Table 1: Supervised PhD Students (in total 21)
Name |
University |
Status of Thesis |
Thesis Title |
Mingjun Wang |
Xidian University, China |
Completed (12.2017) |
Security and Privacy Preservation in Device-to-Device Communications (pass with distinction) |
Wenxiu Ding |
Xidian University, China |
Completed (12.2017) |
Secure Computations and Deduplication Management over Encrypted Data in Cloud Computing (pass with distinction) |
Wei Feng |
Xidian University, China |
Completed (05.2020) |
Anonymous Authenticatoin on Trust in Cyber-Physical-Social Systems (pass with distinction) |
Yafeng Wang |
Xidian University, China |
Partially Completed (10.2021) |
Crowdsensing Privacy Preservation |
Xueqin Liang (Dual degree) |
Aalto University |
Completed (12.2020) |
Game Theoretic Analysis on Encrypted Data Deduplication in Cloud (IEEE TCSC Outstanding Ph.D. Dissertation Award) |
Xuyang Jing |
Xidian University, China |
Completed (12.2020) |
Security Data Compression and Fusion for Efficient Network Security Analysis (pass with distinction) |
Yaxing Chen |
Xi’an Jiaotong University, China |
Completed (05.2021) |
Research on Augmented Trust in SGX-enabled Cloud Applications |
Xueqin Liang (Dual degree) |
Xidian University, China |
Completed (12.2021) |
Incentive Mechanism Study on Secure and Efficient Crowdsourcing and Cloud Storage Deduplication Systems (pass with distinction) |
Pu Wang |
Xidian University, China |
Completed (12.2021) |
Research on Physical Layer Security and Optimization for Backscatter Communications (pass with distinction) |
Xixun Yu |
Xidian University, China |
Completed (12.2021) |
Verifiable Mechanisms in Cloud Data Services (pass with distinction) |
Gao Liu |
Xidian University, China |
Completed (05.2022) |
Decentralized Network Trust Management |
Haomeng Xie |
Xidian University, China |
Planned defense in 12.2023 (75% done) |
Privacy Preservation and Trust Authentication in Blockchain Systems |
Rui Zhang |
Xidian University, China |
Planned defense in 12.2023 (85% done) |
Privacy-preserving and Secure Voiceprint Authentication |
Lijun Gao |
Xidian University, China |
Planned defense in 12.2024 (30% done) |
Adversarial Learning for PDF Malware Detection |
Jialei Zhang |
Xidian University, China |
Planned defense in 12.2024 (40% done) |
Intelligent and Customized Routing in Integrated HetNets with Privacy Preservation |
Shufan Fei |
Xidian University, China |
Planned defense in 12.2025 (30% done) |
Decentralized Management for Trustworthy Networking |
Jie Wang |
Xidian University, China |
Planned defense in 12.2025 (20% done) |
Intelligent Trust Evaluation |
Yishan Yang |
Xidian University, China |
Planned defense in 12.2026 (15% done) |
Batch Authentication in Backscattered Communications |
Panpan Han |
Xidian University, China |
Planned defense in 12.2026 (10% done) |
Privacy Preservation in Complex Cross-Chain Systems |
Hongke Zhang |
Xidian University, China |
Planned defense in 12.2026 (15% done) |
N.A. |
Jiahe Lan |
Xidian University, China |
Planned defense in 12.2027 (10% done) |
N.A. |
Haoxiang Han |
Xidian University, China |
Planned defense in 12.2027 (10% done) |
N.A. |
Table 2: Advised or Co-supervised PhD Students (in total 10)
Name |
University |
Status |
Thesis Topic |
Xueqin Liang (Dual degree) |
Aalto University, Finland |
Completed (12.2020) |
Game Theoretic Analysis on Encrypted Data Deduplication in Cloud |
Shushu Liu |
Aalto University, Finland |
Under pre-examination, planned defense in 12.2022 |
Securing 5G Positioning and its Services with Privacy Preservation |
Monshizadeh Mehrnoosh |
Aalto University, Finland |
Under pre-examination, planned defense in 01.2023 |
Machine Learning Techniques to Detect Known and Novel Cyber-attacks |
Lifang Zhang |
Aalto University, Finland |
(75% done) |
Privacy-preserving Unwanted Traffic Control |
Yifan Zhang |
Aalto University, Finland |
Planned defense in 12.2026 (5% done) |
Noise Management for Securing Backscatter Communications |
Ping Wang |
Xidian University, China |
Planned defense in 12.2022 (95% done) |
Research on Adversarial Attack and Defense Approaches of CAPTCHA |
