头像

姓名:胡晓艳

职称:副教授

电话:025-52090904

办公室:九龙湖校区计算机楼308

个人主页:

邮箱:xyhu@njnet.edu.cn

教育背景

学士 (软件工程,优秀本科毕业生) ,南京理工大学, 中国, 2007

工学博士(计算机系统结构),东南大学,中国,2015

公派博士联合培养(计算机科学),科罗拉多州立大学,美国,2012

学术兼职

CCF互联网专委会委员,江苏省大数据专委会委员

IEEE会员,ACM会员,CCF会员,N2Women会员,江苏省计算机学会会员

软件学报,IEEE Network Magazine, IEEE Communications Magazine, IEEE Communications Letters, IEEE Internet of Things Journal, IEEE Access, Journal of NetworksIEEE Transactions on Industrial Informatics, IEEE Transactions on Network and Service Management, Journal of Internet Technology, Transactions on information systems, ETRI Journal, Transactions on Design Automation of Electronic SystemsConcurrency and Computation: Practice and Experience, Transactions on Multimedia Computing Communications and Applications, Journal of Network and Systems Management, EURASIP Journal on Wireless Communications and Networking等国内外著名期刊审稿人。

研究领域

区块链网络安全智能感知、加密流量分析、未来网络体系结构及其安全

研究概况

胡晓艳15年博士毕业留校工作东南大学网络空间安全学院副教授、硕导、东南大学至善青年学者、江苏省科技副总、CCF互联网专委会副主任助理、江苏省大数据专委会委员。从事加密流量分析、区块链网络安全智能感知、区块链隐私保护、未来网络体系结构及其安全等领域的研究工作。参与或主持国家省部级纵向科研项目近10项。定期参加国际交流,保持和国际一流团队的合作,担任ACM Transactions on Information Systems (CCF A)、软件学报(CCF中文A)、IEEE INFOCOM (CCF A)等国内外著名期刊和会议的审稿人。发表SCI/EI收录论文40余篇,其中一作近30篇,出版专著1部。授权发明专利4项,申请发明专利14项。2010年至2012年在美国科罗拉多州立大学访学期间参与美国国家自然科学基金项目2项。

招收学生

长期招收免研和考研硕士研究生以及优秀本科实习生。希望加入课题组的学生具备以下宝贵特质:

[1] 积极、乐观、热爱生活;

[2] 良好的人品与在线的双商;

[3]良好的逻辑思维能力;

[4] 较强大的自我驱动力和自律能力;

[5] 踏实肯干;

[6] 优秀的团队意识与沟通能力;

欢迎对相关研究方向感兴趣且具备上述特质的本科生报考我的研究生,联系的邮箱为xyhu@njnet.edu.cn, 18114037703(微信同号)。



研究课题

[1]装备预研重点实验室基金,No. 6142103200101, 加密流量精细化测量方法研究,2020/6-2022/620万,在研,主持

[2] 江苏省产学研合作项目(科技副总合作项目)No. BY2020404,面向联盟链的高效隐私保护机制研究,2020/6-2021/1230万,在研,主持

[3] 东南大学优秀青年教师科学研究资助,No. 3209012001A3, 区块链网络安全智能感知研究,2020/01-2022/1230万,在研,主持

[4]国家自然科学基金青年基金,No. 61602114,基于网络编码的信息中心网络研究,2017/01-2019/1221万元,结题,主持

[5]2017年度赛尔网络下一代互联网技术创新项目,No. NGII20170406IPv6网络中NDN应用的安全防御机制研究,2018/01-2020/1210万元,在研,主持

[6]国家重点研发计划课题,No. 2018YFB1800602,下一代网络处理器体系结构及关键技术研究,2019/07-2023/06954万元,在研,子课题负责人

[7]国家重点研发计划课题,No. 2017YFB0801703SDN/NFV NDN安全研究,2017/07-2020/1243万元,在研,子课题排名第二

[8]总装预研项目,基于***的威胁感知技术,2017/09至今,185万元,在研,子课题负责人

[9]国防科技创新特区项目,***弹性**网络**60万元,2018/12-2019/12,结题,子课题负责人

[10]教育部-中国移动科研基金项目,下一代网络拒绝服务攻击检测和防护关键技术研究,No, 6209010001100万元,2019/01-2020/10,在研,排名第三

