Ding Wang (汪 定)
Full Professor, College of Cyber Science, Nankai University, Tianjin(27 mins from Beijing)
100 Young Academic Leaders of Nankai University; Tianjin Talent Introduction-Leading Talent;
Email: wangding at nankai.edu.cn; wangding at pku.edu.cn
2021-Now, Chair of Department of Cryptography(密码系主任), Nankai University ;
2019-Now, Professor, Nankai University; Deputy-director of Tianjin Key Laboratory of Network and Data Security Technology ;
2017-2019, Lecturer & Boya Postdoctoral Fellowship, Peking University, Beijing;
2013-2017, PhD. in Information Security, Peking University, Beijing ;
2010-2012, MS. in Information Security, Harbin Engineering University;
2008-2009, BA. in Information Engineering, Information Engineering University;
2004-2008, BA. in Information Security, Nankai University, Tianjin.
Minds are like parachutes, they only function when open. I am looking forward to cooperating with those working on related areas. Being open minded, we together can exchange interesting ideas, perform individually insurmountable experiments, have a visit, etc. You are welcome to our lab. NKU is beautiful.
Full Professor, College of Cyber Science, Nankai University, Tianjin(27 mins from Beijing)
100 Young Academic Leaders of Nankai University; Tianjin Talent Introduction-Leading Talent;
Email: wangding at nankai.edu.cn; wangding at pku.edu.cn
2021-Now, Chair of Department of Cryptography(密码系主任), Nankai University ;
2019-Now, Professor, Nankai University; Deputy-director of Tianjin Key Laboratory of Network and Data Security Technology ;
2017-2019, Lecturer & Boya Postdoctoral Fellowship, Peking University, Beijing;
2013-2017, PhD. in Information Security, Peking University, Beijing ;
2010-2012, MS. in Information Security, Harbin Engineering University;
2008-2009, BA. in Information Engineering, Information Engineering University;
2004-2008, BA. in Information Security, Nankai University, Tianjin.
Minds are like parachutes, they only function when open. I am looking forward to cooperating with those working on related areas. Being open minded, we together can exchange interesting ideas, perform individually insurmountable experiments, have a visit, etc. You are welcome to our lab. NKU is beautiful.
Research Interests: We are devoted to authentication and related area(researches):
(1) Machine learning-based techniques for authentication;
(2) Protocols, including Password-based, Blockchain-based, Lattice-based ones;
(3) Multi-factor authentication, including passwords, devices, biometrics and others;
We are looking for promising Professors/Associate Professors/Assitant Professors/ PostDoc/Lecturers and self-motivated Ph.D/Master students interested in the above research areas. We together do some great work and aim to make real impact! Feel free to drop me an email!
(1) Machine learning-based techniques for authentication;
(2) Protocols, including Password-based, Blockchain-based, Lattice-based ones;
(3) Multi-factor authentication, including passwords, devices, biometrics and others;
We are looking for promising Professors/Associate Professors/Assitant Professors/ PostDoc/Lecturers and self-motivated Ph.D/Master students interested in the above research areas. We together do some great work and aim to make real impact! Feel free to drop me an email!
Research Funds: Our work is supported by NSF of China, State Key Lab of Cryptography, and National Key R&D Plan.
(13) NSF of China, Excellent Young Scientists Program, "Secret Key Security" (2023.01~2025.12);
(12) NSF of China, General Program,"Machine Learning based Authentication" (2022.01~2025.12);
(11) Key Program of NSF, Tianjin, "Password Authentication" (2021.10~2024.09);
(10) Research Program of Jing-Jin-Ji Cooperation, "Provable Authentication for Industrial IoT" (2022.01~2024.12);
(9) National Key R&D Plan, "Identity Security" (2021.11~2023.11);
(8) Research Project of CETC, "User Authentication" (2020.01~2021.12);
(7) Science Foundation of NKU, "Authentication Team Building" (2020.01~2022.12);
(6) NSF of China, "Authentication for mobile devices" under Grant No. 61802006 (2019.01~2020.12);
(5) State Key Lab of Crypto, "Leakage-resistant authentication" under Grant No. MMKT-2018-31 (2018.07~2020.06);
(4) China Postdoctoral Science Foundation, "Password authentication" under No. 2019T120019 (2019.06~2019.11);
(3) China Postdoctoral Science Foundation, "Multi-factor authentication" under No. 2018M640026 (2018.11~2019.11);
(2) National Key R&D Plan, "Multi-factor Auth for Virtual Concurrency" under No. 2016YFB0800603 (2016.07~2019.06).
(1) NSF of China, "Anonymous multi-factor authentication" under Grant No. 61472016 (2015.01~2018.12);
PhD Dissertation: Research on Key Issues in Password Security (口令安全关键问题研究), 2017.06. PDF
Doctoral Dissertation Award by Peking University, China Computer Federation, ACM SIGSAC China, and ACM China.
(ACM中国优秀博士论文奖; 中国计算机学会优秀博士论文奖; ACM SIGSAC中国优秀博士论文奖; 北京大学优秀博士论文奖.)
(13) NSF of China, Excellent Young Scientists Program, "Secret Key Security" (2023.01~2025.12);
(12) NSF of China, General Program,"Machine Learning based Authentication" (2022.01~2025.12);
(11) Key Program of NSF, Tianjin, "Password Authentication" (2021.10~2024.09);
(10) Research Program of Jing-Jin-Ji Cooperation, "Provable Authentication for Industrial IoT" (2022.01~2024.12);
(9) National Key R&D Plan, "Identity Security" (2021.11~2023.11);
(8) Research Project of CETC, "User Authentication" (2020.01~2021.12);
(7) Science Foundation of NKU, "Authentication Team Building" (2020.01~2022.12);
(6) NSF of China, "Authentication for mobile devices" under Grant No. 61802006 (2019.01~2020.12);
(5) State Key Lab of Crypto, "Leakage-resistant authentication" under Grant No. MMKT-2018-31 (2018.07~2020.06);
(4) China Postdoctoral Science Foundation, "Password authentication" under No. 2019T120019 (2019.06~2019.11);
(3) China Postdoctoral Science Foundation, "Multi-factor authentication" under No. 2018M640026 (2018.11~2019.11);
(2) National Key R&D Plan, "Multi-factor Auth for Virtual Concurrency" under No. 2016YFB0800603 (2016.07~2019.06).
(1) NSF of China, "Anonymous multi-factor authentication" under Grant No. 61472016 (2015.01~2018.12);
PhD Dissertation: Research on Key Issues in Password Security (口令安全关键问题研究), 2017.06. PDF
Doctoral Dissertation Award by Peking University, China Computer Federation, ACM SIGSAC China, and ACM China.
(ACM中国优秀博士论文奖; 中国计算机学会优秀博士论文奖; ACM SIGSAC中国优秀博士论文奖; 北京大学优秀博士论文奖.)
