Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Yan Zheng's MessageBoard
Students
  • I am supervising and have supervised 23 PhD students, 14 of them have got PhD degrees (4 supervised students got associate professor positions and two have tenured, 4 got assistant professor positions);
  • I am supervising and have supervised 81 master theses (54 graduates) and 55 bachelor theses (49 graduates) (2011 - date), most of students got job offers after graduation from universities, including big Internet companies (BAT), national banks, Telecom companies, institutes, etc.
  • I co-supervised or advised more than 10 PhD and master students;
  • Three PhD dissertation achieved IEEE TC Outstanding Ph.D. Dissertation Award; one PhD dissertation was nominated as the best Ph.D. dissertation of Chinese Electronics  Education Association;
  • 18 of my postgraduate or PhD students achieved national level scholarships or awards, 13 PhD students got CSC Chinese government scholarships to visit universities abroad, 2 got the best bachelor thesis award.

Table 1: Supervised PhD Students (in total 23)

Name

University

Status of Thesis

Thesis Title

Mingjun Wang

Xidian University, China

Completed

(12.2017)

Security and Privacy Preservation in Device-to-Device Communications (pass with distinction)

Wenxiu Ding

Xidian University, China

Completed

(12.2017)

Secure Computations and Deduplication Management over Encrypted Data in Cloud Computing (pass with distinction)

Wei Feng

Xidian University, China

Completed

(05.2020)

Anonymous Authenticatoin on Trust in Cyber-Physical-Social Systems (pass with distinction)

Yafeng Wang

Xidian University, China

Partially Completed

(10.2021)

Crowdsensing Privacy Preservation

Xueqin Liang

(Dual degree)

Aalto University

Completed

(12.2020)

Game Theoretic Analysis on Encrypted Data Deduplication in Cloud (IEEE TCSC Outstanding Ph.D. Dissertation Award)

Xuyang Jing

Xidian University, China

Completed

(12.2020)

Security Data Compression and Fusion for Efficient Network Security Analysis (pass with distinction)

Yaxing Chen

Xi’an Jiaotong University, China

Completed

(05.2021)

Research on Augmented Trust in SGX-enabled Cloud Applications

Xueqin Liang

(Dual degree)

Xidian University, China

Completed

(12.2021)

Incentive Mechanism Study on Secure and Efficient Crowdsourcing and Cloud Storage Deduplication Systems (pass with distinction)

Pu Wang

Xidian University, China

Completed

(12.2021)

Research on Physical Layer Security and Optimization for Backscatter Communications (pass with distinction)

Xixun Yu

Xidian University, China

Completed

(12.2021)

Verifiable Mechanisms in Cloud Data Services (pass with distinction)

Gao Liu

Xidian University, China

Completed

(05.2022)

Decentralized Network Trust Management

Haomeng Xie

Xidian University, China

Completed

(12.2023)

Privacy Preservation and Trust Authentication in Blockchain Systems

Rui Zhang

Xidian University, China

Completed

(12.2023)

Privacy-preserving and Secure Voiceprint Authentication

Lijun Gao

Xidian University, China

Planned defense in 12.2024

(50% done)

Adversarial Learning for PDF Malware Detection

Jialei Zhang

Xidian University, China

Planned defense in 12.2024

(70% done)

Intelligent and Customized Routing in Integrated HetNets with Privacy Preservation

Shufan Fei

Xidian University, China

Planned defense in 12.2025

(50% done)

Decentralized Management for Trustworthy Networking

Jie Wang

Xidian University, China

Planned defense in 12.2025

(50% done)

Intelligent Trust Evaluation

Yishan Yang

Xidian University, China

Planned defense in 12.2026

(30% done)

Batch Authentication in Backscattered Communications

Panpan Han

Xidian University, China

Planned defense in 12.2026

(30% done)

Privacy Preservation in Complex Cross-Chain Systems

Hongke Zhang

Xidian University, China

Planned defense in 12.2026

(30% done)

N.A.

Jiahe Lan

Xidian University, China

Planned defense in 12.2027

(40% done)

N.A.

Haoxiang Han

Xidian University, China

Planned defense in 12.2027

(20% done)

N.A.

Yijia Liu

Xidian University, China

Planned defense in 12.2028

(10% done)

N.A.

Chaoming Shi

Xidian University, China

Planned defense in 12.2028

(10% done)

N.A.

