头像

姓名:胡晓艳

职称:博士生导师

电话:025-52090904

办公室:九龙湖校区计算机楼308

个人主页:

邮箱:xyhu@njnet.edu.cn

教育背景

学士 (软件工程,优秀本科毕业生) ,南京理工大学, 中国, 2007

工学博士(计算机系统结构),东南大学,中国,2015

公派博士联合培养(计算机科学),科罗拉多州立大学,美国,2012

学术兼职

东南大学网络空间安全学院博导、网络安全系主任、东南大学至善青年学者、江苏省科技副总、江苏省泛在网络安全工程研究中心副主任、CCF互联网专委会副秘书长、教育部区块链应用监管工程研究中心数字化金融区块链工程研究分中心主任、江苏省大数据专委会委员

IEEE会员,ACM会员,CCF会员,N2Women会员,江苏省计算机学会会员

ACM ICN 2022 Posters/Demos Co-chair

国内外著名期刊审稿人:软件学报,计算机研究与发展,IEEE/ACM Transactions on Networking, IEEE Transactions on Information Forensics & Security (TIFS), IEEE Network Magazine, IEEE Communications Magazine, IEEE Communications Letters, IEEE Internet of Things Journal, IEEE Access, Journal of Networks, IEEE Transactions on Industrial Informatics, IEEE Transactions on Network and Service Management, Digital Communications and Networks, Journal of Internet Technology, Transactions on information systems, ETRI Journal, Transactions on Design Automation of Electronic SystemsConcurrency and Computation: Practice and Experience, Transactions on Multimedia Computing Communications and Applications, Journal of Network and Systems Management, EURASIP Journal on Wireless Communications and Networking

研究领域

区块链网络安全智能感知、加密流量分析、未来网络体系结构及其安全

研究概况

胡晓艳,东南大学网络空间安全学院博导、网络安全系主任、东南大学至善青年学者、江苏省科技副总、江苏省泛在网络安全工程研究中心副主任、CCF互联网专委会副秘书长、教育部区块链应用监管工程研究中心数字化金融区块链工程研究分中心主任、江苏省大数据专委会委员。从事加密流量分析、区块链网络安全智能感知、区块链隐私保护、未来网络体系结构及其安全等领域的研究工作。参与或主持国家省部级纵向科研项目近10项。定期参加国际交流,保持和国际一流团队的合作,担任IEEE/ACM Transactions on Networking (TON, CCF A) IEEE Transactions on Information Forensics & Security (TIFS, CCF A)、软件学报(CCF中文A)等国内外著名期刊和会议的审稿人。发表SCI/EI收录论文50余篇,其中一作30余篇,出版专著2部。授权发明专利10项,申请发明专利25项,荣获2021年度江苏省科学技术一等奖。2010年至2012年在美国科罗拉多州立大学访学期间参与美国国家自然科学基金项目2项。

招收学生

长期招收博士研究生、免研、考研硕士研究生以及优秀本科实习生,希望加入课题组的学生具备以下宝贵特质:

[1] 积极、乐观、热爱生活;

[2] 良好的人品与在线的双商;

[3]良好的逻辑思维能力;

[4] 较强大的自我驱动力和自律能力;

[5] 踏实肯干;

[6] 优秀的团队意识与沟通能力;

欢迎对相关研究方向感兴趣且具备上述特质的本科生报考我的研究生,联系的邮箱为xyhu@njnet.edu.cn, 18114037703(微信同号)。2024年无锡硕士和工程博士招生尚有少量名额,欢迎联系。

 

最近动态

研究课题

[1]   国家重点研发计划课题,No2023YFB3106801,高隐蔽网络公害活动的匿迹机理和传播方法研究,2023/12-2026/11140万,在研,主持

