乐鱼体育

客座传授——王利明

来历:本站编辑      点击数:     日期:2018-06-19 17:45:36

王利明,1978 年生,男,博士,中国迷信院信息工程研讨所研讨员、传授、博导。国度失密局公用挪动通讯整体构成员、中科院计谋性先导名目构成员,中国计较机协会、IEEEACM 会员。掌管和到场了科技部重点研发专项、失密局、863、发改委、工信部、中科院、中挪动、国度电网等国度级和省部级 30 余项,颁发论文 40 余篇,请求国际、国度专利 40 余项,掌管和到场拟定国度或行业规范多项,请求项软件著述 20 余项,取得国度失密科技前进二等奖一项。现研讨范畴为智能宁静、云宁静、大数据宁静阐发 5G 收集宁静和工控宁静等,今朝已培育和指点博士毕业生 4 名,硕士毕业生 10 名。

 

简历

2014.9  中国迷信院信息工程研讨所 研讨员;

2009.6-2014.8  中国迷信院收集中间副研讨员 国度域名宁静中间副主任;

2006.7- 2009.6  NEC中国研讨院高隐衷与宁静组 副研讨员;

2003.9 -2006.7  中科院软件所信息宁静国度重点尝试室 助理研讨员;

 

论文:

1. Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu, Proactive Mitigation to Table-Overflow in Software-Defined Networking, 2018 IEEE Symposium on Computers and Communications (ISCC), accepted. (CCF-C)

2. Fabiao Miao, Liming Wang, Zailong Wu, Zhen Xu, A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in Cloud. 2018 IEEE Symposium on Computers and Communications (ISCC), accepted. (CCF-C)

3. C. Yang, H. Li, L. Wang, and D. Tang, Exploring the Behaviors and Threats of Pollution Attack in Cooperative MEC Caching, in proc. IEEE WCNC, 2018. (CCF-C)

4. H. Li, L. Wang, Online Orchestration of Cooperative Defense against DDoS Attacks for 5G MEC, in proc. IEEE WCNC, 2018. (CCF-C)

5. C. Yang, H. Li, L. Wang, and Z. Xu, A Game Theoretical Framework for Improving the Quality of Service in Cooperative RAN Caching, in proc. IEEE ICC, 2017. (CCF-C)

6. Z. Wang, H. Li, D. Wang, and L. Wang, Adaptive Relaying for Full-Duplex Energy Harvesting Enabled Cooperative Communication in Harsh Environments, in proc. IEEE MILCOM, 2016. (IIE-B)

7. J. Xu, L. Wang, C. Song, Z. Xu, Proactive Mitigation to Table-Overflow in Software-Defined Networking, in proc. IEEE ISCC, 2018. (CCF-C)

8. F. Miao, L. Wang, Z. Wu, A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in Cloud, in proc. IEEE ISCC, 2018. (CCF-C)

9. J. Yang, L. Wang, and Z. Xu, A Novel Semantic-aware Approach for Detecting Malicious Web Traffic, in proc. ICICS, 2017. (CCF-C)

10. X. Luo, L. Wang, et al., DGASensor: Fast Detection for DGA-Based Malwares, in proc. ICCBN, 2017.

11. X. Zhou, Z. Xu, L. Wang, et al., Inside the Closed WorldUser and Device Profile Analytics for SCADA Security, in proc. ICSP, 2018.(EI)

12. X. Zhou, Z. Xu, L. Wang, et al., Kill Chain for Industrial Control System, in proc. ICSP, 2018.(EI)

13. X. Zhou, Z. Xu, L. Wang, et al., APT Attack Analysis in SCADA Systems, in proc. ICSP, 2018.(EI)

14. X. Zhou, Z. Xu, L. Wang, et al., Construction and Evaluation of Defense-in-Depth architecture in SCADA System, in proc. ICSP, 2018.(EI)

15. X. Zhou, Z. Xu, L. Wang, et al., Behavior Based Anomaly Detection Model in SCADA System, in proc. ICSP, 2018.(EI)

16. X. Zhou, Z. Xu, L. Wang, and K. Chen, What should we do? A structured review of SCADA system cyber security standards, in proc. IEEE CoDIT, 2017. (EI)

17. D. Ma, L. Wang, and Z. Xu, Thwart Eavesdropping Attacks on Network Communication Based on Moving Target Defense, in proc. IPCCC, 2017. (CCF-C)

18. D. Ma, L. Wang, and Z. Xu, A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks, in proc. ICICS, 2016. (CCF-C)

19. D. Ma, L. Wang, et al., Host-identifier-based scheme for source accountability of the internet, in proc. IM, 2011. (CCF-C)