Qixian RenXidian University, China N.A

Table 2: Advised or Co-supervised PhD Students (in total 10)

Name

University

Status

Thesis Topic

Xueqin Liang

(Dual degree)

Aalto University, Finland

Completed

(12.2020)

Game Theoretic Analysis on Encrypted Data Deduplication in Cloud

Shushu Liu

Aalto University, Finland

Under pre-examination, planned defense in 12.2022

Securing 5G Positioning and its Services with Privacy Preservation

Monshizadeh Mehrnoosh

Aalto University, Finland

Under pre-examination, planned defense in 01.2023

Machine Learning Techniques to Detect Known and Novel Cyber-attacks

Lifang Zhang

Aalto University, Finland

(75% done)

Privacy-preserving Unwanted Traffic Control

Yifan Zhang

Aalto University, Finland

Planned defense in 12.2026

(5% done)

Noise Management for Securing Backscatter Communications

Ping Wang

Xidian University, China

Planned defense in 12.2022

(95% done)

Research on Adversarial Attack and Defense Approaches of CAPTCHA

Yurong Luo

Xi’an Jiaotong University

Planned defense in 2023

(85% done)

Blockchain Based Data Security Management in IoT

Xi Xu

Xi’an Jiaotong University

Planned defense in 12.2023

(75% done)

Binary Reuse Detection and Batch Presence Test

Zhe Guo

HUST

Completed

(12.2011)

Group Mobility and Communication Pattern Study of Mobile Users

Junze Wang

HUST

Completed

(06.2010)

Review Spam Study based on Semantic Relevance

Table 3: Supervised Master Students in Xidian University (in total 81)

Name

Date of Graduation

Thesis Title

Liang Chen

April 2014

Implementation of an SMS Spam Control System Based on Trust Management (pass with distinction)

Gaowa Shi

April 2014

Performance Evaluation of PSN Unwanted Content Control System via Trust management

Hanling Chen

January 2015

A Fashionable Technology of Pervasive Social Networking Based on Mobile Device

Wei Tang

January 2015

CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management

Yulu Wang

January 2015

Validation on a Research Model of Human-Computer Trust Interaction

Sixuan Ma

January 2015

Implementation of an Unwanted Content Control System in Pervasive Social Networking Based on Trust Management (pass with distinction)

Tianli Dang

January 2015

The implementation and Evaluation of a Trust-Behavior Based Reputation System for Mobile Application

Ning Li

January 2016

Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE

Yutan Ma

January 2016

Implementation of unwanted Traffic Control System Based on Trust Management Using SDN

Lijun Gao

January 2016

Game Theoretical Analysis on the Acceptance of a Cloud Data Access Control System Based on Reputation (pass with distinction)

Fei Tong

January 2016

Android Application Detection

Chaoyin Huang

January 2016

Secure Pervasive Social Communications Based on Distributed Trust Evaluation

Jiazhen Zhou

2017 uncompleted

Secure Wearable Device Communications

Wangyang Shi

March 2016

CloudFile: A Cloud Data Access Control System Based on Mobile Social Trust

Shanshan Bian

June 2017

A Trust Management Framework of SDN Application

Yanxiao Cheng

June 2017

PermitRec: A Permission Configuration Recommender System for Mobile Apps Based on Trust Management

Yuquan Zhu

June 2017

Adaptive Trust Management in NFV

Guangwu Xu

June 2017

A Trust Insurance Mechanism for Virtualized Network Functions Based on Trusted Computing

Sihui Zhao

June 2017

Implementation and Verification of Identity Authentication System Based on Individual Voiceprint Challenge System

Fengyu Tian

June 2018

Trusted Cooperative Platform among Virtual Base Stations in C-RAN Architecture (pass with distinction)

Chenzi Wu

June 2018

AnonyAuth: The Demo of an Trustworthy Anonymous Authentication System Based on PSN and its Performance Evaluation

Ping Yan

June 2018

Privacy-Preserving Mobile Malware Detection in the Cloud

Hanlu Chen

June 2018

Security Related Data Collection and Composition in LTE Network

Zhen Yao

June 2018

A Trust management Framework for SDN Application Based on Trusted Data Collectinon

Kun Xu

June 2018

Research on Privacy Protection in Mobile Application Recommender System (pass with distinction)

