蒋琳
通讯地址
深圳市南山区西丽深圳大学城哈工大校区C栋303 (518055)

电子邮件
zoeljiang@hit.edu.cn
联系电话
86-755-26033461
个人简介      
蒋琳,助理研究员,硕士生导师,深圳市海外高层次人才,南山区领航人才。先后主持国家自然科学基金项目2项、广东省自然科学基金项目1项,深圳市基础研究项目1项,863(军)项目子课题1项;作为副组长承担863项目1项、863(军)项目1项。作为第三获奖人获得深圳市科技进步奖二等奖1项。近5年在国内外学术期刊和会议上已发表论文共30篇,其中SCI索引10篇,EI索引29篇,JCR1/2区5篇,CCF推荐期刊A/B类3篇,CCF推荐会议C类4篇。
研究方向      
密码学、云/大数据安全、隐私保护深度学习、物联网安全
教育经历      
2006-2010
博士 香港大学计算机科学系
2002-2005
硕士 暨南大学电子工程系
1998-2002
学士 暨南大学电子工程系
研究与工作经历    
2013-
助理研究员 哈尔滨工业大学深圳研究生院
2011-2013
师资博士后 哈尔滨工业大学深圳研究生院
2010-2010
博士后 香港大学计算机科学系
专业资质与学术兼职    
2014
中国计算机学会会员、中国密码学会会员、香港资讯保安及法证公会(ISFS)专家会员,深圳市科技咨询专家
2014
国际期刊Journal of System and Software (JSS)、Information Processing Letter (IPL) 、Secure and Communication Networks (SCN)、The Journal of Intelligent Information Hiding and Multimedia Signal Processing (JIHMSP)审稿人
2014
国际会议ICICS2014(Hong Kong, Dec. 16-17, 2014)分会主席
国际会议NSS 2014(Xi’an, China, Oct. 15-17, 2014)程序委员会委员
2013
国际会议ICDFI 2013(Wuhan, China, Sep. 13-16, 2013)程序委员会委员
2012
国际会议ICICS 2012(Hong Kong, Oct. 21-23, 2012)程序委员会委员
国际会议ICDFI 2012(Beijing, China, Sep. 21-23, 2012)分会主席
2011
国际会议ASIACCS 2011(Hong Kong, Mar. 22-24, 2011)程序委员会委员
国际会议IIH-MSP2011(Dalian, China, Oct. 14-16, 2011)分会主席
科研项目    
2015.1-2017.12
具有安全仲裁员的属性加密 国家自然科学基金委青年科学基金项目 主持
2016.8-2018.9
面向E-医疗的隐私保护云数据访问技术研究 深圳市基础研究项目 主持
2016.6-2016.12
云计算环境用户数据隐私保护关键技术 教育部港澳与内地高等学校师生交流计划项目 主持
2014.10-2017.10
用户可撤销的属性加密算法研究 广东省自然科学基金委面上基金项目 主持
2015.1-2017.12
云计算环境用户数据隐私保护关键技术 国家863计划项目 副组长
2016.8-2019.8
量子保密通信技术研究 深圳市技术攻关项目 参与
2015.11-2017.10
单光子量子密钥分发高速后处理技术 深圳市基础研究项目 参与
2015.8-2017.8
基于水声信号分离、定位和跟踪的海洋环境探测技术 深圳市国际合作研究项目 参与
2014.7-2016.7
面向金融信息安全的数据隐私保护系统 深圳市国际合作研究项目 参与
2014.1-2017.12
数字取证调查中多媒体证据碎片的雕复及篡改检测核心问题研究 国家自然科学基金委国际(地区)合作与交流项目 参与
已结题
2013.1-2013.12
支持无效签名判定的基于身份聚合签名算法研究及应用 国家自然科学基金委专项基金
科研成果及奖励    
2015
非完备信息机器博弈中风险及对手模型的设计,2015年度广东省计算机学会科学技术奖,二等奖
2015
“云平台下具有隐私保护的多方参与聚类算法设计与实现”,第一届全国密码技术竞赛优秀指导教师奖
2015
“世安杯”广东省大学生网络安全大赛“优秀指导老师”称号
2013
“车联网关键技术研究”,最佳青年科技成果奖,中国人工智能学会2013全国青年论坛总论坛
2012
“高效网络海量多媒体安全管理系统”,2012年深圳市科技进步奖二等奖,排名第三
发明专利    
论文及著作    
期刊论文
1. Zoe L. Jiang, Junbin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, K. P. Chow, Lucas C. K. Hui, S. M. Yiu, and K. H. Pun. Maintaining Hard Disk Integrity with Digital Legal Professional Privilege (LPP) Data, IEEE Transactions on Information Forensics and Security, 8(1), pp. 821-828, 2013.5. (SCI, IF 2.065, JCR 1, CCF A)
2. Zoe L. Jiang, Ruojing Zhang, Zechao Liu, S.M. Yiu, C.K. Hui, junbin Fang, Xuan Wang. A Revocable outsourcing Attribute-based Encryption, Mobile Networks and Applications. (SCI, IF1.538, JCR 2, CCF C) (accepted)
3. Zoe L. Jiang, Junbin Fang, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, M.M. Sheng. k-Dimension Hashing scheme for Hard Disk Integrity Verification in Computer Forensics, Journal of Zhejiang University-SCIENCE C-Computers & Electronics, 12(10), pp. 809-818, 2011. (SCI, IF 0.308, JCR 4)