20. L. Ye, Y. Hu, H. Tan, and L. Wang, QoE-driven Cross-layer Design for Device-to-Device Video Delivery, in proc. ICPADS, 2016. (CCF-C)

21. Yukang Liu, Zhen Xu, Jing Yang, Liming Wang, Chen Song and Kai Chen. ANovel Meta-Heuristic-based Sequential Forward Feature Selection Approach forAnomaly Detection Systems[C]. Wu Han: The 2nd Annual International Conferenceon Network and Information Systems for Computers, 2016

22. G. Geng, X. Li, L. Wang, et al., Statistical feature extraction for cross-language web content quality assessment, in proc. ACM SIGIR, pp. 1129-1130, 2011. (CCF-A)

23. Zhen.Xie, Liming.Wang, YuanYuan.Ma, Zhen.Xu, CMDHunter Finding Malicious Domains from Cyclical,2016 5th International Conference on Computer Science and Network Technology(ICCSNT).

24. Liming Wang and Chuan-Kun Wu. Efficient Identity Based Multicast Scheme from Bilinear Pairing, IEE Proceedings Communications, Vol.152, No.6, December 2005,Page 877-882. SCI.

25. Liming Wang and Chuan-Kun Wu. Efficient Key Agreement for Large and Dynamic Multicast Groups. International Journal of Network Security, Vol. 3, No.1, July, 2006, pp. 8-17.

26. Liming Wang and Chuan-Kun Wu. Identity Based Group Key Agreement in Multiple PKG Environment. Wuhan University Journal of Natural Sciences . Vol.11, No.6, 2006, pp.1605-1608EI

27. Liming Wang and Chuan-Kun Wu. Identity Based Group Key Agreement from Bilinear Pairing. Wuhan University Journal of Natural Sciences. Vol.11, No.6, 2006, pp.1731-1735.EI

28. Liming Wang and Chuan-Kun Wu. Efficient Selective Identity Based Multicast Schemes Without Random Oracles. The Chinese Journal of Electronics . No.1,151-154, 2007.SCI.

29. Liming Wang and Chuan-Kun Wu. Authenticated Group Key Agreement Scheme for Multicast. the 5th International Conference on Cryptology and Network Security, LNCS 4301,2006,Berlin/Heidelberg: Springer-Verlag. pp. 55-72.SCI.

30. Liming Wang, Dianzhong Li, Yiyi Li etc, Modeling of Microstructral Evolution and Prediction of Mechanical Properties of Strip Steel in Hot Rolling Process, ISIJ International Vo.l42, No.12, 2002SCI.

31. D.Z.Li, L.M.Wang, Y.Y.Li, Modelling of Microstructural Evolution and Prediction of Mechanical Properties of Strip Steel in Hot Rolling Process, ICASS, 2002, Japan.

32. 徐震周晓军王利明等. PLC 攻防关头手艺研讨停顿[J]. 信息宁静学报2018.

33. 李宏佳王利明徐震杨畅. 5G 宁静:通讯与计较融会演进中的需要阐发与架构设想,[J]. 信息宁静学报, 2018.

34. 雷程马多贺张红旗杨英杰王利明. 基于收集进犯面自顺应转换的挪动方针进攻手艺[J]. 计较机学报,2017, 41(05), 1109-1131.

35. 陈晓兵,陈凯,徐震,王利明.面向产业节制收集的宁静羁系计划,信息收集宁静,pp61-702016 (7)

36. 张焕,武建亮,唐豪杰,班涛,俞研,郭山清,王利明,胡安磊. NeighborWatcher: 基于法式家属干系的附加歹意手机利用检测方式研讨[J]. 电子学报, 2014, 42(8), 1642-1646.

37. 王淼王利明徐震等. 基于熵变的多租户云内 DDoS 检测方式研讨[J]. 通讯学报, 2016(s1), 204-210.

38. 谢德俊王利明宋晨杨倩.基于 SDN 的自顺应收集拜候节制体系设想与完成. 收集新媒体手艺, Vol. 6No. 5pp.20-282017

39. 洪博,耿光刚,王利明,毛伟.  一种中文域名仿冒进犯的检测方式[J]. 计较机利用研讨,2013 11 期月刊.

40. 洪博,耿光刚,王利明,王伟,毛伟. 一种基于 DNS 自动检测垂钓进犯的体系[J]. 计较机利用研讨,2013 12 期月刊.