[2]   江苏省未来网络科研基金,加密流量应用协议识别及深度行为分类方法研究,2022/1-2022/125万,在研,主持

[3]   装备预研重点实验室基金,加密流量精细化测量方法研究,2020/6-2022/620万,在研,主持

[4]   江苏省产学研合作项目(科技副总合作项目),面向联盟链的高效隐私保护机制研究,2020/6-2021/1230万,在研,主持

[5]   东南大学优秀青年教师科学研究资助,区块链网络安全智能感知研究,2020/01-2022/1230万,在研,主持

[6]   国家自然科学基金青年基金,No. 61602114,基于网络编码的信息中心网络研究,2017/01-2019/1221万元,结题,主持

[7]   2017年度赛尔网络下一代互联网技术创新项目,No. NGII20170406IPv6网络中NDN应用的安全防御机制研究,2018/01-2020/1210万元,在研,主持

[8]   国家重点研发计划课题,No. 2018YFB1800602,下一代网络处理器体系结构及关键技术研究,2019/07-2023/06954万元,在研,子课题负责人

[9] 国家重点研发计划课题,No. 2017YFB0801703SDN/NFV NDN安全研究,2017/07-2020/1243万元,在研,子课题排名第二

[10] 教育部-中国移动科研基金项目,下一代网络拒绝服务攻击检测和防护关键技术研究,No, 6209010001100万元,2019/01-2020/10,在研,排名第三

[11] 教育部产学合作协同育人项目,面向新工科的网络空间安全专业建设与实践,2019/10-2021/123万元,在研,参与

[12] 东南大学高校基本科研业务费专项,面向新一代网络的加密流量分析研究,2019/01-2019/1250万,结题,主持

[13] 江苏省未来网络创新研究院未来网络前瞻性研究项目,基于群体监测的未来网络故障推理研究与实现,BY2013095-5-0310万元,2014/01-2015/12,结题,参与

[14] 美国国家自然科学基金委,下一代互联网体系结构Named Data Networking (NDN)No.10395852011/06-2013/06911467美元,结题,参与

[15] 美国国家自然科学基金委,6Watch: Gauging the Global Rollout of IPv6No.096496962010/09-2011/05150万美元,结题,参与


奖励与荣誉


[1] 2023年度江苏省网络空间安全学会青年科技奖


[2] 通信旗舰会议IEEE ICC 2022 Best Paper Award


[3] 江苏省科学技术一等奖


[4]2019年东南大学至善青年学者B层次荣誉


[5]2020年度江苏省科技副总



课程信息

本科生课程:

《算法分析与设计》

《计算机网络概论》


研究生课程:

《计算机网络体系结构》



学术成果

专著

程光,杨望,吴桦,胡晓艳,汪洋,彭艳兵,《网络测量实验》,东南大学出版社,371千字,2023

程光,吴桦,胡晓艳,《网络测量学》,东南大学出版社,635千字,2022.

胡晓艳,程光,龚俭,吴桦,郑少琦,赵丽侠,《信息中心网络传输性能优化及安全探讨》,东南大学出版社,368千字,2020


2023代表性:

[1]  Xiaoyan Hu, Zhuozhuo Shu, Zhongqi Tong, Guang Cheng, Ruidong Li, Hua Wu. Fine-grained Ethereum Behavior Identification via Encrypted Traffic Analysis with Serialized Backward Inference, Computer Network, Vol. 237, p1~13, 2023. 

https://www.sciencedirect.com/science/article/pii/S1389128623005558 (CCF B, JCR 一区)

[2] Xiaoyan Hu, Wenjie Gao, Guang Cheng, Ruidong Li, Yuyang Zhou, Hua Wu. Towards Early and Accurate Network Intrusion Detection Using Graph Embedding, IEEE Transactions on Information Forensics & Security, in press, 2023.  https://ieeexplore.ieee.org/document/10262084  (CCF Rank A,中科院一区)

[3]  Xiaoyan Hu, Hao Chen, Miao Li, Guang Cheng, Ruidong Li, Hua Wu, Yali Yuan. ReplaceDGA: BiLSTM based Adversarial DGA with High Anti-Detection Ability, IEEE Transactions on Information Forensics & Security, Vol.18, p4406~4421, 2023. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10177739  (CCF Rank A,中科院一区)

[4]  Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu. Towards Verifiable and Privacy-Preserving Account Model on a Consortium Blockchain based on zk-SNARKs.  Peer-to-Peer Network Applications, accepted, 2023. (JCR二区)

