头像

姓名:黄杰

职称:教授

电话:

办公室:

个人主页:

邮箱:jhuang@seu.edu.cn

教育背景

2004年毕业于华中科技大学,获博士学位


学术兼职

1IEEE PES电力物联数据传输及信息交换技术分委会 副主席

2大数据安全与隐私保护专业委员会委员



研究领域

移动通信网及其安全技术

深度学习与人工智能安全

大数据安全及其隐私计算


研究生招生:

本课题组招收硕士和博士研究生,欢迎对上述相关研究方向感兴趣的同学邮件联系,请将个人简历、学术论文(如有)或其他材料发送至邮箱jhuang@seu.edu.cn,学生来信及时回复。

 

毕业生去向:

硕士毕业生去向:华为、阿里巴巴、腾讯、美团、拼多多、研究所、国家电网、中国移动、中国电信、银行、外企、选调生、攻博等。

博士毕业生去向:高校、研究所、华为、国电等。

 

实验室现状:

实验室课题来源包括国家级、省部级、企业和自研等,经费充足,有高性能GPU、服务器、信号分析仪和专用网络测试设备。每位同学有充足办公空间、独立电脑。 实验室阳光明媚,师兄弟姐妹氛围好,相处和谐。

 

 

教育理念:

本人致力于将每一位学生培养成材,让每位学生都有更好的未来;有教无类,不对学生有任何的歧视;强调培养过程的指导,关注学生日常的学习和科研情况;培养学生独立思考问题和解决问题的能力;对学生认真负责,认真指导毕业论文;提倡学生锻炼身体




研究概况


教授,博导,十二五“863计划首席专家,入选江苏省六大人才高峰计划。先后承担了国家重点研发计划项目“863计划主题项目,“863计划前瞻性项目,自然科学基金项目,部委预研项目,工信部项目,江苏省创新基金,国家电网科技项目等20余项国家及省部级项目,成功帮助企业开发了3个产品。获得浙江省科技进步“三等奖”1项。取得的2项成果通过了江苏省教育厅的鉴定,其中一项成果被评为国际先进水平,另一项为国内领先水平。出版一部“十三五”规划教材,申请发明专利40+项,其中23项已经授权,获得软件著作权6项。近几年,被EISCI收录的论文40多篇。



最近动态

研究课题

1. 国家重点研发计划项目,物联网智能开放服务运行支撑系统,课题负责人

2. 国家电网科技项目,开放网络环境下物联管理平台的大连接高并发业务支撑技术研究,课题负责人

3. 部委预研项目,*******,项目负责人;

4. 863计划主题项目,物联网安全感知关键技术及仿真验证平台。项目首席专家,项目负责人

5. 863计划前瞻项目,TD_SCDMA大规模用户群的信息监管关键技术研究。项目负责人;

6. 863计划前瞻项目,移动互联网内容监管技术研究与应用。项目负责人;

7. 部委项目,×××××××××。项目负责人;

8. 部委项目,×××××××××。项目负责人;

9. 江苏省科技创新,具有高精度定位功能的无线传感器网络节点设计与应用技术研究,项目负责人;

10. 国家自然科学基金项目,智能物联网安全关键技术,主要参与人员;

11. 国际合作项目欧盟第7框架,物联网系统设备可靠及安全,主要参与人员;

12. 企业横向课题,车联网关键安全技术,项目负责人;

13. 企业横向课题,无线网络与安全工程技术研究,第一合作人;

14. 企业横向课题,无线网络工程技术,第一合作人。

奖励与荣誉

变电设备物联数字化赋能关键技术及工程实践”获2020年浙江省科学技术三等奖



课程信息

1.      本科生课程,《系统安全》

2.      博士研究生课程,《密码学与安全协议》


学术成果

近10年发表的主要论文:


[1] S. Zhang, J. Huang, P. Li, and C. Liang, “Differentially private federated learning with local momentum updates and gradients filtering,” Information Sciences, vol. 680. 2024. doi: 10.1016/j.ins.2024.120960.