41. 马迪,毛伟,郊野,王伟,王利明. “面向可托互联网的 IP 地点办理手艺研讨”.《计较机利用研讨》, Vol. 29No. 3pp.801-8072012.

42. 朱田,陈涛,马迪,王利明,毛伟. “基于 IPv4 IPv6 过渡的 IP追溯手艺研讨”. 《计较机利用研讨》, Vol. 28No. 12pp.4409-44132011.

43. 陈威,王利明,耿光刚,毛伟,李晓东,“基于机械进修的域名信誉评价方式”,《计较机利用研讨》, vol29, No.2 pp690-697,2012

 

专利

1. 李海灵,洪博,王利明. “仿冒域名检测方式及装备”,专利受权号:ZL201310346713.9

2. 洪博,王利明,肖雅丽. “垂钓网站检测方式及装备”,  专利受权号:ZL201210104080.6

3. 肖雅丽,王利明,耿光刚,洪博.  “垂钓网站检测方式及装配”,  专利受权号:ZL201110402085.2

4. 王利明,耿光刚,洪博. “不良网页检测方式及装配”, 专利受权号:ZL201110401720.5

5. 洪博,耿光刚,王利明,肖雅丽.  “收集垂钓检测方式及装配”,  专利受权号:ZL201110212909.X

6. 马迪,王利明,郊野,沈烁,王伟. “实体标识符分派体系、溯源、认证方式及办事器”,专利受权号:ZL201110210819.7

7. 毛伟,李晓东,王龑,陈涛,沈烁,王利明. “域名体系和域名体系的信息处置方式、装配”, 专利受权号:ZL201010100342.2

8. 耿光刚,王利明,胡安磊.  “基于域名剖析特点的网站做弊检测方式”专利受权号:ZL201210333167.0

9. 王伟,马迪,王利明,朱田.  “数据包处置和溯源方式、装配及体系”,专利受权号:ZL201110212609.1

10. 洪博,耿光刚,王利明. “不良网站检测方式及装备”,  专利受权号:ZL201210104059.6

11. 王利明 ,耿光刚,陈威. “网站内容品质评价方式和装配”专利受权号:ZL201110205726.5

12. 延志伟,胡安磊,王利明. “一种 DNS 递归办事器的查问请求办事方式”专利受权号:ZL201210328266.X

13. 王利明,洪博. 仿冒域名检测方式及装备”,专利受权号:ZL201210104110.3

14. 周晓军,王利明,徐震,陈凯.“一种高效的和谈客户端缝隙挖掘方式与体系”, 专利受理号:CN 201810186292.0

15. 王利明,孔同,欧悯洁 ,雷程,马多贺,王淼. “一种面向多租户云计较的容器宁静监控方式及体系”, 专利受理号:CN201710711788.0

16. 王利明,谢德俊,宋晨 ,杨倩. “一种基于 SDN 收集途径的拜候节制方式及体系”,  专利受理号:CN201710253313.1

17. 王利明,雷程,马多贺 ,孔同,陈凯,欧悯洁 ,董文婷. “一种基于转发途径自迁徙的链路型 DDoS 进攻方式及体系”, 专利受理号:CN201710200585.5

18. 宋晨,王利明,史淼 ,杨倩,谢德俊. “一种基于 SDN 的数据流溯源方式”, 专利受理号:CN201710160267.0

19. 王利明,雷程,刘世文,马多贺,陈凯,董文婷,孔同. “一种基于 IP 地点自顺应转换的歹意扫描进攻方式及体系”, 专利受理号:CN201710140954.6

20. 杨倩,谢德俊,宋晨,王利明. “一种基于改良 AHP 的用户行动信赖评价方式及体系”专利受理号:CN201710059540.0

21. 荀浩,宋晨,王利明,史淼,杨倩,谢德俊. “一种 SDN 节制器的拜候节制方式及体系”专利受理号:CN201710018099.1

22. 王利明,宋晨.  “一种检测  SDN  中流表分歧性的方式和体系”,   专利受理号:CN201611186120.0

23. 刘艇,王利明,罗熙, 杨婧,张明扬,周晟, 傅慧斌. “一种基于反向 DNS 查问属性聚合的非常检测方式及体系”, 专利受理号:CN201611186125.3

