个人信息

姓  名: 王化群 性  別: 导师类型: 博士生导师
技术职称: 教授 电子邮箱: whq@njupt.edu.cn
学术型博士招生学科: (083900)网络空间安全
学术型硕士招生学科: (083900)网络空间安全
专业型硕士招生类别(领域): (085404)计算机技术
photo

个人简介:

王化群,教授,硕导,博导。入选江苏省“333人才工程“第二层次、双创团队、江苏高校青蓝工程中青年学术带头人、“辽宁省百千万人才工程”百人层次、辽宁省优秀人才支持计划第一层次。江苏省大数据安全与智能处理重点实验室学术带头人(大数据安全与隐私保护方向),南京邮电大学1311科研创新团队负责人,南京邮电大学“鼎山学者”,“密码学及其应用 ”科研团队负责人,入选2021年中国高被引学者,荣获江苏省科学技术奖二等奖,IET Information Security最优论文奖。从2012年2月到2013年2月在西班牙罗维拉-威尔吉利大学(Universitat Rovira i Virgili)做博士后。中国保密协会隐私保护专委会委员、中国密码学会安全协议专委会委员、中国计算机学会区块链专委会委员。先后承担国家自然科学基金、省基金、各类人才项目等多项。





研究领域:

主要研究方向为应用密码学、云计算安全、区块链技术等。近年来,主持国家自然科学基金、省自然科学基金、省人才计划等各级项目20余项。在IEEE TDSC,IEEE TIFS,IEEE TSC,IEEE TPDS,IEEE TWC等国际期刊和会议上发表论文100余篇。

发表的部分论文清单见: http://dblp.uni-trier.de/pers/hd/w/Wang:Huaqun 

招生说明:具有良好的数学和外语基础,喜欢探索,有恒心,有毅力,做事主动。 代表性论文如下: 

[1]Huaqun Wang, Debiao He, Jia Yu, Zhiwei Wang, Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession, IEEE Transactions on Services Computing , Online, doi: 10.1109/TSC.2016.2633260 (CCF B)

[2]Huaqun Wang, Debiao He, Jinguang Han, VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud,IEEE Transactions on Services Computing,doi: 10.1109/TSC.2017.2687459 (CCF B)

[3]Huaqun Wang, Debiao He, Shaohua Tang, Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud, IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1165-1176. (CCF A)

[4]Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer: TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart GridsIEEE Transactions on Information Forensics and Security, 2015, 10(11): 2340-2351. (CCF A)

[5]Huaqun Wang, Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage, IEEE Transactions on Services Computing, 2015, 8(2): 328-340. (CCF B)

[6]Huaqun Wang, Yuqing Zhang, On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage, IEEE Transactions on Parallel and Distributed Systems, 2013, 25(1): 264-267. (CCF A)

[7]Huaqun Wang, Proxy Provable Data Possession in Public Clouds, IEEE Transactions on Services Computing, 2013, 6(4): 551-559. (CCF B)

[8]Huaqun Wang, Yuqing Zhang, On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks, IEEE Transactions on Dependable and Secure Computing, 2012, 9(3): 443-446. (CCF A)

[9]Huaqun Wang, Yuqing Zhang, Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme, IEEE Transactions on Wireless Communications, 2011, 10(1): 1-4. (CCF B)

[10]Huaqun Wang, Futai Zhang, Yanfei Sun, Cryptanalysis of a Generalized Ring Signature Scheme, IEEE Transactions on Dependable and Secure Computing, 2009, 6(2): 149-151. (CCF A)

[11]Debiao He, N. Kumar, Huaqun Wang, L. Wang, K. K. R. Choo, A. Vinel, A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network, IEEE Transactions on Dependable and Secure Computing , Online, doi: 10.1109/TDSC.2016.2596286 (CCF A)

[12]Linzhi Jiang, Chuxiang Xu, Xiaofang Wang,Bo Luo, Huaqun Wang, Privacy-Preserving Feature Extraction on Secure SIFT Based on Homomorphic Encryption, IEEE Transactions on Dependable and Secure Computing , Online, doi: 10.1109/TDSC.2017.2751476, (CCF A)

[13]Jia Yu, Huaqun Wang, Strong Key-Exposure Resilient Auditing for Secure Cloud Storage,IEEE Transactions on Information Forensics and Security, 12(8), 1931-1940, 2017. (CCF A)

[14]Anmin Fu, S. Yu, Yuqing Zhang, Huaqun Wang;C. Huang, NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users, IEEE Transactions on Big Data , doi: 10.1109/TBDATA.2017.2701347

[15]Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang, Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems, IEEE Transactions on Industrial Informatics, 14(3), 1232-1241,2018.

[16] Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Identity-based remote data possession checking in public clouds. IET Information Security, 2014, 8(2): 114-121. (2016 Premium Award for Best Paper) (CCF C)