头像

姓名:宋宇波

职称:副教授

电话:

办公室:无线谷6号楼323房间

个人主页:欢迎信息专业、计算机专业及信息安全专业背景的学生报考。(2025南京校区名额已招满,无锡校区名额还有空余)

邮箱:songyubo AT seu.edu.cn

教育背景

学士(电力系统及其自动化),东南大学,1999.06

硕士(通信与信息系统),东南大学,2002.03

博士(信号与信息处理),东南大学,2005.07

学术兼职

研究领域

(1)网络与通信安全:包括移动通信安全攻击与防护、网络协议安全性分析、物理指纹提取与识别、物联网设备认证等;

(2)电力物联网安全:包括电力物联终端安全接入、终端识别、信任评估及访问控制等;

(3)数据防护与隐私计算:包括敏感数据识别、泄露检测、多方安全计算、零知识证明及区块链应用等;

(4)恶意检测及漏洞挖掘:包括日志分析、恶意流量检测、软件漏洞挖掘等。



研究概况

宋宇波,现就职于东南大学网络空间安全学院副教授,硕士生导师。2005.07年博士毕业于东南大学信息科学与通信学院信号与信息处理专业,在东南大学信息科学与通信学院获得通信与信息系统专业硕士学位,以及在东南大学电气工程学院获得电力系统及其自动化专业学士学位。是江苏省网络空间安全学会、江苏省密码学会、江苏省网络空间安全学会数据安全专委会成员,金砖国家职业技能大赛首席专家。目前的研究方向包括无线安全、数据安全以及区块链安全,近年主要围绕设备物理安全,数据隐私保护以及区块链等领域开展研究,参与国家自然科学基金、国家863项目、国家发改委重大专项目以及国家信息安全计划项目多项。在国内外重要学术期刊和会议发表学术论文100多篇,申请及授权发明专利40多项,获得科技成果鉴定5项,2005年获江苏省科技进步三等奖一项,2022年获电子学会技科技进步一等奖,2024年入选全球前2%顶尖科学家年度影响力榜单。教学方面2009年获得东南大学青年教师授课竞赛二等奖,2012及2014年获东南大学教学优秀二等奖,2016年获孙庆云创新奖教金,2017年及2022年两次被评为东南大学最受欢迎研究生导师称号。

最近动态

研究课题

  1. 国网总部科技项目,广域分布式新能源测控终端轻量级加密传输与在线运维管控技术研究,2023-2025;

  2. 国网总部科技项目,基于非监督学习的营销线上合作渠道业务数据风险防控技术研究,2023-2024;

  3. 国网总部科技项目,电力物联终端智能化漏洞挖掘关键技术研究,2022-2023;

  4. 国网总部科技项目,电力数据中台入侵容忍防护及危害缓解技术研究,2022-2023;

  5. 国家重点研发计划,2022YFB2902202,融合无线空口使能新技术的6G内生安全,2022-2025;

  6. 国家自然科学基金(联合基金项目)),6509019692,基于量子密钥分发的5G物联网安全技术研究,2022-2026;

  7. 国家自然科学基金,61601113,基于量化可信模型的信息系统智能安全机制研究,2018-2020;

  8. 国家重点研发计划,2018YFB2202200,高宽带超高速数据率及宽带可重构射频系统集成芯片,2018-2020;

  9. 国家重点研发计划,2018YFB2100403,异构物体资源建模与交换关键技术,2018-2020;

  10. 国家自然科学基金面上项目,61202448,半量子密码学中若干问题研究,2013/01-2015/12;

  11. 国家863计划,2007AA01Z43TD-SCDMA大规模用户群的信息监管关键技术研究,2007/07-2008/07

  12. 国家发改委重大专项,无线智能终端安全检测服务能力建设,2012/01-2013/12

  13. 国家信息安全测试中心合作项目,无线局域网安全性能测试平台,2011/09-2012.03

  14. 全国信息安全标准化技术委员会项目,无线城域网安全接入控制技术规范。

奖励与荣誉

  1. 江苏省科技厅,江苏省科技进步三等奖,(2005年);

  2. 东南大学,东南大学青年教师授课竞赛二等奖,(2009年);

  3. 东南大学,东南大学教学工作优秀二等奖,(2012年);

  4. 东南大学,东南大学教学工作优秀二等奖,(2014年);

  5. 东南大学,孙庆云创新奖教金,(2016年);

  6. 东南大学,获东南大学最受欢迎研究生导师称号,(2017年,信息学院);

  7. 江苏省高校团队优秀毕业设计,(2021年);

  8. 东南大学,获东南大学最受欢迎研究生导师称号,(2022年,网安学院);

  9. 中国电子学会,科技进步一等奖,电力基础设施信息物理跨域攻击防御关键技术及应用,个人排名第五(2022年);

  10. 2024年入美国斯坦福大学与爱思唯尔(Elsevier)公布的全球前2%顶尖科学家(World's Top 2% Scientists)年度影响力(Single year impact)榜单。

