  • 基于TPM的可信Web网页的实现方法 常晓林
  • 一种响应Xen客户硬件虚拟域可信计算TOCTOU攻击的方法 常晓林
  • 一种可扩展的可信SSH的实现方法 常晓林
  • 一种远程动态验证客户端软件完整性的方法 常晓林
  • 一种保护平台信息的可信QpenSSH的实现方法 常晓林
  • 一种有效的可信OpenSSH的实现方法 常晓林
  • 一种基于可信计算实现可信SSH的方法 常晓林
  • 一种响应TOCTOU攻击的轻量级方法 常晓林
  • 完整性度量技术在可信虚拟域无缝运行的方法 常晓林
  • 一种针对TPM可信计算的TOCTOU攻击响应方法 常晓林
  • 自适应的保障可信客户虚拟域正常启动的方法 常晓林

软件著作权

获奖与荣誉

R&D Awards

  • Ministry of Education Science and Technology Progress Award(The First Class in 2010 )- , P.R. China 教育部科技进步一等奖

  • National Science and Technology Progress Award (The Second Class in 2000 )- MOST, P.R. China, 国家科技进步二等奖

  • Science and Technology Progress Award (The Second Class in 1997, The first Class in 1999)- CAS, P.R. China, 中科院科技进步一等奖,二等奖

社会兼职


国际会议program committee member:

2020:  PRDC, ISPA, ISSRE WoSAR, Globecom


近五年主要研究成果:

  (1)移动目标防御的机理分析

  (2)网络系统安全度量方法的研究

  (3)网络虚拟资源和云数据中心虚拟资源分配

  (4)基于随机演化模型的智能电网的可生存分析

  (5)大规模异构云计算中心IaaS服务的性能与可用性分析