Recent Publications: Our work gets 6000+ citations (Google Scholar), is covered by 200+ worldwide media, and appears in IEEE S&P'24, USENIX Security'23abc, IEEE S&P'22, SRDS'22, ESORICS'22, IEEE TIFS'22, IEEE TIFS'21, IEEE TDSC'20 a~d, Usenix Security'19, NDSS'18, IEEE TSC'18, IEEE TDSC'18, IEEE TII'18, ACM ASIACCS'17, IEEE TIFS'17, ACM CCS'16, IEEE/IFIP DSN'16, ESORICS'16, ACM ASIACCS'16, IEEE TDSC'15, ESORICS'15, INS'15, COMNET'14, ISC'13, ICICS'12, DBSec'12, etc. (full list):
Fei Duan, Ding Wang*, Chunfu Jia. A Security Analysis of Honey Vaults. Proc. 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), pp. 1-18. https://www.computer.org/csdl/proceedings-article/sp/2024/313000a230/1WPcYSgCAi4 pdf
(Full paper, winter circle acceptance rate: 70/601=11.6%)
Ding Wang*, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen. Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. Proc. of 32nd USENIX Security Symposium (USENIX Security 2023). pp.983-1000. video pdf
(Covered by medias like the Wall Street Journal, ITmedia, Impress, Nikkei, Zaikei)
Ding Wang*, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang. How to Attack and Generate Honeywords. Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022), pp. 489-506, Doi: 10.1109/SP46214.2022.00029 pdf
Qingxuan Wang, Ding Wang*, Chi Cheng, Debiao He. Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices, IEEE Transactions on Dependable and Secure Computing, 2023, 20(1): 193-208 (ESI highly cited paper) pdf
Zengpeng Li, Ding Wang*, and Eduardo Morais. Quantum-Safe Round-Optimal Password Authentication for Mobile Devices. IEEE Trans. on Dependable and Secure Computing, 2022, 19(3): 1885-1899 (ESI highly cited paper) pdf
Ding Wang, Ping Wang, Debiao He, Yuan Tian. Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019), pp.1537-1554. (Full paper, acceptance rate: 113/719=15.7%) pdf
(Arouse heated discussion, and covered by media IEEE Spectrum, MIT Tech Review 中文)
Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang. A Security Analysis of Honeywords. Proc. of the 25th Network and Distributed System Security Symposium (NDSS 2018), pp.1-16. (Full paper, acceptance rate 20.9%) . Github pdf
Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian. Zipf’s Law in Passwords. IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2017, 12(11): 2776-2791. codes pdf
(300+ citations, ESI Highly Cited Paper; Our models have been adopted into over 120 studies worldwide such as GenoGuard (IEEE S&P'15) by EPFL researchers, Password economics (IEEE S&P'18) by Purdue researchers, and Distributed guessing (IEEE TIFS'19) by MIT researchers)
Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang. Targeted Online Password Guessing: An Underestimated Threat. Proc. the 23nd ACM Conference on Computer and Communications Security (ACM CCS 2016), pp. 1242–1254. Oct 24, 2016 - Oct 28, 2016, Vienna, Austria. (Full paper, acceptance rate: 137/831=16.4%) slides pdf
(300+ citations; Part of US NIST SP800-63-3 standard has been revised on Sep., 2016 according to our results. Covered by 200+ medias like Dailmail, Forbes, Naked security, Science Daily, CACM, Microsoft, theSun, Alphr, SCMagazine)
Ding Wang, Debiao He, Haibo Cheng, Ping Wang. fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE/IFIP DSN 2016), pp.595-606. June 28-July 01, France. (Full paper, acceptance rate: 53/259=20.4%) Github slides pdf (At ACM CCS'18, Golla and Durmuth showed that our fuzzyPSM performs the best among 45 password strength meters (81 variants), against both online guessing and offline guessing)
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. on Dependable and Secure Computing, 2015, 12(4): 228-442. pdf (300+ citations, the 2nd most cited article since 2014 of IEEE TDSC, ESI highly cited paper, ESI hotspot paper (top 0.1%); A number of following works write that this paper makes a "crucial observation", an "interesting observation", an "important observation", and "a big breakthough")
Ding Wang, Ping Wang. On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions. Elsevier Computer Networks, 2014(73): 41–57. pdf
(180+ Citations; This work investigates the inherent cryptographic complexity of designing a two-factor authentication scheme with user anonymity, and formally proves an impossibility result. A number of following works write that our result is "somewhat surprising" and "an important finding"; Also honored to appear in the Elsevier 2017 list of "Article Selection Celebrating Computer Science Research in China";)
Fei Duan, Ding Wang*, Chunfu Jia. A Security Analysis of Honey Vaults. Proc. 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), pp. 1-18. https://www.computer.org/csdl/proceedings-article/sp/2024/313000a230/1WPcYSgCAi4 pdf
(Full paper, winter circle acceptance rate: 70/601=11.6%)
Ding Wang*, Yunkai Zou, Yuan-An Xiao, Siqi Ma, Xiaofeng Chen. Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. Proc. of 32nd USENIX Security Symposium (USENIX Security 2023). pp.983-1000. video pdf
(Covered by medias like the Wall Street Journal, ITmedia, Impress, Nikkei, Zaikei)
Ding Wang*, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang. How to Attack and Generate Honeywords. Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022), pp. 489-506, Doi: 10.1109/SP46214.2022.00029 pdf
Qingxuan Wang, Ding Wang*, Chi Cheng, Debiao He. Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices, IEEE Transactions on Dependable and Secure Computing, 2023, 20(1): 193-208 (ESI highly cited paper) pdf
Zengpeng Li, Ding Wang*, and Eduardo Morais. Quantum-Safe Round-Optimal Password Authentication for Mobile Devices. IEEE Trans. on Dependable and Secure Computing, 2022, 19(3): 1885-1899 (ESI highly cited paper) pdf
Ding Wang, Ping Wang, Debiao He, Yuan Tian. Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019), pp.1537-1554. (Full paper, acceptance rate: 113/719=15.7%) pdf
(Arouse heated discussion, and covered by media IEEE Spectrum, MIT Tech Review 中文)
Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang. A Security Analysis of Honeywords. Proc. of the 25th Network and Distributed System Security Symposium (NDSS 2018), pp.1-16. (Full paper, acceptance rate 20.9%) . Github pdf
Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian. Zipf’s Law in Passwords. IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2017, 12(11): 2776-2791. codes pdf
(300+ citations, ESI Highly Cited Paper; Our models have been adopted into over 120 studies worldwide such as GenoGuard (IEEE S&P'15) by EPFL researchers, Password economics (IEEE S&P'18) by Purdue researchers, and Distributed guessing (IEEE TIFS'19) by MIT researchers)
Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang. Targeted Online Password Guessing: An Underestimated Threat. Proc. the 23nd ACM Conference on Computer and Communications Security (ACM CCS 2016), pp. 1242–1254. Oct 24, 2016 - Oct 28, 2016, Vienna, Austria. (Full paper, acceptance rate: 137/831=16.4%) slides pdf
(300+ citations; Part of US NIST SP800-63-3 standard has been revised on Sep., 2016 according to our results. Covered by 200+ medias like Dailmail, Forbes, Naked security, Science Daily, CACM, Microsoft, theSun, Alphr, SCMagazine)
Ding Wang, Debiao He, Haibo Cheng, Ping Wang. fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE/IFIP DSN 2016), pp.595-606. June 28-July 01, France. (Full paper, acceptance rate: 53/259=20.4%) Github slides pdf (At ACM CCS'18, Golla and Durmuth showed that our fuzzyPSM performs the best among 45 password strength meters (81 variants), against both online guessing and offline guessing)
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. on Dependable and Secure Computing, 2015, 12(4): 228-442. pdf (300+ citations, the 2nd most cited article since 2014 of IEEE TDSC, ESI highly cited paper, ESI hotspot paper (top 0.1%); A number of following works write that this paper makes a "crucial observation", an "interesting observation", an "important observation", and "a big breakthough")
Ding Wang, Ping Wang. On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions. Elsevier Computer Networks, 2014(73): 41–57. pdf
(180+ Citations; This work investigates the inherent cryptographic complexity of designing a two-factor authentication scheme with user anonymity, and formally proves an impossibility result. A number of following works write that our result is "somewhat surprising" and "an important finding"; Also honored to appear in the Elsevier 2017 list of "Article Selection Celebrating Computer Science Research in China";)
Academic Awards:
2024 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2023 Innovative Person of the Year in China's Intelligent Computing Technology (中国智能计算科技创新人物,全国30人);
2023 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2023 World's Top 2% Scientists of 2023 by Elsevier Mendeley & John P.A. Ioannidis at Stanford Uni. (全球前2%科学家);
2023 Most Innovative and Entrepreneurial Value Award at the 16th National College Student Information Security Competition (第16全国大学生信息安全竞赛最具创新创业价值奖,指导教师);
2023 First Prize in National College Student Information Security Competition (第16届全国大学生信息安全竞赛一等奖,指导教师);
2023 First Prize in National Cryptography Competition (第7届全国密码技术竞赛一等奖,指导教师);
2022 Young Scientist Nomination Award for Powerful Nation (强国青年科学家提名奖,全国40人);
2022 NSF of China Excellent Young Scientists Program (国家优青资助);
2022 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2022 World's Top 2% Scientists of 2022 by Elsevier Mendeley & John P.A. Ioannidis at Stanford Uni. (全球前2%科学家);
2021 Frontrunner 5000 --Top Article in Outstanding S&T Journals of China (领跑者5000-中国精品科技期刊顶尖学术论文);
2021 Outstanding Youth Award of China Association for Cryptologic Research (中国密码学会优秀青年奖);
2021 The First Prize of Outstanding papers at 12th National Cryptography and Security Teaching Symposium(第十二届全国密码学与信息安全教学研讨会优秀论文一等奖);
2021 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2021 World's Top 2% Scientists of 2020 by Elsevier Mendeley& John P.A. Ioannidis at Stanford Uni. (全球前2%科学家);
2021 Our ninth paper IEEE TIFS'17 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2021 Our eighth paper IEEE TII'18 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2020 Outstanding Young Talent for Science & Technology, Tianjin City (天津市青年科技优秀人才,全市40人)
2020 The Second Prize of Science & TechnologyAchievement Award, Tianjin City (天津市科技进步二等奖, 排名第4)
2020 Outstanding Reviewer Award for SCIENCE CHINA: Information Science (中国科学:信息科学);
2020 Tianjin Talent Introduction: Leading Talent (天津市人才引进领军人才);
2019 ACM China Doctoral Dissertation Award (PDF), honored to get the award certificate from Turing Award Laureate Manuel Blum at the award dinner (ACM China 优秀博士论文奖, two winners each year, first place in China);
2018 Best Paper Award of INSCRYPT 2018 (1/93), An existing photo with PC Chair Moti Yung at the award dinner;
2018 Our fourth paper IEEE TDSC'18 paper was selected as ESI Hot Paper (top 0.1%) by Clarivate Analytics;
2018 Our third paper IEEE System Journal'18 paper was selected as ESI Hot Paper (top 0.1%) by Clarivate Analytics;
2018 Our seventh paper IEEE TDSC'18 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2018 Our sixth paper Ad Hoc Networks'14 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2018 Outstanding Reviewer Award for Journal of Networks and Computers Applications;
2018 Our fifth paper IEEE System Journal'18 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2018 The First Prize of Natural Science Award, Ministry of Education of China (教育部自然科学奖一等奖, 排名第二)
2018 Our fourth paper Information Science'15 paper selected as ESI Highly Cited Paper by Clarivate Analytics;(65 citations);
2018 ACM SIGSAC China Outstanding Doctoral Dissertation Award (two winners each year by SIGSAC China);
2017 CCF Outstanding Doctoral Dissertation Award (中国计算机学会优秀博士论文奖 ,10 winners each year in China) ;
2017 Outstanding Doctoral Dissertation Award of Peking University (北大优秀博士论文奖, first place in School of EECS);
2017 Our Computer Networks'14 paper selected as "Article Selection Celebrating Computer Science Research in China";
2017 Outstanding Reviewer Award for Computer & Security Journal ;
2017 Outstanding Graduates of Peking University (北京大学优秀毕业生);
2017 Outstanding Reviewer Award for Journal of Information and Security Applications ;
2017 Our IEEE TDSC'15 paper selected as ESI Hot Paper (150+ citations, the most cited article since 2014 of IEEE TDSC);
2016 Person of the Year 2016, Peking University (北京大学学生年度人物, 10 recipients out of 45,000+ PKU students);
2016 BoYa Postdoc Fellowship of Peking University (the only one recipient in School of EECS);
2016 Qualcomm PhD Fellowship for outstanding academic achievements ($6,000);
2016 ACM CCS 2016 Student Travel Grant Award (up to the maximum support);
2016 Our IEEE Syst. J'15 paper selected as ESI Hot Paper (the most cited research article since 2013 of IEEE Syst. J.);
2016 Top-10 Distinguished Graduate Academic Award (学术十杰,first place), EECS of Peking University
2015 Annual Graduate Scholarship of the National Key Laboratory of Information Security (10 Phd. recipients in China);
