![]()
方黎明

-
教授
博士生导师
- 招生学科专业:
计算机科学与技术 -- 【招收硕士研究生】 -- 计算机科学与技术学院
网络空间安全 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
电子信息 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
- 性别:男
- 毕业院校:南京航空航天大学
- 学历:南京航空航天大学
- 学位:工学博士学位
- 所在单位:计算机科学与技术学院/人工智能学院/软件学院
- 联系方式:fangliming@nuaa.edu.cn
- 电子邮箱:4a1931eff7b0a6956032c4f0365764ad4048ad34cd3c3f4c5611c079cab3775558e6ea60854c08d18480ae89d0b677a69983546e8892bc6e1aca118a0e8e5da326efd7f71edc6ed440ce818326ff67885021d0df5def134c5a87660bf054be9ea9d272079778aa117bf5b196b32bc06e728e9a272f38f599dcefb28500526cbe
访问量:
-
[1] .A Secure and Fine-grained Scheme for Data Security in Industrial IoT Platforms for Smart City:IEEE Internet of Things Journal
-
[2] .A Secure and Authenticated Mobile Payment Protocol Against Off-site Attack Strategy:IEEE Transactions on Dependable and Secure Computing
-
[3] .Revocable Attribute-Based Encryption with Data Integrity in Clouds:IEEE Transactions on Dependable and Secure Computing, 2021.
-
[4] .A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against Ext:IEEE Transactions on Industrial Informatics
-
[5] .Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds:IEEE Transactions on Dependable and Secure Computing
-
[6] .WebEnclave: Protect Web Secrets from browser extensions with Software Enclave:IEEE Transactions on Dependable and Secure Computing
-
[7] .Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Pe.[C]:ACM MM 2022
-
[8] .A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds:IEEE Transactions on Dependable and Secure Computing
-
[9] .Privacy Protection for Medical Data Sharing in Smart Healthcare:ACM Transactions on Multimedia ,Computing Communications, and Applications
-
[10] .Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining:IEEE International Conference on Data Engineering (ICDE’21)
-
[11] .A Secure Revocable Fine-grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems:IEEE Internet of Things Journal
-
[12] .A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices:IEEE Transactions on Dependable and Secure Computing
-
[13] 方黎明,方黎明,李阳,恽昕宇,温震宇,纪守领,蒙威志,曹泽宏,Muhammad Tanveer..THP: A Novel authentication scheme to prevent multiple attacks in SDN-based IoT network:IEEE Internet of Things Journal,2019
-
[14] .Countermeasure Based on Smart Contracts and AI Against DoS/DDoS Attack in 5G Circumstances:IEEE Network
-
[15] 方黎明,Zhou, Lu,方黎明,Yin, Changchun,Zhou, Lu,陈黎阳,Su, Chunhua,Xia, Jinyue.A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough :Inf Sci,2020
-
[16] .A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection w:IEEE Transactions on Parallel and Distributed Systems
-
[17] .Public Key Encryption with Keyword Search Secure Against Keyword Guessing Attacks without Random Ora:Information Sciences
-
[18] .Secure Keyword Search and Data Sharing Mechanism for Cloud Computing:IEEE Transactions on Dependable and Secure Computing
-
[19] .Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM:ACM Transactions on Data Science
-
[20] .Secure Transmission of Compressed Sampling Data Using Edge Clouds:IEEE Transactions on Industrial Informatics