Table 1: Supervised PhD Students (in total 23)
Name | University | Status of Thesis | Thesis Title |
Mingjun Wang | Xidian University, China | Completed (12.2017) | Security and Privacy Preservation in Device-to-Device Communications (pass with distinction) |
Wenxiu Ding | Xidian University, China | Completed (12.2017) | Secure Computations and Deduplication Management over Encrypted Data in Cloud Computing (pass with distinction) |
Wei Feng | Xidian University, China | Completed (05.2020) | Anonymous Authenticatoin on Trust in Cyber-Physical-Social Systems (pass with distinction) |
Yafeng Wang | Xidian University, China | Partially Completed (10.2021) | Crowdsensing Privacy Preservation |
Xueqin Liang (Dual degree) | Aalto University | Completed (12.2020) | Game Theoretic Analysis on Encrypted Data Deduplication in Cloud (IEEE TCSC Outstanding Ph.D. Dissertation Award) |
Xuyang Jing | Xidian University, China | Completed (12.2020) | Security Data Compression and Fusion for Efficient Network Security Analysis (pass with distinction) |
Yaxing Chen | Xi’an Jiaotong University, China | Completed (05.2021) | Research on Augmented Trust in SGX-enabled Cloud Applications |
Xueqin Liang (Dual degree) | Xidian University, China | Completed (12.2021) | Incentive Mechanism Study on Secure and Efficient Crowdsourcing and Cloud Storage Deduplication Systems (pass with distinction) |
Pu Wang | Xidian University, China | Completed (12.2021) | Research on Physical Layer Security and Optimization for Backscatter Communications (pass with distinction) |
Xixun Yu | Xidian University, China | Completed (12.2021) | Verifiable Mechanisms in Cloud Data Services (pass with distinction) |
Gao Liu | Xidian University, China | Completed (05.2022) | Decentralized Network Trust Management |
Haomeng Xie | Xidian University, China | Completed (12.2023) | Privacy Preservation and Trust Authentication in Blockchain Systems |
Rui Zhang | Xidian University, China | Completed (12.2023) | Privacy-preserving and Secure Voiceprint Authentication |
Lijun Gao | Xidian University, China | Planned defense in 12.2024 (50% done) | Adversarial Learning for PDF Malware Detection |
Jialei Zhang | Xidian University, China | Planned defense in 12.2024 (70% done) | Intelligent and Customized Routing in Integrated HetNets with Privacy Preservation |
Shufan Fei | Xidian University, China | Planned defense in 12.2025 (50% done) | Decentralized Management for Trustworthy Networking |
Jie Wang | Xidian University, China | Planned defense in 12.2025 (50% done) | Intelligent Trust Evaluation |
Yishan Yang | Xidian University, China | Planned defense in 12.2026 (30% done) | Batch Authentication in Backscattered Communications |
Panpan Han | Xidian University, China | Planned defense in 12.2026 (30% done) | Privacy Preservation in Complex Cross-Chain Systems |
Hongke Zhang | Xidian University, China | Planned defense in 12.2026 (30% done) | N.A. |
Jiahe Lan | Xidian University, China | Planned defense in 12.2027 (40% done) | N.A. |
Haoxiang Han | Xidian University, China | Planned defense in 12.2027 (20% done) | N.A. |
Yijia Liu | Xidian University, China | Planned defense in 12.2028 (10% done) | N.A. |
Chaoming Shi | Xidian University, China | Planned defense in 12.2028 (10% done) | N.A. |
Qixian Ren | Xidian University, China | N.A |
Table 2: Advised or Co-supervised PhD Students (in total 10)
Name | University | Status | Thesis Topic |
Xueqin Liang (Dual degree) | Aalto University, Finland | Completed (12.2020) | Game Theoretic Analysis on Encrypted Data Deduplication in Cloud |