2015 Annual Innovation Award of Peking University (the highest honor for graduates in our university);
2015 Outstanding Reviewer Award for the past two year service (2013-2015) to Elsevier Journal;
2015 Our first paper IJCS'14 paper selected as ESI highly cited paper by Thomson Reuters (100+ citations);
2014 Graduate Scholarship for Outstanding Academic Innovations of Peking University;
2013 Outstanding Reviewer Award from Elsevier Journal of Information Security and Applications;
2013 Excellent Master Thesis of the University (the only one awarded in our CS college);
2012 Top-10 Graduate Academic Star (十大学术之星,唯一硕士入选) of Harbin Engineering University;
2011 Outstanding Student Leaders of the Harbin Engineering University;
2009 Outstanding Graduates of Information Engineering University;
2008 Outstanding Graduates of Nankai University;
2008 Top 50 of the "Zhongke" Cup National Software Contest;
2024 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2023 Innovative Person of the Year in China's Intelligent Computing Technology (中国智能计算科技创新人物,全国30人);
2023 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2023 World's Top 2% Scientists of 2023 by Elsevier Mendeley & John P.A. Ioannidis at Stanford Uni. (全球前2%科学家);
2023 Most Innovative and Entrepreneurial Value Award at the 16th National College Student Information Security Competition (第16全国大学生信息安全竞赛最具创新创业价值奖,指导教师);
2023 First Prize in National College Student Information Security Competition (第16届全国大学生信息安全竞赛一等奖,指导教师);
2023 First Prize in National Cryptography Competition (第7届全国密码技术竞赛一等奖,指导教师);
2022 Young Scientist Nomination Award for Powerful Nation (强国青年科学家提名奖,全国40人);
2022 NSF of China Excellent Young Scientists Program (国家优青资助);
2022 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2022 World's Top 2% Scientists of 2022 by Elsevier Mendeley & John P.A. Ioannidis at Stanford Uni. (全球前2%科学家);
2021 Frontrunner 5000 --Top Article in Outstanding S&T Journals of China (领跑者5000-中国精品科技期刊顶尖学术论文);
2021 Outstanding Youth Award of China Association for Cryptologic Research (中国密码学会优秀青年奖);
2021 The First Prize of Outstanding papers at 12th National Cryptography and Security Teaching Symposium(第十二届全国密码学与信息安全教学研讨会优秀论文一等奖);
2021 Highly Cited Chinese Researchers by Elsevier (爱思唯尔“中国高被引学者”);
2021 World's Top 2% Scientists of 2020 by Elsevier Mendeley& John P.A. Ioannidis at Stanford Uni. (全球前2%科学家);
2021 Our ninth paper IEEE TIFS'17 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2021 Our eighth paper IEEE TII'18 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2020 Outstanding Young Talent for Science & Technology, Tianjin City (天津市青年科技优秀人才,全市40人)
2020 The Second Prize of Science & TechnologyAchievement Award, Tianjin City (天津市科技进步二等奖, 排名第4)
2020 Outstanding Reviewer Award for SCIENCE CHINA: Information Science (中国科学:信息科学);
2020 Tianjin Talent Introduction: Leading Talent (天津市人才引进领军人才);
2019 ACM China Doctoral Dissertation Award (PDF), honored to get the award certificate from Turing Award Laureate Manuel Blum at the award dinner (ACM China 优秀博士论文奖, two winners each year, first place in China);
2018 Best Paper Award of INSCRYPT 2018 (1/93), An existing photo with PC Chair Moti Yung at the award dinner;
2018 Our fourth paper IEEE TDSC'18 paper was selected as ESI Hot Paper (top 0.1%) by Clarivate Analytics;
2018 Our third paper IEEE System Journal'18 paper was selected as ESI Hot Paper (top 0.1%) by Clarivate Analytics;
2018 Our seventh paper IEEE TDSC'18 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2018 Our sixth paper Ad Hoc Networks'14 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2018 Outstanding Reviewer Award for Journal of Networks and Computers Applications;
2018 Our fifth paper IEEE System Journal'18 paper was selected as ESI Highly Cited Paper (top 1%) by Clarivate Analytics;
2018 The First Prize of Natural Science Award, Ministry of Education of China (教育部自然科学奖一等奖, 排名第二)
2018 Our fourth paper Information Science'15 paper selected as ESI Highly Cited Paper by Clarivate Analytics;(65 citations);
2018 ACM SIGSAC China Outstanding Doctoral Dissertation Award (two winners each year by SIGSAC China);
2017 CCF Outstanding Doctoral Dissertation Award (中国计算机学会优秀博士论文奖 ,10 winners each year in China) ;
2017 Outstanding Doctoral Dissertation Award of Peking University (北大优秀博士论文奖, first place in School of EECS);
2017 Our Computer Networks'14 paper selected as "Article Selection Celebrating Computer Science Research in China";
2017 Outstanding Reviewer Award for Computer & Security Journal ;
2017 Outstanding Graduates of Peking University (北京大学优秀毕业生);
2017 Outstanding Reviewer Award for Journal of Information and Security Applications ;
2017 Our IEEE TDSC'15 paper selected as ESI Hot Paper (150+ citations, the most cited article since 2014 of IEEE TDSC);
2016 Person of the Year 2016, Peking University (北京大学学生年度人物, 10 recipients out of 45,000+ PKU students);
2016 BoYa Postdoc Fellowship of Peking University (the only one recipient in School of EECS);
2016 Qualcomm PhD Fellowship for outstanding academic achievements ($6,000);
2016 ACM CCS 2016 Student Travel Grant Award (up to the maximum support);
2016 Our IEEE Syst. J'15 paper selected as ESI Hot Paper (the most cited research article since 2013 of IEEE Syst. J.);
2016 Top-10 Distinguished Graduate Academic Award (学术十杰,first place), EECS of Peking University
2015 Annual Graduate Scholarship of the National Key Laboratory of Information Security (10 Phd. recipients in China);
2015 Annual Innovation Award of Peking University (the highest honor for graduates in our university);
2015 Outstanding Reviewer Award for the past two year service (2013-2015) to Elsevier Journal;
2015 Our first paper IJCS'14 paper selected as ESI highly cited paper by Thomson Reuters (100+ citations);
2014 Graduate Scholarship for Outstanding Academic Innovations of Peking University;
2013 Outstanding Reviewer Award from Elsevier Journal of Information Security and Applications;
2013 Excellent Master Thesis of the University (the only one awarded in our CS college);
2012 Top-10 Graduate Academic Star (十大学术之星,唯一硕士入选) of Harbin Engineering University;
2011 Outstanding Student Leaders of the Harbin Engineering University;
2009 Outstanding Graduates of Information Engineering University;
2008 Outstanding Graduates of Nankai University;
2008 Top 50 of the "Zhongke" Cup National Software Contest;
Keynote talks/Invited speaker:
The 22nd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2022), CCF Rank C.