Limei He

June 2019

Anonymous Trust Authentication System for Pervasive Social Networking

Guoquan Li

June 2019

Network Security Metric Based on Index System

Huaqing Lin

June 2019

Research on Application-layer Tunnels Detection Technology (pass with distinction)

Donghao Zhou

June 2019

An Adaptive Network Data Collection System in Software-Defined-Network

Dan Liu

June 2020

Research on Multi-party Access Control Mechanism in Multi-level Data processing with SGX (pass with distinction)

Rui Hu

June 2020

Research on Privacy-Preserving Division and Vector Dot Product Computation

Muhammad Jehanzaib Yousuf

June 2020

Trusted Network Slicing Among Multiple Mobile Network Operators

Tong Meng

June 2020

DDoS Intrusion Detection Based on Machine Learning and Reversible Sketch

Yilin Li

June 2020

Truth Detection and Attack Tracing in 5G Positioning

Xuetao Yang

June 2020

Automatic Data Transmission Control in
Tacticle Data Link Based on Blockchain

Jingwen Wang

June 2020

Privacy-preserving Malware Detection System Based on Reputation Evaluation

Li Peng

June 2021

Research on Secure Data Deduplication with Dynamic Auditing

Wentao Wei

June 2021

Privacy-Preserving Malware Detection Based on SGX

Xuerui Wang

June 2021

A Voiceprint Authentication System with Liveness Detection

Dongsheng Zhao

June 2021

Handover Authentication in 5G Heterogeneous Network

Jingjing Zhao

June 2021

Efficient Traffic Classification Based on Network Traffic Granule (pass with distinction)

Wei Sun

June 2021

A Software Side Channel Vulnerability Detection Method Based on Similarity Calculation and Machine Learning

Wenming Zhang

June 2021

Abnormal Network Traffic Detection Based on Deep Metric Learning

Xinren Qian

June 2021

Privacy Protection in 5G Positioning and Location-based Services Based on SGX

Xiang Li

June 2022

Node Attribute Privacy Preservation in Decentralized Crowdsourcing

Hui Han

June 2022

Super Host Identification and Network Host Trust Evaluation Based on Memory Efficient Sketch

Li Wang

June 2022

A Secure and Anonymous Scheme to Access Core Network Based on Multi-UAV Relay

Huidong Dong

June 2022

Inter-domain Trustworthy and Personalized Routing Based on Crowdsourcing

Rong Han

June 2022

Game Theoretic Analysis on Decentralized Mobile Crowdsourcing Incentive

Hao Weng

June 2022

Intrusion Detection and Node Trust Evaluation Based on Stacked Ensemble and Deep learning

Hui Bai

June 2022

Verification on Outsourced Intelligent Routing to a Cloud

Fei Wu

June 2023

An Effective Truth Discovery Method Based on Prior Constraints Fuzzy Clustering for Streaming Data

Kangde Liu

June 2023

An Efficient Local Model Truth Discovery Scheme in Blockchain-enabled Federated Learning

Guocang Liu

June 2023

Implementation of Anonymous Authentication on Trust in
Blockchain-Based Mobile Crowdsourcing System

Xiaoxuan Xie

June 2023

Secure and Personalized Routing Algorithm and Simulation Implementation for Heterogeneous Networks

Xinmeng Liu

Planned in June 2024

N.A.

Ruoyu Yin

Planned in June 2024

N.A.

Rui Ma

Planned in June 2024

N.A.

Haonan Yuan

Planned in June 2024

N.A.

Mubeen Ashraf

Planned in June 2024

N.A.

Chenhao Zhang

Planned in June 2025

N.A.

Jingdong Chang

Planned in June 2025

N.A.

Xiaoyan Wei

Planned in June 2025

N.A.

Jiajun Li

Planned in June 2025

N.A.

Baochen Yan

Planned in June 2025

N.A.

Qinghua Cao

Planned in June 2025

N.A.

Longxin Li

Planned in June 2025

N.A.

Xuyan Li

Planned in June 2025

N.A.

Zitong Zhang

Planned in June 2026

N.A.

Zhaozheng Li

Planned in June 2026

N.A.

Essodokinam LAMATETOU

Planned in June 2026

N.A.

Haoxin He

Planned in June 2026

N.A.

Tingxi Luo

Planned in June 2026

N.A.

Guoliang Zhou

Planned in June 2026

N.A.

Lanzhen Shao

Planned in June 2027

N.A.