Shushu Liu | Aalto University, Finland | Under pre-examination, planned defense in 12.2022 | Securing 5G Positioning and its Services with Privacy Preservation |
Monshizadeh Mehrnoosh | Aalto University, Finland | Under pre-examination, planned defense in 01.2023 | Machine Learning Techniques to Detect Known and Novel Cyber-attacks |
Lifang Zhang | Aalto University, Finland | (75% done) | Privacy-preserving Unwanted Traffic Control |
Yifan Zhang | Aalto University, Finland | Planned defense in 12.2026 (5% done) | Noise Management for Securing Backscatter Communications |
Ping Wang | Xidian University, China | Planned defense in 12.2022 (95% done) | Research on Adversarial Attack and Defense Approaches of CAPTCHA |
Yurong Luo | Xi’an Jiaotong University | Planned defense in 2023 (85% done) | Blockchain Based Data Security Management in IoT |
Xi Xu | Xi’an Jiaotong University | Planned defense in 12.2023 (75% done) | Binary Reuse Detection and Batch Presence Test |
Zhe Guo | HUST | Completed (12.2011) | Group Mobility and Communication Pattern Study of Mobile Users |
Junze Wang | HUST | Completed (06.2010) | Review Spam Study based on Semantic Relevance |
Table 3: Supervised Master Students in Xidian University (in total 81)
Name | Date of Graduation | Thesis Title |
Liang Chen | April 2014 | Implementation of an SMS Spam Control System Based on Trust Management (pass with distinction) |
Gaowa Shi | April 2014 | Performance Evaluation of PSN Unwanted Content Control System via Trust management |
Hanling Chen | January 2015 | A Fashionable Technology of Pervasive Social Networking Based on Mobile Device |
Wei Tang | January 2015 | CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management |
Yulu Wang | January 2015 | Validation on a Research Model of Human-Computer Trust Interaction |
Sixuan Ma | January 2015 | Implementation of an Unwanted Content Control System in Pervasive Social Networking Based on Trust Management (pass with distinction) |
Tianli Dang | January 2015 | The implementation and Evaluation of a Trust-Behavior Based Reputation System for Mobile Application |
Ning Li | January 2016 | Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE |
Yutan Ma | January 2016 | Implementation of unwanted Traffic Control System Based on Trust Management Using SDN |
Lijun Gao | January 2016 | Game Theoretical Analysis on the Acceptance of a Cloud Data Access Control System Based on Reputation (pass with distinction) |
Fei Tong | January 2016 | Android Application Detection |
Chaoyin Huang | January 2016 | Secure Pervasive Social Communications Based on Distributed Trust Evaluation |
Jiazhen Zhou | 2017 uncompleted | Secure Wearable Device Communications |
Wangyang Shi | March 2016 | CloudFile: A Cloud Data Access Control System Based on Mobile Social Trust |
Shanshan Bian | June 2017 | A Trust Management Framework of SDN Application |
Yanxiao Cheng | June 2017 | PermitRec: A Permission Configuration Recommender System for Mobile Apps Based on Trust Management |
Yuquan Zhu | June 2017 | Adaptive Trust Management in NFV |
Guangwu Xu | June 2017 | A Trust Insurance Mechanism for Virtualized Network Functions Based on Trusted Computing |
Sihui Zhao | June 2017 | Implementation and Verification of Identity Authentication System Based on Individual Voiceprint Challenge System |
Fengyu Tian | June 2018 | Trusted Cooperative Platform among Virtual Base Stations in C-RAN Architecture (pass with distinction) |
Chenzi Wu | June 2018 | AnonyAuth: The Demo of an Trustworthy Anonymous Authentication System Based on PSN and its Performance Evaluation |
