近5年部分发表/录用论文 [1] Jiawei Li, Jiahao Liu, Jian Mao*, Jun Zeng, Zhenkai Liang: UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications. Network and Distributed System Security (NDSS) Symposium 2025. (CCF-A, 安全旗舰会议) [2] Ziwen Liu, Jian Mao*, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, Zhenkai Liang: ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs. Network and Distributed System Security (NDSS) Symposium 2025. (CCF-A, 安全旗舰会议) [3] Chen Z, Mao J*, Lin Q, et al. Empirical Analysis of Remote Keystroke Inference Attacks and Defenses on Incremental Search[J]. Tsinghua Science and Technology.2025. (SCI JCR 1 区) [4] 刘力沛, 毛剑*, 林其箫, 吕雨松, 李嘉维, 刘建伟. 基于语义分析的小程序代码与隐私声明一致性检测方法. 软件学报. 2025. (CCF-A) [5] Lin Q, Chang S, Mao J*, et al. Anomaly Detection in Smart IoT Systems Based on Contextual Semantics of Behavior Graphs[J]. IEEE Internet of Things Journal, 2025. (SCI JCR 1 区) [6] Jiawei Li, Jian Mao*, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang: UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation.USENIX Security Symposium 2024. (CCF-A, 安全旗舰会议) [7] Yudi Zhou, Yan Huo, Qinghe Gao, Yue Wu, Tao Jing, Jian Mao: Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable Cooperators. IEEE Trans. Inf. Forensics Secur. 19: 5798-5813 (2024) (SCI JCR 1 区,CCF-A) [8] Z. Zhou, X. Luo, J. Mao*, T. He, X. Ji and J. Wang, "Blockchain-assisted Efficient Data Sharing Scheme with Accountability and Privacy-preserving for Internet of Drones Networks," in IEEE Transactions on Vehicular Technology, doi: 10.1109/TVT.2024.3476670. 09 October 2024. (SCI JCR 1 区) [9] Jian Mao*, Qixiao Lin, Shishi Zhu, Liran Ma, and Jianwei Liu, SMARTTRACER: Anomaly-driven Provenance Analysis Based on Device Correlation in Smart Home Systems, IEEE Internet of Things Journal, 2023. (SCI JCR 1 区) [10] Zequan Zhou, Xiling Luo, Yupeng Wang, Jian Mao* et al., A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing, IEEE Transactions on Vehicular Technology, 2023. (SCI JCR 1 区) [11] Jian Mao*, Ziwen Liu, Qixiao Lin, Zhenkai Liang, Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages, IEEE Internet of Things Journal, 2022. (SCI JCR 1 区) [12] Jian Mao*, SybilHunter: Hybrid Graph-based Sybil Detection by Aggregating User behaviors, Neurocomputing, 2022. (SCI JCR 1 区) [13] Jian Mao*, Yitong Yang and Tianchen Zhang, Empirical Analysis of Attribute Inference Techniques in Online Social Network, IEEE Transactions on Network Science and Engineering, 2021, 8(2), 881-893. (SCI JCR 1 区) [14] Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao*. WATSON: Abstracting behaviors from audit logs via aggregation of contextual semantics. Proceedings of the Network and Distributed Systems Security Symposium, 2021(NDSS’2021)(CCF-A, 安全旗舰会议) [15] Jian Mao*, Shishi Zhu, Qixiao Lin. Watchdog: Detecting Ultrasonic-based Inaudible Voice Attacks to Smart Home Systems, IEEE Internet of