14th Annual Conference of China Association for Cryptologic Research(第十四届中国密码学会年会, ChinaCrypt 2021);
2021 Annual IACR Conference on Cryptographic Protocols (中国密码学会安全协议专委会2021年学术年会);
5th Forum on Frontiers in Theory and Technology of Cryptanalysis(第五届强网论坛“密码分析前沿理论与技术”分论坛);
7th National Conference on Identification, Certification and Authentication (中国密码学会第七届全国电子认证技术交流大会);
3rd Zongheng Workshop on Cyber Security (第三届“纵横”网络空间安全创新论坛);
2020 MIT Technology Review China Forum on Blockchain and Digital Economy (MIT TR2020年区块链与数字经济发展论坛);
2020 InForSec Workshop at Wuhan (2020江夏晴川网安论坛);
11th International Symposium on Cyberspace Safety and Security (CSS 2019);
2019 7th Annual CCF BigData Conference (第七届CCF大数据学术会议);
2019 10th Annual CCF Outstanding Phd Dissertation Award Winner Forum (CCF优博2019年会);
2019 5th Let's GoSSIP Software security Summer School (第五届上海交通大学 “Let's GoSSIP软件安全”暑期学校);
2019 ACM Turing Celebration Conference - China: SIGSAC China Symposium (ACM TURC 2019 中国图灵大会);
2019 Annual Forum of the 111 Project "Mobile Intenet Security" ( “移动互联网安全”111学科创新引智基地2019学术年会);
2019 Forum on Frontiers of Cryptography&Coding and Its Applications ( 密码与编码及其应用前沿学术论坛);
2019 Pengcheng Lab Young Researcher Workshop on Cyber Security (首届鹏城实验室网络空间安全青年学者论坛);
2018 11th China Computer Networks and Information Security Conference (CCNIS 2018);
2018 Hebei University Young Researcher Workshop on Cyber Security (河北大学网络空间安全青年科学家论坛);
2018 Xidian Forum on Frontiers of Cryptography (西电2018密码学前沿论坛);
2018 9th Annual CCF Outstanding Phd Dissertation Award Winner Forum (CCF优博2018年会);
2018 Chinese Young Researcher Workshop on on Cryptography(中国密码学会2018青年论坛);
2017 6th National Summit Forum on Network Security: Prevention&Defense (XDef 2017);
2017 Young Researcher Workshop on on Cyber security, Huazhong University of Science and Technology ;
2016 5th National Summit Forum on Network Security: Prevention&Defense (XDef 2016);
2016 2nd International Workshop on Cyber Security (CS 2016) ;
2016 Young Researcher Workshop on Cyber Security, Wuhan University;
2016 Summit Forum on Information Security, East China Normal University(Link);
2015 Young Researcher Workshop on Information Security, IIE, Chinese Academy of Sciences;
The 22nd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2022), CCF Rank C.
14th Annual Conference of China Association for Cryptologic Research(第十四届中国密码学会年会, ChinaCrypt 2021);
2021 Annual IACR Conference on Cryptographic Protocols (中国密码学会安全协议专委会2021年学术年会);
5th Forum on Frontiers in Theory and Technology of Cryptanalysis(第五届强网论坛“密码分析前沿理论与技术”分论坛);
7th National Conference on Identification, Certification and Authentication (中国密码学会第七届全国电子认证技术交流大会);
3rd Zongheng Workshop on Cyber Security (第三届“纵横”网络空间安全创新论坛);
2020 MIT Technology Review China Forum on Blockchain and Digital Economy (MIT TR2020年区块链与数字经济发展论坛);
2020 InForSec Workshop at Wuhan (2020江夏晴川网安论坛);
11th International Symposium on Cyberspace Safety and Security (CSS 2019);
2019 7th Annual CCF BigData Conference (第七届CCF大数据学术会议);
2019 10th Annual CCF Outstanding Phd Dissertation Award Winner Forum (CCF优博2019年会);
2019 5th Let's GoSSIP Software security Summer School (第五届上海交通大学 “Let's GoSSIP软件安全”暑期学校);
2019 ACM Turing Celebration Conference - China: SIGSAC China Symposium (ACM TURC 2019 中国图灵大会);
2019 Annual Forum of the 111 Project "Mobile Intenet Security" ( “移动互联网安全”111学科创新引智基地2019学术年会);
2019 Forum on Frontiers of Cryptography&Coding and Its Applications ( 密码与编码及其应用前沿学术论坛);
2019 Pengcheng Lab Young Researcher Workshop on Cyber Security (首届鹏城实验室网络空间安全青年学者论坛);
2018 11th China Computer Networks and Information Security Conference (CCNIS 2018);
2018 Hebei University Young Researcher Workshop on Cyber Security (河北大学网络空间安全青年科学家论坛);
2018 Xidian Forum on Frontiers of Cryptography (西电2018密码学前沿论坛);
2018 9th Annual CCF Outstanding Phd Dissertation Award Winner Forum (CCF优博2018年会);
2018 Chinese Young Researcher Workshop on on Cryptography(中国密码学会2018青年论坛);
2017 6th National Summit Forum on Network Security: Prevention&Defense (XDef 2017);
2017 Young Researcher Workshop on on Cyber security, Huazhong University of Science and Technology ;
2016 5th National Summit Forum on Network Security: Prevention&Defense (XDef 2016);
2016 2nd International Workshop on Cyber Security (CS 2016) ;
2016 Young Researcher Workshop on Cyber Security, Wuhan University;
2016 Summit Forum on Information Security, East China Normal University(Link);
2015 Young Researcher Workshop on Information Security, IIE, Chinese Academy of Sciences;
Academic Services: I am honored to be invited as editor, TPC member and reviewer for a number of venues:
Journal Editor:
IEEE Transactions on Information Forensics & Security (IEEE TIFS), SCI, EI, CCF Rank A;
International Journal of Information Security(IJIS), SCI, EI, CACR Rank B;
International Journal of Information Security and Privacy (IJISP), EI, CCF Rank C;
Wireless Communications and Mobile Computing(WCMC), CCF Rank C, SCI,=2.336, Wiley;
Human-centric Computing and Information Sciences (HCIS), SCI IF=3.700, Springer;
Symmetry, SCI IF=2.713;
The Open Cybernetics & Systemics Journal;
Current Chinese Computer Science Journal;
International Journal on AdHoc Networking Systems ;
Chinese Journal of Computer Science (《计算机科学》杂志, 中文核心期刊,CSCD核心期刊, CCF Rank B);
Chinese Journal of Computer Engineering(《计算机工程》杂志, 中文核心期刊,CSCD核心期刊, CCF Rank C);
Journal of Surveillance, Security and Safety;
Chinese Computer Federation Digital (CCF《技术动态》);
Journal of Electronics & Information Technology (《电子与信息学报》中文核心期刊,EI 期刊, CCF Rank B);
Lead Guest Editor:
Wireless Communications and Mobile Computing - Special Issue on Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices 2021 , Submission DDL: August 7th, 2021; CCF Rank C Open for papers!