[11]教育部产学合作协同育人项目,面向新工科的网络空间安全专业建设与实践,2019/10-2021/123万元,在研,参与

[12]东南大学高校基本科研业务费专项,面向新一代网络的加密流量分析研究,2019/01-2019/1250万,结题,主持

[13]江苏省未来网络创新研究院未来网络前瞻性研究项目,基于群体监测的未来网络故障推理研究与实现,BY2013095-5-0310万元,2014/01-2015/12,结题,参与

[14]美国国家自然科学基金委,下一代互联网体系结构Named Data Networking (NDN)No.10395852011/06-2013/06911467美元,结题,参与

[15]美国国家自然科学基金委,6Watch: Gauging the Global Rollout of IPv6No.096496962010/09-2011/05150万美元,结题,参与

[16]国家重点基础研究发展973计划,基于自治治理模型的网络管理与安全研究,2009CB3205052009/01-2010/08126.5万元,结题,参与

[17]美国Verisign公司赞助,DNS Query Analysis (DQA)2011/02-2011/0550000美元,结题,参与

奖励与荣誉

2019年东南大学至善青年学者B层次荣誉

江苏省科技副总



课程信息

《算法分析与设计》

《计算机网络概论》



学术成果

专著

《信息中心网络传输性能优化及安全探讨》,东南大学出版社,2020年10月


代表性论文

  

[1]Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Lu Yang, Honggang Chen, Zhichao Liang. Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement, accepted by MSN 2021, p1~8

  

[2]Xiaoyan Hu, Zhuozhuo Shu, Xiaoyi Song, Guang Cheng, Jian Gong. Detecting Cryptojacking Traffic Based on Network Behavior Features, accepted by Globecom 2021, p1~6

  

[3]Xiaoyan Hu, Zechen Wang, Xiangjun Liu, Xinran Li, Guang Cheng, Jian Gong. Exploring Real-Time Super-Resolution Generative Adversarial Networks, International Journal of  Sensor Networks, Vol. 36, No. 2, 2021, p85~96

[4]胡晓艳,童钟奇,徐恪,张国强,郑少琦,赵丽侠,龚俭,程光命名数据网络中视频传输研究综述,计算机研究与发展,581):116-1362021 CCF A类中文期刊,EI: 20210309803480

  

[5]胡晓艳童钟奇,吴桦,许昱玮基于活跃节点库的以太坊加密流量识别方法,网络空间安全,118),34-392020

[6]Xiaoyan Hu, Xiaoyi Song, Shaoqi Zheng, Ruidong Li, Guang Cheng, Jian Gong. Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission. Accepted by GLOBECOM 2020

[7]Xiaoyan Hu, Jun Yin, Shaoqi Zheng, Ruidong Li, Guang Cheng, Jian Gong. A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN. Accepted by GLOBECOM 2020

  

[8]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Chengyu Fan. A Network-wide View Based Detection and Mitigation of A Sophisticated Interest Flooding Attack, EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, Vol. 2020, No. 1, 2020, p1-18 (SCI: 000551974800001)

[9]Xiaoyan Hu, Shaoqi Zheng, Guoqiang Zhang, Lixia Zhao, Guang Cheng, Jian Gong, Ruidong Li, An On-demand Off-path Cache Exploration based Multipath Forwarding Strategy, Computer Networks, Vol. 166, 2020, p107032-107046 (SCI WOS:000510525700024, CCF B类期刊)

[10]Xiaoyan Hu, Liu Xuhui, Zhao Lixia, Gong Jian, Cheng Guang, Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN, China Communications, Vol. 16, No. 7, 2019, p120-130 (SCI WOS: 000475460600010)

[11]Xiaoyan Hu, Jian Gong, Guang Cheng, Guoqiang Zhang, Chengyu Fan, Mitigating Content Poisoning with Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities, IEEE Access 6 (2018): 39692-39704, Aug. 2018 (SCI WOS:000441028900001, EI: 20182905554671)