Shuo Ma

Planned in June 2027

N.A.

Yuhang Ma

Planned in June 2027

N.A.

Yuxuan Lei

Planned in June 2027

N.A.

Yifan Li

Planned in June 2027

N.A.

Yaxin Tang

Planned in June 2027

N.A.

Niya Luo

Planned in June 2027

N.A.

Table 4: Advised Master Students in Aalto University (in total 4)

Name

Date of Graduation

Thesis Title

Yu Chen

June 2010

A Privacy-enhanced Reputation System for Mobile Ad hoc Services (pass with distinction)

Yue Shen

December 2012

An Evaluation Platform on Trust Management for Unwanted Traffic Control (pass with distinction)

Xueyun Li

April 2015

Performance Evaluation on Three Data Access Control Schemes in Cloud Computing (pass with distinction)

Lifang Zhang

May 2016

Privacy-Preserving Trust Management for Unwanted Traffic Control (pass with distinction)

Table 5: Supervised Post-doc Researchers (in total 5)

Name

Duration

Research Topic

Yulong Fu

07.2016 –06.2018

Network Security-related Data Collection and Composition

Wenxiu Ding

01.2018 –09.2019

Homomorphic Re-encryption and its Applications

Mingjun Wang

01.2018 – 03.2021

6G Trustworthy Networking

Masoud Kaveh

(Sponsored and advised by me)

05.2022 – Date

Performance Evaluation on Three Data Access Control Schemes in Cloud Computing

Zhe Guo

01.2013 –12.2013

Routing in LEO Satellite Network

Junze Wang

01.2011 –12.2011

Message Receiver Determination in IM Conversations

Table 6: Supervised Bachelor Theses (Selected, in total 51+4)

Name

Date of Graduation

Thesis Title

Yanxiao Cheng

June 2014

Design and Implementation of a Mobile App Security Configuration Recommendation System

Wei Feng

June 2014

Privacy Preservation in Pervasive Social Networking (pass with distinction)

Pu Wang

June 2014

Anonymous Trust Authentication in MANET

Sihui Zhao

June 2014

A Text-Voice Conversion System Based on Android

Yanlan Lin

June 2015

Reputation Generation based on Feedback Opinions

Yuxiang Li

June 2015

Implementation of Cloud Data Deduplication Based on ABE

Xixun Yu

June 2015

Verifiable Cloud Computing (pass with distinction)

Haiqi Zhu

June 2015

Implementation of Cloud Data Deduplication Based on Proxy-based Re-enquiption

Aijun Yang

June 2016

An Anonymous Authentication and Key Agreement Protocol in D2D Communications

Qun Yang

June 2016

Anonymous Authentication on Trust in Pervasive Social Networking

Haomeng Xie

June 2016

Trustworthy Batch Anonymous Authentication in Pervasive Social Networking (pass with distinction)

Cheng Ji

June 2016

A D2D Anonymous Authentication and Key Agreement Protocol Based on Identity Signature

Li Wen

June 2017

Secure Encryption Cloud Data Deduplication Management

Tong Meng

June 2017

Design and Implementation of Network Security Parameter Collection (pass with distinction)

Rui Hu

June 2017

Verifiable Oursourced Secure Data Computation

Yihao Yuan

June 2017

Implementation and Evaluation on a D2D Secure Communication Protocol with Privacy Preservation

Li Peng

June 2018

Design and Implementation of a Context-aware Communication Security and Data Access Control Scheme in Pervasive Social Networking

Jingjing Zhao

June 2018

DDoS Attack Detection Based on Sketch

Xuerui Wang

June 2018

Implementation of a Voiceprint User Authentication with Liveness Detection System

Xinren Qian

June 2018

Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control

Jiandong Liu

June 2018

Privacy-preserving Machine Learning - Logistic Regression

Huidong Dong

June 2019

An Incentive Mechanism for Security-Related Data Collection based on Micro-Payment in DSR Routing

Xiang Li

June 2019

Implementation of Privacy-Preserving Data Processing Based on Blockchain

Hui Bai

June 2019

Verifiable Computation on Cloud Data Deduplication

Jie Wang

June 2020

A Fuzzy C-means Clustering Algorithm with Proximity-based Constraint (pass with distinction)