课程信息

序号课程名称课时授课对象课程类型授课时间
1移动通信和无线网络安全36研究生一年级网安学院研究生学位课秋季长学期
2移动通信和无线网络安全36研究生一年级网安学院研究生学位课(无锡校区)秋季长学期
3无线网络安全技术(研讨)32本科生三年级网安学院本科生专业研讨课春季长学期
4无线网络安全技术(研讨)32本科生三年级信息学院本科生专业研讨课春季长学期
5信息安全48本科生三年级信息学院本科生基础课秋季长学期
6网络空间安全实训32本科生二年级网安学院本科生主干课暑期短学期

竞赛指导:


  1. 第十四届全国大学生信息安全竞赛作品赛一等奖,获奖题目:X-Cam:基于网络流量分析的偷拍无线摄像机检测定位系统,组员:周厚霖、舒钰淇、文俊、刘欣宇,2021年8月;

  2. 第十四届全国大学生信息安全竞赛作品赛二等奖,获奖题目:基于网络环境属性感知的WEB用户身份识别系统,组员:陈烨、蔡义涵、曹越、马运聪,2021年8月;

  3. 第十二届全国大学生信息安全竞赛作品赛一等奖,获奖题目:基于参量阵隐蔽声的防录音窃听设备,组员:陶祎航,成员李珮玄、高圣沂、撒鹏程,2019年8月;

  4. 第十二届全国大学生信息安全竞赛作品赛二等奖,获奖题目:跨越 Air-gapped 的鸿沟-基于显示器隐通道和图像微扰动的隐蔽通信系统,组员:黄云川、郑鹏翔、赵晨、李想,2019年8月;

  5. 第十二届全国大学生信息安全竞赛作品赛二等奖,获奖题目:基于区块链的慈善捐款系统,组员:时旻、林志、吴天琦、刘业扬,2019年8月;

  6. 第十一届全国大学生信息安全竞赛作品赛二等奖,获奖题目:基于运动传感器的用户前台数字密码输入推断系统,组员:马小松、朱皓瑀、李沙志远,2018年8月;

  7. 第十一届全国大学生信息安全竞赛作品赛二等奖,获奖题目:免密登录:通过外部手机实现桌面在线服务身份认证,组员:王梦哲、薛天昊、黄文俊、练杨,2018年8月;



学术成果

论文发表

  1. L. Zhao et al., “Robust Soliton Distribution-Based Zero-Watermarking for Semi-Structured Power Data,” Electronics, vol. 13, no. 3, p. 655, 2024.

  2. Y. Yang, W. Shen, Q. Guo, Q. Shan, Y. Cai, and Y. Song, “EPA-GAN: Electric Power Anonymization via Generative Adversarial Network Model,” Electronics, vol. 13, no. 5, p. 808, 2024.

  3. H. Yang, R. Song, B. Chen, Y. Song, and B. Xiao, “MoDID: Decentralized Identity Management for Multiple Owners,” in ICC 2024-IEEE International Conference on Communications, IEEE, 2024, pp. 2022–2027.

  4. Y. Song et al., “Hierarchical-Based Dynamic Scenario-Adaptive Risk Assessment for Power Data Lifecycle,” Electronics, vol. 13, no. 3, p. 631, 2024.

  5. D. Mao et al., “EPFed: Achieving Optimal Balance between Privacy and Efficiency in Federated Learning,” Electronics, vol. 13, no. 6, p. 1028, 2024.

  6. C. Chen, Y. Song, Y. Jiang, and M. Zhang, “Optimizing Network Service Continuity with Quality-Driven Resource Migration,” Electronics, vol. 13, no. 9, p. 1666, 2024.

  7. X. Zuo, Y. Song, R. Mao, Z. Qin, and X. Sun, “MODGF: Multi-Objective Optimization Approach for Directed Greybox Fuzzing,” in 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), IEEE, 2023, pp. 106–113.

  8. T. Zheng, S. Gao, Y. Song, and B. Xiao, “Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols,” in 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023, pp. 2533–2550.

  9. J. Xue, Z. Yu, Y. Song, Z. Qin, X. Sun, and W. Wang, “VulSAT: Source Code Vulnerability Detection Scheme Based on SAT Structure,” in 2023 8th International Conference on Signal and Image Processing (ICSIP), IEEE, 2023, pp. 639–644.

  10. Y. Song, K. Liu, Y. Gu, Y. Jiang, W. Sun, and L. Fang, “Data Resilience Protection for Power Data Center Based on Automatic Identification of Key Data and Incremental Backup,” in 2023 International Conference on Intelligent Management and Software Engineering (IMSE), IEEE, 2023, pp. 56–59.

  11. R. Song, B. Xiao, Y. Song, S. Guo, and Y. Yang, “A survey of blockchain-based schemes for data sharing and exchange,” IEEE Transactions on Big Data, 2023.

