首页 >> 研究生培养 >> 硕导介绍 >> 正文

毛剑

作者:       发布: 2018-05-24      来源:

打印

毛剑Jian Mao

职 称

讲师

学 历

博士研究生

电 话

010-82317212-0

办公室

新主楼F610

系 别

网络空间安全学院

职 务

电子信箱

maojian@buaa.edu.cn

传 真

个人主页

学习经历

1998.09-2004.12西安电子科技大学 博士

1993.07-1997.07西安电子科技大学 工学学士学位

工作经历

2018.05-至今 北京航空航天大学 网络空间安全学院 教师

2015.09-2016.09美国乔治华盛顿大学 计算机系 访问学者

2010.11-2011.11新加坡国立大学 计算学院 访问学者

2009.02-2018.04北京航空航天大学 电子信息工程学院 教师

2006.11-2008.12北京大学计算机科学技术研究所 博士后

2005.08-2006.10中科院研究生院国家信息安全重点实验室 研究人员

研究领域

云存储安全、Web安全、移动终端安全、物联网安全

荣誉及奖励

l 北京市高等教育教学成果二等奖,2018.03

l 北京航空航天大学教学成果奖,2015.01

l 北京航空航天大学教学成果奖,2013.01

l 北京航天航空大学蓝天新秀,2009.12

开授课程

信息网络安全防护技术,本科生

Introduction to Information and System Security, 留学生

信息网络安全,研究生(合讲)

教学及科研成果

部分发表/录用论文

(1)Jian Mao, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang. Detecting Malicious Behaviors in JavaScript Applications, IEEE Access, 2018

(2)Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity[J]. IEEE ACCESS. 2017

(3)Jian Mao, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, Jianhong Zhang. Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment[J]. Security and Communication Networks. 2017.

(4)Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang. Toward Exposing Timing-Based Probing Attacks in Web Applications[J]. Sensors. 2017, 17(3), 464.

(5)Jian Mao, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, Jianwei Liu. A Position-aware Merkle Tree for Dynamic Cloud Data Integrity Verification[J]. Soft Computing. 2017, 55, 62-80.

(6)Jian Mao, Yue Chen, Yan Zhang, Xiandong Xu, Yajian Zhou, Jianwei Liu. Parallel Checking of Content Integrity in Multi-cloud Storage of Heterogeneous Sensor Systems[J].

(7) Mengmeng Wang, Jianwei Liu,Jian Mao*, Haosu Cheng, Jie Chen, Chan Qi. RouteGuardian: Constructing Secure Routing Paths in Software Defined Networking [J]. Tsinghua Science and Technology, 2017

(8) Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu,Jian Mao*. PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking[J]. Journal of Signal Processing Systems for Signal, Image, and Video Technology. 2017, 86(2), 157–173.

(9) Jianhong Zhang, Xubing Zhao,Jian Mao*. Attack on Chen et al.'s Certificateless Aggregate Signature Scheme[J]. Security and Communication Networks. 2016. 9(1), 54-59.

(10)Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena,Jian Mao*, Zhenkai Liang. Man-in-thebrowser-cache: Persisting HTTPS Attacks via Browser Cache Poisoning[J]. Computers and Security. 2015, 55: 62-80.

(11)Jian Mao, Hanjun Ma, Yue Chen, Yaoqi Jia, Zhenkai Liang. Automatic Permission Inference for Hybrid Mobile Apps[J]. Journal of High Speed Networks. 2016, 22(1): 55-64.

(12)Jian Mao, Ruilong Wang, Yue Chen, Yaoqi Jia. Detecting Injected Behaviors in HTML5-based Android Applications[J]. Journal of High Speed Networks. 2016, 22(1): 15-34.

(13)王蒙蒙,刘建伟,陈杰,毛剑,毛可飞.软件定义网络:安全模型、机制及研究进展.软件学报. 2016.

(14)Jian Mao, Wenqian Tian, Pei Li, Tao Wei, and Zhenkai Liang, Phishing Website Detection Based on Effective CSS Features of Web Pages[C]. The 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA2017) (CCF-C类).

(15)Wenqian Tian,Jian Mao*, Jingbo Jiang, Zhaoyuan He. Deeply Understanding Structure-based Social Network De-anonymization[C]. IIKI2017. 2017.

(16)Yinhao Xiao, Guangdong Bai,Jian Mao, Zhenkai Liang and Wei Cheng. Privilege Leakage and Information Stealing through the Android Task Mechanism[C]. The 1st IEEE Symposium on Privacy-Aware Computing (PAC 2017), 2017.