(At Dec 2020, Our WCMC Special Issue (2020) was selected by the Publishers as an Annual Issue, and I am honored to be invited to launch another special issue with the same topic in Q1 2021. )
Security and Communications Networks - Special Issue on Security and Privacy for Edge-Assisted Internet of Things; Submission DDL: June 11th, 2021; CCF Rank C Open for papers!
Wireless Communications and Mobile Computing - Special Issue on Rethinking Authentication on Smart Mobile Devices , Submission DDL: August 24th, 2020; CCF Rank C Open for papers!
(At Dec 2019, Our WCMC Special Issue (2018) was selected by the Publishers as an Annual Issue, and I am honored to be invited to launch another special issue with the same topic in Q1 2020. )
Wireless Communications and Mobile Computing - Special Issue on Security and Privacy in New Computing Environments; Submission DDL: July 31th, 2020; CCF Rank C
Mobile Networks and Applications - Special Issue on Security and Privacy in New Computing Environments; Submission DDL: August 24th, 2020; Dedicated to the SPNCE 2020 conference; CCF Rank C
Chinese Journal of Computer Science- Special Issue on Mobile Authentication; Submission DDL: May 31h, 2020; Dedicated CCF Rank B Open for papers!
Security and Communications Networks - Special Issue on User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs; Submission DDL: Sep. 1th, 2017; With 5 selected papers published at May 14, 2018.
Wireless Communications and Mobile Computing - Special Issue on Rethinking Authentication on Smart Mobile Devices , Submission DDL: April 27th, 2018; With 20 selected papers published at Dec 18, 2018.
Guest Editor:
IET Smart Cities -Special Issue on security and privacy in smart cities. Submission DDL: Nov. 30th, 2019, see Details CFP.
Journal of Cryptologic Research -Special Issue on Cryptologic Applications Security (密码学报. DDL:2020年3月31日)
Program Chair:
25th International Conference on Information and Communications Security (ICICS 2023), CCF Rank C. Nov 18-20, Tianjin, Nankai University. DDL: March 30th, 2023. https://icics23.nankai.edu.cn/
5th EAI Int. Conf. on Security and Privacy in New Computing Environments (SPNCE 2022), September 21-22, Xi'an. DDL: May 2nd, 2022 ;
4th EAI Int. Conf. on Security and Privacy in New Computing Environments (SPNCE 2021), August 21-22, Qinghuangdao. DDL: April 2nd, 2021 ;
4th International Conference on Frontiers in Cyber Security (FCS 2021), Dec 17-19, Haikou. DDL: August 20th, 2021 ;
3rd EAI Int. Conf. on Security and Privacy in New Computing Environments (SPNCE 2020), July 27-28, Denmark. DDL: March 2nd, 2020 ; Proceedings available at: http://link.springer.com/openurl.asp?genre=issue&issn=1867-8211&volume=344
6th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2020), Aug 22-23, Tianjin, China. DDL: May 10th, 2020
Program Vice-Chair:
第十四届中国可信计算与信息安全学术会议(CTCIS 2021);
Session Chair:
29th ACM Conference on Computer and Communications Security (ACM CCS 2022), CCF Rank A, CACR Rank A.
17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022): Session 5A: Cyber-physical and IOT Security
16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021): Session #5A: Network and Web Security
37th Annual Computer Security Applications Conference (ACSAC 2021): Session #4B: Authentication and Passwords
Track chair:
22nd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2021), CCF Rank C.
20th IEEE International Conference on Computational Science and Engineering (IEEE CSE 2017).
Publicity chair:
24th International Conference on Information and Communications Security (ICICS 2022), CCF Rank C.
Publication Chair:
16th International Conference on Information Security Practice and Experience (ISPEC 2021), CACR Rank C.
Web/Video Chair:
39th International Symposium on Reliable Distributed Systems (SRDS 2020) , CCF B.
Special Issue Co-Chair:
15th International Conference on Network and System Security (NSS 2021).
AEC member:
31th USENIX Security 2022 Artifact Evaluation Committee (USENIX Security 2022 ), CCF Rank A.
29th USENIX Security Artifact Evaluation Committee (USENIX Security 2020 ), CCF Rank A.
38th Annual Computer Security Applications Conference (ACSAC 2022), CCF Rank B.
36th Annual Computer Security Applications Conference (ACSAC 2020), CCF Rank B.
TPC member:
31th Network and Distributed System Security Symposium (NDSS 2025), CCF A.
10th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2025), CCF C.
20th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2025), CCF Rank C, CACR Rank B;
29th International Conference on Financial Cryptography and Data Security (FC 2025), CCF Rank C, CACR Rank B;
30th Australasian Conference on Information Security and Privacy (ACISP 2025), CCF Rank C, CACR Rank C;
24th Privacy Enhancing Technologies Symposium (PETS 2024), CCF C.
38th Annual Computer Security Applications Conference (ACSAC 2024), CCF Rank B.
26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024), CCF B.
30th Network and Distributed System Security Symposium (NDSS 2024), CCF A.
26th International Conference on Information and Communications Security (ICICS 2024), CCF Rank C.
20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2024) , CCF Rank C.
38th Annual Computer Security Applications Conference (ACSAC 2023), CCF Rank B.
26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023), CCF B.
28th Australasian Conference on Information Security and Privacy (ACISP 2023) , CCF Rank C.
19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023) , CCF Rank C.
IEEE Global Communications Conference: Communication & Info Systems Security Track (GlobeCom 2023), CCF Rank C.
29th Network and Distributed System Security Symposium (NDSS 2023), CCF A
23nd Privacy Enhancing Technologies Symposium (PETS 2023), CCF C.
29th ACM Conference on Computer and Communications Security (ACM CCS 2022), CCF Rank A, CACR Rank A.
38th Annual Computer Security Applications Conference (ACSAC 2022), CCF Rank B.
17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), CCF Rank C, CACR Rank B;
22nd Privacy Enhancing Technologies Symposium (PETS 2022), CCF C.
27th Australasian Conference on Information Security and Privacy (ACISP 2022) , CCF Rank C.
18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2022) , CCF Rank C.
24th International Conference on Information and Communications Security (ICICS 2022), CCF Rank C.
12th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2022), CCF Rank C.
17th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2022), CCF Rank C.
15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022), CCF Rank C;
IEEE Global Communications Conference: Communication & Info Systems Security Track (GlobeCom 2022), CCF Rank C.
21th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2022), CCF Rank C.
17th International Conference on Information Security Practice and Experience (ISPEC 2022), CACR Rank C.
56th IEEE International Conference on Communications (ICC 2022), CCF Rank C.