  12. T. Jiang and Y. Song, “Privacy Protection Offloading Algorithm Based on K-anonymity in Mobile Edge Computing Networks,” in 2023 IEEE 11th International Conference on Information, Communication and Networks (ICICN), IEEE, 2023, pp. 248–254.

  13. Y. Chen, Y. Song, Y. Cai, Q. Shan, B. Zhang, and T. Zhang, “A Novel Fuzzy Identity-Based Encryption with Wireless PUF for IoT Device Authentication,” in 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), IEEE, 2023, pp. 574–581.

  14. L. Zhang, D. Mao, Z. Chen, Y. Song, L. Chen, and Z. Qin, “Smart Grid Data Aggregation Scheme Based on Local Differential Privacy,” in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, 2022, pp. 1534–1539.

  15. Z. Yu et al., “VulMiningBGS: Detection of overflow vulnerabilities based on graph similarity,” in 2022 18th International Conference on Computational Intelligence and Security (CIS), IEEE, 2022, pp. 386–390.

  16. L. Yang, Y. Song, S. Gao, A. Hu, and B. Xiao, “Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN,” IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2269–2281, 2022.

  17. X. Sun et al., “VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN,” in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, 2022, pp. 953–958.

  18. R. Song, S. Gao, Y. Song, and B. Xiao, : “A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge,” in 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), IEEE, 2022, pp. 224–234.

  19. 宋宇波, 朱靖恺, 赵灵奇, 胡爱群. 基于模型准确率的链上去中心化联邦学习模型[J]. 清华大学学报(自然科学版), 2022, 62(5): 832-841.

  20. 宋宇波, 杨光, 陈立全, 胡爱群. 基于无痕嵌入的二维码不可见劫持攻击[J]. 清华大学学报(自然科学版), 2022, 62(5): 825-831.

  21. Q. Chen, Y. Song, B. Jennings, F. Zhang, B. Xiao and S. Gao, IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation, 2021 IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1-6.

  22. X. Jiang, Y. Song, R. Song and A. Hu, Data desensitization mechanism of Android application based on differential privacy, 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), 2021, pp. 1-5.

  23. Chen B, Song Y, Wu T, et al. Enhancing Wi-Fi Device Authentication Protocol Leveraging Channel State Information[C]//International Conference on Mobile Multimedia Communications. Springer, Cham, 2021: 33-46.

  24. Song Y, Chen B, Wu T, et al. Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information[J]. Wireless Communications and Mobile Computing, 2021, 2021.

  25. 宋宇波,陈冰,郑天宇,陈宏远,陈立全,胡爱群.基于混合特征指纹的无线设备身份识别方法[J].计算机研究与发展,2021,58(11):2374-2399.

  26. 陈冰,宋宇波,施麟,朱珍超,郑天宇,陈宏远,吴天琦.基于信道指纹的无线设备身份异常检测技术研究[J].信息安全研究,2021,7(09):849-855.

  27. Ma X, Song Y, Wang Z, et al. You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording[C]//ICC 2021-IEEE International Conference on Communications. IEEE, 2021: 1-6.

  28. T. Wu, Y. Song, F. Zhang, S. Gao and B. Chen. My Site Knows Where You Are: A Novel Browser Fingerprint to Track User Position[C]//ICC 2021 - IEEE International Conference on Communications, 2021, pp. 1-6.

  29. Chen B, Song Y, Zhu Z, et al. Authenticating Mobile Wireless Device Through Per-packet Channel State Information[C]//2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2021: 78-84.

  30. Song Y, Geng Y, Wang J, et al. Permission Sensitivity-Based Malicious Application Detection for Android[J]. Security and Communication Networks, 2021.

  31. 宋宇波,金星妤,燕锋,胡爱群.车联网中移动边缘计算的安全高效节能卸载策略[J/OL].清华大学学报(自然科学版), 2021.

  32. 宋宇波,吴天琦,胡爱群,高尚.基于跨域资源访问的浏览器用户追踪[J/OL].清华大学学报(自然科学版), 2021.

  33. 宋宇波,陈琪,宋睿,胡爱群.基于虚拟机字节码注入的Android应用程序隐私保护机制[J].通信学报,2021,42(06):171-181.

  34. 宋宇波,马文豪,胡爱群,王俊波.一种基于像素值偏移编解码技术的屏摄隐通道研究[J].信息网络安全,2021,21(04):31-38.

  35. 宋宇波,耿益瑾,李古月,李涛.基于差分星座轨迹图的LoRa设备识别方法[J].信息网络安全,2021,21(01):41-48.

  36. Shi C, Xie L, Wang C, et al. Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking[J]. Wireless Communications and Mobile Computing, 2021, 2021.

  37. Lin Z, Song Y, Wang J. Detection of Virtual Machines Based on Thread Scheduling[C]//International Conference on Artificial Intelligence and Security. Springer, Cham, 2021: 180-190.

