近5年部分发表/录用论文 [1]Jian Mao*, Qixiao Lin, Shishi Zhu, Liran Ma, and Jianwei Liu, SMARTTRACER: Anomaly-driven Provenance Analysis Based on Device Correlation in Smart Home Systems, IEEE Internet of Things Journal, 2023. (SCI JCR 1 区) [2]Zequan Zhou, Xiling Luo, Yupeng Wang, Jian Mao* et al., A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing, IEEE Transactions on Vehicular Technology, 2023. (SCI JCR 1 区) [3]Jian Mao*, Ziwen Liu, Qixiao Lin, Zhenkai Liang, Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages, IEEE Internet of Things Journal, 2022. (SCI JCR 1 区) [4]Jian Mao*, SybilHunter: Hybrid Graph-based Sybil Detection by Aggregating User behaviors, Neurocomputing, 2022. (SCI JCR 1 区) [5]Jian Mao*, Yitong Yang and Tianchen Zhang, Empirical Analysis of Attribute Inference Techniques in Online Social Network, IEEE Transactions on Network Science and Engineering, 2021, 8(2), 881-893. (SCI JCR 1 区) [6]Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao*. WATSON: Abstracting behaviors from audit logs via aggregation of contextual semantics. Proceedings of the Network and Distributed Systems Security Symposium, 2021(NDSS’2021). (安全顶会,通讯作者) [7]Jian Mao*, Shishi Zhu, Qixiao Lin. Watchdog: Detecting Ultrasonic-based Inaudible Voice Attacks to Smart Home Systems, IEEE Internet of Things Journal, 2020. (SCI JCR 1 区) [8]Jian Mao*, Xiang Li, Qixiao Lin, Jianwei Liu, Deeply Understanding Graph-Based Sybil Detection Techniques via Empirical Analysis on Graph Processing, China Communications, 2020, 17(10). (SCI JCR 3区,通信学会A类) [9]Mengmeng Wang, Jianwei Liu, Jian Mao*, Haosu Cheng, Jie Chen, Chan Qi. RouteGuardian: Constructing Secure Routing Paths in Software Defined Networking. Tsinghua Science and Technology, 2017, 22(4): 400-412 (SCI, 通讯作者,2019 年度优秀论文奖,Web of Science他引:18) [10]Qixiao Lin, Jian Mao*, Futian Shi, Shishi Zhu, Zhenkai Liang. Detecting Android Side Channel Probing Attacks Based on System States, The 14th International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2019: 201-212. (CCF-C 类会议,会议最佳论文奖) [11]Jian Mao*, Shishi Zhu, Jingdong Bian, Qixiao Lin, Jianwei Liu. Anomalous Power-usage Behavior Detection from Smart-Home Wireless Communications. IEEE Journal of Communications and Information Networks. 2019, 4(1): 23-33.(通讯学会 A 类) [12]Jian Mao*, Jingdong Bian, Wenqian Tian, Shishi Zhu, Taowei, Aili Li, Zhenkai Liang. Phishing page detection via learning classifiers from page layout feature. EURASIP Journal on Wireless Communications and Networking. 