BasicInformation

头像

Name: Anjia Yang

Department: College of Cyber Security

Organization: Jinan University

Gender: male

Post:

Career: Professor

Degree: PhD

Graduate School:

Tel:

Email:

Office Location:

Address:

PostCode:

Fax:

Honor:

Enrollment

Resume

I am currently an associate professor in the College of Cyber Security at the Jinan University. I received the B.S. degree in College of Computer Science and Technology from Jilin University in 2011, and the Ph.D. degree in the Department of Computer Science at the City University of Hong Kong under the supervision of Prof. Duncan S. Wong in 2015. I worked as a postdoc supervised by Prof. Jian Weng in Jinan University from 2016 to 2019, during which I visited the BBCR Lab in the Department of Electrical and Computer Engineering at University of Waterloo under the supervision of Prof. Xuemin (Sherman) Shen since May 2018. From September 2015 to July 2016, I worked as a research associate in the department of Computer Science at the City University of Hong Kong, cooperating with Prof. Gerhard Hancke. From November to December 2014, I worked at the Charlmers University of Technology, Sweden, as a visiting student. From December 2013 to June 2014, I was a research assistant in Institute for Infocomm Research (I2R), A*STAR, Singapore.

Education

2011/9 - 2015/8   PhD, City University of Hong Kong,  Hong Kong, P. R. China, Supervisor: Duncan S. Wong

2007/9 - 2011/6   Bachelor of Science, Jilin University, China


Work Experience

2019/10--present, Associate Professor, Jinan University, Guangzhou, China

2018/5--2019/9, Visiting Scholar, University of Waterloo, Canada

2016/12--2019/10, Postdoc, Jinan University, Guangzhou, China

2015/9-- 2016/7, Postdoc, City University of Hong Kong, Hong Kong, P. R. China

Research Fields

Thesis Fields

Publications

BOOKS/CHAPTERS

[B1] Anjia Yang, Gerhard P. Hancke. RFID and Contactless TechnologySmart Cards, Tokens, Security and Applications, Springer International Publishing, ISBN 978-3-319-50500-8, pp. 351-385, 2017


(* Corresponding author)

JOURNALS

[J28] Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert Deng, A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing, KSII Transactions on Internet and Information Systems, to appear, 2021

[J27] Xiang Liu, Anjia Yang*, Cheng Huang, Yuxian Li, Tao Li, and Ming Li, Decentralized Anonymous Authentication with Fair Billing for Space-Ground Integrated Networks, IEEE Transactions on Vehicular Technology, to appear, 2021

[J26] Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, and Anjia Yang, DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks, IEEE Transactions on Dependable and Secure Computing, to appear, 2021

[J25] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, and Konstantinos Markantonakis, Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns, IEEE Internet of Things Journal, vol. 8(14), pp. 11607-11620, 2021

[J24] Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou and Duncan S. Wong, Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage, IEEE Transactions on Cloud Computing, vol. 9(1), pp. 212-225, 2021 (Highly Cited Paper)

[J23Qiao Hu, Yuanzhen Liu, Anjia Yang* and Gerhard Hancke, Preventing Overshadowing Attacks in Self-Jamming Audio Channels, IEEE Transactions on Dependable and Secure Computing, vol. 18(1), pp. 45-57, 2021

[J22] Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang and Robert H. Deng, Looking Back! Using Early Versions of Android Apps as Attack Vectors, IEEE Transactions on Dependable and Secure Computing, vol. 18(2), pp. 652-666, 2021

[J21] Anjia Yang, Jian Weng, Kan Yang, Cheng Huang and Xuemin (Sherman) Shen, Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks, IEEE Transactions on Intelligent Transportation Systems, to appear, 2020

[J20] Yunhui Zhuang, Anjia Yang*, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang. Energy-Efficient Distance-Bounding with Residual Charge Computation, IEEE Transactions on Emerging Topics in Computing, vol. 8(2), pp. 365-376, 2020

[J19] Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li and Xiaodong Lin, Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage, IEEE Transactions on Dependable and Secure Computing, to appear, 2020

[J18] Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen and Xiaodong Lin, Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing based Smart Grid, IEEE Transactions on Smart Grid, vol. 11(1), pp. 247-257, 2020

[J17] Wenjie Yang, Jian Weng, Xinyi Huang, and Anjia Yang, A provably secure certificateless proxy signature scheme against malicious-but-passive KGC attacks, The Computer Journal, vol. 63(8), pp. 1139–1147, 2020