Ping Yan | June 2018 | Privacy-Preserving Mobile Malware Detection in the Cloud |
Hanlu Chen | June 2018 | Security Related Data Collection and Composition in LTE Network |
Zhen Yao | June 2018 | A Trust management Framework for SDN Application Based on Trusted Data Collectinon |
Kun Xu | June 2018 | Research on Privacy Protection in Mobile Application Recommender System (pass with distinction) |
Limei He | June 2019 | Anonymous Trust Authentication System for Pervasive Social Networking |
Guoquan Li | June 2019 | Network Security Metric Based on Index System |
Huaqing Lin | June 2019 | Research on Application-layer Tunnels Detection Technology (pass with distinction) |
Donghao Zhou | June 2019 | An Adaptive Network Data Collection System in Software-Defined-Network |
Dan Liu | June 2020 | Research on Multi-party Access Control Mechanism in Multi-level Data processing with SGX (pass with distinction) |
Rui Hu | June 2020 | Research on Privacy-Preserving Division and Vector Dot Product Computation |
Muhammad Jehanzaib Yousuf | June 2020 | Trusted Network Slicing Among Multiple Mobile Network Operators |
Tong Meng | June 2020 | DDoS Intrusion Detection Based on Machine Learning and Reversible Sketch |
Yilin Li | June 2020 | Truth Detection and Attack Tracing in 5G Positioning |
Xuetao Yang | June 2020 | Automatic Data Transmission Control in |
Jingwen Wang | June 2020 | Privacy-preserving Malware Detection System Based on Reputation Evaluation |
Li Peng | June 2021 | Research on Secure Data Deduplication with Dynamic Auditing |
Wentao Wei | June 2021 | Privacy-Preserving Malware Detection Based on SGX |
Xuerui Wang | June 2021 | A Voiceprint Authentication System with Liveness Detection |
Dongsheng Zhao | June 2021 | Handover Authentication in 5G Heterogeneous Network |
Jingjing Zhao | June 2021 | Efficient Traffic Classification Based on Network Traffic Granule (pass with distinction) |
Wei Sun | June 2021 | A Software Side Channel Vulnerability Detection Method Based on Similarity Calculation and Machine Learning |
Wenming Zhang | June 2021 | Abnormal Network Traffic Detection Based on Deep Metric Learning |
Xinren Qian | June 2021 | Privacy Protection in 5G Positioning and Location-based Services Based on SGX |
Xiang Li | June 2022 | Node Attribute Privacy Preservation in Decentralized Crowdsourcing |
Hui Han | June 2022 | Super Host Identification and Network Host Trust Evaluation Based on Memory Efficient Sketch |
Li Wang | June 2022 | A Secure and Anonymous Scheme to Access Core Network Based on Multi-UAV Relay |
Huidong Dong | June 2022 | Inter-domain Trustworthy and Personalized Routing Based on Crowdsourcing |
Rong Han | June 2022 | Game Theoretic Analysis on Decentralized Mobile Crowdsourcing Incentive |
Hao Weng | June 2022 | Intrusion Detection and Node Trust Evaluation Based on Stacked Ensemble and Deep learning |
Hui Bai | June 2022 | Verification on Outsourced Intelligent Routing to a Cloud |
Fei Wu | June 2023 | An Effective Truth Discovery Method Based on Prior Constraints Fuzzy Clustering for Streaming Data |
Kangde Liu | June 2023 | An Efficient Local Model Truth Discovery Scheme in Blockchain-enabled Federated Learning |
Guocang Liu | June 2023 | Implementation of Anonymous Authentication on Trust in |
Xiaoxuan Xie | June 2023 | Secure and Personalized Routing Algorithm and Simulation Implementation for Heterogeneous Networks |
Xinmeng Liu | Planned in June 2024 | N.A. |
Ruoyu Yin | Planned in June 2024 | N.A. |
Rui Ma | Planned in June 2024 | N.A. |