 

Before 2023:

[1]  Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong. Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement, Computer Communications, Vol. 194, p44-54, 2022. (JCR一区,影响因子5.047) https://authors.elsevier.com/a/1fUyUVwcQkCoH

[2]  Xiaoyan Hu, Cheng Zhu, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong. A Deep Subdomain Adaptation Network with Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway, accepted by IEEE Internet of Things Journal, 2022. (中科院一区,影响因子10.238)

[3]  Xiaoyan Hu, Cheng Zhu, Zhongqi Tong, Wenjia Gao, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong. Identifying Ethereum Traffic Based on an Active Node Library and DEVp2p Features, accepted by Future Generation Computer Systems, Vol. 132, p162~177, 2022 (SCI: WOS:000770655700013, JCR一区,影响因子7.307)

 

[4]  Xiaoyan Hu, Miao Li, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong. Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples. 2022 IEEE International Conference on Communications (ICC 2022), p1-6, May, 2022

 

[5]  Xiaoyan Hu, Jun Yi, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang. Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs, accepted by WCNC 2022, p1~6

 

[6]  Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Lu Yang, Honggang Chen, Zhichao Liang. Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement, accepted by MSN 2021, p1~8

 

[7]  Xiaoyan Hu, Zhuozhuo Shu, Xiaoyi Song, Guang Cheng, Jian Gong. Detecting Cryptojacking Traffic Based on Network Behavior Features, accepted by Globecom 2021, p1~6

 

[8]  Xiaoyan Hu, Zechen Wang, Xiangjun Liu, Xinran Li, Guang Cheng, Jian Gong. Exploring Real-Time Super-Resolution Generative Adversarial Networks, International Journal of Sensor Networks, Vol. 36, No. 2, 2021, p85~96

 

[9]  胡晓艳,童钟奇,徐恪,张国强,郑少琦,赵丽侠,龚俭,程光命名数据网络中视频传输研究综述,计算机研究与发展,581):116-1362021 CCF A类中文期刊,EI: 20210309803480

 

[10]    胡晓艳童钟奇,吴桦,许昱玮基于活跃节点库的以太坊加密流量识别方法,网络空间安全,118),34-392020

 

[11]    Xiaoyan Hu, Xiaoyi Song, Shaoqi Zheng, Ruidong Li, Guang Cheng, Jian Gong. Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission. Accepted by GLOBECOM 2020

 

[12]    Xiaoyan Hu, Jun Yin, Shaoqi Zheng, Ruidong Li, Guang Cheng, Jian Gong. A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN. Accepted by GLOBECOM 2020

 

[13]    Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Chengyu Fan. A Network-wide View Based Detection and Mitigation of A Sophisticated Interest Flooding Attack, EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, Vol. 2020, No. 1, 2020, p1-18 (SCI: 000551974800001)

 

[14]    Xiaoyan Hu, Shaoqi Zheng, Guoqiang Zhang, Lixia Zhao, Guang Cheng, Jian Gong, Ruidong Li, An On-demand Off-path Cache Exploration based Multipath Forwarding Strategy, Computer Networks, Vol. 166, 2020, p107032-107046 (SCI WOS:000510525700024, CCF B类期刊)

 

[15]    Xiaoyan Hu, Liu Xuhui, Zhao Lixia, Gong Jian, Cheng Guang, Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN, China Communications, Vol. 16, No. 7, 2019, p120-130 (SCI WOS: 000475460600010)

 

[16]    Xiaoyan Hu, Shaoqi Zheng, Lixia Zhao, Guang Cheng and Jian Gong. Exploration and exploitation of off-path cached content in network coding enabled named data networking[C]//2019 IEEE 27th International Conference on Network Protocols (ICNP). IEEE, 2019: 1-6.