  38. Xv Q, Song Y, Li X, et al. A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme[C]//International Conference on Artificial Intelligence and Security. Springer, Cham, 2021: 650-663.

  39. Chen Q, Song Y, Hu A, et al. Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection. International Conference on Artificial Intelligence and Security. Springer, Cham, 2021: 664-676.

  40. 宋宇波,马小松,陶祎航,高圣沂,撒鹏程,李珮玄.基于声学参量阵理论的超声波防录音屏蔽研究与实现[J].北京理工大学学报,2020,40(12):1282-1288.

  41. 宋宇波,杨俊杰,张仕奇,祁欣妤,胡爱群.基于流量特征识别的哑终端安全管控系统[J].北京理工大学学报,2020,40(10):1081-1087.

  42. Liyan Yang,Yubo Song, Shang Gao, Bin Xiao, Aiqun Hu, Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN. 2020 IEEE Global Communications Conference: Communication & Information System Security (Globecom2020 CISS), 2020. 

  43. Shi C, Song R, Qi X, et al. ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis[C]. ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 2020: 1-6.

  44. Shang Gao, Zhe Peng, Bin Xiao and Yubo Song, Detection and Mitigation of DoS Attacks in Software Defined Networks, IEEE/ACM Transactions on Networking, 2020.

  45. 宋宇波,樊明,杨俊杰,胡爱群.一种基于拓扑分析的网络攻击流量分流和阻断方法.信息网络安全,2020,20(03):9-17.

  46. 宋宇波,张仕奇,宋睿.一种基于投票权竞争的区块链共识机制.山东大学学报(理学版),2020,55(03):43-50.

  47. 张明远,武威,宋宇波,胡爱群.面向无线局域网接入设备的安全等级评估系统.清华大学学报(自然科学版), 2020, 60(05):371-379.

  48. 宋宇波,祁欣妤,黄强,胡爱群,杨俊杰.基于二阶段多分类的物联网设备识别算法.清华大学学报(自然科学版),2020,60(05):365-370.

  49. C. Shi, L. Xie, C. Wang, P. Yang, Y. Song, and S. Lu, “iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking,” in 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), 2019, pp. 655–662.

  50. Q. Huang, Y. Song, J. Yang, M. Fan, and A. Hu, “A Booting Fingerprint of Device for Network Access Control,” in 2019 3rd International Conference on Circuits, System and Simulation (ICCSS), 2019, pp. 251–254.

  51. F. Deng, Y. Song, A. Hu, M. Fan, and Y. Jiang, “Abnormal traffic detection of IoT terminals based on Bloom filter,” in Proceedings of the ACM Turing Celebration Conference-China, 2019, pp. 1–7.

  52. 宋宇波,彭朝阳,苏悦,刘蕴箫,赵千锋,朱珍超.基于神经网络模型的室内大规模人流密度预测.北京理工大学学报,2019,39(07):714-718+770.

  53. 宋宇波,戚姗姗,胡爱群.权限可控传递的物联网共享设备委托授权访问机制.网络与信息安全学报,2019,5(02):40-49.

  54. 赵灵奇,宋宇波,张克落,胡爱群,罗坚.基于区块链和分层加密的物流隐私保护机制.应用科学学报,2019,37(02):224-234.

  55. 宋宇波,杨慧文,武威,胡爱群,高尚.软件定义网络DDoS联合检测系统.清华大学学报(自然科学版),2019,59(01):28-35.

  56. Y. Song, Q. Huang, J. Yang, M. Fan, A. Hua and Y. Jiang, IoT device fingerprinting for relieving pressure in the access control, Proceedings of the ACM Turing Celebration Conference-China, 2019, pp 1–8.

  57. R. Song, Y. Song, Z. Liu, M. Tang and K. Zhou, GaiaWorld: A Novel Blockchain System Based on Competitive PoS Consensus Mechanism, 2019.

  58. 张明远,祁欣妤,宋宇波,顾荣荣,胡爱群,朱珍超.基于协议逆向的移动终端通信数据解析.网络与信息安全学报,2018,4(12):54-61.

  59. Song Rui, Song Yubo, Gao Shang, Xiao Bin and Hu Aiqun, I Know What You Type: Leaking User Privacy Via Novel Frequency-based Side-channel Attacks, 2018 IEEE Global Communications Conference: Communication & Information System Security (Globecom2018 CISS),2018.

  60. R. Song, Y. Song, Q. Dong, A. Hu, and S. Gao, “WebLogger: Stealing your personal PINs via mobile web application,” in 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017, pp. 1–6.

  61. Y. Hua, Y. Zhang, Q. Liu, Y. Liu, and Y. Song, “The Fake BTS Detection and Location On Smart Phones,” in Proceedings of the 2017 International Conference on Industrial Design Engineering, New York, NY, USA, 2017, pp. 116–120.

  62. Y. Song, S. Gao, A. Hu, and B. Xiao, “Novel attacks in OSPF networks to poison routing table,” in Communications (ICC), 2017 IEEE International Conference on, 2017, pp. 1–6.

