个人信息

头像

姓名: 翁健

部门: 信息科学技术学院

直属机构: 党政办公室

性别:

职务:

职称: 教授

学位:

毕业院校:

联系电话:

电子邮箱:

办公地址:

通讯地址:

邮编:

传真:

荣誉奖励:

联系方式

个人简介

学习经历

2004.9-2008.1 上海交通大学计算机系 博士研究生 (导师:陈克非 教授)

2001.9-2004.7 华南理工大学计算机系 硕士研究生 (导师:李仲麟 教授)

1996.9-2000.7 华南理工大学计算机系 本科


工作经历

研究方向

密码学与信息安全

主要论文

部分期刊论文

1. Xin Chen, Jian Weng, Wei Lu, Jiaming Xu. Multi-Gait Recognition Based on Attribute Discovery. IEEE Transactions on Pattern Analysis and Machine Intelligence (IEEE TPAMI), 40(7): 1697-1710, 2018

2. Jia-Si Weng, Jian Weng, Yue Zhang, Weiqi Luo. BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-based VANET. IEEE Transactions on Vehicular Technology, 2018

3. Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Transactions on Dependable and Secure Computing, 15(1): 27-39, 2018

4. Xin Chen, Jian Weng, Wei Lu, Jiaming Xu, Jia-Si Weng. Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE Transactions on Neural Networks and Learning Systems, 29(9): 3938-3952, 2018

5. Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren. Secure Integrated Circuit Design via Hybrid Cloud. IEEE Transactions on Parallel and Distributed Systems, 29(8): 1851-1864, 2018

6. Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Transactions on Smart Grid 9(5): 4490-4502, 2018

7. Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Transactions on Information Forensics and Security, 12(8): 1874-1884, 2017

8. Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren. Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE Transactions on Smart Grid 8(2): 619-626, 2017

9. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li. Lightweight fine-grained search over encrypted data in fog computing, IEEE Transactions on Services Computing, 2018

10. Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu. False Load Attack to Smart Meters by Synchronously Switching Power Circuits, IEEE Transactions on Smart Grid, 2018

11. Yang Yang, Ximeng Liu, Robert H Deng, Jian Weng. Flexible wildcard searchable encryption system, IEEE Transactions on Services Computing, 2017

12. Minxin Du, Qian Wang, Meiqi He, Jian Weng. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage, IEEE Transactions on Information Forensics and Security 13 (9), 2320-2332, 2018

13. Zhijun Zhang, Lunan Zheng, Jian Weng, Yijun Mao, Wei Lu, Lin Xiao. A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation. IEEE Transactions on Cybernetics, pp. 1-14, 2018

14. Yongdong Wu, Zhuo Wei, Jian Weng, Robert H Deng. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Transactions on Vehicular Technology 67 (6), 5287-5301

15. Zhe Liu, Jian Weng, Xinyi Huang, Zhi Hu, Lu Zhou. Efficient Elliptic Curve Cryptography for Embedded Devices. ACM Transactions on Embedded Computing Systems, 2016

16. Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren. You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Transactions on Dependable and Secure Computing, 2018

17. Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert Deng. Vulnerabilities, Attacks and Countermeasures in Balise-based Train Control Systems, IEEE Transactions on Intelligent Transportation Systems, 18 (4), 814-823, 2017

18. Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K Liu, Xun Yi. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Transactions on Dependable and Secure Computing, 2018

19. Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S Wong. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Transactions on Cloud Computing, 2018

部分CCF推荐会议论文

1. Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond. Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, LNCS 9216, pp. 77-92, Springer-Verlag, 2015

2. Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao. Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. In Proc. of 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2014), LNCS 8441, pp. 77–92, 2014

3. Lingguang Lei,Yi He,Kun Sun,Jiwu Jing,Yuewu Wang,Qi Li,Jian Weng. Vulnerable Implicit Service: A Revisit.ACM CCS2017:1051-1063

4. Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. In Proc. of Twelfth IACR Theory of Cryptography Conference (TCC 2015), LNCS 9014, pp. 7-35, Springer-Verlag, 2015.

5. Yu Yu and Xiangxue Li and Jian Weng. Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters. 19th Annual International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), K. Sako and P. Sarkar (Eds.), LNCS 8270, pp. 261–279, Spring-Verlag, 2013

6. Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng. CCA-Secure Keyed-Fully Homomorphic Encryption. In: 19th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2016), pp. 70-98, 2016.

7. Jian Weng, Yunlei Zhao, Goichiro Hanaoka. On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy

8. Jie Chen, Junqing Gong, Jian Weng.Tightly Secure IBE Under Constant-Size Master Public Key. In: 19th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2017),pp. 207-231.

9. Yanjiang, Jianying Zhou, Jian Weng and Feng Bao. A New Approach for Anonymous Password Authentication. 25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 2009

10. Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou: Verifiable Computation over Large Database with Incremental Updates. In 19th European Symposium on Research in Computr Security (ESORICS 2014), 2014: 148-162, 2014

11. Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng. Verifiable Computation on Outsourced Encrypted Data. In 19th European Symposium on Research in Computer Security (ESORICS 2014), 2014: 273-291, 2014

12. Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng. Authorized Keyword Search on Encrypted Data. In 19th European Symposium on Research in Computr Security (ESORICS 2014), 2014: 419-435, 2014

13. Junzuo Lai, Robert Deng, Yingjiu Li and Jian Weng. Fully Secure Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts and Fast Decryption. In Proc. of ACM ASIACCS 2014, ACM Press, pp. 239-248, 2014

14. Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai. Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack. Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 2009

15. Yanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang and Jianying Zhou. Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. ACM ASIACCS 2016, pp. 141-151.

16. Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng and Kui Ren. Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. ACM ASIACCS 2016, pp. 59-70

17. Kai He, Jian Weng, Jia'Nan Liu, Joseph Liu, Robert Deng and Wei Liu. Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACM ASIACCS 2016, 247-255

18. Wenjie Yang, Jian Weng, Futai Zhang. New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ICICS 2017: 236-247

19. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai: Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222(Best Paper Award)


主要著作

第26届信息安全国际会议SCIS 2011(会议地点:Kokura, Japan)最佳论文奖

国家杰出青年科学基金获得者

广东省珠江学者特聘教授

广东省高校“千百十工程”国家奖培养对象

中国密码学会首届密码创新奖

2017年全国网络安全优秀教师

第八届可证明安全国际会议ProvSec 2014(会议地点:Hong Kong)最佳学生论文奖

第37届IEEE分布式计算系统国际会议(ICDCS 2017)最佳学生论文奖


承担课题

发明专利

讲授课程

荣誉奖励

社会职务