 

[17]    Xiaoyan Hu, Jian Gong, Guang Cheng, Guoqiang Zhang, Chengyu Fan, Mitigating Content Poisoning with Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities, IEEE Access 6 (2018): 39692-39704, Aug. 2018 (SCI WOS:000441028900001, EI: 20182905554671)

 

[18]    Xiaoyan Hu, Xiangjun Liu, Zencheng Wang, Xinran Li, Wenqiang Peng, Guang Cheng, RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks, September 21-22, 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD), Suzhou, Jiangsu, China (EI: 20195207930573)

 

[19]    Xiaoyan Hu, Shaoqi Zheng, Jian Gong, Guang Cheng, Guoqiang Zhang, Ruidong Li. Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking, in the 14th International Conference on Future Internet Technologies (CFI’19), August 7–9, 2019, Phuket, Thailand (EI: 20194507635536) 

 

[20]    吴桦,于振华,程光,胡晓艳,大型指纹库场景中加密视频识别方法,软件学报,录用待发表(EI检索,CCF中文A类期刊)

 

[21]    胡晓艳,郑少琦,龚俭,程光,臧小东基于网络编码的信息中心网络研究.通信学报, Vol. 39, No. Z1: 206-212, 2018

 

[22]    Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Ruidong Li and Chengyu Fan, Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-wide View, in Proc. IEEE International Conference on Distributed Computing System Workshops, July 7-10, 2019, Dallas, USA (EI: 20194007490387, ICDCSCCF B类会议). 

 

[23]    Jie Xu, Wei Ding, Xiaoyan Hu, Qiushi Gong, VATE: A trade-off between memory and preserving time for high accurate cardinality estimation under sliding time window, Computer Communications, Vol. 138, p20-31, 2019 (SCI WOS:000464481200003, EI:20191006603848, CCF C类期刊)

 

[24]    Xiaodong Zang, Jian Gong, Xiaoyan Hu, An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone, IEEE Access, Vol. 7, p56920-56934, 2019(SCI WOS: 000468481300001, JCR一区)

 

[25]    Lixia Zhao, Guang Cheng, Xiaoyan Hu, Hua Wu, Jian Gong, Wang Yang, and Chengyu Fan, An insightful experimental study of a sophisticated interest flooding attack in ndn, in Proc. IEEE International Conference on Hot Information Centric Networking (HotICN), 2018, pp. 121–127 (EI: 20190906559154)

 

[26]    Xiaoyan Hu, Jian Gong. Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking. 11th International Conference on Future Internet Technologies, p1~4, Jun. 2016 

 

[27]    Xiaoyan Hu, Jian Gong, Guang Cheng, Weiwei Zhang, Ahmad Jakalan. Design and Implementation of Not So Cooperative Caching System, China Communication, Vol. 12, No. 7, p36-51, Jul. 2015

 

[28]    Xiaoyan Hu and Jian Gong. Opportunistic On-path Caching for Named Data Networking. IEICE Transactions on Communications, Vol. E97-B, No.11, p2360-2367, Nov. 2014

 

[29]    Xiaoyan Hu and Jian Gong. Study on the Theoretical Framework of Not So Cooperative Caching. Journal of Internet Technology, Vol. 15, No.3, p351-362, Apr. 2014

 

[30]    Xiaoyan Hu and Jian Gong. PhD Forum: Not So Cooperative Caching (Problem Statement). The 21st International Conference on Network Protocols (ICNP 2013) PhD Forum, p1-3, 2013

 

[31]    Xiaoyan Hu, Jian Gong, Guang Cheng and Chengyu Fan. Enhancing In-network Caching by Coupling Cache Placement, Replacement and Location. 2015 IEEE International Conference on Communications (ICC 2015), p1-7, June, 2015

 

[32]    Xiaoyan Hu, Christos Papadopoulos, Jian Gong and Dan Massey. Not So Cooperative Caching in Named Data Networking. IEEE GLOBECOM 2013 Technical Symposia, p2285-2290, 2013

 

[33]    Xiaoyan Hu, Jian Gong. CANR: Cache-Aware Name-based Routing. 2014 IEEE 3rd International Conference on Cloud Computing and Intelligent Systems (CCIS2014), p212-217, Nov 2014

 

[34]    Xiaoyan Hu and Jian Gong. Multipath Inter-domain Routing for Named Data Networking. Journal on Communications, Vol. 36, No. 10, p211-223, 2015. (in Chinese)

