当前位置: X-MOL首页全球导师 国内导师 › 秦中元

个人简介

秦中元,博士,副教授,硕士生导师, 江苏省科技评审专家,教育部学位中心论文评审专家,江苏省计算机学会信息安全专委会委员,《信息网络安全》期刊编委。 2009 年12 月至 2010 年 12 月获国家留学基金委资助到美国南加州大学进行访问学者交流,合作教授为多媒体专家 C.-C Jay Kuo 教授和国际云计算专家Kai Hwang (黄铠)教授。先后主持和参与完成国家自然科学基金、国家 863 高科技计划、信息产业部信息安全计划等多项国家科研项目,发表学术论文8 0余篇,申请国家发明专利 20 余项,参编著作 4 部。

研究领域

工业互联网信息安全 智能终端安全 无线网络安全

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

1. Zhongyuan Qin , Jiaqi Chen, Xin Sun, Yubo Song, Hua Dai, Weiwei Chen, Bang Lv,Kanghui Wang. Directed Grey Box Fuzzy Testing for Power Terminal Device Firmware with Intermediate Representation Similarity Comparison. Journal of Information Security and Applications . 2025. (JCR Q2, IF 3.8 ) 2. Zhongyuan Qin , Jiarong Fan, Xujian Liu, Zeru Li, Xin Sun. Effective fuzzing testcase generation based on variational auto-encoder generative adversarial network. Engineering Applications of Artificial Intelligence . 2025 . (JCR Q1,IF 7.5 ) 3. Zhongyuan Qin , Kefei Lu, Qunfang Zhang, Dinglian Wang, Liquan Chen. Dynamic privacy loss management: The innovation of α-confidence differential privacy filters and odometers. Computers & Security . 2025. (JCR Q1, IF 4.8, CCF B ) 4. Xiaokai Si, Yubo Song, Xin Sun, Wen Wang, Zhongyuan Qin . MARLFuzz: industrial control protocols fuzzing based on multi-agent reinforcement learning. Computing , 2025, 107, 61. (SCI, IF 3.3) 5. Yubo Song, Kanghui Wang, Xin Sun, Zhongyuan Qin , Hua Dai, Weiwei Chen, Bang Lv,Jiaqi Chen, A multi-source log semantic analysis-based attack investigation approach . Computers & Security . 2025 . (JCR Q1, IF 4.8, CCF B ) 6. 秦中元 ,王田田,刘伟强,等. 大语言模型水印技术研究进展, 信息网络安全. 2025,25(02):177-193. 7. Li Xiao, Chen Liquan, Jia Ju, Qin Zhongyuan, Fu Zhangjie. A Lightweight Image Forgery Prevention Scheme for IoT Using GAN-Based Steganography. IEEE Transactions on Industrial Informatics . 2024. (JCR Q1, IF 11.7) 8. Zhongyuan Qin, Dinglian Wang, Minghua Wang, Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework . Trustcom , IEEE, 2024. (CCF C) 9. Yuxuan Liu, Yadong Shi, Zhongyuan Qin* , Yubo Song,EtherEditor: Bytecode Defense Framework for Unleashing Proactive Smart Contract Security . HPCC , IEEE, 2024.(CCF C) 10. Yuxiang Zeng, Nan Ma, Zhongyuan Qin, MHFuzz: Advancing Heap Vulnerability Detection through Phased Fuzzing Strategies . HPCC , IEEE, 2024. (CCF C) 11. Zhongyuan Qin, Shiyuan Feng, Huahao Zhao, Tao Li, Aiqun Hu,BioWarp: An SDN Failure Recovery Scheme Based on Bio-Mimetic Optimization and Weighted-Cost Multi-Path Routing. HPCC , IEEE, 2024. (CCF C) 12. Zuo Xueying, Song Yubo, Mao Run, Qin Zhongyuan, Sun Xin. MODGF: Multi-Objective Optimization Approach for Directed Greybox Fuzzing. HPCC . Melbourne, Australia:IEEE, 2023. 106-113. (CCF C) 13. Zhang Chao, Qin Zhongyuan, Chen Liquan, Sun Xin,Wang Wen. AutoExploit: Automatic Exploit Generation with Security Mitigation. 2023 8th International Conference on Signal and Image Processing, ICSIP 2023. Wuxi, China: IEEE, 2023. 645-649. 14. 陈立全,朱宇航,王宇, 秦中元, 马旸. 基于混沌神经网络和C-MD结构的带密钥哈希函数, 网络与信息安全学报. 2023. 9(03): 1-15. (核心期刊 ) 15. 秦中元, 马楠,余亚聪,陈立全. 基于双重图神经网络和自编码器的网络异常检测, 信息网络安全. 2023. 23(09): 1-11. ( 核心期刊 ) 16. 秦中元, 戈臻伟, 潘经纬, 陈立全. 基于虚拟可信平台模块的完整性度量方案研究[J]. 信息网络安全, 2023, 23(2): 11-18. ( 核心期刊 ) 17. Xin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song, Zhongyuan Qin ,VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN , IEEE 21th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) , Wuhan, China, 28-30 Oct. 2022. (CCF C) 18. Lei Zhang , Dong Mao, Zuge Chen, Yubo Song, Liquan Chen, Zhongyuan Qin , Smart Grid Data Aggregation Scheme Based on Local Differential Privacy, IEEE 21th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) , Wuhan, China, 28-30 Oct. 2022. (CCF C) 19. 秦中元 ,贺兆祥,李涛,陈立全.基于图像重构的MNIST对抗样本防御算法[J]. 网络与信息安全学报,2022,8(01):86-94. 20. 秦中元 , 胡宁 , 方兰婷,基于免疫仿生机理和图神经网络的网络异常检测方法,信息网络安全 , 2021, 21(08): 10-16. 21. 秦中元 , 韩尹 , 张群芳 , 等 . 一种高可靠的多云存储密码管理器 [J]. 东南大学学报 ( 自然科学版 ),2019,49(6):1081-1087. 22. 秦中元 , 陆凯 , 张群芳 , 黄星期 . 一种二进制私有协议字段格式划分方法 [J]. 小型微型计算机系统 , 2019,40(11):2318-2323. 23. QIN Zhongyuan, PAN Wanpeng, XU Ying, FENG Kerong, and YANG Zhongyun , An Efficient Scheme of Detecting Repackaged Android Applications , ZTE COMMUNICATIONS , 2016 , 14(3) , 60-66 。 24. Zhongyuan Qin , Xinshuai Zhang, Kerong Feng, Qunfang Zhang, and Jie Huang, An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks, International Journal of Distributed Sensor Networks , vol. 2015. (SCI) 25. Qin Z , Zhang X, Feng K, Zhang Q, Huang J. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter. Sensors . 2014; 14(10):17937-17951. (SCI) 26. 秦中元 ,徐毓青,梁彪,张群芳,黄杰 , 一种 Android 平台恶意软件静态检测方法.东南大学学报:自然科学版, 2013 , 43 ( 6 ):1162-1167 。

学术兼职

中国计算机学会会员 江苏省网络空间安全学会会员 江苏省计算机学会信息安全专委会委员 江苏省计算机学会工控安全专委会委员

推荐链接
down
wechat
bug