14th International Symposium on Cyberspace Safety and Security (CSS 2022).
IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022).
3rd ACNS Workshop on Secure Cryptographic Implementation (SCI 2022).
EAI International Conference on Applied Cryptography in Computer and Communications (EAI AC3 2022).
8th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2022).
37th Annual Computer Security Applications Conference (ACSAC 2021), CCF Rank B.
7th Who Are You!? Adventures in Authentication (WAY 2021), Co-located with Usenix SOUPS 2021 ;
16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021), CCF Rank C, CACR Rank B;
36th IFIP International Information Security and Privacy Conference(IFIP SEC 2021), CCF Rank C.
24th Information Security Conference (ISC 2021), CCF Rank C, CACR Rank C.
17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2021), CCF Rank C.
23rd International Conference on Information and Communications Security (ICICS 2021), CCF Rank C.
11th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2021), CCF Rank C.
International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2021), CCF Rank C.
18th International Conference on Privacy, Security and Trust (PST 2021).
16th International Conference on Information Security Practice and Experience (ISPEC 2021), CACR Rank C.
10th IEEE International Conference on Communications, Network, and Satellite (IEEE Comnetsat 2021).
13th International Symposium on Cyberspace Safety and Security (CSS 2021).
7th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2021).
15th International Conference on Network and System Security (NSS 2021).
14th IEEE International Conference on Cloud Computing (IEEE CLOUD 2021).
55th IEEE International Conference on Communications (ICC 2021), CCF Rank C.
IEEE Global Communications Conference: Communication & Info Systems Security Track (GlobeCom 2021), CCF Rank C.
2rd ACNS Workshop on Secure Cryptographic Implementation (SCI 2021).
IEEE International Conference on Cyber-Security and Resilience (IEEE CSR 2021) .
IEEE Conference on Dependable and Secure Computing (IEEE DSC 2021).
3rd International Workshop on Application Intelligence and Blockchain Security (AIBlock 2021).
IEEE 21th International Conference on Communication Technology (ICCT 2021).
EAI International Conference on Applied Cryptography in Computer and Communications (EAI AC3 2021).
14th International Conference on Knowledge Science, Engineering and Management (KSEM 2021), CCF Rank C.
7th International Conference on Artificial Intelligence and Security (ICAIS 2021).
36th Annual Computer Security Applications Conference (ACSAC 2020), CCF Rank B.
35th IFIP International Information Security and Privacy Conference(IFIP SEC 2020), CCF Rank C.
11th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2020), CCF Rank C.
8th IEEE Conference on Communications and Network Security (CNS 2020).
25th Australasian Conference on Information Security and Privacy (ACISP 2020) , CCF Rank C.
16th International Conference on Information Security and Cryptology (Inscrypt 2020), CACR Rank C.
22nd International Conference on Information and Communications Security (ICICS 2020), CCF Rank C.
6th Who Are You!? Adventures in Authentication (WAY 2020), Co-located with Usenix SOUPS 2020 ;
15th International Conference on Information Security Practice and Experience (ISPEC 2020), CACR Rank C.
54th IEEE International Conference on Communications (ICC 2020), CCF Rank C.
IEEE Global Communications Conference: Communication & Info Systems Security Track (GlobeCom 2020), CCF Rank C.
13th IEEE International Conference on Cloud Computing (IEEE CLOUD 2020).
International Conference on Algorithms and Architectures for Parallel Process (ICA3PP 2020), CCF Rank C.
14th International Conference on Network and System Security (NSS 2020).
3rd International Conference on Machine Learning for Cyber Security (ML4CS 2020) ;
International Conference on Information Security and Privacy Protection (ICISPP 2020) .
IEEE International Conference on Cyber-Security and Resilience (IEEE CSR 2020) .
6th International Conference on Artificial Intelligence and Security (ICAIS 2020).
6th International Symposium on Privacy Computing (PriCom 2020);
International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2020);
2nd International Workshop on Application Intelligence and Blockchain Security (AIBlock 2020).
International Conference on Blockchain and Internet of Things (BIoT 2020).
IEEE Conference on Dependable and Secure Computing (IEEE DSC 2020).
3rd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2020),Co-located with ESORICS 2020;
10th International Conference on Computer Science, Engineering and Applications (CCSEA 2020).
22nd Information Security Conference (ISC 2019), CCF Rank C, CACR Rank C.
24th Australasian Conference on Information Security and Privacy (ACISP 2019), CCF Rank C, CACR Rank C.
18th International Conference on Cryptology and Network Security (CANS 2019) , CACR Rank C.
21st International Conference on Information and Communications Security (ICICS 2019), CCF Rank C.
14th International Conference on Information Security Practice and Experience (ISPEC 2019), CACR Rank C.
15th International Conference on Information Security and Cryptology (Inscrypt 2019), CACR Rank C.
IEEE Global Communications Conference: Communication & Info Systems Security Track (GlobeCom 2019), CCF Rank C.
24th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2019), CCF Rank C.
5th Who Are You!? Adventures in Authentication (WAY 2019), Co-located with Usenix SOUPS 2019 and Security 2019 ;
9th EAI International Conference on Cloud Computing (CloudComp 2019).
13th Chinese Conference on Trusted Computing and Information Security (CTCIS 2019).
13th International Conference on Network and System Security (NSS 2019).
34rd ACM SIGAPP Symposium On Applied Computing (SAC 2019).
2nd International Conference on Machine Learning for Cyber Security (ML4CS 2019) ;
11th International Symposium on Cyberspace Safety and Security (CSS 2019);
2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2019);
5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019) .
5th International Symposium on Privacy Computing (PriCom 2019);
2019 International Workshop on Fog Computing Technologies and Applications (FogCom 2019).
4th International Conference on Smart Computing and Communication (SmartCom 2019);
Second International Conference on Smart Blockchain (SmartBlcok 2019);
2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2019),Co-located with ESORICS 2019;
2019 IEEE Middle East & North Africa COMMunications Conference (MENACOMM 2019).
22nd IEEE International Conference on Computational Science and Engineering (IEEE CSE 2019).
5th International Conference on Artificial Intelligence and Security (ICAIS 2019).
8th International Conference on Modeling, Simulation and Applied Optimization (ICMSAO 2019).
2nd International Cognitive Cities Conference (IC3 2019) ;
International Workshop on Mobile Applications (MobiAPP 2019)
21th Information Security Conference (ISC 2018), CCF Rank C, CACR Rank C.
33rd IFIP International Conference on Information Security and Privacy Protection (IFIP SEC 2018), CCF Rank C.
17th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018), CCF Rank C.
16th Annual Conference on Privacy, Security and Trust (IEEE PST 2018).
14th International Conference on Information Security Practice and Experience (ISPEC 2018), CACR Rank C.
14th International Conference on Information Security and Cryptology (Inscrypt 2018), CACR Rank C.