[J16] Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu and Xiaodong Lin, Towards Blockchain-based Fair and Anonymous Ad Dissemination in Vehicular Networks, IEEE Transactions on Vehicular Technology, vol. 68(11), pp. 11248-11259, 2019

[J15] Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin and Xuemin (Sherman) Shen, DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation, IEEE Transactions on Vehicular Technology, vol. 68(5), pp. 4834-4845, 2019

[J14] Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Liu Jia-Nan, Yang Xiang, Robert Deng. CrowdBC: A blockchain-based decentralized framework for crowdsourcing. IEEE Transactions on Parallel and Distributed Systems, vol. 30(6), pp. 1251-1266, 2019 (Highly Cited Paper)

[J13] Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang, Notes on a provably-secure certificate-based encryption against malicious CA attacks, Information Sciences, vol. 463-464, pp. 86-91, 2018

[J12] Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani, OTP-IoT: An ownership transfer protocol for the Internet of Things, Journal of Information Security and Applications, vol. 43, pp. 73-82, 2018

[J11] Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang and Hailiang Li, REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks, IEEE NETWORK, vol. 32(5), pp. 118-123, 2018

[J10Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong. Two-hop Distance-Bounding Protocols: Keep your Friends Close, IEEE Transactions on Mobile Computing, vol. 17(7), pp. 1723-1736 , 2018

[J9] Anjia Yang, Yunhui Zhuang, Jian Weng*, Gerhard Hancke, Duncan S. Wong and Guomin Yang, Exploring Relationship between Indistinguishability-based and Unpredictability-Based RFID Privacy Models, Future Generation Computer Systems, vol. 82, pp. 315-326, 2018

[J8] Elena Pagnin, Anjia Yang*, Qiao Hu, Gerhard Hancke, Aikaterina Mitrokotsa, HB+DB: Distance Bounding Meets Human Based Authentication, Future Generation Computer Systems, vol. 80, pp. 627-639, 2018

[J7] Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, and Anjia Yang, Fully distributed certificateless threshold signature without random oracles, SCIENCE CHINA Information Sciences, Vol. 61, pp. 098101:1–098101:3, 2018

[J6] Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang. Strongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGC, Security and Communication Networks, pp. 1-8, 2017

[J5] Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen. Security analysis of some diffusion mechanisms used in chaotic ciphers, International Journal of Bifurcation and Chaos , vol 27(10), pp. 1750155-1:13, 2017

[J4] Anjia Yang*, Xiao Tan, Joonsang Baek, Duncan S. Wong, A New ADS-B Authentication Framework based on Efficient Hierarchical Identity-Based Signature with Batch Verification, IEEE Transactions on Services Computing, vol. 10(2), pp. 165-175, 2017

[J3] Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard Hancke, Practical Limitation of Co-Operative RFID Jamming Methods in Environments without Accurate Signal Synchronization, Computer Networks, vol. 105, pp.224-236, 2016

[J2] Anjia Yang*, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia, A New Unpredictability-Based RFID Forward Privacy Model and a Provably Secure Construction, Secure and Communication Networks, 2015, 8(16):2836-2849

[J1] Kaitai Liang, Man Ho Au, Joseph K Liu, Willy Susilo, Duncan S Wong, Guomin Yang, Yong Yu, Anjia Yang, A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing, Future Generation Computer Systems, vol.52, pp.95-108, 2014

CONFERENCES

[C8] Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu, Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE, The 26st European Symposium on Research in Computer Security (ESORICS 2021), Darmstadt, Germany, 2021

[C7] Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen, Efficient and Fully Secure Lattice-based IBE with Equality Test, Proceedings of the 23th International Conference on Information and Communications Security (ICICS 2021), Chongqing, China, 2021

[C6] Jingyi Zhang, Anjia Yang, Qiao Hu and Gerhard P. Hancke, Security Implications of Implementing Multistate Distance-Bounding Protocols, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19), in conjunction with ACM CCS'19

[C5] Jia Xu*, Anjia Yang*, Jianying Zhou, Duncan S. Wong, Lightweight Delegatable Proofs of Storage, 21st European Symposium on Research in Computer Security (ESORICS 2016), 324-343, Heraklion, Greece, 2016

[C4] Elena Pagnin, Anjia Yang, Gerhard Hancke, Katerina Mitrokotsa, Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding, 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015), 3:1-3:6, New York, USA, 2015