[2] Z. Zhang and J. Huang, “Aligning the domains in cross domain model inversion attack,” Neural Networks, vol. 178, p. 106490, Oct. 2024, doi: 10.1016/j.neunet.2024.106490.


[3] P. Li, J. Huang, H. Wu, Z. Zhang, and C. Qi, “SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning,” Neural Networks, vol. 174, p. 106199, Jun. 2024, doi: 10.1016/j.neunet.2024.106199.


[4] Y. Peng, J. Huang, S. Zhou, Z. Ju, X. Wang, and P. Li, “BGET: A Blockchain-Based Grouping-EigenTrust Reputation Management Approach for P2P Networks,” Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 561 LNICST. pp. 225–242, 2024. doi: 10.1007/978-3-031-54521-4_13.


[5] C. Liang, J. Huang, Z. Zhang, and S. Zhang, “Defending against model extraction attacks with OOD feature learning and decision boundary confusion,” Computers & Security, vol. 136, p. 103563, Jan. 2024, doi: 10.1016/j.cose.2023.103563.


[6] S. Zhang, J. Huang, Z. Zhang, P. Li, and C. Qi, “Compromise privacy in large-batch Federated Learning via model poisoning,” Information Sciences, vol. 647, p. 119421, Nov. 2023, doi: 10.1016/j.ins.2023.119421.


[7] X. Zhu, J. Huang, and C. Qi, “Modeling and Analysis of Malware Propagation for IoT Heterogeneous Devices,” IEEE Systems Journal, vol. 17, no. 3, pp. 3846–3857, 2023, doi: 10.1109/JSYST.2023.3269158.


[8]X. Zhu and J. Huang, “SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks,” Entropy, vol. 25, no. 4, 2023, doi: 10.3390/e25040637.


[9] X. Wang, J. Huang, and J. Chen, “Group Key Generation Scheme Based on Random Forwarding Network for Large-scale IoT Devices,” presented at the Proceedings - 2023 2nd International Conference on Sensing, Measurement, Communication and Internet of Things Technologies, SMC-IoT 2023, 2023, pp. 78–84. doi: 10.1109/SMC-IoT62253.2023.00022.


[10] Z. Zhang, X. Wang, J. Huang, and S. Zhang, “Analysis and Utilization of Hidden Information in Model Inversion Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4449–4462, 2023, doi: 10.1109/TIFS.2023.3295942.


[11] C. Qi, J. Huang, X. Zhao, and Z. Wang, “Lightweight network structure face recognition method based on cloud-edge collaboration,” DongnanDaxueXuebao (ZiranKexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 53, no. 1, pp. 1–13, 2023, doi: 10.3969/j.issn.1001-0505.2023.01.001.


[12] X. Wang, J. Huang, C. Qi, Y. Peng, and S. Zhang, “An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay,” PeerJ Computer Science, vol. 9, 2023, doi: 10.7717/PEERJ-CS.1349.


[13] S. Zhang, J. Huang, Z. Zhang, and C. Qi, “Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters,” in Algorithms and Architectures for Parallel Processing, W. Meng, R. Lu, G. Min, and J. Vaidya, Eds., in Lecture Notes in Computer Science. Cham: Springer Nature Switzerland, 2023, pp. 63–80. doi: 10.1007/978-3-031-22677-9_4.


[14]P. Li, J. Huang, S. Zhang, C. Qi, C. Liang, and Y. Peng, “A Novel Backdoor Attack Adapted to Transfer Learning,” presented at the Proceedings - 2022 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Autonomous and Trusted Vehicles, Scalable Computing and Communications, Digital Twin, Privacy Computing, Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022, 2022, pp. 1730–1735. doi: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00246.


[15]C. Qi, J. Huang, C. Huang, H. Wu, and X. S. Shen, “Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model,” presented at the Proceedings - IEEE Global Communications Conference, GLOBECOM, 2022, pp. 6259–6264. doi: 10.1109/GLOBECOM48099.2022.10000946.


[16] X. Wang, J. Huang, Z. Duan, Y. Xu, and Y. Yao, “Randomness analysis of end-to-end delay in random forwarding networks,” PeerJ Computer Science, vol. 8, 2022, doi: 10.7717/PEERJ-CS.942.