Yurong Luo |
Xi’an Jiaotong University |
Planned defense in 2023 (85% done) |
Blockchain Based Data Security Management in IoT |
Xi Xu |
Xi’an Jiaotong University |
Planned defense in 12.2023 (75% done) |
Binary Reuse Detection and Batch Presence Test |
Zhe Guo |
HUST |
Completed (12.2011) |
Group Mobility and Communication Pattern Study of Mobile Users |
Junze Wang |
HUST |
Completed (06.2010) |
Review Spam Study based on Semantic Relevance |
Table 3: Supervised Master Students in Xidian University (in total 72)
Name |
Date of Graduation |
Thesis Title |
Liang Chen |
April 2014 |
Implementation of an SMS Spam Control System Based on Trust Management (pass with distinction) |
Gaowa Shi |
April 2014 |
Performance Evaluation of PSN Unwanted Content Control System via Trust management |
Hanling Chen |
January 2015 |
A Fashionable Technology of Pervasive Social Networking Based on Mobile Device |
Wei Tang |
January 2015 |
CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management |
Yulu Wang |
January 2015 |
Validation on a Research Model of Human-Computer Trust Interaction |
Sixuan Ma |
January 2015 |
Implementation of an Unwanted Content Control System in Pervasive Social Networking Based on Trust Management (pass with distinction) |
Tianli Dang |
January 2015 |
The implementation and Evaluation of a Trust-Behavior Based Reputation System for Mobile Application |
Ning Li |
January 2016 |
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE |
Yutan Ma |
January 2016 |
Implementation of unwanted Traffic Control System Based on Trust Management Using SDN |
Lijun Gao |
January 2016 |
Game Theoretical Analysis on the Acceptance of a Cloud Data Access Control System Based on Reputation (pass with distinction) |
Fei Tong |
January 2016 |
Android Application Detection |
Chaoyin Huang |
January 2016 |
Secure Pervasive Social Communications Based on Distributed Trust Evaluation |
Jiazhen Zhou |
2017 uncompleted |
Secure Wearable Device Communications |
Wangyang Shi |
March 2016 |
CloudFile: A Cloud Data Access Control System Based on Mobile Social Trust |
Shanshan Bian |
June 2017 |
A Trust Management Framework of SDN Application |
Yanxiao Cheng |
June 2017 |
PermitRec: A Permission Configuration Recommender System for Mobile Apps Based on Trust Management |
Yuquan Zhu |
June 2017 |
Adaptive Trust Management in NFV |
Guangwu Xu |
June 2017 |
A Trust Insurance Mechanism for Virtualized Network Functions Based on Trusted Computing |
Sihui Zhao |
June 2017 |
Implementation and Verification of Identity Authentication System Based on Individual Voiceprint Challenge System |
Fengyu Tian |
June 2018 |
Trusted Cooperative Platform among Virtual Base Stations in C-RAN Architecture (pass with distinction) |
Chenzi Wu |
June 2018 |
AnonyAuth: The Demo of an Trustworthy Anonymous Authentication System Based on PSN and its Performance Evaluation |
Ping Yan |
June 2018 |
Privacy-Preserving Mobile Malware Detection in the Cloud |
Hanlu Chen |
June 2018 |
Security Related Data Collection and Composition in LTE Network |
Zhen Yao |
June 2018 |
A Trust management Framework for SDN Application Based on Trusted Data Collectinon |
Kun Xu |
June 2018 |
Research on Privacy Protection in Mobile Application Recommender System (pass with distinction) |
Limei He |
June 2019 |
Anonymous Trust Authentication System for Pervasive Social Networking |
Guoquan Li |
June 2019 |
Network Security Metric Based on Index System |
Huaqing Lin |
June 2019 |
Research on Application-layer Tunnels Detection Technology (pass with distinction) |
Donghao Zhou |
June 2019 |
An Adaptive Network Data Collection System in Software-Defined-Network |
Dan Liu |
June 2020 |
Research on Multi-party Access Control Mechanism in Multi-level Data processing with SGX (pass with distinction) |
Rui Hu |
June 2020 |
Research on Privacy-Preserving Division and Vector Dot Product Computation |
Muhammad Jehanzaib Yousuf |
June 2020 |
Trusted Network Slicing Among Multiple Mobile Network Operators |
Tong Meng |
June 2020 |
DDoS Intrusion Detection Based on Machine Learning and Reversible Sketch |
Yilin Li |
June 2020 |
