電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院導(dǎo)師介紹:張小松

發(fā)布時(shí)間:2019-07-29 編輯:考研派小莉 推薦訪問:
電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院導(dǎo)師介紹:張小松

電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院導(dǎo)師介紹:張小松內(nèi)容如下,更多考研資訊請(qǐng)關(guān)注我們網(wǎng)站的更新!敬請(qǐng)收藏本站,或下載我們的考研派APP和考研派微信公眾號(hào)(里面有非常多的免費(fèi)考研資源可以領(lǐng)取,有各種考研問題,也可直接加我們網(wǎng)站上的研究生學(xué)姐微信,全程免費(fèi)答疑,助各位考研一臂之力,爭(zhēng)取早日考上理想中的研究生院校。)

電子科技大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院導(dǎo)師介紹:張小松 正文

 
  ?個(gè)人簡(jiǎn)介
  張小松,教授

  ?聯(lián)系方式
  電話:028-61830061
  郵箱:johnsonzxs@uestc.edu.cn

  ?教育背景
  1968年6月出生,四川雙流人,教授、博導(dǎo)。本科畢業(yè)于上海交通大學(xué),碩士、博士畢業(yè)于電子科大學(xué)。
  *教育部長(zhǎng)江學(xué)者特聘教授;
  *第十一批四川省學(xué)術(shù)技術(shù)帶頭人;
  *國(guó)家科學(xué)技術(shù)獎(jiǎng)勵(lì)評(píng)審專家;
  *保密通信國(guó)防重點(diǎn)實(shí)驗(yàn)室客座專家;
  *國(guó)家信息技術(shù)安全研究中心-電子科技大學(xué)網(wǎng)絡(luò)安全技術(shù)實(shí)驗(yàn)室主任;
  *電子科技大學(xué)大數(shù)據(jù)研究中心副主任兼安全大數(shù)據(jù)研究所所長(zhǎng)。

  ?科研方向
  長(zhǎng)期致力于網(wǎng)絡(luò)與信息安全、計(jì)算機(jī)應(yīng)用技術(shù)的研究和人才培養(yǎng),重點(diǎn)圍繞網(wǎng)絡(luò)空間安全中,IT基礎(chǔ)架構(gòu)、大數(shù)據(jù)安全及應(yīng)用、嵌入式平臺(tái)安全、網(wǎng)絡(luò)攻擊檢測(cè)與軟件脆弱性等關(guān)鍵領(lǐng)域和支撐技術(shù)開展創(chuàng)新研究和技術(shù)攻關(guān),近來主要興趣和方向包括:
  1、軟件安全性分析;
  2、大數(shù)據(jù)環(huán)境下的網(wǎng)絡(luò)信息安全;
  3、自主可控的安全虛擬化基礎(chǔ)架構(gòu)關(guān)鍵技術(shù)及產(chǎn)業(yè)推廣應(yīng)用;
  4、可信安全嵌入式系統(tǒng);
  5、復(fù)雜電磁環(huán)境多目標(biāo)優(yōu)化(智能航路規(guī)劃,信號(hào)最優(yōu)化覆蓋)

  ?研究項(xiàng)目
  自2006年建立網(wǎng)絡(luò)技術(shù)實(shí)驗(yàn)室起,領(lǐng)導(dǎo)團(tuán)隊(duì)圍繞網(wǎng)絡(luò)空間安全的國(guó)家戰(zhàn)略及科學(xué)問題,系統(tǒng)開展方法、理論研究以及關(guān)鍵技術(shù)攻關(guān),截至2014年底,主持承擔(dān)包括軍973課題、863重點(diǎn)課題、國(guó)防預(yù)研課題、型號(hào)課題、省部科技支撐課題、企業(yè)橫向合作課題50多項(xiàng),主持研制的網(wǎng)絡(luò)和信息化平臺(tái)在應(yīng)用中取得重要的社會(huì)和經(jīng)濟(jì)效益,近年來分別獲得:
  2012年度中華人民共和國(guó)科學(xué)技術(shù)進(jìn)步二等獎(jiǎng)(第1完成人)
  2013年度四川省科技進(jìn)步一等獎(jiǎng)(第2完成人)
  2010年度四川省科技進(jìn)步一等獎(jiǎng)(第1完成人)
  2008年度四川省科技進(jìn)步二等獎(jiǎng)(第1完成人)
  2013電力行業(yè)信息化優(yōu)秀成果一等獎(jiǎng)(第3完成人)