  63. S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, “SCoP: Smartphone energy saving by merging push services in Fog computing,” in Quality of Service (IWQoS), 2017 IEEE/ACM 25th International Symposium on, 2017, pp. 1–10.

  64. G. Shang, P. Zhe, X. Bin, and S. Yubo, “Secure and energy efficient prefetching design for smartphones,” in 2016 IEEE International Conference on Communications (ICC), 2016, pp. 1–6.

  65. S. Yubo, Z. Zhiwei, and X. Yunfeng, “Using Short Message Service (SMS) to deploy Android exploits,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.

  66. S. Yubo, X. Yunfeng, and Z. Zhiwei, “A platform for GSM Um interface signaling observation,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.

  67. S. Yubo, Z. Mujing, and Q. Kaihua, “Accurate location based services by mobile phone actively detected,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–5.

  68. S. Yubo, Z. Kelong, and Y. Xiaowen, “Achievement of multiple HTTP communications based on single TCP connection,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–4.

  69. M. Shanshan, Y. Xiaohui, S. Yubo, Z. Kelong, and C. Fei, “Android’s sensitive data leakage detection based on API monitoring,” in International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1–4.

  70. Z. Kelong, S. Yubo, and C. Fei, “Implementation of automated testing system for android applications based on dynamic taint propagation,” in Communications Security Conference (CSC 2014), 2014, 2014, pp. 1–5.

  71. Z. Zhiwei, S. Yubo, X. Yunfeng, and Y. Zhongyun, “Using Short Message Service (SMS) to Deploy Android Exploits,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 890–893.

  72. S. Yubo, Z. Mujing, and Q. Kaihua, “Accurate Location Based Services by Mobile Phone Actively Detected,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 919–922.

  73. Y. Xiaowen, S. Yubo, and Z. Kelong, “Driver-Hiding Scheme Based on PsLoadedModuleList and Driver Object,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 899–902.

  74. M. Shanshan, Y. Xiaohui, S. Yubo, Z. Kelong, and C. Fei, “Android’s Sensitive Data Leakage Detection Based on API Monitoring,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 907–910.

  75. Z. Lan, Y. Song, and L. Tang, “Novel process-protecting method using camouflage techniques based on direct kernel object manipulation,” Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 43, no. 1, pp. 24–29, 2013.

  76. Z. Kelong, S. Yubo, and Y. Xiaowen, “Achievement of Multiple HTTP Communications Based on Single TCP Connection,” in Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Washington, DC, USA, 2013, pp. 903–906.

  77. 唐磊;宋宇波;蓝智灵;, “基于I/O缓冲区读写的控制台远程交互模型,”计算机工程, no. 01, pp. 275–278, 2013.

  78. 蓝智灵;宋宇波;唐磊;, “基于直接内核对象操作的进程伪装保护方法,”东南大学学报(自然科学版), no. 01, pp. 24–29, 2013.

  79. H. Wu, A. Hu, Y. Song, N. Bu, and X. Jia, “A New Intrusion Detection Feature Extraction Method Based on Complex Network Theory,” in 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), 2012, pp. 852–856.

  80. L. Tang, Y. Song, and Z. Lan, “A novel model of console remote interaction based on I/O buffer access,” in 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC), 2012, pp. 160–163.

  81. Y. Song, X. Zhu, Y. Hong, H. Zhang, and H. Tan, “A mobile communication honeypot observing system,” in 2012 4th International Conference on Multimedia and Security, MINES 2012, November 2, 2012 - November 4, 2012, 2012, pp. 861–865.

  82. Y. Song, K. Zhou, and X. Chen, “Fake BTS attacks of GSM system on software radio platform,” Journal of Networks, vol. 7, no. 2, pp. 275–281, 2012.

  83. S. Gao, A. Hu, and Y. Song, “Remote forensics system based on Minifilter,” in Proceedings of 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012, Changchun, China, 2012, pp. 1381–1385.

  84. S. Yubo, H. Xili, and L. Zhiling, “The GSM/UMTS Phone Number Catcher,” in 2011 Third International Conference on Multimedia Information Networking and Security (MINES), 2011, pp. 520–523.

  85. S. Yubo, Z. Kan, Y. Bingxin, and C. Xi, “A GSM/UMTS Selective Jamming System,” in 2010 International Conference on Multimedia Information Networking and Security (MINES), 2010, pp. 813–815.

  86. K. Zhou, A. Hu, and Y. Song, “A No-Jamming Selective Interception System of the GSM Terminals,” in 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010, pp. 1–4.

  87. B. Yao and Y. Song, “A partial zero-forcing precoding method for downlink multi-user MIMO channel,” in 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, November 4, 2010 - November 6, 2010, 2010, pp. 816–819.

  88. 宋宇波;胡爱群;姚冰心;, “802.11i认证协议可验安全性形式化分析,”中国工程科学, no. 01, pp. 67–73, 2010.