4. Junbin Fang, Zoe Lin Jiang*, Lucas C.K. Hui, S.M. Yiu. Checking Key Integrity Efficiently for High Speed Quantum Key Distribution by using Combinatorial Group Testing, Optics Communication, 284(1), pp.531-535, 2011. (SCI, IF 1.542, JCR 2)
5. Zechao Liu, Zoe L. Jiang(co-corresponding author), Xuan Wang, Xinyi Huang, S.M. Yiu, Kunihiko Sadakane. Offline/Online Attribute-Based Encryption with Verified Outsourced Decryption, Concurrency and Computation: Practice and Experience, 2016.8, doi: 10.1002/cpe.3915. (SCI, IF 0.5, JCR 3, CCF C)
6. Junbin Fang, Zoe L. Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang, Xiamu Niu, S. M. Yiu, Lucas C. K. Hui. Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design, Quantum Information Process, 13(6), pp. 1425-1435, 2014.6, doi: 10.1007/s11128-014-0737-7. (SCI, IF 2.960, JCR 1)
7. Cong Zuo, Kaitai Liang, Zoe L. Jiang*, Jun Shao, Junbin Fang. Cost-effective Privacy-Preserving Vehicular Urban Sensing System, Personal and Ubiquitous Computing. (SCI, IF1.498, JCR 2, CCF C) (accepted)
8. Joseph Liu, M.H. Au, Junbin Fang, Zoe L. Jiang*, Willy Susilo, Jianying Zhou. Efficient Privacy-Preserving Charging Station Reservation System, The Computer Journal, 2016.1, doi: 10.1093/comjnl/bxv117. (SCI, IF 0.787, JCR 3, CCF B)
9. Ye Li, Zoe L. Jiang*, Xuan Wang and S.M. Yiu. Outsourcing privacy-preserving ID3 decision tree over horizontal partitioned data for multiple parties. International Journal of High Performance Computing and Networking. 2016. (EI)通信作者(accepted)
10. Meng Liu, Xuan Wang, Zoe L. Jiang. An Efficient Secure IoT Data Storage Auditing Protocol with Adjustable Parameter in Cloud Computing, International Journal of Distributed Sensor Networks, 13(1), pp. 1-11, 2017.1, doi: 10.1177/1550147716686579. (SCI, IF 0.906, JCR 3)
11. Man Ho Au, Joseph K. Liu, Junbin Fang, Zoe L. Jiang, Willy Susilo, Jianying Zhou. A New Payment System for Enhancing Location Privacy of Electric Vehicles, IEEE Transactions on Vehicular Technology, 63(1), pp. 3-18, 2014.1. (SCI, IF 2.642, JCR 1, CCF B)
12. Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zeo L. Jiang and Xuan Wang*. Key Based Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing, Future Generation Computer Systems, 62, pp. 40-50, 2016.9. http://dx.doi.org/10.1016/j.future.2016.03.008 (SCI, IF 2.786, JCR 1, CCF C)
13. Junbin Fang, LIAO Chang‐jun, Zoe Lin Jiang, WEI Zheng‐jun, Jin‐dong WANG, Song‐hao LIU. Impact of Picosecond Laser Pulse Waveform on Detection Efficiency of Gated‐Mode Avalanche Photodiodes for Quantum Key Distribution, Optics Communications, 284(3), pp. 833-837, 2011.2. (SCI, IF 1.542, JCR 2)
14. Zili Zhang, Xuan Wang, Kai Han, Zoe L. Jiang. A Novel Arc Segmentation Approach for Document Image Processing, International Journal of Pattern Recognition and Artificial Intelligence, 29(1), 2015.2. (SCI, IF 0.669, JCR 3)
15. Xianhua Song, Shen Wang, Siuming Yiu, Lin Jiang, Xiamu Niu. Detection of Image Region Duplication Using Spin Image, IEICE Transactions on Information and Systems, E96-D(7), pp. 1565-1568, 2013.7. (SCI, IF 0.191, JCR 4)