Things Journal, 2020. (SCI JCR 1 区) [16] Jian Mao*, Xiang Li, Qixiao Lin, Jianwei Liu, Deeply Understanding Graph-Based Sybil Detection Techniques via Empirical Analysis on Graph Processing, China Communications, 2020, 17(10). (SCI JCR 3区,通信学会A类) [17] Mengmeng Wang, Jianwei Liu, Jian Mao*, Haosu Cheng, Jie Chen, Chan Qi. RouteGuardian: Constructing Secure Routing Paths in Software Defined Networking. Tsinghua Science and Technology, 2017, 22(4): 400-412 (SCI, 通讯作者,2019 年度优秀论文奖,Web of Science他引:18) [18] Qixiao Lin, Jian Mao*, Futian Shi, Shishi Zhu, Zhenkai Liang. Detecting Android Side Channel Probing Attacks Based on System States, The 14th International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2019: 201-212. (CCF-C 类会议,会议最佳论文奖) [19] Jian Mao*, Shishi Zhu, Jingdong Bian, Qixiao Lin, Jianwei Liu. Anomalous Power-usage Behavior Detection from Smart-Home Wireless Communications. IEEE Journal of Communications and Information Networks. 2019, 4(1): 23-33.(通讯学会 A 类) [20] Jian Mao*, Jingdong Bian, Wenqian Tian, Shishi Zhu, Taowei, Aili Li, Zhenkai Liang. Phishing page detection via learning classifiers from page layout feature. EURASIP Journal on Wireless Communications and Networking. 2019: 43(SCI JCR 3区,Web of Science他引:12) 部分已授权专利、软件著作权 [1] 毛剑、刘建伟、李坤、徐先栋、冯克、张晏. 一种无线信道数据完整性保护方法. ZL201210154081.1 [2] 毛剑、徐先栋、刘建伟、张晏、李坤、修春娣. 一种分布式云存储数据完整性保护方法. ZL201210159546.2 [3] 毛剑、张晏、刘建伟、徐先栋、冯克、尚涛. 一种云存储数据持有性验证方法. ZL201210159377.2 [4] 李坤、毛剑*、刘建伟、冯克、李佩. 一种钓鱼网站检测方法. ZL201210477139.6. [5] 毛剑、冯克、李腾、刘建伟、张晏、张键红. 一种可公开验证云端数据持有性校验方法. ZL201310295910.2 [6] 毛剑、李腾、张晏、冯克、刘建伟、伍前红. 一种云存储数据完整性验证方法. ZL201310246856.2 [7] 毛剑、李腾、王瑞珑、陈杰、王培人、伍前红、刘建伟. 一种云存储服务信用评价方法. ZL201410283074.0(已转化) [8] 毛剑,祝施施,刘建伟等. 针对超声波的语音隐藏攻击的检测方法及装置. ZL201810804883.X(已转化) [9] 毛剑,卞京东,杨晨,刘建伟等. 基于智能插座的电器类型推断方法及装置. (CN201810501654.0) [10] 毛剑,王瑞珑,陈岳,刘建伟,马寒军,伍前红. HTML5移动应用程序的异常行为检测方法和行为模型建立方法. ZL2015103331621.(已转化) [11] 毛剑、崔键、刘建伟等. 移动应用程序异常行为检测方法及装置. ZL2016100037984.(已转化) [12] 毛剑、陈岳、刘建伟等. Web应用程序行为提取方法和恶意行为检测方法. ZL2015108817655.(已转化) [13] 毛剑、马寒军、卞京东、刘建伟、关振宇. Hybrid移动应用用户界面的检测方法及系统. ZL201710385933.0.(已转化) [14] 毛剑、李佩、李腾、陈岳、马寒军、刘建伟.一种钓鱼网页检测方法. ZL201410282730.5.(已转化) [15] 毛剑,陈岳,史福田,伍前红,刘建伟. 基于浏览器扩展插件的网页行为提取和分析工具软件. 受理号:2015R11S243689 (软件著作权) 出版教材 [1] 毛剑, 刘建伟,网络安全创新实验(微课版),清华大学出版社,2023.01. [2] 毛剑,刘建伟,Web安全简明实验教程,电子工业出版社,2023.03. [3] 毛剑,刘建伟,刘文懋,关振宇,物联网安全——理论与技术,清华大学出版社,2024.03. 部分教学论文 [1] Jian Mao, Zheng Leong Chua, Zhenkai Liang. Enabling Practical Experimentation in Cyber-Security Training[C]. 2017 IEEE Conference on Dependable and Secure Computing. August 2017. [2] Zhenkai Liang and Jian Mao. Tool, Technique, and Tao in Computer Security Education. IEEE Reliability Magazine, August 2015. [3] 毛剑, 刘建伟, 尚涛, 关振宇, 张宗洋, 徐同阁, 基于 OBE 的《网络安全》闭环课堂教学方法探索与实践, 工业和信息化教育, 2019(4): 42-47 [4] 毛剑,尚涛,关振宇,徐同阁,白琳,刘建伟,聚焦国际前沿化的信息系统安全课程体系建设初探,工业和信息化教育,2021。 [5] 毛剑,刘正华,刘建伟,尚涛,彭浩,王天博,伍前红,Web安全研究生精品课程建设初探,计算机教育,202302,338(2):26-30 |