 

[35]    Xiaoyan Hu and Jian Gong. Exploring the Roles of In-Network Caching in ICN. Telecommunications Science, Vol. 30, No. 3, p67-71, 2014. (in Chinese)

 

[36]    Ahmad Jakalan, Jian Gong, Qi Su, Xiaoyan Hu, and Abdeldime MS Abdelgder. Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary. Computer Networks 100 (2016): 12-27

 

[37]    Qi Su, Jian Gong, Xiaoyan Hu. RTT Estimation with Sampled Flow Data, IEICE Transactions on Communications, vol. E98-B, No. 9, pp.1848-1857, 2015

 

[38]    张维维,龚俭,刘茜,刘尚东,胡晓艳. (2016).基于词素特征的轻量级域名检测算法软件学报, 27(9), 2348-2364.

 

[39]    张维维,龚俭,刘尚东,胡晓艳. (2017).面向主干网的dns流量监测软件学报, 28(9), 2370-2387.

 

[40]    龚俭,臧小东,苏琪,胡晓艳, &徐杰. (2017).网络安全态势感知综述软件学报, 28(4), 1010-1026.



专利

[1]胡晓艳陈浩,程光,吴桦,龚俭.一种具备高抗检测能力的对抗域名生成模型,申请日期: 2021827,申请号: 202110991233.2

  

[2]胡晓艳, 朱成,程光,吴桦,龚俭.一种基于加密流量分析的恶意软件行为识别方法.申请日期:2021819日,申请号:202110950651.7

  

[3]胡晓艳,刘旭辉,程光一种基于FPGA的在线流量业务分类方法.申请日期:2021721日,申请号:202110825550.7

  

[4]胡晓艳,童钟奇,程光.一种以太坊行为流量精细化分类方法.申请日期:2021721日,申请号:202110824930.9

  

[5]胡晓艳,舒卓卓,程光,吴桦,龚俭一种比特币挖矿僵尸网络流量的快速识别方法申请日期:202155日,申请号:202110487259.3

  

[6]胡晓艳,朱成,程光,吴桦,龚俭一种精准的恶意流量变种检测方法申请日期:2021429日,申请号:202110469814.X


[7]胡晓艳,童钟奇,程光,吴桦,许昱,张玉健一种轻量化以太坊加密流量识别方法.申请日期:2020624日,申请号:202010584367.8


[8]胡晓艳,黄雨卓,万家铖,刘啸,程光一种基于区块链的阳澄湖大闸蟹防伪溯源的方法.申请日期:2020213日,申请号:202010090934.4


[9]胡晓艳,尹君,郑少琦,程光,吴桦一种基于网络编码的命名数据网络中内容缓存方法,申请日期:20191213日,专利号:ZL 2019 1 1278816.X(授权日期:202197日)

  

[10]胡晓艳,郑少琦,赵丽侠,龚俭,程光,吴桦.一种NDN中支持pipeline模式获取内容的方法,申请日期:2019.01.04,专利号:ZL 2019 1 0030576.5 (授权日期:20201225日)


[11]胡晓艳,郑少琦,赵丽侠,龚俭,程光,吴桦.一种基于网络编码的命名数据网络中多路径转发方法,申请日期:2018.11.30, 专利号:ZL 201811452766.8 (授权日期:2021226日)


[12]胡晓艳,龚俭,程光,吴桦.一种缓解命名数据网络中内容毒害攻击的方法,申请日期:2018.02.12,申请号:2018101446484.4,专利号:ZL 2018 1 0144648.4 (授权日期:2020731日)

  

[13]程光,李峻辰,胡晓艳,吴桦,赵丽侠.基于中央控制器缓解命名数据网络中内容毒害攻击的方法.申请日期:2019920日,申请号:201910891047.4

  

[14]程光,赵丽侠,胡晓艳,吴桦,郑少琦一种缓解命名数据网络中隐蔽兴趣包泛洪攻击的方法.申请日期:2019314日,专利号:ZL 201910193356.4


其他