  ?論文列表
  截至2015年,在研究領(lǐng)域重要學(xué)術(shù)期刊上發(fā)表SCI、EI收錄論文36篇(SCI收錄13篇,其中ISI JCR一區(qū)論文6篇),獲授權(quán)發(fā)明專利8項(xiàng),受理及公開26項(xiàng),獲計(jì)算機(jī)軟件著作權(quán)登記10項(xiàng)。主要論文如下:
  [1] Yong Yu,Jianbing Ni,Qi Xia,Xiaofen Wang, Haomiao Yang, Xiaosong Zhang.SDIVIP2: Shared Data Integrity Verification with Identity Privacy Preserving in Mobile Clouds.Concurrency and Computation: Practice and Experience(Accepted):
  [2] Ting Chen, Xiao-song Zhang, Xiao-li Ji, Cong Zhu, Yue Wu. Test Generation for Embedded Executables via Concolic Execution in Real Environment. IEEE Transactions on Reliability, 2014. (SCI,IF 2.293, Accepted)
  [3] Ting Chen, Xiao-song Zhang, Cong Zhu, Xiao-li Ji, Shi-ze Guo, Yue Wu. Design and Implementation of a Dynamic Symbolic Execution Tool for Windows Executables. Journal of Software: Evolution and Process. 2013, 25:1249-1272. (SCI,IF 1.273, CCF推薦B類刊物)
  [4] Ting Chen, Xiao-song Zhang, Shi-ze Guo, Hong-yuan Li, Yue Wu. State of the art: Dynamic symbolic execution for automated test generation. Future Generation Computer Systems, 2013, 29(7): 1758-1773. (SCI,IF 1.864)
  [5] Ting Chen, Xiao-song Zhang, Yue Wu. FPM: Four-factors Propagation Model for Passive P2P Worms. Future Generation Computer Systems, 2014,36(7): 133-141(SCI,IF 1.864)
  [6] Ting Chen, Xiao-song Zhang*, Hong-yuan Li, Dong Wang, Yue Wu. Propagation Modeling of Active P2P Worms Based on Ternary Matrix. Journal of Network and Computer Applications, 2013, 36(5):1387-1394. (SCI,IF1.467)
  [7] Ting Chen, Xiao-song Zhang, Hua Li, Xiong-da Li, Yue Wu. Fast Quarantining of Proactive Worms in Unstructured P2P Networks. Journal of Network and Computer Applications, 2011, 34:1648-1659. (SCI,IF1.467)
  [8] Ying SUN,Yong Yu,Xiaosong Zhang*,Jiwen CHAI.On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model.IEICE TRANS.FUNDAMENTALS,VOL.E96-A,NO.3 MARCH 2013:721-723(SCI,EI檢索)
  [9] Ting CHEN,Xiao-song ZHANG,XU XIAO,YUE WU,Chun-xiang XU.SEVE: Symbolic Execution based Vulnerability Exploring System[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2013,32(2):620-637(SCI:03321641311297016,IF0.373,EI:20131216126668)
  [10]  Zhi LIU, Xiao-song ZHANG, Yue, WU, Ting CHEN.An Effecitve Taint-based Software Vulnerability Miner.[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2013,32(2):467-484 (SCI:03321641311296873,IF0.373,EI:20131216126677)
  [11]  Xiao-song ZHANG, Ting CHEN, Chun-xiang XU, Xiao-hui PAN.Proactive P2P Worm Containment via Automatic Authentication.[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2013,32(2): 1163-1170(SCI:03321641311297106,IF0.373,EI:20131216126671)
  [12]  Zhang Xiaosong, Chen Ting, Chen Dapeng, Liu Zhi. SISG: self-immune automated signature generation for polymorphic worms[J]. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering,2010,29(2): 445 - 467 (SCI:592IH, EI:20101312803311,IF 0.373)
  [13]  Zhang Xiaosong,Chen Ting,Zheng Jiong,Li Hua.Proactive worm propagation modeling and analysis in unstructured peer-to-peer Networks[J]. Journal of Zhejinang University-SCIENCE C,2010,11(2):119-129 (SCI:568QQ,EI:20101912914212,IF 0.373)
  [14]  Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao. Designated verifier proxy signature scheme without random oracles[J]. Computers and Mathematics with Applications, May.2009 ,57 (4): 1352-1364(SCI, EI )
  [15]  Xiaoli Ji, Xiaosong Zhang, Ting Chen, Xiaoshan Li and Lei Jiang. Loop Transparency for Scalable Dynamic Symbolic Execution [J]. Advances in Engineering Design and Optimization Ⅲ, 2012, Applied Mechanics and Materials Vols.201-202,Part 1: 242-245
  [16]  Weiwei Wang,Xiaosong ZHANG,Ting Chen,Xueyang Wu,Xiaoshan Li.The Cloud Computing Based Software Testing Framework Design and Implementation[J]. Advances in Computer, Communication, Control and Automation, 2011, LNEE(121): 785-790 (EI: 20114814569195)
  [17]  Xiaowei Yan,Xiaosong ZHANG,Ting Chen,Hongtian Zhao,Xiaoshan Li. The research and design of cloud computing security framework[J]. Advances in Computer, Communication, Control and Automation, 2011, LNEE(121): 757-763 (EI: 20114814569191)