11th China Computer Networks and Information Security Conference (CCNIS 2018).
21st IEEE International Conference on Computational Science and Engineering (IEEE CSE 2018).
13th International Conference on Green, Pervasive and Cloud Computing (GPC 2018).
5th Annual International Conference on Computer Science and Applications (CSA 2018).
4th International Conference on Cloud Computing and Security (ICCCS 2018) .
Smart Cities Symposium-Cyber Security Track (SCS 2018).
First International Cognitive Cities Conference (IC3 2018) .
16th International Conference on Cryptology and Network Security (CANS 2017) , CACR Rank C.
11th International Conference on Provable Security (ProvSec 2017) , CACR Rank C.
16th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2017), CCF Rank C.
13th International Conference on Information Security Practice and Experience (ISPEC 2017), CACR Rank C.
9th International Symposium on Cyberspace Safety and Security (CSS 2017)
12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2017)
3rd International Conference on Cloud Computing and Security (ICCCS 2017)
3rd International Workshop on Computer Security (CS 2017)
3rd International Conference on Cyber Security (ICCS 2017)
11th IEEE International Conference on Big Data Science and Engineering (BigDataSE 2017)
14th International Conference on Embedded Software and Systems (ICESS 2017)
5th International Conference on Emerging Internetworking, Data&Web Technologies (EIDWT 2017)
1st International Workshop on Data Security and Privacy in Internet of Things (DSPIoT 2017)
1st ACM Authentication Techniques Workshop (ACM AuthTech 2016)
15th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), CCF Rank C.
21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016), CCF Rank C.
11th International Conference on Green, Pervasive and Cloud Computing (GPC 2016)
1st EAI International Conference on Security and Privacy in New Computing Environments (SPNCE 2016)
1st EAI International Workshop on Security and Privacy in Collaborative System (WSPCS 2016)
2nd International Workshop on Cyber Security (CS 2016)
8th Int. Conf. on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 2016)
11th IEEE Conference on Industrial Electronics and Applications (ICIEA 2016)
9th IEEE-GCC 2016, Security track (http://ieee-gcc.org/)
2nd International Symposium on Web of Things and Big Data (WoTBD 2016)
3rd International Workshop on Mobile Applications (MobiAPP 2016)
International Conference on Intelligent Cloud Computing (ICC 2016)
15th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2015)
International Workshop on Mobile Applications (MobiAPP 2014)
Reviewers:
ACM Computing Surveys;
IEEE Trans. on Dependable and Secure Computing;
IEEE Trans. on Information Forensics and Security;
IEEE Trans. on Big Data;
IEEE Transactions on Cloud Computing;
IEEE Transactions on Industrial Electronics;
IEEE Transactions on Industrial Informatics;
IEEE Systems Journal;
IEEE Communication Letters;
IEEE Access;
International Journal of Information Security;
Computers & Security;
Computer Networks;
Ad Hoc Networks;
Information Sciences;
IET Information Security;
Security and Communication Networks;
Journal of Information Security and Applications;
Information Security Journal: A Global Perspective;
International Journal of Human-Computer Studies;
Journal of Computer and System Sciences;
Science China: Information Sciences;
Future Generation Computer Systems;
Fundamenta Informaticae;
International Journal of Communication Systems;
Springer Journal of Zhejiang University Science C;
Computers & Electrical Engineering;
European Transactions on Telecommunications;
Human-centric Computing and Information Sciences;
Information Security Technical Report;
International Journal of Network Security;
International Journal of Computing and Digital Systems;
Journal of Computers;
Journal of Medical Systems;
Journal of Sensors;
Elsevier CAAI Transactions on Intellegence Technology;
Wireless Personal Communications;
Chinese Journal of Computer Science ;
Chinese Journal of Computer Applications;
Chinese Journal of Computer Research and development;
Chinese Journal of Software;
Chinese Journal of Computer;
19th Privacy Enhancing Technologies Symposium (PETS 2019)
37th International Conference on Distributed Computing Systems (ICDCS 2017)
15th International Conference on Applied Cryptography and Network Security (ACNS 2017)
19th Information Security Conference (ISC 2016)
10th International Conference on Information Security Theory and Practice (WISTP 2016)
31th IFIP International Information Security and Privacy Conference (SEC 2016)
11th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2016)
30th IEEE International Conference on Advanced Information Networking and Applications (AINA 2016)
9th International Conference on Provable Security (ProvSec 2015)
17th International Conference on Information and Communications Security (ICICS 2015)
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
14th IEEE International Conference on Trust Security and Privacy in Computing and Communication (TrustCom 2015)
30th IFIP International Information Security and Privacy Conference (SEC 2015)
11th International Conference on Information Security Practice and Experience (ISPEC 2015)
6th IEEE International Conference on Computing and Communications Technology (ICCCT 2015)
10th International Conference on Information Security and Cryptology (Inscrypt 2014)
International Workshop on Mobile Applications (MobiAPP 2014)
9th International Conference on Future Networks and Communications (FNC 2014)
IEEE Wireless Communication and Networking Conference (WCNC 2014)
Education and Working Experience:
2018-today, PostDoc in Information Security at Peking University. Supervised by and Cooperate with Prof. Ru Huang, an academician of the Chinese Academy of Sciences.
2013-2017, Ph.D Degree in Information Security, Supervised by Prof. Ping Wang, Peking University. Tutor team (Prof. Chao-Hsien Chu at Pennsylvania State University, Co-director, Center for Cyber Security, Information Privacy and Trust; Prof. Zhong Chen, Prof. Maozhi Xu, and Prof. Sihan Qing at PKU)
2010-2012, Mater Degree in Information Security, Supervised by Prof. Chunguang Ma, Harbin Engineering University;
2008-2009, BA. in Information Engineering, Supervised by Prof. Yuango Guo, Information Engineering University;
2004-2008, BA. Degree in Information Security, Supervised by Prof. Chunfu Jia, Nankai University, Tianjin.
2018-today, PostDoc in Information Security at Peking University. Supervised by and Cooperate with Prof. Ru Huang, an academician of the Chinese Academy of Sciences.
2013-2017, Ph.D Degree in Information Security, Supervised by Prof. Ping Wang, Peking University. Tutor team (Prof. Chao-Hsien Chu at Pennsylvania State University, Co-director, Center for Cyber Security, Information Privacy and Trust; Prof. Zhong Chen, Prof. Maozhi Xu, and Prof. Sihan Qing at PKU)
2010-2012, Mater Degree in Information Security, Supervised by Prof. Chunguang Ma, Harbin Engineering University;
2008-2009, BA. in Information Engineering, Supervised by Prof. Yuango Guo, Information Engineering University;
2004-2008, BA. Degree in Information Security, Supervised by Prof. Chunfu Jia, Nankai University, Tianjin.