Haonan Yuan | Planned in June 2024 | N.A. |
Mubeen Ashraf | Planned in June 2024 | N.A. |
Chenhao Zhang | Planned in June 2025 | N.A. |
Jingdong Chang | Planned in June 2025 | N.A. |
Xiaoyan Wei | Planned in June 2025 | N.A. |
Jiajun Li | Planned in June 2025 | N.A. |
Baochen Yan | Planned in June 2025 | N.A. |
Qinghua Cao | Planned in June 2025 | N.A. |
Longxin Li | Planned in June 2025 | N.A. |
Xuyan Li | Planned in June 2025 | N.A. |
Zitong Zhang | Planned in June 2026 | N.A. |
Zhaozheng Li | Planned in June 2026 | N.A. |
Essodokinam LAMATETOU | Planned in June 2026 | N.A. |
Haoxin He | Planned in June 2026 | N.A. |
Tingxi Luo | Planned in June 2026 | N.A. |
Guoliang Zhou | Planned in June 2026 | N.A. |
Lanzhen Shao | Planned in June 2027 | N.A. |
Shuo Ma | Planned in June 2027 | N.A. |
Yuhang Ma | Planned in June 2027 | N.A. |
Yuxuan Lei | Planned in June 2027 | N.A. |
Yifan Li | Planned in June 2027 | N.A. |
Yaxin Tang | Planned in June 2027 | N.A. |
Niya Luo | Planned in June 2027 | N.A. |
Table 4: Advised Master Students in Aalto University (in total 4)
Name | Date of Graduation | Thesis Title |
Yu Chen | June 2010 | A Privacy-enhanced Reputation System for Mobile Ad hoc Services (pass with distinction) |
Yue Shen | December 2012 | An Evaluation Platform on Trust Management for Unwanted Traffic Control (pass with distinction) |
Xueyun Li | April 2015 | Performance Evaluation on Three Data Access Control Schemes in Cloud Computing (pass with distinction) |
Lifang Zhang | May 2016 | Privacy-Preserving Trust Management for Unwanted Traffic Control (pass with distinction) |
Table 5: Supervised Post-doc Researchers (in total 5)
Name | Duration | Research Topic |
Yulong Fu | 07.2016 –06.2018 | Network Security-related Data Collection and Composition |
Wenxiu Ding | 01.2018 –09.2019 | Homomorphic Re-encryption and its Applications |
Mingjun Wang | 01.2018 – 03.2021 | 6G Trustworthy Networking |
Masoud Kaveh (Sponsored and advised by me) | 05.2022 – Date | Performance Evaluation on Three Data Access Control Schemes in Cloud Computing |
Zhe Guo | 01.2013 –12.2013 | Routing in LEO Satellite Network |
Junze Wang | 01.2011 –12.2011 | Message Receiver Determination in IM Conversations |
Table 6: Supervised Bachelor Theses (Selected, in total 51+4)
Name | Date of Graduation | Thesis Title |
Yanxiao Cheng | June 2014 | Design and Implementation of a Mobile App Security Configuration Recommendation System |
Wei Feng | June 2014 | Privacy Preservation in Pervasive Social Networking (pass with distinction) |
Pu Wang | June 2014 | Anonymous Trust Authentication in MANET |
Sihui Zhao | June 2014 | A Text-Voice Conversion System Based on Android |
Yanlan Lin | June 2015 | Reputation Generation based on Feedback Opinions |
Yuxiang Li | June 2015 | Implementation of Cloud Data Deduplication Based on ABE |
Xixun Yu | June 2015 | Verifiable Cloud Computing (pass with distinction) |
Haiqi Zhu | June 2015 | Implementation of Cloud Data Deduplication Based on Proxy-based Re-enquiption |
Aijun Yang | June 2016 | An Anonymous Authentication and Key Agreement Protocol in D2D Communications |
Qun Yang | June 2016 | Anonymous Authentication on Trust in Pervasive Social Networking |
Haomeng Xie | June 2016 | Trustworthy Batch Anonymous Authentication in Pervasive Social Networking (pass with distinction) |
Cheng Ji | June 2016 | A D2D Anonymous Authentication and Key Agreement Protocol Based on Identity Signature |
Li Wen | June 2017 | Secure Encryption Cloud Data Deduplication Management |