[12]Xiaoyan Hu, Xiangjun Liu, Zencheng Wang, Xinran Li, Wenqiang Peng, Guang Cheng, RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks, September 21-22, 2019, Suzhou, Jiangsu, China (EI: 20195207930573)

[13]Xiaoyan Hu, Shaoqi Zheng, Jian Gong, Guang Cheng, Guoqiang Zhang, Ruidong Li. Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking, in the 14th International Conference on Future Internet Technologies (CFI’19), August 7–9, 2019, Phuket, Thailand (EI: 20194507635536) 

  

[14]吴桦,于振华,程光,胡晓艳,大型指纹库场景中加密视频识别方法,软件学报,录用待发表(EI检索,CCF中文A类期刊)

[15]胡晓艳,郑少琦,龚俭,程光,臧小东基于网络编码的信息中心网络研究.通信学报, Vol. 39, No. Z1: 206-212, 2018

  

[16]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Ruidong Li and Chengyu Fan, Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-wide View, in Proc. IEEE International Conference on Distributed Computing System Workshops, July 7-10, 2019, Dallas, USA (EI: 20194007490387, ICDCSCCF B类会议). 

  

[17]Jie Xu, Wei Ding, Xiaoyan Hu, Qiushi Gong, VATE: A trade-off between memory and preserving time for high accurate cardinality estimation under sliding time window, Computer Communications, Vol. 138, p20-31, 2019 (SCI WOS:000464481200003, EI:20191006603848, CCF C类期刊)

  

[18]Xiaodong Zang, Jian Gong, Xiaoyan Hu, An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone, IEEE Access, Vol. 7, p56920-56934, 2019(SCI WOS: 000468481300001, JCR一区)

  

[19]Lixia Zhao, Guang Cheng, Xiaoyan Hu, Hua Wu, Jian Gong, Wang Yang, and Chengyu Fan, An insightful experimental study of a sophisticated interest flooding attack in ndn, in Proc. IEEE International Conference on Hot Information Centric Networking (HotICN), 2018, pp. 121–127 (EI: 20190906559154)

[20]Xiaoyan Hu, Jian Gong. Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking. 11th International Conference on Future Internet Technologies, p1~4, Jun. 2016 

[21]Xiaoyan Hu, Jian Gong, Guang Cheng, Weiwei Zhang, Ahmad Jakalan. Design and Implementation of Not So Cooperative Caching System, China Communication, Vol. 12, No. 7, p36-51, Jul. 2015

[22]Xiaoyan Hu and Jian Gong. Opportunistic On-path Caching for Named Data Networking. IEICE Transactions on Communications, Vol. E97-B, No.11, p2360-2367, Nov. 2014

[23]Xiaoyan Hu and Jian Gong. Study on the Theoretical Framework of Not So Cooperative Caching. Journal of Internet Technology, Vol. 15, No.3, p351-362, Apr. 2014

[24]Xiaoyan Hu and Jian Gong. PhD Forum: Not So Cooperative Caching (Problem Statement). The 21st International Conference on Network Protocols (ICNP 2013) PhD Forum, p1-3, 2013

[25]Xiaoyan Hu, Jian Gong, Guang Cheng and Chengyu Fan. Enhancing In-network Caching by Coupling Cache Placement, Replacement and Location. 2015 IEEE International Conference on Communications (ICC 2015), p1-7, June, 2015

[26]Xiaoyan Hu, Christos Papadopoulos, Jian Gong and Dan Massey. Not So Cooperative Caching in Named Data Networking. IEEE GLOBECOM 2013 Technical Symposia, p2285-2290, 2013

[27]Xiaoyan Hu, Jian Gong. CANR: Cache-Aware Name-based Routing. 2014 IEEE 3rd International Conference on Cloud Computing and Intelligent Systems (CCIS2014), p212-217, Nov 2014

[28]Xiaoyan Hu and Jian Gong. Multipath Inter-domain Routing for Named Data Networking. Journal on Communications, Vol. 36, No. 10, p211-223, 2015. (in Chinese)

