首页 >> 师资力量 >> 全体教工 >> 副高(副教授等) >> 正文

毛剑

作者:       发布: 2019-06-15      来源:

打印

毛剑Jian Mao

 

副教授

     

博士

     

010-82317212-0

 

新主楼F610

     

网络空间安全学院

     

电子信箱

maojian@buaa.edu.cn

     

个人主页

u  学习经历

§  1998.09-2004.12西安电子科技大学博士 

§  1993.07-1997.07西安电子科技大学工学学士学位 

u  工作经历

§  2018.05-至今北京航空航天大学网络空间安全学院教师 

§  2015.09-2016.09美国乔治华盛顿大学计算机系访问学者 

§  2010.11-2011.11新加坡国立大学计算学院访问学者 

§  2009.02-2018.04北京航空航天大学电子信息工程学院教师 

§  2006.11-2008.12北京大学计算机科学技术研究所博士后 

§  2005.08-2006.10中科院研究生院国家信息安全重点实验室研究人员 

u  研究领域

云存储安全、Web安全、移动终端安全、物联网安全

u  荣誉及奖励

§  北京市高等教育教学成果二等奖,2018.03 

§  北京航空航天大学教学成果奖,2015.01 

§  北京航空航天大学教学成果奖,2013.01 

§  北京航天航空大学蓝天新秀,2009.12 

u  开授课程

信息网络安全防护技术,本科生

Introduction to  Information and System Security留学生 

信息网络安全,研究生(合讲)

u  教学及科研成果

部分发表/录用论文

(1)Jian Mao, Jingdong Bian, Guangdong  Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang. Detecting Malicious  Behaviors in JavaScript Applications, IEEE Access, 2018

(2)Jian Mao, Wenqian Tian, Pei Li, Tao  Wei, Zhenkai Liang. Phishing-Alarm: Robust and Efficient Phishing Detection  via Page Component Similarity[J]. IEEE ACCESS. 2017

(3)Jian Mao, Wenqian Tian, Yan Zhang,  Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, Jianhong Zhang. Co-Check:  Collaborative Outsourced Data Auditing in Multicloud Environment[J]. Security  and Communication Networks. 2017.

(4)Jian Mao, Yue Chen, Futian Shi, Yaoqi  Jia, Zhenkai Liang. Toward Exposing Timing-Based Probing Attacks in Web  Applications[J]. Sensors. 2017, 17(3), 464.

(5)Jian Mao, Yan Zhang, Pei Li, Teng Li,  Qianhong Wu, Jianwei Liu. A Position-aware Merkle Tree for Dynamic Cloud Data  Integrity Verification[J]. Soft Computing. 2017, 55, 62-80.

(6)Jian Mao, Yue Chen, Yan Zhang,  Xiandong Xu, Yajian Zhou, Jianwei Liu. Parallel Checking of Content Integrity  in Multi-cloud Storage of Heterogeneous Sensor Systems[J].

(7)  Mengmeng Wang, Jianwei Liu,Jian Mao*,  Haosu Cheng, Jie Chen, Chan Qi. RouteGuardian: Constructing Secure Routing  Paths in Software Defined Networking [J]. Tsinghua Science and Technology,  2017

(8)  Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu,Jian Mao*. PERM-GUARD: Authenticating  the Validity of Flow Rules in Software Defined Networking[J]. Journal of  Signal Processing Systems for Signal, Image, and Video Technology. 2017,  86(2), 157173.

(9)  Jianhong Zhang, Xubing Zhao,Jian Mao*.  Attack on Chen et al.'s Certificateless Aggregate Signature Scheme[J].  Security and Communication Networks. 2016. 9(1), 54-59.

(10)Yaoqi  Jia, Yue Chen, Xinshu Dong, Prateek Saxena,Jian Mao*, Zhenkai Liang. Man-in-thebrowser-cache:  Persisting HTTPS Attacks via Browser Cache Poisoning[J]. Computers and  Security. 2015, 55: 62-80.