Tong Meng | June 2017 | Design and Implementation of Network Security Parameter Collection (pass with distinction) |
Rui Hu | June 2017 | Verifiable Oursourced Secure Data Computation |
Yihao Yuan | June 2017 | Implementation and Evaluation on a D2D Secure Communication Protocol with Privacy Preservation |
Li Peng | June 2018 | Design and Implementation of a Context-aware Communication Security and Data Access Control Scheme in Pervasive Social Networking |
Jingjing Zhao | June 2018 | DDoS Attack Detection Based on Sketch |
Xuerui Wang | June 2018 | Implementation of a Voiceprint User Authentication with Liveness Detection System |
Xinren Qian | June 2018 | Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control |
Jiandong Liu | June 2018 | Privacy-preserving Machine Learning - Logistic Regression |
Huidong Dong | June 2019 | An Incentive Mechanism for Security-Related Data Collection based on Micro-Payment in DSR Routing |
Xiang Li | June 2019 | Implementation of Privacy-Preserving Data Processing Based on Blockchain |
Hui Bai | June 2019 | Verifiable Computation on Cloud Data Deduplication |
Jie Wang | June 2020 | A Fuzzy C-means Clustering Algorithm with Proximity-based Constraint (pass with distinction) |
Yifan Yang | June 2020 | Security and Privacy Preservation in Voiceprint Authentication System |
Anqihui Wang | June 2020 | SGX Side Channel Attack in SQL Data Query |
Pucheng Lei | June 2020 | Blockchain Based Routing in Heterogeneous Network |
Zihao Zhao | June 2020 | Network Intrusion Detection Based on Deep Distance Learning |
Xinjie Zhu | June 2020 | Secure Bitcoin Transaction |
Yuntao Zhang | June 2021 | Implementation of Security and Privacy Protection in Voiceprint Authentication System |
Xinmeng Liu | June 2021 | Trusted Anonymous Updating Based on Blockchain in Large-scale Heterogeneous Networks |
Yiwen Wang | June 2021 | SGX-enabled Decentralized Intrusion Detection and Network Trust Evaluation (pass with distinction) |
Huiquan Liang | June 2021 | SGX-Based Anonymous Authentication on Trust for Decentralized MCS |
Kunyang Du | June 2021 | Physical Layer Enhanced Authentication Based on Positioning in Backscatter Communication |
Zeyu Yang | June 2022 | Cross-Blockchain Digital Currency Anonymous Transactions |
Baochen Yan | June 2022 | Efficient and Privacy-preserving Voiceprint User Authentication Based on Sketch (pass with distinction) |
Jiajun Li | June 2022 | Physical Layer Session Key Generation and Security Analysis in Backscatter Communications (pass with distinction) |
Hesong Wang | June 2023 | Customised Trustworthy Routing in Integrated Heterogeneous Networks |
Xinyu Li | June 2023 | Backdoor Attack on Voiceprint User Authentication |
Chao Tang | June 2023 | Adversarial Link Detection in Graphic Neural Networks |
Dongliang Wang | June 2023 | Implementation of Decentralized 5G VNF Management and Service System |
Zixi Feng | June 2023 | Adversarial Learning for Malicious PDF Detection |
Zhaozheng Li | June 2023 | Backdoor Attack on Voiceprint Authentication |
Zitong Zhang | June 2023 | Efficient Decentralized Trust Evaluation and Consensus |
Yifan Li | June 2024 | Vulnerable Software Package Detection |
Yuxuan Lei | June 2024 | Privacy-preserving Cross-chain Transaction |
Niya Luo | June 2024 | Large-scale Backscatter Device Grouping Optimization |
Yujuan Cao | June 2024 | Backdoor Attack on Speech Recognition Systems |
Jiaqi Zhang | June 2024 | A GNN-based Trust Evaluation Model for Heterogenous Social Networks |
Bowen Bao | June 2024 | Adversarial Attack on ChatGPT |
Note: the records before 2014 are lost.