Truth Detection and Attack Tracing in 5G Positioning |
Xuetao Yang |
June 2020 |
Automatic Data Transmission Control in |
Jingwen Wang |
June 2020 |
Privacy-preserving Malware Detection System Based on Reputation Evaluation |
Li Peng |
June 2021 |
Research on Secure Data Deduplication with Dynamic Auditing |
Wentao Wei |
June 2021 |
Privacy-Preserving Malware Detection Based on SGX |
Xuerui Wang |
June 2021 |
A Voiceprint Authentication System with Liveness Detection |
Dongsheng Zhao |
June 2021 |
Handover Authentication in 5G Heterogeneous Network |
Jingjing Zhao |
June 2021 |
Efficient Traffic Classification Based on Network Traffic Granule (pass with distinction) |
Wei Sun |
June 2021 |
A Software Side Channel Vulnerability Detection Method Based on Similarity Calculation and Machine Learning |
Wenming Zhang |
June 2021 |
Abnormal Network Traffic Detection Based on Deep Metric Learning |
Xinren Qian |
June 2021 |
Privacy Protection in 5G Positioning and Location-based Services Based on SGX |
Xiang Li |
June 2022 |
Node Attribute Privacy Preservation in Decentralized Crowdsourcing |
Hui Han |
June 2022 |
Super Host Identification and Network Host Trust Evaluation Based on Memory Efficient Sketch |
Li Wang |
June 2022 |
A Secure and Anonymous Scheme to Access Core Network Based on Multi-UAV Relay |
Huidong Dong |
June 2022 |
Inter-domain Trustworthy and Personalized Routing Based on Crowdsourcing |
Rong Han |
June 2022 |
Game Theoretic Analysis on Decentralized Mobile Crowdsourcing Incentive |
Hao Weng |
June 2022 |
Intrusion Detection and Node Trust Evaluation Based on Stacked Ensemble and Deep learning |
Hui Bai |
June 2022 |
Verification on Outsourced Intelligent Routing to a Cloud |
Fei Wu |
Planned in June 2023 (80% done) |
An Effective Truth Discovery Method Based on Prior Constraints Fuzzy Clustering for Streaming Data |
Kangde Liu |
Planned in June 2023 (80% done) |
An Efficient Local Model Truth Discovery Scheme in Blockchain-enabled Federated Learning |
Guocang Liu |
Planned in June 2023 (80% done) |
Implementation of Anonymous Authentication on Trust in |
Xiaoxuan Xie |
Planned in June 2023 (80% done) |
Secure and Personalized Routing Algorithm and Simulation Implementation for Heterogeneous Networks |
Yijia Liu |
Planned in June 2024 (30% done) |
N.A. |
Xinmeng Liu |
Planned in June 2024 (30% done) |
N.A. |
Ruoyu Yin |
Planned in June 2024 (30% done) |
N.A. |
Rui Ma |
Planned in June 2024 (30% done) |
N.A. |
Haonan Yuan |
Planned in June 2024 (30% done) |
N.A. |
Chaoming Shi |
Planned in June 2024 (30% done) |
N.A. |
Mubeen Ashraf |
Planned in June 2024 (30% done) |
N.A. |
Chenhao Zhang |
Planned in June 2025 (5% done) |
N.A. |
Jingdong Chang |
Planned in June 2025 (5% done) |
N.A. |
Xiaoyan Wei |
Planned in June 2025 (5% done) |
N.A. |
Jiajun Li |
Planned in June 2025 (5% done) |
N.A. |
Baochen Yan |
Planned in June 2025 (5% done) |
N.A. |
Qinghua Cao |
Planned in June 2025 (5% done) |
N.A. |
Longxin Li |
Planned in June 2025 (5% done) |
N.A. |
Xuyan Li |
Planned in June 2025 (5% done) |
N.A. |
Zitong Zhang |
Planned in June 2026 (0% done) |
N.A. |
Zhaozheng Li |
Planned in June 2026 (0% done) |
N.A. |
Table 4: Advised Master Students in Aalto University (in total 4)
Name |
Date of Graduation |
Thesis Title |
Yu Chen |
June 2010 |
A Privacy-enhanced Reputation System for Mobile Ad hoc Services (pass with distinction) |
Yue Shen |
December 2012 |
An Evaluation Platform on Trust Management for Unwanted Traffic Control (pass with distinction) |
Xueyun Li |
April 2015 |
Performance Evaluation on Three Data Access Control Schemes in Cloud Computing (pass with distinction) |
Lifang Zhang |
May 2016 |
Privacy-Preserving Trust Management for Unwanted Traffic Control (pass with distinction) |
Table 5: Supervised Post-doc Researchers (in total 5)
Name |
Duration |
Research Topic |
Yulong Fu |
07.2016 –06.2018 |
Network Security-related Data Collection and Composition |
Wenxiu Ding |
01.2018 –09.2019 |
Homomorphic Re-encryption and its Applications |
Mingjun Wang |
01.2018 – 03.2021 |
6G Trustworthy Networking |
Masoud Kaveh (Sponsored and advised by me) |