  89. 李国琴;宋宇波;胡爱群;, “基于GAA-WAPI的融合网络认证机制,”南京邮电大学学报(自然科学版), no. 06, p. 59–64+70, 2010.

  90. 陈开志;胡爱群;宋宇波;刘慧慧;袁红林;, “基于BioHashing和密钥绑定的双重可删除指纹模板方法,”高技术通讯, no. 11, pp. 1115–1120, 2010.

  91. S. Yubo, C. Xi, and H. Aiqun, “The Denial of Service Attack Analysis of WLAN Authentication Infrastructure,” in International Conference on Multimedia Information Networking and Security, 2009. MINES ’09, 2009, vol. 1, pp. 407–411.

  92. S. Yubo, H. Aiqun, and C. Kaizhi, “Security analysis of certificate authentication in Chinese WLAN standard,” in International Conference on Advanced Technologies for Communications, 2009. ATC ’09, 2009, pp. 23–26.

  93. 徐宁;宋宇波;刘金官;严国平;, “继电保护定值远程安全配置系统的设计与研究,”南京邮电大学学报(自然科学版), no. 03, pp. 57–63, 2009.

  94. 陈开志;胡爱群;宋宇波;袁红林;, “基于最小化星座点离散度的MPSK定时盲同步,”高技术通讯, no. 11, pp. 1106–1110, 2009.

  95. Y. Song and A. Hu, “Dynamic threshold proxy authenticated encryption scheme,” in 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, October 12, 2008 - October 14, 2008, 2008, p. Wuhan University, China; Dalian University of Technology, China; IEEE Antennas and Propagation Society; Scientific Research Publishing, USA; IEEE Communications Society.

  96. Y. Song and A. Hu, “Dynamic key distribution system in ad hoc networks,” in 2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, October 12, 2008 - October 14, 2008, 2008, p. Wuhan University, China; Dalian University of Technology, China; IEEE Antennas and Propagation Society; Scientific Research Publishing, USA; IEEE Communications Society.

  97. 吴亚军;胡爱群;宋宇波;, “无线局域网协议分析系统的设计与实现,”计算机工程, no. 22, pp. 140–142, 2008.

  98. 宋宇波;黄玉划;, “CCMP协议的量化可验安全分析,”东南大学学报(自然科学版), no. 02, pp. 206–210, 2008.

  99. 宋宇波;胡爱群;杨晓辉;, “基于接入控制器模式的公共无线局域网安全体系设计,”中国工程科学, no. 08, pp. 56–59, 2008.

  100. 宋宇波;陈开志;吴亚军;, “基于口令的鉴别密钥交换协议设计,”信息安全与通信保密, no. 02, pp. 81–83, 2008.

  101. 吴文南;胡爱群;宋宇波;, “短距离无线语音和数据传输模块的设计与实现,”现代电子技术, no. 05, pp. 29–31, 2007.

  102. 汪姬;胡爱群;宋宇波;, “一种新的用于3G互连的盲均衡改进算法TDE-CMA,”中国工程科学, no. 02, pp. 54–57, 2007.

  103. 宋宇波;陈开志;姚冰心;, “基于自我加密的无线局域网快速切换认证,”东南大学学报(自然科学版), no. 06, pp. 945–949, 2007.

  104. 刘玉洁;宋宇波;裴文江;, “VoWLAN监听系统的设计与实现,”信息安全与通信保密, no. 10, pp. 66–68, 2007.

  105. 杨丹;胡爱群;宋宇波;, “移动无线网络接入计费信息系统的设计与实现,”电子技术应用, no. 10, pp. 64–66, 2006.

  106. 李炎新;胡爱群;宋宇波;, “自适应BPSK解调方法研究,”中国工程科学, no. 05, p. 49–51+68, 2006.

  107. 陈曦;宋宇波;王执铨;吴慧中;, “复杂产品虚拟样机综合集成型决策支持系统研究,”中国工程科学, no. 02, pp. 67–74, 2006.

  108. 陈端端;裴文江;宋宇波;, “基于CDMA和802.11的无线多媒体平台的设计与实现,”电子技术应用, no. 11, pp. 66–68, 2006.

  109. 王质礼;胡爱群;宋宇波;, “嵌入式无线接入点网络驱动的设计与实现,”中国工程科学, no. 10, pp. 91–94, 2005.

  110. 宋宇波,胡爱群, “无线局域网TKIP协议的安全分析,”应用科学学报, no. 01, pp. 67–70, 2005.

  111. 宋宇波,胡爱群, “无线接入点WAPI认证机制的研究与实现,”中国工程科学, no. 09, pp. 65–69, 2005.

  112. 宋宇波,胡爱群, “WLAN802.11/11b数据加密机制的安全分析,”中国工程科学, no. 10, pp. 32–38, 2004.

  113. 黄玉划,胡爱群, “一次一密保密算法研究与实现,”应用科学学报, no. 03, pp. 287–290, 2004.