(17)Jian Mao, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang, Poster: GeminiScope: An Efficient Solution for Detecting UI-Mimicking Android Applications. The 37th IEEE Symposium on Security and Privacy (S&P 2016), May 2016. (CCF-A类)

(18)Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Liang Zhenkai, Toward Exposing Timing-based Probing Attacks in Web Applications[C]. The 11th International Conference on Wireless Algorithms, Systems, and Applications (WASA2016), Lecture Notes in Computer Science, vol. 9798, 499-510.(CCF-C类, EI, 检索号:20163302715450)

(19)Jian Mao, Jian Cui, Yan Zhang, Hanjun Ma, Jianhong Zhang, Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment[C]. The 11th International Conference on Wireless Algorithms, Systems, andApplications (WASA2016), Lecture Notes in Computer Science, vol. 9798, 511-523.(CCF-C类)

(20)Yue Chen, Yaoqi Jia,Jian Mao, Zhenkai Liang. Poster: Detecting Browser-Based Probing Attacks via Behavior Analysis. The 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), February 2015. (CCF-B类)

(21)Jian Mao, Yaoqi Jia, Xinshu Dong, Yue Chen, Ruilong Wang, Zhenkai Liang. Poster: Detecting Unexpected Behaviors in HTML5 Mobile Apps using Difference in Execution Context. The 35thIEEE Symposium on Security and Privacy (S&P 2014), May 2014. (CCF-A类)

(22)Pei Li,Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei. A Website Credibility Assessment Scheme Based on Page Association[C]. The 10th International Conference on Information Security Practice and Experience (ISPEC 2014) Fuzhou, China: Springer Verlag, 2014, 105-118.

(23)Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang. Rating Web Pages Using Page-transition Evidence[C]. The 15th International Conference on Information and Communications Security (ICICS 2013), Beijing, China: Springer Verlag, 2013.(CCF-C类)

(24)Xinshu Dong, Kailas Patil,Jian Mao, Zhenkai Liang. A Comprehensive Client-side Behavior Model for Diagnosing Attacks in Ajax Applications[C]. The 18th International Conference on Engineering of Complex Computer Systems (ICECCS2013), Singapore, 2013, 177-187.

已授权专利

(1) 毛剑、刘建伟、李坤、徐先栋、冯克、张晏.一种无线信道数据完整性保护方法. ZL201210154081.1

(2) 毛剑、徐先栋、刘建伟、张晏、李坤、修春娣.一种分布式云存储数据完整性保护方法. ZL201210159546.2

(3) 毛剑、张晏、刘建伟、徐先栋、冯克、尚涛.一种云存储数据持有性验证方法. ZL201210159377.2

(4) 李坤、毛剑*、刘建伟、冯克、李佩.一种钓鱼网站检测方法. ZL201210477139.6.(学生第一)

(5) 毛剑、冯克、李腾、刘建伟、张晏、张键红.一种可公开验证云端数据持有性校验方法. ZL201310295910.2

(6) 毛剑、李腾、张晏、冯克、刘建伟、伍前红.一种云存储数据完整性验证方法. ZL201310246856.2

(7) 毛剑,李佩,李腾,陈岳,马寒军,刘建伟.一种钓鱼网页检测方法.北京:CN104092667A.

(8) 毛剑,李腾,王瑞珑,陈杰,王培人,伍前红,刘建伟.一种云存储服务信用评价方法.北京:CN104092564A

(9) 毛剑,陈岳,史福田,伍前红,刘建伟. 基于浏览器扩展插件的网页行为提取和分析工具软件.受理号:2015R11S243689

部分科研项目:

(1) 国家重点研发安全专项“基于国产密码算法的服务认证与证明关键技术”

(2) 国家自然科学青年基金 “基于程序行为分析的Web安全复合信任机理研究”

(3) 北京市自然科学基金 面上项目 “云端数据持有性检测与云存储信任机理研究”

(4) 华为课题“基于HTML5的移动应用程序安全分析”

(5) 国家973计划项目 “可重构基础网络的安全与管控机理与结构”

学术与社会服务

l IEEE会员、ACM会员;

l TPC委员:WASA2017,2018(CCF C类)、ICNC2017、ISPA2017、PAMCO 2016;

l SCI期刊TDSC(CCF A类)、TNSE、KSII TIIS、EURASIP(CCF C类)、WCMC(CCF C类)、JCST等审稿人;

l CCF-A类顶级会议CCS’14-16(CCF_A)、USENIX Security’15、WWWW2014、安全顶级会议(CCF-B类)NDSS’13-15等会议审稿人。

Curriculum Vitae (CV)

Jian Mao received the Ph.D. degree in Computer Communications from Xidian University in 2004, and the B.E. degree in Computer Communications from Xidian University in 1997. She is currently an Assistant Professor in the School of Cyberspace Science of Beihang University, Beijing, China. She was a visiting scholar in the School of Computing, National University of Singapore (from 2010 to 2011) and the Department of Computer Science, the George Washington University (from 2015 to 2016). Her research interests include cloud security, Web security, and mobile security. She has published more than seventy papers in renowned journals and international conferences. She has served as a Technical Program Committee (TPC) member for many conferences including the 14th ACM Asia Conference on Information, Computer and Communications Security (ACM ASIACCS 2019), the 12th and 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2017, 2018), International Conference on Computing, Networking and Communication (ICNC 2017), the 15th IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA 2017), Workshop on Privacy-Aware Mobile Computing (PAMCO 2016) and a reviewer for a number of journals including IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Network Science & Engineering, KSII Transactions on Internet and Information Systems, EURASIP Journal on Wireless Communications and Networking, Wireless Communications and Mobile Computing, China Communications, Journal of Computer Science and Technology, Theory of Computing Systems. She is a member of IEEE and ACM.