(11)Jian Mao, Hanjun Ma, Yue Chen, Yaoqi  Jia, Zhenkai Liang. Automatic Permission Inference for Hybrid Mobile Apps[J].  Journal of High Speed Networks. 2016, 22(1): 55-64.

(12)Jian Mao, Ruilong Wang, Yue Chen,  Yaoqi Jia. Detecting Injected Behaviors in HTML5-based Android  Applications[J]. Journal of High Speed Networks. 2016, 22(1): 15-34.

(13)王蒙蒙,刘建伟,陈杰,毛剑,毛可飞.软件定义网络:安全模型、机制及研究进展.软件学报. 2016.

(14)Jian Mao, Wenqian Tian, Pei Li, Tao  Wei, and Zhenkai Liang, Phishing Website Detection Based on Effective CSS  Features of Web Pages[C]. The 12th International Conference on Wireless  Algorithms, Systems, and Applications (WASA2017) (CCF-C).

(15)Wenqian  Tian,Jian Mao*, Jingbo  Jiang, Zhaoyuan He. Deeply Understanding Structure-based Social Network  De-anonymization[C]. IIKI2017. 2017.

(16)Yinhao  Xiao, Guangdong Bai,Jian Mao,  Zhenkai Liang and Wei Cheng. Privilege Leakage and Information Stealing  through the Android Task Mechanism[C]. The 1st IEEE Symposium on  Privacy-Aware Computing (PAC 2017), 2017.

(17)Jian Mao, Hanjun Ma, Yaoqi Jia,  Zhenkai Liang, Xuxian Jiang, Poster: GeminiScope: An Efficient Solution for  Detecting UI-Mimicking Android Applications. The 37th IEEE Symposium on  Security and Privacy (S&P 2016), May 2016. (CCF-A)

(18)Jian Mao, Yue Chen, Futian Shi, Yaoqi  Jia, Liang Zhenkai, Toward Exposing Timing-based Probing Attacks in Web  Applications[C]. The 11th International Conference on Wireless Algorithms,  Systems, and Applications (WASA2016), Lecture Notes in Computer Science, vol.  9798, 499-510.CCF-C, EI, 检索号:20163302715450

(19)Jian Mao, Jian Cui, Yan Zhang, Hanjun  Ma, Jianhong Zhang, Collaborative Outsourced Data Integrity Checking in  Multi-Cloud Environment[C]. The 11th International Conference on Wireless  Algorithms, Systems, andApplications (WASA2016), Lecture Notes in Computer  Science, vol. 9798, 511-523.CCF-C类)

(20)Yue  Chen, Yaoqi Jia,Jian Mao,  Zhenkai Liang. Poster: Detecting Browser-Based Probing Attacks via Behavior  Analysis. The 22nd Annual Network and Distributed System Security Symposium  (NDSS 2015), February 2015. (CCF-B)

(21)Jian Mao, Yaoqi Jia, Xinshu Dong, Yue  Chen, Ruilong Wang, Zhenkai Liang. Poster: Detecting Unexpected Behaviors in  HTML5 Mobile Apps using Difference in Execution Context. The 35thIEEE Symposium on Security  and Privacy (S&P 2014), May 2014. (CCF-A)

(22)Pei  Li,Jian Mao, Ruilong  Wang, Lihua Zhang, Tao Wei. A Website Credibility Assessment Scheme Based on  Page Association[C]. The 10th International Conference on Information  Security Practice and Experience (ISPEC 2014) Fuzhou, China: Springer Verlag,  2014, 105-118.

(23)Jian Mao, Xinshu Dong, Pei Li, Tao  Wei, Zhenkai Liang. Rating Web Pages Using Page-transition Evidence[C]. The  15th International Conference on Information and Communications Security  (ICICS 2013), Beijing, China: Springer Verlag, 2013.CCF-C类)

(24)Xinshu  Dong, Kailas Patil,Jian Mao,  Zhenkai Liang. A Comprehensive Client-side Behavior Model for Diagnosing  Attacks in Ajax Applications[C]. The 18th International Conference on  Engineering of Complex Computer Systems (ICECCS2013), Singapore, 2013,  177-187.

