当前位置: X-MOL首页全球导师 国内导师 › 黄杰

个人简介

教授,博导,十二五 “863 计划 ” 首席专家,入选江苏省 “ 六大人才高峰 ” 计划。 先后承担了 国家重点研发计划项目 , “863 计划 ” 主题项目,“863 计划 ” 前瞻性项目,自然科学基金项目, 部委预研项目, 工信部项目, 江苏省创新基金, 国家电网科技项目等20余项国家及省部级项目,成功帮助企业开发了 3 个产品。获得浙江省科技进步“三等奖” 1 项。取得的 2项成果通过了江苏省教育厅的鉴定,其中一项成果被评为国际先进水平,另一项为国内领先水平。出版一部“十三五”规划教材,申请发明专利 40+ 项,其中 23项已经授权,获得软件著作权 6 项。近几年,被 EI 或 SCI 收录的论文 40 多篇。

研究领域

移动通信网及其安全技术 深度学习与人工智能安全 大数据安全及其隐私计算

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1] S. Z hang, J. Huang , P. Li, and C. Liang, “Differentially private federated learning with local momentum updates and gradients filtering,” Information Sciences, vol. 680. 2024. doi : 10.1016/j.ins.2024.120960. [2] Z. Zhang and J. Huang , “Aligning the domains in cross domain model inversion attack,” Neural Networks, vol. 178, p. 106490, Oct. 2024, doi : 10.1016/j.neunet.2024.106490. [3] P. Li, J. Huang , H. Wu, Z. Zhang, and C. Qi, “ SecureNet : Proactive intellectual property protection and model security defense for DNNs based on backdoor learning,” Neural Networks, vol. 174, p. 106199, Jun. 2024, doi : 10.1016/j.neunet.2024.106199. [4] Y. Peng, J. Huang , S. Zhou, Z. Ju, X. Wang, and P. Li, “BGET: A Blockchain-Based Grouping- EigenTrust Reputation Management Approach for P2P Networks,” Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 561 LNICST. pp. 225–242, 2024. doi : 10.1007/978-3-031-54521-4_13. [5] C. Liang, J. Huang , Z. Zhang, and S. Zhang, “Defending against model extraction attacks with OOD feature learning and decision boundary confusion,” Computers & Security, vol. 136, p. 103563, Jan. 2024, doi : 10.1016/j.cose.2023.103563. [6] S. Zhang, J. Huang , Z. Zhang, P. Li, and C. Qi, “Compromise privacy in large-batch Federated Learning via model poisoning,” Information Sciences, vol. 647, p. 119421, Nov. 2023, doi : 10.1016/j.ins.2023.119421. [7] X. Zhu, J. Huang , and C. Qi, “ Modeling and Analysis of Malware Propagation for IoT Heterogeneous Devices,” IEEE Systems Journal, vol. 17, no. 3, pp. 3846–3857, 2023, doi : 10.1109/JSYST.2023.3269158. [8] X. Zhu and J. Huang , “ SpreadRank : A Novel Approach for Identifying Influential Spreaders in Complex Networks,” Entropy, vol. 25, no. 4, 2023, doi : 10.3390/e25040637. [9] X. Wang, J. Huang, and J. Chen, “Group Key Generation Scheme Based on Random Forwarding Network for Large-scale IoT Devices,” presented at the Proceedings - 2023 2nd International Conference on Sensing, Measurement, Communication and Internet of Things Technologies, SMC-IoT 2023, 2023, pp. 78–84. doi : 10.1109/SMC-IoT62253.2023.00022. [10] Z. Zhang, X. Wang, J. Huang , and S. Zhang, “Analysis and Utilization of Hidden Information in Model Inversion Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4449–4462, 2023, doi : 10.1109/TIFS.2023.3295942. [11] C. Qi, J. Huang , X. Zhao, and Z. Wang, “Lightweight network structure face recognition method based on cloud-edge collaboration,” Dongnan Daxue Xuebao ( Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 53, no. 1, pp. 1–13, 2023, doi : 10.3969/j.issn.1001-0505.2023.01.001. [12] X. Wang, J. Huang , C. Qi, Y. Peng, and S. Zhang, “An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay,” PeerJ Computer Science, vol. 9, 2023, doi : 10.7717/PEERJ-CS.1349. [13] S. Zhang, J. Huang , Z. Zhang, and C. Qi, “Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters,” in Algorithms and Architectures for Parallel Processing, W. Meng, R. Lu, G. Min, and J. Vaidya, Eds., in Lecture Notes in Computer Science. Cham: Springer Nature Switzerland, 2023, pp. 63–80. doi : 10.1007/978-3-031-22677-9_4. [14] P. Li, J. Huang , S. Zhang, C. Qi, C. Liang, and Y. Peng, “A Novel Backdoor Attack Adapted to Transfer Learning,” presented at the Proceedings - 2022 IEEE SmartWorld , Ubiquitous Intelligence and Computing, Autonomous and Trusted Vehicles, Scalable Computing and Communications, Digital Twin, Privacy Computing, Metaverse, SmartWorld /UIC/ATC/ ScalCom / DigitalTwin / PriComp/Metaverse 2022, 2022, pp. 1730–1735. doi : 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00246. [15] C. Qi, J. Huang , C. Huang, H. Wu, and X. S. Shen, “Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model,” presented at the Proceedings - IEEE Global Communications Conference, GLOBECOM, 2022, pp. 6259–6264. doi : 10.1109/GLOBECOM48099.2022.10000946. [16] X. Wang, J. Huang , Z. Duan, Y. Xu, and Y. Yao, “Randomness analysis of end-to-end delay in random forwarding networks,” PeerJ Computer Science, vol. 8, 2022, doi : 10.7717/PEERJ-CS.942. [17] S. Zhang, J. Huang , C. Qi, and X. Wang, “Online IoT device identification method based on SOINN,” Dongnan Daxue Xuebao ( Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 51, no. 4, pp. 715–723, 2021, doi : 10.3969/j.issn.1001-0505.2021.04.023. [18] X. Zhu, J. Huang , B. Wang, and C. Qi, “Malware homology determination using visualized images and feature fusion,” PeerJ Computer Science, vol. 7, pp. 1–22, 2021, doi : 10.7717/peerj-cs.494. [19] C. Qi, J. Huang, X. Zhu, and X. Wang, “MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNs,” presented at the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference, CCWC 2021, 2021, pp. 839–845. doi : 10.1109/CCWC51732.2021.9375914. [20] Xuejin Zhu, Jie Huang* , Bin Wang, Chunyang Qi. Malware homology determination using visualized images and feature fusion[J]. PeerJ Computer Science, Wireless Communications and Mobile Computing, 2021.4:1-22 [21] Chunyang Qi, Jie Huang* , Bin Wang, Hongkai Wang. A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs[J]. 2021.7: 1-16 [22] Xiang Liu, Teng Joon Lim, Jie Huang* . Universal Resource Allocation Framework for Preventing Pollution Attacks in Network-Coded Wireless Mesh Networks[J]. Ad Hoc Networks, 2020, 99: 102073. [23] Xiang Liu, Teng Joon Lim, Jie Huang* . Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks[J]. IEEE Transactions on Information Forensics and Security, 2020,15(1): 2570-2583 [24] Xiang Liu, Jie Huang* , Yuanxi Wu, Guowen Zong. A Privacy-Preserving Signature Scheme for Network Coding[J]. IEEE Access, 2019, 7: 109739-109750 [25] Xiang Liu, Jie Huang* . A probabilistically weakly secure network coding scheme in multipath routing for WSNs[J]. Sensors, 2017,17(5) [26] Jie Huang* , Bei Huang, A Security Key Distribution Scheme Based on Energy Efficiency for Hybrid Wireless Sensor Networks, Security and Communication Networks , 2014,7(8): 1189-1198.

学术兼职

1 、 IEEE PES 电力物联数据传输及信息交换 技术分委会 副主席 2 、 “ 大数据安全与隐私保护专业委员会 ” 委员

推荐链接
down
wechat
bug