个人简介
Dr. Kai Dong is an associate professor in the School of Computer Science and Engineering and the College of Software Engineering, Southeast University (SEU). In 2010, he received his B.S. and M.E. degrees in Computer Science and technology from Nanjing University (NJU), China. In 2014, he received his Ph.D degree in Computer Software and Theory from Nanjing University under the supervision of Prof. Jian Lv (Academician of CAS). Since then, he joined Prof. Junzhou Luo’s Group in SEU.
实验室:江苏省网络与信息安全重点实验室 (Jiangsu Provincial Key Laboratory of Network and Information Security, JSSEC) 。省内唯一、长期专业从事网络与信息安全理论研究和技术开发的团队。
获奖情况:
• 教育部-高校计算机专业优秀教师奖励计划,2024(全国仅55人)
• 教育部-XX-“智能基座”全国优秀教师,2021(全国仅20人)
• 江苏省计算机学会教学新秀奖二等奖,2023(全省一等奖1人、二等奖2人)
• 东南大学全校十大最受欢迎老师,2019
科研项目:
• National Natural Science Foundation of China (62472089, 62132009, 62232004)
• Jiangsu Key R&D Program (BE2022065-5, BE2022680)
• Jiangsu Provincial Key Laboratory of Network and Information Security (BM2003201)
• Key Laboratory of Computer Network and Information Integration of Ministry of Education of China (Grant No. 93K-9)
• Collaborative Innovation Center of Novel Software Technology and Industrialization.
研究领域
大模型与RAG安全
可解释AI与AI安全
差分隐私与隐私计算
操作系统与体系结构安全
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
1. Huanhuan Jia, Yuanbo Zhao, Kai Dong *, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu. Distributed Private Aggregation in Graph Neural Networks, in Proceedings of the 34rd USENIX Security Symposium, 2025. [Artifacts] (CCF A)
2. Yixuan Yao, Ming Yang, Zixia Liu, Kai Dong , Xiaodan-Gu, Chunmian Wang. Do Not Trust What They Tell: Exposing Malicious Accomplices in Tor via Anomalous Circuit Detection, in The Web Conference ( WWW ), 2025. (CCF A)
3. Kai Dong , Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu. Relation Mining Under Local Differential Privacy, in Proceedings of the 33rd USENIX Security Symposium, 2024. [Artifacts] (CCF A)
4. Chongqing Lei, Zhen Ling, Xiangyu Xu, Shaofeng Li, Guangchi Liu, Kai Dong , Junzhou Luo. FlexEmu: Towards Flexible MCU Peripheral Emulation’, in Proceedings of the 32nd ACM Conference on Computer and Communications Security ( CCS ), 2025.
5. Haodi Wang, Kai Dong *, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang*, Xianglong Liu. Transferable Multimodal Attack on Vision-Language Pre-training Models, in Proceedings of the 45th IEEE Symposium on Security and Privacy ( S&P ), 2024. [Artifacts] (CCF A)
6. Kai Dong , Yakun Zhang, Yuchen Zhao, Daoming Li, Zhen Ling, Wenjia Wu, Xiaorui Zhu. Real-Time Execution of Trigger-Action Connection for Home Internet-of-Things, IEEE Conference on Computer Communications ( INFOCOM ), 2022: 1489-1498. (CCF A)
7. Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong , Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu. LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems, in Proceedings of the 31th Network and Distributed System Security ( NDSS ), 2024. (CCF A)
8. Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong , Kaizheng Liu, Junzhou Luo, Xinwen Fu. Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks, in Proceedings of the 30th Network and Distributed System Security ( NDSS ), 2023. (CCF A)
9. Taolin Guo, Shunshun Peng, Kai Dong , You Zhao, Mingliang Zhou. RDPCF: Range-based differentially private user data perturbation for collaborative filtering, in Computers & Security 134 (2023): 103452, 2023. (JCR 1, CCF B)
10. Taolin Guo, Junzhou Luo, Kai Dong , Ming Yang, Locally differentially private item-based collaborative filtering. Information Sciences, 2019, 502: 229-246. (JCR 1, CCF B)
11. Taolin Guo, Junzhou Luo, Kai Dong , Ming Yang. Differentially private graph-link analysis based social recommendation. Information Sciences, 2018, 463: 214-226. (JCR 1, CCF B)
12. 董恺, 蒋驰昊, 李想, 凌振, 杨明. 基于代理训练集的属性推理攻击防御方法. 计算机学报, 2024,47(4). (中文 CCF A)
13. 董恺; 王立夫; 凌振,面向实时位置的隐私保护优化与加速求解算法,计算机研究与发展, 2024, 61(9): 2156-2169. (中文 CCF A)