已授权专利

(1) 毛剑、刘建伟、李坤、徐先栋、冯克、张晏.一种无线信道数据完整性保护方法. ZL201210154081.1

(2) 毛剑、徐先栋、刘建伟、张晏、李坤、修春娣.一种分布式云存储数据完整性保护方法. ZL201210159546.2

(3) 毛剑、张晏、刘建伟、徐先栋、冯克、尚涛.一种云存储数据持有性验证方法. ZL201210159377.2

(4) 李坤、毛剑*、刘建伟、冯克、李佩.一种钓鱼网站检测方法. ZL201210477139.6.(学生第一)

(5) 毛剑、冯克、李腾、刘建伟、张晏、张键红.一种可公开验证云端数据持有性校验方法. ZL201310295910.2

(6) 毛剑、李腾、张晏、冯克、刘建伟、伍前红.一种云存储数据完整性验证方法. ZL201310246856.2

(7) 毛剑,李佩,李腾,陈岳,马寒军,刘建伟.一种钓鱼网页检测方法.北京:CN104092667A.

(8) 毛剑,李腾,王瑞珑,陈杰,王培人,伍前红,刘建伟.一种云存储服务信用评价方法.北京:CN104092564A

(9) 毛剑,陈岳,史福田,伍前红,刘建伟. 基于浏览器扩展插件的网页行为提取和分析工具软件.受理号:2015R11S243689

u  学术与社会服务

§ IEEE会员、ACM会员;

§ TPC委员:WASA20172018CCF  C类)、ICNC2017ISPA2017PAMCO  2016

§ SCI期刊TDSCCCF  A类)、TNSEKSII  TIISEURASIPCCF  C类)、WCMC(CCF C)JCST等审稿人;

§ CCF-A类顶级会议CCS14-16CCF_A)、USENIX  Security15WWWW2014、安全顶级会议(CCF-B类)NDSS13-15等会议审稿人。

u  科研项目

(1) 国家重点研发安全专项“基于国产密码算法的服务认证与证明关键技术”

(2) 国家自然科学青年基金 “基于程序行为分析的Web安全复合信任机理研究”

(3) 北京市自然科学基金 面上项目 “云端数据持有性检测与云存储信任机理研究”

(4) 华为课题“基于HTML5的移动应用程序安全分析”

(5) 国家973计划项目  “可重构基础网络的安全与管控机理与结构”

Curriculum Vitae  (CV)

Jian Mao received  the Ph.D. degree in Computer Communications from Xidian University in 2004,  and the B.E. degree in Computer Communications from Xidian University in  1997. She is currently an Assistant Professor in the School of Cyberspace  Science of Beihang University, Beijing, China. She was a visiting scholar in  the School of Computing, National University of Singapore (from 2010 to 2011)  and the Department of Computer Science, the George Washington University  (from 2015 to 2016). Her research interests include cloud security, Web  security, and mobile security. She has published more than seventy papers in  renowned journals and international conferences. She has served as a  Technical Program Committee (TPC) member for many conferences including the  14th ACM Asia Conference on Information, Computer and Communications Security  (ACM ASIACCS 2019), the 12th and 13th International Conference on Wireless  Algorithms, Systems, and Applications (WASA 2017, 2018), International  Conference on Computing, Networking and Communication (ICNC 2017), the 15th  IEEE International Symposium on Parallel and Distributed Processing with  Applications (IEEE ISPA 2017), Workshop on Privacy-Aware Mobile Computing  (PAMCO 2016) and a reviewer for a number of journals including IEEE Transactions  on Dependable and Secure Computing, IEEE Transactions on Network Science  & Engineering, KSII Transactions on Internet and Information Systems,  EURASIP Journal on Wireless Communications and Networking, Wireless  Communications and Mobile Computing, China Communications, Journal of  Computer Science and Technology, Theory of Computing Systems. She is a member  of IEEE and ACM.