  [18]  Xiao-song ZHANG,Jiong Zheng,Hua Li.A Novel Approach for Host General Risk Assessment Based on Logical Recursion[J]. Electronics and Signal Processing, 2011, LNEE(1): 469-475 (EI: 20113214223771)
  [19]  Zhang, Xiao-Song, Chen, Ting, Wang, Xiao-Lin, Huang, Yong, Bao, Hou-Bin. CRBA: A capacity restricted model evolved from BA model for complex network.[J]. Journal of Networks,2011,6(8): 1163-1170 (EI: 20113314243427)
  [20]  Zhi Liu, Xiaosong Zhang,Xiongda Li.Proactive Vulnerability Finding via Information Flow Tracking[C]. Nanjing, Jiangsu, China:MINES 2010:481-485(EI:20110413613499)
  [21]  Xiao-song Zhang, Jiong Zheng, Ji-wei Zou. A Simplified Model for Attack Paths Contruction in Multiple Hosts[C]. Harbin, China:PCSPA-2010:301-304(EI:20105213521161)
  [22]  Xu Xiao, Xiao-song Zhang,Xiong-da Li. New Approach to Path Explosion Problem of Symbolic Execution [C]. Harbin, China:PCSPA-2010:1310-1313(EI:20105213521014)
  [23]  Jiong Zheng,Xiao-song Zhang,Xiao-hui Pan. A Host Deployed Vulnerability Assessment System Based On OVAL[C]. Taiyuan,China: ICCASM 2010:V2-123-126(EI:20104913451889)
  [24]  Zhang Xiaosong, Chen Ting, Chen Ruidong,Li Hua.Complex Network Modeling with Constant Capacity Restriction Based on BA Model[C]. Wuhan, China:CNMT 2009:315-318(EI:20101212778932)
  [25]  Li Hua, Qin Zheng,Pan Xiaohui,Zhang Xiaosong.Propagation Model of Non-scanning Active Worm in Unstructured P2P Network. Wuhan,China:MINES 2009:378-381(EI:20101012757931)
  [26]  Zhang Xiaosong,Liu Fei,Chen Ting,Li Hua. Research and Application of the Transparent Data Encryption in Intranet Data Leakage Prevention. BeiJing,China:CIS'2009:376-379(EI:20101112768893)
  [27]      Zhang Xiaosong,Chen Ting, MaYue,LiHua.Peer-to-Peer Based Intrusion Detection Modelling and Analysis. Beijing, China:ICFIN 2009:213-217(EI:20095212570233)
  [28]  Zhang Xiaosong,Pan Xiaohui,Long Xiaoshu. Analysis of Virtual Machine applied to Malware Detection System[C]. Wuhan, China: IEEC'2009:290-294(EI:20094712465399)
  [29]  Liu Zhi, Xiaosong Zhang. A Novel Approach to Malicious Executables Detection and Containment Based on Distributed System Architecture[C]. Jinan, China:ICNC'2008:160-164 (EI:20085211803927)(ISTP:BJB64)
  [30]  Zhang Xiaosong, Chen Ting,Wang Ding. A Novel Model for Critical Services Consolidation based on FVM. [C]. Wuhan, China: EBISS'2009:77-81(EI:20094212376970) (EI:20094212376970)(ISTP:BLZ43)
  [31]  Da-Peng Chen, Xiao-song Zhang. Internet Anomaly Detection with Weighted Fuzzy Matching over Frequent Episode Rules[C]. Chengdu,China:ICACIA 2008:299-302(EI:20092412118490)(ISTP:BJX45)
  [32]  Xiao-song Zhang,Lin Shao, Jiong Zheng. A novel method of software vulnerability detection based on fuzzing technique[C]. Chengdu,China:ICACIA 2008:270-273(EI:20092412118483)(ISTP:BJX45)
  [33]  Xiao-song Zhang, Liu Zhi,Da-Peng Chen. A practical taint-based malware detection[C]. Chengdu,China:ICACIA 2008:73-77(EI:20092412118436)(ISTP:BJX45)
  [34]      Ting Chen, Zhang Xiaosong,Liu Zhi. A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes[C]. Wuhan, China: EBISS'2009:45-49(EI:20094212376957)(ISTP:BLZ43)
  [35]      Xiaohui Pan,Zhang Xiaosong, Ting Chen. A Novel Hybrid Method for Polymorphic Worm Detection[C]. Wuhan, China: EBISS'2009:50-54(EI:20094212376968)(ISTP:BLZ43)
  [36]  Xiao-song Zhang,Lei Huang,Chun-xiang Xu,Ting Chen.A Novel Method for Host Risk Assessment Based on Predecessor Attack[C]. Changsha, China:ICSIP 2010:495-498(EI:20114214443499)
  [37]  Zhang Xiaosong,Chen Ting,Zheng Jiong,Li Hua.Active Worm Propagation Modeling in Unstructured P2P Networks[C]. Huangshan, China: ISCSCT’09:35-38(EI: 20101912914212)
  [38]  劉智,張小松.一種基于污點(diǎn)分析的文件型軟件漏洞發(fā)現(xiàn)方法.小型微型計(jì)算機(jī)系統(tǒng),2012,33(1): 42-48
  [39]  劉智,張小松, 吳躍. 一種有效的Return-Oriented-Programming攻擊檢測(cè)方法.小型微型計(jì)算機(jī)系統(tǒng),2013,34(7):