05.2022 – Date |
Performance Evaluation on Three Data Access Control Schemes in Cloud Computing |
Zhe Guo |
01.2013 –12.2013 |
Routing in LEO Satellite Network |
Junze Wang |
01.2011 –12.2011 |
Message Receiver Determination in IM Conversations |
Table 6: Supervised Bachelor Theses (Selected)
Name |
Date of Graduation |
Thesis Title |
Yanxiao Cheng |
June 2014 |
Design and Implementation of a Mobile App Security Configuration Recommendation System |
Wei Feng |
June 2014 |
Privacy Preservation in Pervasive Social Networking (pass with distinction) |
Pu Wang |
June 2014 |
Anonymous Trust Authentication in MANET |
Sihui Zhao |
June 2014 |
A Text-Voice Conversion System Based on Android |
Yanlan Lin |
June 2015 |
Reputation Generation based on Feedback Opinions |
Yuxiang Li |
June 2015 |
Implementation of Cloud Data Deduplication Based on ABE |
Xixun Yu |
June 2015 |
Verifiable Cloud Computing (pass with distinction) |
Haiqi Zhu |
June 2015 |
Implementation of Cloud Data Deduplication Based on Proxy-based Re-enquiption |
Aijun Yang |
June 2016 |
An Anonymous Authentication and Key Agreement Protocol in D2D Communications |
Qun Yang |
June 2016 |
Anonymous Authentication on Trust in Pervasive Social Networking |
Haomeng Xie |
June 2016 |
Trustworthy Batch Anonymous Authentication in Pervasive Social Networking (pass with distinction) |
Cheng Ji |
June 2016 |
A D2D Anonymous Authentication and Key Agreement Protocol Based on Identity Signature |
Li Wen |
June 2017 |
Secure Encryption Cloud Data Deduplication Management |
Tong Meng |
June 2017 |
Design and Implementation of Network Security Parameter Collection (pass with distinction) |
Rui Hu |
June 2017 |
Verifiable Oursourced Secure Data Computation |
Yihao Yuan |
June 2017 |
Implementation and Evaluation on a D2D Secure Communication Protocol with Privacy Preservation |
Li Peng |
June 2018 |
Design and Implementation of a Context-aware Communication Security and Data Access Control Scheme in Pervasive Social Networking |
Jingjing Zhao |
June 2018 |
DDoS Attack Detection Based on Sketch |
Xuerui Wang |
June 2018 |
Implementation of a Voiceprint User Authentication with Liveness Detection System |
Xinren Qian |
June 2018 |
Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control |
Jiandong Liu |
June 2018 |
Privacy-preserving Machine Learning - Logistic Regression |
Huidong Dong |
June 2019 |
An Incentive Mechanism for Security-Related Data Collection based on Micro-Payment in DSR Routing |
Xiang Li |
June 2019 |
Implementation of Privacy-Preserving Data Processing Based on Blockchain |
Hui Bai |
June 2019 |
Verifiable Computation on Cloud Data Deduplication |
Jie Wang |
June 2020 |
A Fuzzy C-means Clustering Algorithm with Proximity-based Constraint (pass with distinction) |
Yifan Yang |
June 2020 |
Security and Privacy Preservation in Voiceprint Authentication System |
Anqihui Wang |
June 2020 |
SGX Side Channel Attack in SQL Data Query |
Pucheng Lei |
June 2020 |
Blockchain Based Routing in Heterogeneous Network |
Zihao Zhao |
June 2020 |
Network Intrusion Detection Based on Deep Distance Learning |
Xinjie Zhu |
June 2020 |
Secure Bitcoin Transaction |
Yuntao Zhang |
June 2021 |
Implementation of Security and Privacy Protection in Voiceprint Authentication System |
Xinmeng Liu |
June 2021 |
Trusted Anonymous Updating Based on Blockchain in Large-scale Heterogeneous Networks |
Yiwen Wang |
June 2021 |
SGX-enabled Decentralized Intrusion Detection and Network Trust Evaluation (pass with distinction) |
Huiquan Liang |
June 2021 |
SGX-Based Anonymous Authentication on Trust for Decentralized MCS |
Kunyang Du |
June 2021 |
Physical Layer Enhanced Authentication Based on Positioning in Backscatter Communication |
Zeyu Yang |
June 2022 |
Cross-Blockchain Digital Currency Anonymous Transactions |
Baochen Yan |
June 2022 |
Efficient and Privacy-preserving Voiceprint User Authentication Based on Sketch (pass with distinction) |
Jiajun Li |
June 2022 |
Physical Layer Session Key Generation and Security Analysis in Backscatter Communications (pass with distinction) |
Note: the records before 2014 are lost.