[17]S. Zhang, J. Huang, C. Qi, and X. Wang, “Online IoT device identification method based on SOINN,” DongnanDaxueXuebao (ZiranKexue Ban)/Journal of Southeast University (Natural Science Edition), vol. 51, no. 4, pp. 715–723, 2021, doi: 10.3969/j.issn.1001-0505.2021.04.023.


[18] X. Zhu, J. Huang, B. Wang, and C. Qi, “Malware homology determination using visualized images and feature fusion,” PeerJ Computer Science, vol. 7, pp. 1–22, 2021, doi: 10.7717/peerj-cs.494.


[19] C. Qi, J. Huang, X. Zhu, and X. Wang, “MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNs,” presented at the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference, CCWC 2021, 2021, pp. 839–845. doi: 10.1109/CCWC51732.2021.9375914.


[20] Xuejin Zhu, Jie Huang*, Bin Wang, Chunyang Qi. Malware homology determination using visualized images and feature fusion[J].  PeerJ Computer Science, Wireless Communications and Mobile Computing, 2021.4:1-22

[21] Chunyang Qi, Jie Huang*Bin Wang, Hongkai Wang. A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs[J].  2021.7: 1-16

[22] Xiang Liu, Teng Joon Lim, Jie Huang*. Universal Resource Allocation Framework for Preventing Pollution Attacks in Network-Coded Wireless Mesh Networks[J]. Ad Hoc Networks, 2020, 99: 102073. 

[23] Xiang Liu, Teng Joon Lim, Jie Huang*. Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks[J]. IEEE Transactions on Information Forensics and Security, 2020,15(1): 2570-2583  

[24] Xiang Liu, Jie Huang*, Yuanxi Wu, Guowen Zong. A Privacy-Preserving Signature Scheme for Network Coding[J]. IEEE Access, 2019, 7: 109739-109750  

[25] Xiang Liu,Jie Huang*. A probabilistically weakly secure network coding scheme in multipath routing for WSNs[J]. Sensors, 2017,17(5)

[26] Jie Huang*, Bei Huang, A Security Key Distribution Scheme Based on Energy Efficiency for Hybrid Wireless Sensor Networks, Security and Communication Networks, 2014,7(8): 1189-1198.



部分授权专利:

[1]一种基于单向函数的分布式无线传感器网络密钥管理方法(发明专利),专利号:ZL201110054675.0

[2]一种分布式无线传感器网络密钥管理方法(发明专利),专利号:ZL201110054566.9

[3]一种抗DoS攻击的通用移动通信系统无线接入方法(发明专利),专利号:ZL201310061348.7

[4]一种基于多要素信任机制的分簇路由方法(发明专利),专利号:ZL201310110449.9

[5]无线传感器网络中基于零知识证明的节点身份认证方法(发明专利),专利号:ZL201310119570.8

[6]基于中国剩余定理的物联网感知层认证中的位置隐私方法(发明专利),专利号:ZL201410016989.5

[7]一种无线传感器网络中的恶意节点容忍方法(发明专利),专利号:ZL201310597049.5

[8]一种分层无线传感器网络中的密钥管理方法(发明专利),专利号:ZL201410246037.2

[9]一种基于危险多代理的WSNs联合入侵检测方法(发明专利),专利号:ZL201410161843.x

[10]一种无线传感器网络密钥预分配方法(发明专利),专利号:ZL201410169717.9

[11]无线传感器网络的便携电脑级恶意节点检测与容忍方法(发明专利),专利号:ZL201410001114.8

[12]全同态加密中的重加密深度优化方法(发明专利),专利号:ZL201410421236.2

[13]一种基于幻影单径路由的增强性源位置隐私保护方法(发明专利),专利号:ZL201410011049.7

[14]一种物联网认证中的位置隐私保护方法(发明专利),专利号:ZL201410016575.2

[15]无线传感器簇形网络基于时空关联的离群数据检测方法(发明专利),专利号:ZL201410153817.2

其他

指导本科生的SRTP、项目等科研实践,欢迎有意愿的优秀本科生进入我的课题组。