[C3] Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie, A Highly Efficient RFID Distance Bounding Protocol Without Real-time PRF Evaluation, Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 451-464 Madrid, Spain, 2013

[C2] Anjia Yang*,Yunhui Zhuang,Duncan S. Wong,Guomin Yang,A New Unpredictability-Based RFID Privacy Model,Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 479-492, Madrid, Spain, 2013

[C1] Anjia Yang*, Yunhui Zhuang, Duncan S. Wong, An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), 285-292, Hong Kong, 2012


Undertake the subject

Patent for invention

Open Course

Honor

Social Position

PROFESSIONAL ACTIVITIES

  • Academic Editor for Security and Communication Networks, 2021-present

  • Guest Editor for Security and Communication Networks (SI: Security Threats and Defenses for Connected Vehicles), DDL: June 11, 2021

  • TPC member for IEEE International Conference on Blockchain (Blockchain'21), Melbourne, Australia, December 6-8, 2021

  • TPC member for UbiSec 2021 (The 17th International Conference on Ubiquitous Security), Guangzhou, China, December 28 - 31, 2021

  • TPC member for IEEE Globecom 2021 CISS (IEEE Global Communications Conference: Communication & Information Systems Security), Madrid, Spain, December 7-11, 2021

  • TPC member for IEEE TrustCom 2021 (The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications), Shenyang, China, August 18-20, 2021

  • TPC member for PST 2021 (18th International Annual Conference on Privacy, Security and Trust), Auckland, New Zealand, December 13-15, 2021

  • TPC member for IEEE Globecom 2020 CISS (IEEE Global Communications Conference: Communication & Information Systems Security), Taipei, Taiwan, December 7-11, 2020

  • TPC member for IEEE TrustCom 2020 (The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications), Guangzhou, China, November 10-13, 2020

  • TPC member for IEEE International Conference on Blockchain, Rhode Island, Greece, November 2-6, 2020

  • TPC member for WISTP 2019 (13th International Conference on Information Security Theory and Practice), Paris, France, December 11-12, 2019

  • TPC member for SSCC 2019 (7th International Symposium on Security in Computing and Communications), Trivandrum, India, December 18-21, 2019

  • TPC member for Cybersecurity 2019 (The 8th International Workshop on Cyber Security and Privacy), Guilin, China, October 17-19, 2019

  • TPC member for BAT 2019 (The First International Workshop on Blockchain Applications and Theory), Rome, Italy, June 10-13, 2019

  • TPC member for IEEE Globecom 2019 CISS (IEEE Global Communications Conference: Communication & Information Systems Security), Hawaii, USA, December 9-13, 2019

  • TPC member for IEEE International Conference on Blockchain, Atlanta, USA, July 14-17, 2019

  • TPC member for WISTP 2018 (12th International Conference on Information Security Theory and Practice), Brussels, Belgium, December 11-12, 2018

  • TPC member for IEEE Globecom 2018 CISS (IEEE Global Communications Conference: Communication & Information Systems Security), Abu Dhabi, UAE, December 9-13, 2018

  • TPC member for International Conference on Blockchain, Halifax, Canada, July 30-August 03, 2018

  • TPC member for ICCC 2018 (IEEE/CIC International Conference on Communications in China), Beijing, China, August 16-18, 2018

  • TPC member for WISTP 2017 (11th International Conference on Information Security Theory and Practice), Heraklion, Crete, Greece, September 28-29, 2017

  • Organizer committee for CCNIS 2017 (10th China Computer Networks and Information Security Conference), Guangzhou, China, October 10-12, 2017

  • TPC member for IEEE Globecom 2017 CISS (IEEE Global Communications Conference: Communication & Information Systems Security), Singapore, December 4-8, 2017

  • Invited talk in Blockchain Technical Forum, A Decentralized Crowdsourcing System based on Blockchain, at Wuhan University, Wuhan, China, March 25, 2017

  • TPC member and local organizer for RFIDSec 2016, Hong Kong, November 30-December 2, 2016

  • Volunteer for SecureComm 2016, Guangzhou, China, October 10-12, 2016


REVIEWERS

Journal Reviewer

Conference Reviewer

TrustCom 2020-2021, GlobeCom 2017-2020, ICC 2019-2020, IEEE Blockchain Conference 2018-2020, ICCC 2018, ICA3PP 2017, Inscrypt 2017, CCNIS 2017, RFIDSec 2016, ACNS 2014, ACISP 2014, SecureComm 2014, IEEE CloudCom 2014, ICICS 2014...