头像

姓名:陶军

职称:教授

电话:

办公室:

个人主页:Latest News: Yuyang, Jinghai, Yuehao, Kun, Hao, Yuan and Han win National Scholarship. Dingwen's paper is accepted by IEEE TCSS. Jinghai's paper is accepted by IEEE IoTJ. Yuyang's paper is accepted by NPC2024. Ruijie's paper is accepted by ACM CCS 2024. LinXiao's paper is accepted by Computer Networks. Yu's paper is accepted by IJCNN. Haotian's papers are accepted by IEEE TIFS and IEEE TVT, respectively.

邮箱:juntao@seu.edu.cn

教育背景

  • 现任东南大学网络空间安全学院教授、博士生导师。

  • 2014-2015,教育部,科学技术与信息化司。

  • 2011-2012,Victoria University, Canada, Visiting Professor in Computer Science.

  • 2009-2012,Nanjing University, Postdoctoral Research.

  • The Ph.D. degree in Computer Science from the Department of Computer Science and Engineering, Southeast Universtiy, in 2005.

  • The B.S. and M.S. degrees in Computer Science from the Department of Computer Science and Engineering, Northeast University, in 1998 and 2001, respectively.



学术兼职

  • 中国教育科研网华东(北地区节点网络中心 主任

  • 江苏省互联网协会 副理事长

  • 江苏省网络空间安全学会 秘书长

  • 国家网络空间国际治理研究基地(东南大学)副主任

  • 中国计算机学会高级会员,互联网专业委员会委员

  • 江苏省计算机学会 理事

研究领域

  • 互联网与信息安全(Internet and Information Security)

  • 网络测量与流量分析(Network Measurement and Traffic Analysis)

  • 分布式计算和边缘计算(Distributed Computing and Edge Computing)

  • 移动群智感知(Mobile CrowdSensing)

  • 无线与移动网络(Wireless and Mobile Network)

研究概况

希望招募对互联网与信息安全、网络测量与分析、无线群智感知与边缘计算方向感兴趣的博士生和硕士生,欢迎希望从事相关领域研究,诚实守信,代码能力和英语写作表达能力强,发送个人简历到邮箱:juntao@seu.edu.cn

最近动态

研究课题

  • 国家重点研发计划课题,互联网基础行为测量与分析2018YFB1800205),主持

  • 下一代互联网技术创新项目,基于IPv6的无线传感网长效运行关键技术研究(NGII20160315),主持

  • 国家自然科学基金面上项目,受控移动辅助的无线传感网长效运行关键技术研究(61370209),主持

  • 教育部-中国移动联合基金,大数据平台智能采集和处理技术研究和应用(MCM20150502),主持

  • 江苏省自然基金,非合作无线车载自组织网络中路由关键技术的研究(BK20151416),主持

奖励与荣誉

课程信息

本科生:算法分析与设计-I高级网络编程

研究生:算法分析与设计-II

学术成果

Selected Papers(部分论文)

  • D.  Chi, J. Tao*,H. Wang, Y. Xu. Trade-off between Capacity and Cost: Maximizing User Recruitment through Collaboration in Mobile Crowdsensing [J]. IEEE Transactions on Computational Social Systems, 2024. (DOI: 10.1109/TCSS.2024.3)

  • Y. Shen, J. Tao*, L. Yu, Y. Luo. EAMTI: A Novel Method Toward Early and Accurate Malicious Traffic Identification [C]. IFIP International Conference on Network and Parallel Computing (NPC), 2024. (accepted).

  • J. Duan, J. Tao*, D. Chi, X. Li, Y. Xu, Towards Energy Variations for IoT Lightweight Authentication in Backscatter Communication [J],  IEEE Internet of Things Journal, 2024. (doi: 10.1109/JIOT.2024.3464100)

  • R. Li, C. Zhang, H. Chai, L. Ying, H. Duan, J. Tao. PowerPeeler: A Precise and General Deobfuscation Method for PowerShell Scripts [C]. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2024), 2024. (accepted).

  • L. Yu, J. Tao*, Y. Xu, W. Sun, Z. Wang. TLS Fingerprint for Encrypted Malicious Traffic Detection with Attributed Graph Kernel [J]. Computer Networks, 2024. (accepted).

  • Y. Ao, J. Tao, D. Zou, W. Sun, L. Yu. An Accurate and Lightweight Intrusion Detection Model Deployed on Edge Network Devices [C]. International Joint Conference on Neural Networks (IJCNN), 2024. 

  • H. Wang, J. Tao*, D. Chi, Y. Gao, Z. Wang, D. Zou, Y. Xu. A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing [J]. IEEE Transactions on Information Forensics & Security, 2024.  (DOI: 10.1109/TIFS.2024.3352412)

  • Y. Zhu, J. Tao*, H. Wang, L. Yu, Y. Luo, T. Qi, Z. Wang, Y. Xu.  DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network [J]. IEEE Transactions on Network and System Management, 2023.  (DOI: 10.1109/TNSM.2023.3344580)

  • Y. Luo, J. Tao*, Y. Zhu, Y. Xu. HSS: Enhancing IoT Malicious Traffic Classification Leveraging Hybrid Sampling Strategy [J]. Cybersecurity. (DOI: 10.1186/s42400-023-00201-9)

  • D. Zou, J. Tao*, Z. Wang. Semantics-aware Location Privacy Preserving: A Differential Privacy Approach [J]. Wireless Communications and Mobile Computing, 2023.  (to appear)