24. 孙默,罗熙,王利明,杨婧. “一种对算法天生域名停止检测的方式及装配”, 专利受理号:CN201610686248.7

25. 宋晨,杨倩,王利明,徐震,姜帆,黎海燕,荀浩. “一种基于 SDN 手艺的通讯数据掩护方式”, 专利受理号:CN20

26. 王利明,徐震,宋晨,马多贺,杨倩,姜帆,黎海燕,荀浩. “一种基于 POF 的收集窃听进攻方式和体系”, 专利受理号:CN201510679633.4

27. 黄亮,姜帆,荀浩,马多贺,王利明,徐震. “基于入侵容忍的 SDN 节制器端体系和宁静通讯方式”, 专利受理号:CN201510455076.8

28. 王利明,姜帆,荀浩,马多贺,徐震. “一种 openflow 动静中流法则等价疾速鉴定方式”专利受理号:CN20

29. 陈凯,王利明. “面向产业节制收集的宁静数据收罗与非常检测方式与体系”, 专利受理号:CN201610387832.2

30. 马爽,徐震,王利明.  “一种电网信息物理融会体系交互建模方式”,  专利受理号:CN201610806061.6

31. 宋晨,王利明,史淼,荀浩,杨倩,谢德俊. “一种基于 SDN 的自界说数据包采样方式”, 专利受理号:CN201610929876.3

32. 杨倩,宋晨,荀浩,史淼,谢德俊,王利明. DNS 散布式反射型谢绝办事进犯检测,进攻方式与体系”, 专利受理号:CN201610877753.X

33. 王利明,王淼,徐震,马多贺,陈凯,董文婷. “一种云计较假造租户收集监控方式及体系”, 专利受理号:CN201610702447.2

34. 解珍,杨婧,王利明,孙默,骆文,王静. “一种基于周期性检测的歹意软件域名检测方式与体系”, 专利受理号:CN201610966292.3

35. 王利明,李丹. “一种中文仿冒域名检测方式及体系”, 专利受理号:CN201610809596.9

36. 王利明,李丹.  “一种中文域名类似度计较方式及仿冒域名检测方式”专利受理号:CN201610751260.1

37. 王利明,王淼,徐震,马多贺,陈凯,董文婷. “一种多租户云计较体系 DDoS 进犯检测方式及体系”专利受理号:CN201610912580.0

38. 洪博,耿光刚,王利明,胡安磊. “一种中文域名仿冒进犯的检测方式”,  专利受理号CN201410134029.9

39. 刘阳, 王利明 ,耿光刚 .  IP  地点办理方式、装备及体系 ” ,  专利受理号:CN201210148741.5

40. 马迪,王利明,郊野,沈烁,王伟. “接入认证方式、装备、办事器及体系”, 专利受理号:CN201110210884.X

41. 毛伟,李晓东,陈涛,王龑,沈烁,王利明. “对 DNS 报文中的身份信息停止认证的方式、办事器和体系”, 专利受理号:CN201010100355.X

42. 金键,王利明,李长江,王志洋. “一种基于 DNS IPv6 IPv4 互通讯方式”, 专利受理号:CN201410053456.4

43. 刘阳,王利明,耿光刚.IP地点办理方式、装备及体系”专利受理号:CN201210148741.5

44. 耿光刚,王利明,洪博. “网页跳转做弊检测方式及装配”专利受理号:CN201110402588.X

 

国度/行业规范

1. 王利明、李丹、王淼、宋晨、 胡亚辉、王伟、马迪、胡安磊、范乐君、吴倩. “中文仿冒域名检测规范”,规范号:2017-0307T-YD(名目号). 状况:报批

2. 王利明、宋晨、李彬. XX 入侵检测/进攻产物手艺请求”,规范号:BMB13-201X. 状况:报批

3. 王利明.XX 分级掩护请求”,规范号:BMB17-201X.  状况:报批

4. 王利明、宋晨、李丹.XX 数据库宁静 XX 防护产物手艺请求”,规范号:BMB2016A09( 名目号). 状况:收罗定见

5. 马迪、王利明、王伟、邹慧、李岱明、林兆骥,互联网码号资本公钥根本举措措施(RPKI )宁静运转手艺请求 证书战略与认证营业框架.报批稿

6. 马迪、王利明、王伟、邹慧、林兆骥,互联网码号资本公钥根本举措措施(RPKI)宁静运转手艺请求 数据宁静要挟模子. 状况:报批

7. 马迪、王利明、王伟、邹慧、邵晴、林兆骥,RPKI 宁静运转手艺请求 资本包罗干系考证,状况:报批.

8. 马迪、王利明、王伟、邹慧、邵晴、林兆骥, 互联网码号资本公钥根本举措措施(RPKI)宁静运转手艺请求 密钥更替, 状况:报批