部分发表/录用论文
(1)Jian Mao, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang. Detecting Malicious Behaviors in JavaScript Applications, IEEE Access, 2018
(2)Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity[J]. IEEE ACCESS. 2017
(3)Jian Mao, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, Jianhong Zhang. Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment[J]. Security and Communication Networks. 2017.
(4)Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang. Toward Exposing Timing-Based Probing Attacks in Web Applications[J]. Sensors. 2017, 17(3), 464.
(5)Jian Mao, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, Jianwei Liu. A Position-aware Merkle Tree for Dynamic Cloud Data Integrity Verification[J]. Soft Computing. 2017, 55, 62-80.
(6)Jian Mao, Yue Chen, Yan Zhang, Xiandong Xu, Yajian Zhou, Jianwei Liu. Parallel Checking of Content Integrity in Multi-cloud Storage of Heterogeneous Sensor Systems[J].
(7) Mengmeng Wang, Jianwei Liu,Jian Mao*, Haosu Cheng, Jie Chen, Chan Qi. RouteGuardian: Constructing Secure Routing Paths in Software Defined Networking [J]. Tsinghua Science and Technology, 2017
(8) Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu,Jian Mao*. PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking[J]. Journal of Signal Processing Systems for Signal, Image, and Video Technology. 2017, 86(2), 157–173.
(9) Jianhong Zhang, Xubing Zhao,Jian Mao*. Attack on Chen et al.'s Certificateless Aggregate Signature Scheme[J]. Security and Communication Networks. 2016. 9(1), 54-59.
(10)Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena,Jian Mao*, Zhenkai Liang. Man-in-thebrowser-cache: Persisting HTTPS Attacks via Browser Cache Poisoning[J]. Computers and Security. 2015, 55: 62-80.
(11)Jian Mao, Hanjun Ma, Yue Chen, Yaoqi Jia, Zhenkai Liang. Automatic Permission Inference for Hybrid Mobile Apps[J]. Journal of High Speed Networks. 2016, 22(1): 55-64.
(12)Jian Mao, Ruilong Wang, Yue Chen, Yaoqi Jia. Detecting Injected Behaviors in HTML5-based Android Applications[J]. Journal of High Speed Networks. 2016, 22(1): 15-34.
(13)王蒙蒙,刘建伟,陈杰,毛剑,毛可飞.软件定义网络:安全模型、机制及研究进展.软件学报. 2016.
(14)Jian Mao, Wenqian Tian, Pei Li, Tao Wei, and Zhenkai Liang, Phishing Website Detection Based on Effective CSS Features of Web Pages[C]. The 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA2017) (CCF-C类).
(15)Wenqian Tian,Jian Mao*, Jingbo Jiang, Zhaoyuan He. Deeply Understanding Structure-based Social Network De-anonymization[C]. IIKI2017. 2017.
(16)Yinhao Xiao, Guangdong Bai,Jian Mao, Zhenkai Liang and Wei Cheng. Privilege Leakage and Information Stealing through the Android Task Mechanism[C]. The 1st IEEE Symposium on Privacy-Aware Computing (PAC 2017), 2017.
(17)Jian Mao, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang, Poster: GeminiScope: An Efficient Solution for Detecting UI-Mimicking Android Applications. The 37th IEEE Symposium on Security and Privacy (S&P 2016), May 2016. (CCF-A类)
(18)Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Liang Zhenkai, Toward Exposing Timing-based Probing Attacks in Web Applications[C]. The 11th International Conference on Wireless Algorithms, Systems, and Applications (WASA2016), Lecture Notes in Computer Science, vol. 9798, 499-510.(CCF-C类, EI, 检索号:20163302715450)
(19)Jian Mao, Jian Cui, Yan Zhang, Hanjun Ma, Jianhong Zhang, Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment[C]. The 11th International Conference on Wireless Algorithms, Systems, andApplications (WASA2016), Lecture Notes in Computer Science, vol. 9798, 511-523.(CCF-C类)
(20)Yue Chen, Yaoqi Jia,Jian Mao, Zhenkai Liang. Poster: Detecting Browser-Based Probing Attacks via Behavior Analysis. The 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), February 2015. (CCF-B类)
(21)Jian Mao, Yaoqi Jia, Xinshu Dong, Yue Chen, Ruilong Wang, Zhenkai Liang. Poster: Detecting Unexpected Behaviors in HTML5 Mobile Apps using Difference in Execution Context. The 35thIEEE Symposium on Security and Privacy (S&P 2014), May 2014. (CCF-A类)
(22)Pei Li,Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei. A Website Credibility Assessment Scheme Based on Page Association[C]. The 10th International Conference on Information Security Practice and Experience (ISPEC 2014) Fuzhou, China: Springer Verlag, 2014, 105-118.
(23)Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang. Rating Web Pages Using Page-transition Evidence[C]. The 15th International Conference on Information and Communications Security (ICICS 2013), Beijing, China: Springer Verlag, 2013.(CCF-C类)
(24)Xinshu Dong, Kailas Patil,Jian Mao, Zhenkai Liang. A Comprehensive Client-side Behavior Model for Diagnosing Attacks in Ajax Applications[C]. The 18th International Conference on Engineering of Complex Computer Systems (ICECCS2013), Singapore, 2013, 177-187.
已授权专利
(1) 毛剑、刘建伟、李坤、徐先栋、冯克、张晏.一种无线信道数据完整性保护方法. ZL201210154081.1
(2) 毛剑、徐先栋、刘建伟、张晏、李坤、修春娣.一种分布式云存储数据完整性保护方法. ZL201210159546.2
(3) 毛剑、张晏、刘建伟、徐先栋、冯克、尚涛.一种云存储数据持有性验证方法. ZL201210159377.2
(4) 李坤、毛剑*、刘建伟、冯克、李佩.一种钓鱼网站检测方法. ZL201210477139.6.(学生第一)
(5) 毛剑、冯克、李腾、刘建伟、张晏、张键红.一种可公开验证云端数据持有性校验方法. ZL201310295910.2
(6) 毛剑、李腾、张晏、冯克、刘建伟、伍前红.一种云存储数据完整性验证方法. ZL201310246856.2
(7) 毛剑,李佩,李腾,陈岳,马寒军,刘建伟.一种钓鱼网页检测方法.北京:CN104092667A.
(8) 毛剑,李腾,王瑞珑,陈杰,王培人,伍前红,刘建伟.一种云存储服务信用评价方法.北京:CN104092564A
(9) 毛剑,陈岳,史福田,伍前红,刘建伟. 基于浏览器扩展插件的网页行为提取和分析工具软件.受理号:2015R11S243689
部分科研项目:
(1) 国家重点研发安全专项“基于国产密码算法的服务认证与证明关键技术”
(2) 国家自然科学青年基金 “基于程序行为分析的Web安全复合信任机理研究”
(3) 北京市自然科学基金 面上项目 “云端数据持有性检测与云存储信任机理研究”
(4) 华为课题“基于HTML5的移动应用程序安全分析”
(5) 国家973计划项目 “可重构基础网络的安全与管控机理与结构”
|