黃文超[計算機學院特任副研究員]

個人簡介

黃文超,男,1982年6月生,湖北宜昌人,博士。2006、2011年於中國科學技術大學計算機系分別獲得學士、博士學位。2011~2013年在中國科學技術大學從事博士後工作。現任計算機學院特任副研究員。主要從事可信計算、形式化程式驗證、移動計算、群智感知計算方面的研究。目前主持國家自然科學基金青年基金,並參與國家自然科學重點基金、國家自然科學基金面上項目、國家863項目。

主要研究方向

信息安全、形式化程式驗證、移動計算

主要論著

[01]Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu. Fine-grained Refinement on TPM-based Protocol Applications. IEEE Transactions on Information Forensics and Security. vol.8, no.6, 2013: 1013-1026.
[02]Mingxi Li, Yan Xiong, Wenchao Huang, Xiancun Zhou, Xuangou Wu. A Modular Integrated Laboratory for Wireless Sensor Networks, Applied Mechanics and Materials. vol.380, 2013: 2472-2477.
[03]Xuangou Wu, Yan Xiong, Wenchao Huang, Hong Shen, Mingxi Li. An efficient compressive data gathering routing scheme for large-scale wireless sensor networks, Computers & Electrical Engineering, vol.39, no.6, 2013: 1935-1946.
[04]Xuangou Wu, Yan Xiong, Mingxi Li, Wenchao Huang. Distributed Spatial-Temporal Compressive Data Gathering for Large-scale WSNs. (ComComAp), 2013: 105-110.
[05]吳呈邑, 熊焰, 黃文超, 陸琦瑋, 龔旭東. 移動自組網中基於動態第三方的可信公平非抵賴協定. 電子學報. vol.41, no.2. 2013: 227-232.
[06]Xudong Gong, Yan Xiong, Qiwei Lu, Fuyou Miao, Wenchao Huang. A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics. Chinese Journal of Electronics. vol.22, no.1, 2013: 155-159.
[07]Mingxi Li, Yan Xiong, Wenchao Huang, Xiancun Zhou, Xuangou Wu. A Range-assisted Detection Protocol against Replication Attacks in WSNs. ICCSEE 2013: 1023-1026
[08]Qingwen Liu, Yan Xiong, Wenchao Huang. Integrating Social Information into Collaborative Filtering for Celebrities Recommendation. ACIIDS (2) 2013: 109-118
[09]Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang. Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. TrustCom 2012: 100-108.
[10]Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao. A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. TrustCom 2012: 656-665.
[11]Shichen Liu, Yan Xiong, Qiwei Lu, Wenchao Huang. Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization. IJCCI 2012: 133-143.
[12]Wenchao Huang, Yan Xiong, Wenjuan Cheng, Chengyi Wu, Depin Chen. A Formal Specification of Mobile Trusted Computing. Chinese Journal of Electronics. vol.20, no.1. 2011: 11-16.
[13]Wenchao Huang, Yan Xiong, Depin Chen. DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. CSE (2) 2009: 809-816.

熱門詞條

聯絡我們