  114. 黄玉划,胡爱群, “基于双重分组和密钥计数的并行认证模式,”中国工程科学, no. 07, pp. 70–74, 2004.

  115. 黄玉划,胡爱群, “分组密码算法的快速认证模式研究与设计,”东南大学学报(自然科学版), no. 02, pp. 175–178, 2004.

  116. 胡骏,胡爱群,宋宇波等 “Linux环境下基于QT的WLAN管理信息系统,”计算机工程, no. 03, pp. 114–116, 2004.

  117. 侯奋飞,宋宇波, “基于PMI的电子政务访问控制体系,”计算机工程, no. 17, pp. 114–116, 2004.

  118. 宋宇波,胡爱群, “电子政务安全体系结构的探析,”计算机工程, no. 10, pp. 11–13, 2003.

  119. 黄玉划,胡爱群, “网络安全中密钥更新算法研究与实现,”计算机工程与应用, no. 35, pp. 27–29, 2003.

  120. 宋宇波,疏朝明, “RC6加密算法在VPN中的应用,”通信技术, no. 07, pp. 78–80, 2001.

  121. 疏朝明,宋宇波等, “HMAC-SHA-1-96算法在VPN中的应用,”通信技术, no. 06, pp. 35–36, 2001.

著作

  1. 胡爱群,宋宇波,蒋睿.信息安全[M].第1版.华中科技大学出版社, 30万千字,2011.

  2. 蒋睿,胡爱群,陆哲明,宋宇波等.网络信息安全理论与技术[M].华中科技大学出版社, 50万千字,2007.

专利

  1. 陈烨,蔡义涵,宋宇波. 基于网页嵌入式脚本代码的在线内部网络环境扫描方法. CN113709252A,2021-11-26.

  2. 刘若琳,周鹏,叶卫等人. 基于密文策略属性基的能源数据访问权限撤销方法. CN113612805A,2021-11-05.

  3. 薛天昊,曹天旸,洪磊,周灏,宋宇波. 基于多用户轨迹拟合的室内地图生成方法. CN108709557B,2021-09-24.

  4. 陈冰,宋宇波,陈宏远等人. 一种基于信道状态信息的包级别无线设备认证方法. CN113365273A,2021-09-07.

  5. 周鹏,叶卫,王文等人. 基于瑞丽散度进行噪声添加的联邦学习差分隐私保护方法. CN113127931B,2021-09-03.

  6. 刘若琳,周鹏,叶卫等人. 基于知识签名的敏感数据匿名访问方法. CN113132116A,2021-07-16.

  7. 宋宇波;樊明; 陈璐 ;蔡宇翔 ;上官霞 ;肖琦敏 ;胡爱群 , 《基于网络流量特征融合的物联网设备身份凭证生成方法》,CN202010093208.8,2020.02.

  8. 樊明;宋宇波;陈璐;杨俊杰;杨慧文;胡爱群;蔡宇翔;肖琦敏;潘丹,《一种基于流表信息的网络异常流量行为识别阻断的方法》,CN202010032388.9,2020.01.

  9. 宋宇波; 李珮玄; 马小松; 撒鹏程; 高圣沂; 陶祎航, 《一种基于超声波参量阵的隐蔽干扰信号发生装置及方法》, CN111064543A. 2019.12.

  10. 樊明; 宋宇波; 陈璐; 杨慧文; 邓峰杰; 杨俊杰; 胡爱群; 蔡宇翔; 肖琦敏; 潘丹, 《一种基于拓扑分析的攻击流量分流和阻断方法》, CN111049859A. 2019.12.

  11. 宋宇波;黄强;祁欣妤;杨俊杰;胡爱群, 《网络流量指纹特征二阶段多分类的物联网设备识别方法》, CN110380989A ,10月 25, 2019.

  12. 薛天昊;曹天旸;洪磊;周灏;宋宇波, 《基于多用户轨迹拟合的室内地图生成方法》, CN108709557A, 10月 26, 2018.

  13. 曹天旸;薛天昊;洪磊;周灏;宋宇波, 《基于移动众包模式的室内地图生成与轨迹加密方法》, CN108810817A, 11月 13, 2018.

  14. 徐健;宋宇波;石伟;张天阳, “基于显示设备电磁辐射通信的手机验证登录系统及方法”CN201810310532,2018-04-09.

  15. 方昊;胡爱群;姜禹;彭林宁;宋宇波, “一种基于设备物理指纹特征的无线网络接入安全防护系统及方法”, CN 201810223029.4, 2018-03-16.

  16. 李平安,李泽坤,张明昊,吴彧,宋宇波,戚姗姗, “基于公众号的物联网设备控制和权限分享系统及方法”, CN 201710810831.9, 2017-09-11.

  17. 刘祺华远刘奕琳张宇宸李前宋宇波, “一种伪基站检测定位系统,” CN107027122A, 27-May-2017.