Yifan Yang

June 2020

Security and Privacy Preservation in Voiceprint Authentication System

Anqihui Wang

June 2020

SGX Side Channel Attack in SQL Data Query

Pucheng Lei

June 2020

Blockchain Based Routing in Heterogeneous Network

Zihao Zhao

June 2020

Network Intrusion Detection Based on Deep Distance Learning

Xinjie Zhu

June 2020

Secure Bitcoin Transaction

Yuntao Zhang

June 2021

Implementation of Security and Privacy Protection in Voiceprint Authentication System

Xinmeng Liu

June 2021

Trusted Anonymous Updating Based on Blockchain in Large-scale Heterogeneous Networks

Yiwen Wang

June 2021

SGX-enabled Decentralized Intrusion Detection and Network Trust Evaluation (pass with distinction)

Huiquan Liang

June 2021

SGX-Based Anonymous Authentication on Trust for Decentralized MCS

Kunyang Du

June 2021

Physical Layer Enhanced Authentication Based on Positioning in Backscatter Communication

Zeyu Yang

June 2022

Cross-Blockchain Digital Currency Anonymous Transactions

Baochen Yan

June 2022

Efficient and Privacy-preserving Voiceprint User Authentication Based on Sketch (pass with distinction)

Jiajun Li

June 2022

Physical Layer Session Key Generation and Security Analysis in Backscatter Communications (pass with distinction)

Hesong Wang

June 2023

Customised Trustworthy Routing in Integrated Heterogeneous Networks

Xinyu Li

June 2023

Backdoor Attack on Voiceprint User Authentication

Chao Tang

June 2023

Adversarial Link Detection in Graphic Neural Networks

Dongliang Wang

June 2023

Implementation of Decentralized 5G VNF Management and Service System

Zixi Feng

June 2023

Adversarial Learning for Malicious PDF Detection

Zhaozheng Li

June 2023

Backdoor Attack on Voiceprint Authentication

Zitong Zhang

June 2023

Efficient Decentralized Trust Evaluation and Consensus

Yifan Li

June 2024

Vulnerable Software Package Detection

Yuxuan Lei

June 2024

Privacy-preserving Cross-chain Transaction

Niya Luo

June 2024

Large-scale Backscatter Device Grouping Optimization

Yujuan Cao

June 2024

Backdoor Attack on Speech Recognition Systems

Jiaqi Zhang

June 2024

A GNN-based Trust Evaluation Model for Heterogenous Social Networks

Bowen Bao

June 2024

Adversarial Attack on ChatGPT

Note: the records before 2014 are lost.

Honors and Awards
  • Two supervised PhD dissertations achieved IEEE TCSC Outstanding Ph.D. Dissertation Award (Xueqin Liang, Pu Wang); One achieved IEEE HITC Outstanding Ph.D. Dissertation Award (Xuyang Jing);
  • 2 PhD dissertations were nominated as the best Ph.D. dissertations of Chinese Society of Electronic Education (Xuyang Jing);
  • 1 PhD dissertation was nominated as the best Ph.D. dissertation of Chinese Telecommunication Association (Pu Wang);
  • 3 PhD dissertation achieved the best Ph.D. dissertation of Xidian University (Xuyang Jing, Pu Wang, Xueqin Liang);
  • 1 PhD dissertation was nominated as the best Ph.D. dissertation of Xidian University (Xueqin Liang);
  • 13 of my PhD and master students achieved national scholarships (Wenxiu Ding, Fengyu Tian, Ping Yan, Haomeng Xie, Xuyang Jing, Guoquan Li, Huaqing Lin, Dan Liu, Li Peng, Kangde Liu, Jiajun Li 2 times, Jiahe Lan);
  • 4 PhD students achieved National Network Security awards (Mingjun Wang, Wenxiu Ding, Xuyang Jing, Xueqin Liang);
  • 15 PhD students got CSC Chinese government scholarships to visit universities abroad (Mingjun Wang, Xixun Yu, Xuyang Jing, Gao Liu, Pu Wang, Xueqin Liang, Haomeng Xie, Rui Zhang, Lijun Gao, Jialei Zhang, Shufan Fei, Jie Wang, Yishan Yang, Jiahe Lan, Yijia Liu);
  • Two students got the best graduate awards, two got the best bachelor thesis awards, four times of best paper awards in international journal and conferences.
  • Most of my supervised master and bachelor students got job offers from big Internet companies, national banks, telecom companies, research institutes, etc.