书籍章节
Junbin Fang, Zoe L. Jiang†, Sijin Li, Siu-Ming Yiu, Lucas C.K. Hui, Kam-Pui Chow. Chapter 9 - Timeline analysis for digital evidences on MTK-based Shanzhai Mobile Phone, Advanced Topics in Security, Privacy and Forensic (Mobile Security and Privacy), Syngress/Elsevier Book Series, 2016(4000字)
会议论文及发表演说    
1. Jun Zhang, Xin Wang, Siu Ming Yiu, Zoe Jiang and Jin Li. Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM, the 12th ACM Asia Conference on Computer and Communications Security (AsiaCCS2017) , 2017.4-2-6, Abu Dhabi, UAE. (EI, CCF C) (accepted)
2. Junbin Fang, Sijin Li, Guikai Xi, Zoe L. Jiang*, Siu-Ming Yiu, Xuan Wang, Liyang Yu, Qi Han, and Qiong Li. Semantic Video Carving for Digital Forensics Using Perceptual Hash and Optical Flow, IFIP Working Group 11.9 on Digital Forensics, Orlando, Florida, USA, 2017.1.30-2.1. (EI, CCF C) (accepted)
3. Zechao Liu, Zoe L. Jiang*, Xuan Wang, S.M. Yiu, Chunkai Zhang and Xiaomeng Zhao. Dynamic Attribute-Based Access Control in Cloud Storage Systems, the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 August, 2016. (EI, CCF C)
4. Chuting Tan, Zoe L. Jiang(joint first author), Xuan Wang, S.M. Yiu, Junbin Fang, Jin Li, Yabin Jin, Jiajun Huang. Generic Construction of Publicly Verifiable Predicate Encryption, the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS2016), 16, May 30-June 03, 2016, pp. 889-894, Xi’an, China. (EI, CCF C) (doi: 10.1145/2897845.2897919)
5. Yuechen Chen, Zoe L. Jiang(co-corresponding author), S.M. Yiu, Joseph K. Liu, M.H. Au, and Xuan Wang, Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator, the 2014 International Conference on Information and Communications Security (ICICS2014), 2014.12.16-17, LNCS 8958, pp. 274-289, doi: 10.1007/9780-3-319-21966-0_20. (EI, CCF C)
6. Xiaoyan Liu, Zoe L. Jiang*, S.M. Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Junbin Fang. Outsourcing Two-party Privacy Preserving K-means Clustering Protocol in Wireless Sensor Networks, the 11th International Conference on Mobile Ad-hoc and Sensor Networks (IEEE MSN2015), 2015.12.16-18, pp. 124-133, Shenzhen, China. (EI) (doi: 10.1109/MSN.2015.42)
7. Junbin Fang, Zoe L. Jiang, S.M. Yiu, K. P. Chow, L.C.K. Hui, Long Chen, Xiamu Niu. A Dual Cube Hashing Scheme for Solving LPP Integrity Problem, Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2011), pp. 1-7, Oakland, USA, 2011. (EI, 最佳论文)
8. Junbin Fang, Zoe Lin Jiang, S.M. Yiu, Lucas C.K. Hui, K.P. Chow, Mengfei He. Investigating the web-based contents on Shanzhai Mobile Phone. Seventh IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012), Vancouver BC, Canada, 2012. (EI)
9. Junbin Fang, Zoe L. Jiang, K.P. Chow, S.M. Yiu, Lucas C.K. Hui, Gang Zhou, Mengfei He, Yanbin Tang. Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones, Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII, pp. 129-142, Pretoria, South Africa, 2012. (EI)
10. Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui. Efficient key integrity verification for quantum cryptography using combinatorial group testing, Quantum Information and Computation VIII Conference 7702 - Proceedings of SPIE, Vol. 7702, Orlando, USA, Apr. 5-9, 2010. (EI)
11. Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui. Hard Disk Integrity Check by Hashing with Combinatorial Group Testing, the 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC-09), Jeju Island, Korea, Dec. 10-12, Vol. 1, pp. 569-574, 2009. (EI)
12. S.H.Y. Wong, Zoe L. Jiang, L. C. K. Hui, S. M. Yiu. Two Efficient Proxy Signature Schemes for Delegation Chains With Nonrepudiation and Untraceability, Proceedings of The 2009 International Conference on Security and Management (SAM 2009), Las Vegas, USA, Jul. 13-16, Vol. 1, pp. 307-313, 2009.
13. Tong Li, Zheli Liu, Jin L, Chunfu Jia, Zoe L. Jiang. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage, 21st Australian Conference on Information Security and Privacy (ACISP2016), Part II, LNCS 9723, pp. 153-169, Melbourne, Australia, 4-6 July, 2016. (EI, CCF C) (doi: 10.1007/978-3-319-40367-0 10)
14. Gangzhou, Yanbin Tang, Junbin Fang, Zoe L. Jiang, etc., Photo Forensics on Shanzhai Mobile Phone, the 8th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2013), LNCS 7992, pp. 454-464, 2013.8. (EI, CCF C)
15. Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe L. Jiang and Xuan Wang*. Key based reducer placement for data analytics across data centers considering bilevel resource provision in cloud computing, Proceedings of the International Conference on Internet of Things and Big Data, Vol 1, Rome, Italy, April 23-25, pp. 243-254, 2016. (EI) doi: 10.5220/0005894202430254.
16. Zoe Jiang, Lucas Hui and Siu-Ming Yiu. Improving Disk Sector Integrity Using k-Dimension Hashing, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics IV, Vol. 285, No. 14, pp. 87-98, 2008. (EI, CCF C)
17. Zoe L. Jiang, Junbin Fang, S.M. Yiu, L.C.K. Hui. Secure End-to-end Browsing System with Mobile Composition, the 2nd International Conference on Internet Technology and Applications (iTAP 2011), pp.1-4, Wuhan, China, 2011. (EI)
18. Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Y. Dong, S.H.Y. Wong. Chained Threshold Proxy Signature without and with Supervision, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, Dec. 12-14, Vol. 3, pp. 837-840, 2008. (EI)
19. Zoe L. Jiang, Lucas C.K. Hui, K.P. Chow, S.M. Yiu and Pierre K.Y. Lai. Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, the 2007 International Workshop on Forensics for Future Generation Communication environments (F2GC-07), Proceedings of Future Generation Communication and Networking, Vol. 2, pp. 141-145, 2007. (EI)
任教和任导师经历    
任教经历
应用密码学 全日制硕士课程 2012春/2013秋/2014秋/2015秋/2016秋
信息安全工程 非全日制硕士课程 2012秋
任导师经历
2014年取得硕士生导师资格
最后更新:2017-02