2019: 43(SCI JCR 3区,Web of Science他引:12) [13]Jian Mao*, Shishi Zhu, Jianwei Liu. An Inaudible Voice Attack to Context-based Device Authentication in Smart IoT Systems. Journal of Systems Architecture, 2019, 104: 101696 (SCI,CCF-B 类期刊,Web of Science他引:6) [14]Jian Mao, Yan Zhang, Pei Li, Jianwei Liu. A position-aware Merkle tree for dynamic cloud data integrity verification. Soft Computing, 2017, 21(8): 2151-2164. (SCI,CCF-B 类期刊,Web of Science他引:24) [15]Jian Mao*, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, and Xuxian Jiang. Robust Detection of Android UI Similarity. IEEE International Conference on Communications (IEEE ICC2018), Kansas City, MO, USA. May 2018: 1-6. (CCF-C 类) [16]Jian Mao*, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity, IEEE Access, 2017, 5: 17020-17030 (SCI, Q1, Web of Science他引:35) [17]Jian Mao, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang. Poster: GeminiScope: An Efficient Solution for Detecting UI-Mimicking Android Applications. The 37th IEEE Symposium on Security and Privacy (S&P 2016), May 2016. [18]Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao*, Zhenkai Liang. Man-in-the-browser-cache: Persisting HTTPS Attacks via Browser Cache Poisoning. Computers and Security. 2015, 55: 62-80. (SCI, CCF-B, 通讯作者, Web of Science他引:33)
部分已授权专利、软件著作权 [1] 毛剑、刘建伟、李坤、徐先栋、冯克、张晏. 一种无线信道数据完整性保护方法. ZL201210154081.1 [2] 毛剑、徐先栋、刘建伟、张晏、李坤、修春娣. 一种分布式云存储数据完整性保护方法. ZL201210159546.2 [3] 毛剑、张晏、刘建伟、徐先栋、冯克、尚涛. 一种云存储数据持有性验证方法. ZL201210159377.2 [4] 李坤、毛剑*、刘建伟、冯克、李佩. 一种钓鱼网站检测方法. ZL201210477139.6. [5] 毛剑、冯克、李腾、刘建伟、张晏、张键红. 一种可公开验证云端数据持有性校验方法. ZL201310295910.2 [6] 毛剑、李腾、张晏、冯克、刘建伟、伍前红. 一种云存储数据完整性验证方法. ZL201310246856.2 [7] 毛剑、李腾、王瑞珑、陈杰、王培人、伍前红、刘建伟. 一种云存储服务信用评价方法. ZL201410283074.0(已转化) [8] 毛剑,祝施施,刘建伟等. 针对超声波的语音隐藏攻击的检测方法及装置. ZL201810804883.X(已转化) [9] 毛剑,卞京东,杨晨,刘建伟等. 基于智能插座的电器类型推断方法及装置. (CN201810501654.0) [10] 毛剑,王瑞珑,陈岳,刘建伟,马寒军,伍前红. HTML5移动应用程序的异常行为检测方法和行为模型建立方法. ZL2015103331621.(已转化) [11] 毛剑、崔键、刘建伟等. 移动应用程序异常行为检测方法及装置. ZL2016100037984.(已转化) [12] 毛剑、陈岳、刘建伟等. Web应用程序行为提取方法和恶意行为检测方法. ZL2015108817655.(已转化) [13] 毛剑、马寒军、卞京东、刘建伟、关振宇. Hybrid移动应用用户界面的检测方法及系统. ZL201710385933.0.(已转化) [14] 毛剑、李佩、李腾、陈岳、马寒军、刘建伟.一种钓鱼网页检测方法. ZL201410282730.5.(已转化) [15] 毛剑,陈岳,史福田,伍前红,刘建伟. 基于浏览器扩展插件的网页行为提取和分析工具软件. 受理号:2015R11S243689 (软件著作权)
出版教材 [1] 毛剑, 刘建伟,网络安全创新实验(微课版),清华大学出版社,2023.01. [2] 毛剑,刘建伟,Web安全简明实验教程,电子工业出版社,2023.03.
部分教学论文 [3] Jian Mao, Zheng Leong Chua, Zhenkai Liang. Enabling Practical Experimentation in Cyber-Security Training[C]. 2017 IEEE Conference on Dependable and Secure Computing. August 2017. [4] Zhenkai Liang and Jian Mao. Tool, Technique, and Tao in Computer Security Education. IEEE Reliability Magazine, August 2015. [5] 毛剑, 刘建伟, 尚涛, 关振宇, 张宗洋, 徐同阁, 基于 OBE 的《网络安全》闭环课堂教学方法探索与实践, 工业和信息化教育, 2019(4): 42-47 [6] 毛剑,尚涛,关振宇,徐同阁,白琳,刘建伟,聚焦国际前沿化的信息系统安全课程体系建设初探,工业和信息化教育,2021。 [7] 毛剑,刘正华,刘建伟,尚涛,彭浩,王天博,伍前红,Web安全研究生精品课程建设初探,计算机教育,202302,338(2):26-30
|