  18. 宋宇波肖斌, “物联网设备的委托授权方法、服务器、终端及物联网设备”, CN 201610543643.X, 2016-07-11.

  19. 宋宇波,秦艳荣,王润,浦希益, and张志伟, “远程实时监测智能移动终端基带处理器运行状态的方法及系统,” 201510600961.0, 18-Sep-2015.

  20. 宋宇波 et al., “一种基于相似类型匹配估算的SQLite删除数据恢复方法,” CN104866610A, 04-Jun-2015.

  21. 刘兰谊,宋宇波,李卓倩,徐军,蔡金洲, and李度洋, “一种基于心音多维特征提取的身份识别算法及其系统,” CN104887263A, 21-May-2015.

  22. 罗平,宋宇波,王有东,蓝骥, and王国鹏, “一种基于电容感应技术的身份认证系统,” CN104182740A, 01-Sep-2014.

  23. 罗平 and宋宇波, “基于电容感应技术的门禁系统,” CN104183045A, 28-Aug-2014.

  24. 胡爱群,宋宇波,高岳,孟姗姗,陈飞, and朱克龙, “一种Android应用程序隐私数据泄露离线检测方法,” CN103729595 A, 16-Apr-2014.

  25. 高尚,胡爱群,李涛,宋宇波, and王涛, “一种伪无线接入点数据分析系统及其方法,” 201310350040.4, 12-Aug-2013.

  26. 高尚 et al., “基于渗透测试的无线网卡安全评估方法,” 201210421952, 30-Jan-2013.

  27. 胡爱群 et al., “一种基于无线接入点的渗透测试系统及其测试方法,” 201210356909, 26-Dec-2012.

  28. 蒋睿,宋宇波,葛蕤,黄永亮,张南, and胡锡利, “基于手机蓝牙的计算机环绕智能防护装置及方法,” 201110075500, 19-Dec-2012.

  29. 胡爱群 et al., “一种无线局域网安全性能测试系统及方法,” 201210255233, 24-Oct-2012.

  30. 宋宇波,唐磊,蓝智灵, and石乐, “一种控制台程序远程交互的方法,” 201210175830, 17-Oct-2012.

  31. 宋宇波,刘亦辰,岳亚,庞健, and梁琦, “基站获取移动通信终端国际移动设备识别码的装置及方法,” 201210162317, 17-Oct-2012.

  32. 宋宇波,朱筱贇,张皓月,谭杭波, and王许莲, “一种移动通信蜜罐捕获系统及其实现方法,” 201210175212, 19-Sep-2012.

  33. 宋宇波,王雪晨,刘锡仑, and贾成伟, “基于物理不可克隆功能的无线传感器网络,” 201120544168, 29-Aug-2012.

  34. 宋宇波,王雪晨,刘锡仑, and贾成伟, “一种基于前馈模式的物理不可克隆功能模块,” 201120524648, 22-Aug-2012.

  35. 宋宇波,王雪晨,刘锡仑, and贾成伟, “一种基于前馈模式的物理不可克隆功能模块及其实现方法,” 201110419448, 25-Jul-2012.

  36. 宋宇波,王雪晨,刘锡仑, and贾成伟, “基于物理不可克隆功能的无线传感器网络及其实现方法,” 201110435692, 27-Jun-2012.

  37. 蒋睿,宋宇波,胡锡利,郝婷婷, and黄泽, “一种移动终端短消息监管的设备和方法,” CN103369482A, 01-Apr-2012.

  38. 蒋睿,宋宇波,黄泽,郝婷婷, and胡锡利, “一种监控用户手机号码的装置和方法,” 201210039485.6, 21-Feb-2012.

  39. 蒋睿,宋宇波,郝婷婷,胡锡利, and黄泽, “一种移动终端语音通信安全监管的设备和方法,” 201210038932.6, 20-Feb-2012.

  40. 宋宇波,蒋睿,张南, and胡锡利, “基于蓝牙设备认证的计算机系统自动防护方法,” 201110065732, 14-Sep-2011.

  41. 宋宇波, “无线局域网通信接口的远程加密监管方法,” 200710131503, 02-Jun-2010.

  42. 宋宇波 et al., “用于远程内容监管的无线局域网接入装置,” 200710132257, 02-Dec-2009.

  43. 宋宇波 et al., “基于分布式架构的无线网络电话监听装置的监听方法,” 200710132256, 14-Oct-2009.

  44. 胡爱群,杨晓辉,宋宇波, and陈立全, “基于嵌入式系统的无线保护接入设备,” 200510122789, 03-Jun-2009.

  45. 宋宇波, “基于码分多址技术的移动无线局域网接入装置及方法,” 200710131504, 13-Feb-2008.

  46. 胡爱群,杨晓辉,宋宇波, and陈立全, “基于嵌入式系统的无线保护接入设备,” 200520134188, 15-Aug-2007.

  47. 胡爱群 et al., “基于PKI的VPN密钥交换的实现方法,” 01132348, 02-Aug-2006.


其他