  ?教學(xué)工作
  (1)從教以來,先后為計(jì)算機(jī)應(yīng)用技術(shù)和信息安全專業(yè)本科生講授基礎(chǔ)核心課程《微機(jī)原理與接口技術(shù)》、《數(shù)字邏輯設(shè)計(jì)》、《信息安全概論》和《網(wǎng)絡(luò)安全協(xié)議》,開設(shè)本科公選課程《網(wǎng)絡(luò)安全與信息對(duì)抗》;
  (2) 主編普通高等學(xué)校信息安全“十一五”規(guī)劃教材《網(wǎng)絡(luò)安全協(xié)議》,參編普通高等教育“十一五”國(guó)家級(jí)規(guī)劃教材《計(jì)算機(jī)組成原理與匯編語言程序設(shè)計(jì)(第二 版)》,主持翻譯《軟件測(cè)試(第二版)》、《計(jì)算機(jī)安全學(xué)(第二版)》譯著教材;
  (3) 作為負(fù)責(zé)人參與2007四川省精品課程《信息安全概論》建設(shè)(排名第三);
  (4) 2007年創(chuàng)立本科“凝聚網(wǎng)絡(luò)安全技術(shù)工作室”,指導(dǎo)學(xué)生參加2008、2010、2013全國(guó)大學(xué)生信息安全競(jìng)賽,獲二等獎(jiǎng)、三等獎(jiǎng)多項(xiàng)。
以上老師的信息來源于學(xué)校網(wǎng)站,如有更新或錯(cuò)誤,請(qǐng)聯(lián)系我們進(jìn)行更新或刪除,聯(lián)系方式

添加電子科技大學(xué)學(xué)姐微信,或微信搜索公眾號(hào)“考研派小站”,關(guān)注[考研派小站]微信公眾號(hào),在考研派小站微信號(hào)輸入[電子科技大學(xué)考研分?jǐn)?shù)線、電子科技大學(xué)報(bào)錄比、電子科技大學(xué)考研群、電子科技大學(xué)學(xué)姐微信、電子科技大學(xué)考研真題、電子科技大學(xué)專業(yè)目錄、電子科技大學(xué)排名、電子科技大學(xué)保研、電子科技大學(xué)公眾號(hào)、電子科技大學(xué)研究生招生)]即可在手機(jī)上查看相對(duì)應(yīng)電子科技大學(xué)考研信息或資源。

電子科技大學(xué)考研公眾號(hào) 考研派小站公眾號(hào)
電子科技大學(xué)

本文來源:http://m.zhongzhouzhikong.com/dianzikejidaxue/daoshi_211607.html

推薦閱讀