  • Y. Gao, J. Tao*, H. Wang, Z. Wang, W. Sun, C. Song. Joint Server Deployment and Task Scheduling for the Maximal Profit in Mobile Edge Computing [J]. IEEE Internet of Things Journal, 2023.(doi: 10.1109/JIOT.2023.3303356)

  • H. Wang, J. Tao*, D. Chi, Y. Gao, Z. Wang, D. Zou, Y. Xu. IMRSG: Incentive Mechanism Based on Rubinstein-Starr Game for Mobile CrowdSensing [J] IEEE Transactions on Vehicular Technology, 2023.(to appear)

  • X. Chen, Y. Xu, J. Tao, R. Chen. An LP-based Online Dispatching Method with Privacy-preserving in Online Ride-hailing [C]. IEEE GlobeCom 2023. (to appear)

  • D. Chi, J. Tao*, Y. Hu, H. Wang, Z. Wang, Y. Xu, AUV-Assisted Information Collection Scheme with Energy Balance and Low Delay of Underwater Things [J]. Wireless Networks, 2023.(to appear)

  • Y. Gao, J. Tao*, H. Wang, Z. Wang, D. Zou, Y. Xu. Benefit-Oriented Task Offloading in UAV-Aided Mobile Edge Computing: An Approximate Solution [J]. Peer-to-Peer Networking and Applications, 2023.(to appear)

  • J. Tao*, X. Yuan, S. Zhang, Y. Xu. Development of Fingerprint Identification Based on Device Flow in Industrial Control System. Applied Science, 2023, 13, 731. https://doi.org/10.3390/app13020731

  • Z. Wang, J. Tao*, Y. Xu, Y. Gao, D. Zou. Towards  the Minimal Wait-for Delay for Rechargeable WSNs with Multiple Mobile  Chargers. ACM Transaction on Sensor Networks, 2022.(doi: 10.1145/3579093)

  • Z. Wang, J. Tao*, Y. Gao, Y. Xu, W. Sun, Y. Gao, W. Li. Joint Flight Scheduling and Task Allocation for Secure Data Collection in UAV-aided IoTs [J]. Computer Networks, 2022. (doi: 10.1016/j.comnet.2022.108849)

  • W. Li, J. Tao, Y. Xu, Z. Wang, Y. Xu, X. Tang, Y. Dong. MobiTrack: Mobile Crowdsensing-based Object Tracking with Min-Region and Max-Utility [C]. ICA3PP, 2021.

  • Y. Gao, J. Tao*, Y. Xu, Z. Wang, W. Sun, G. Cheng. CEBD: Contact Evidence-driven Blackhole Detection based on Machine Learning in OppNets [J]. IEEE Transactions on Computational Social Systems (DOI: 10.1109/TCSS.2021.3078160). 2021.

  • 陶军*, etc. 一种面向 IPv6网络空间的特征水印生成与嵌入方案研究 [J]. 计算机研究与发展. 2021

  • W. Sun, J. Tao, Y. Xu, Y. Gao, Z. Wang. Network Latency Estimation: A Tensor-Based Weighted Singular Value Thresholding Method [C]. IEEE HPCC 2021.

  • Y. Gao, J. Tao, Z. Wang, W. Li, G. Cheng. Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets [C]. 2021 IEEE MASS.

  • Z. Wang, J. Tao*, Y. Gao, Y. Xu, W. Sun, X. Li. A Precision Adjustable Trajectory Planning Scheme for UAV-based Data Collection in IoTs [J]. Peer-to-Peer Networking and Applications, March, 2021(DOI: 10.1007/s12083-020-01006-0).

  • Y. Xu, P. Xu, J. Pan, J. Tao, A Unified Model for the Two-stage Offline-then-Online Resource Allocation, IJCAI 2020.

  • J. Tao, Y. Li, Z. Wang, P. Xu, and C. Su. Self-adaptive Probabilistic Sampling for Elephant Flows Detection. in Proc. 62th IEEE Global Telecommunications Conf. (GLOBECOM'19), Waikoloa, HI, USA, 2019.

  • J. Tao, X. Li, J. Li, Q. Fang, Z. Wang, and F. Tong. Similarity-guided Multimedia Recommendation in Heterogeneous Information Network. in Proc. 62th IEEE Global Telecommunications Conf. (GLOBECOM'19), Waikoloa, HI, USA, 2019.

  • Y. Gao, J. Tao, L. Zeng, X. Fang, Q. Fang, X. Li. User Profiling with Campus Wi-Fi Access Trace and Network Traffic. IEEE International Conference on Multimedia and Expo (ICME 2019) 2019.

  • 陶军*, 施书静, 冯富琴, 高扬. 节点位置信息驱动的物联网终端缓存管理机制的研究 [J]. 计算机学报, 42(2), 2019, pp. 252-265.

  • L. He, L. Kong, J. Tao, J. Xu and J. Pan, On-Demand Mobile Data Collection in Cyber-Physical Systems. Wireless Communications and Mobile Computing.

  • J. Tao*, Y. Xu, Z. Zhang, F. Feng, F. Tong and F. Dong, A Resource Allocation Game with Restriction Mechanism in VANET Cloud. Concurrency and Computation: Practice & Experience.

  • J. Tao*, L. Zhu, L. Chang, J. Liu, X. Wang, and Y. Hu, Joint Anti-attack Scheme for Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks. Security and Communication Networks (WILEY), (DOI: 10.1002/sec.1176).

其他