[29]Xiaoyan Hu and Jian Gong. Exploring the Roles of In-Network Caching in ICN. Telecommunications Science, Vol. 30, No. 3, p67-71, 2014. (in Chinese)

  

[30]Ahmad Jakalan, Jian Gong, Qi Su, Xiaoyan Hu, and Abdeldime MS Abdelgder. Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary. Computer Networks 100 (2016): 12-27

  

[31]Qi Su, Jian Gong, Xiaoyan Hu. RTT Estimation with Sampled Flow Data, IEICE Transactions on Communications, vol. E98-B, No. 9, pp.1848-1857, 2015

  

[32]张维维,龚俭,刘茜,刘尚东,胡晓艳. (2016).基于词素特征的轻量级域名检测算法软件学报, 27(9), 2348-2364.

  

[33]张维维,龚俭,刘尚东,胡晓艳. (2017).面向主干网的dns流量监测软件学报, 28(9), 2370-2387.

  

[34]龚俭,臧小东,苏琪,胡晓艳, &徐杰. (2017).网络安全态势感知综述软件学报, 28(4), 1010-1026.


专利

[1]胡晓艳陈浩,程光,吴桦,龚俭.一种具备高抗检测能力的对抗域名生成模型,申请日期: 2021827,申请号: 202110991233.2

  

[2]胡晓艳, 朱成,程光,吴桦,龚俭.一种基于加密流量分析的恶意软件行为识别方法.申请日期:2021819日,申请号:202110950651.7

  

[3]胡晓艳,刘旭辉,程光一种基于FPGA的在线流量业务分类方法.申请日期:2021721日,申请号:202110825550.7

  

[4]胡晓艳,童钟奇,程光.一种以太坊行为流量精细化分类方法.申请日期:2021721日,申请号:202110824930.9

  

[5]胡晓艳,舒卓卓,程光,吴桦,龚俭一种比特币挖矿僵尸网络流量的快速识别方法申请日期:202155日,申请号:202110487259.3

  

[6]胡晓艳,朱成,程光,吴桦,龚俭一种精准的恶意流量变种检测方法申请日期:2021429日,申请号:202110469814.X


[7]胡晓艳,童钟奇,程光,吴桦,许昱,张玉健一种轻量化以太坊加密流量识别方法.申请日期:2020624日,申请号:202010584367.8


[8]胡晓艳,黄雨卓,万家铖,刘啸,程光一种基于区块链的阳澄湖大闸蟹防伪溯源的方法.申请日期:2020213日,申请号:202010090934.4


[9]胡晓艳,尹君,郑少琦,程光,吴桦一种基于网络编码的命名数据网络中内容缓存方法,申请日期:20191213日,专利号:ZL 2019 1 1278816.X(授权日期:202197日)

  

[10]胡晓艳,郑少琦,赵丽侠,龚俭,程光,吴桦.一种NDN中支持pipeline模式获取内容的方法,申请日期:2019.01.04,专利号:ZL 2019 1 0030576.5 (授权日期:20201225日)


[11]胡晓艳,郑少琦,赵丽侠,龚俭,程光,吴桦.一种基于网络编码的命名数据网络中多路径转发方法,申请日期:2018.11.30, 专利号:ZL 201811452766.8 (授权日期:2021226日)


[12]胡晓艳,龚俭,程光,吴桦.一种缓解命名数据网络中内容毒害攻击的方法,申请日期:2018.02.12,申请号:2018101446484.4,专利号:ZL 2018 1 0144648.4 (授权日期:2020731日)

  

[13]程光,李峻辰,胡晓艳,吴桦,赵丽侠.基于中央控制器缓解命名数据网络中内容毒害攻击的方法.申请日期:2019920日,申请号:201910891047.4

  

[14]程光,赵丽侠,胡晓艳,吴桦,郑少琦一种缓解命名数据网络中隐蔽兴趣包泛洪攻击的方法.申请日期:2019314日,专利号:ZL 201910193356.4


其他