学习、批判、守正、创新

Lei Sun, Xumei Li, Haipeng Qu, Xiaoshuai Zhang. AFLTurbo: Speed up Path Discovery for Greybox Fuzzing. 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE 2020)(Accepted)

Xiaoyun Zhou, Ruobing Jiang*, Miaoqing Tian, Haipeng Qu, He Zhang. Temperature-sensitive ingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source Identification. 2020, ACM Turing Celebration Conference - China (ACM TURC 2020)(Accepted)

Zhang J, Lu Q, et al. PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range[C]//International Conference on Security and Privacy in Communication Systems. (Accepted)

Lu Q, Jiang R, Ouyang Y, et al. BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks[J]. Computers & Security, 2020, 88: 101618.

Lin X J, Wang Q, Sun L, et al. Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks[J]. The Computer Journal, 2020.

Lu Q, Qu H, Ouyang Y, et al. SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames[J]. Security and Communication Networks, 2019, 2019.

M. Tian, R. Jiang, C. Xing, H. Qu, Q. Lu and X. Zhou, "Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection," 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), London, United Kingdom, 2019, pp. 1-8, doi: 10.1109/IPCCC47392.2019.8958766.

Xi-Jun Lin, Lin Sun, Haipeng Qu and He-Qun Xian. Cryptanalysis of A Compact Anonymous HIBE with Constant Size Private Keys. The Computer Journal. (CCF-B)

Xi-Jun Lin, Lin Sun, Haipeng Qu and Dongxiao Liu. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. The Computer Journal. (CCF-B)

Haipeng Q , Zhen Y , Xi-Jun L , et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462:76-92.(SCI一区、CCF-B)

Xi-Jun Lin, Lin Sun and Haipeng Qu. Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Information Sciences.2018. (SCI一区、CCF-B)

Lu Q, Qu H*, Zhuang Y, et al. Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames[J]. IEICE Transactions on Information and Systems, 2018, 101(10): 2465-2473.

Xi-Jun Lin, Lin Sun, Haipeng Qu and Dongxiao Liu.Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme. The Computer Journal.2018,61(4). (CCF-B)

张琦,李嘉伟,林喜军,曲海鹏*. 支持灵活授权的基于身份的加密相等性测试方案[J]. 计算机工程,2018.

张琦, 林喜军, 曲海鹏*. 云计算中支持授权相等测试的基于身份加密方案[J]. 信息网络安全, 2018(6).

Lu Q, Qu H, Zhuang Y, et al. A passive client-based approach to detect evil twin attacks [C]//2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017: 233-239.

Yang H, Lin X, Haipeng Q U. Improved Top-k Query Algorithm in Distributed Networks[J]. Computer Engineering, 2017.

Xi-Jun Lin, Lin Sun and Haipeng Qu. An Efficient RSA-based Certificateless Public Key Encryption Scheme. Discrete Applied Mathematics.2017,241(51).pp.39-47.

杨浩, 林喜军, 曲海鹏*. 分布式网络下改进的Top-k查询算法[J]. 计算机工程, 2017(02):85-90.

Xi-Jun Lin, Lin Sun, Haipeng Qu and Xiaoshuai Zhang. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme. The Computer Journal. 2016,60(4). (CCF-B)

王宁, 曲海鹏*, 范令. 一种分布式环境下高效查询算法[J]. 中国海洋大学学报(自然科学版), 2016, 46(2):138-145.

李嘉伟, 杨知举, 林喜军, 曲海鹏*. 基于软件定义网络的网络故障诊断方法研究[J]. 网络与信息安全学报, 2016(12).

Xi-Jun Lin, Lin Sun and Haipeng Qu. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications. Computers & Security. 2015,48(9).pp.142-149. (CCF-B)

石沙沙, 孙文红, 江明建, 曲海鹏*. 基于分布式数据聚合的智能电网隐私保护协议研究[J]. 信息网络安全, 2015, 26(12):59-65.

滕希龙, 曲海鹏. 基于区间值直觉模糊集相似性的信息安全风险评估方法研究[J]. 信息网络安全, 2015(5):62-68.

曲海鹏,敖赢戈,晏敏,于爱民,赵保华. 基于上下文的Android移动终端可信运行控制系统的设计与实现. 北京交通大学学报, 2013,10.

Xi-Jun Lin, Lin Sun and Haipeng Qu. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications. Computers & Security. (Accpeted, DOI: 10.1016/j.cose.2014.08.002)

Xi-Jun Lin,Ran Ren,Zhengang Wei and Lin Sun. Comment on "Identity-based non-interactive key distribution with forward security". Designs, Codes and Cryptography, 2013.(Accepted, Published online:DOI 10.1007/s10623-013-9886-4, SCI)

Haipeng Qu, Lili Wen,Yanfe iXu, Ning Wang. LCCWS: Light weight Copyfree Cross-layer web Server. Journal of Networks,Vol.8,No.1,January 2013,165-173.

Zhaoyong Sheng, Haipeng Qu, ChaoWang, Xiaomei Zhou. Research On Security Issues and Solutions of IEC 61850 Communication Protocol Architecture. Journal of Theoretical and Applied Information Technology,Vol.50,No.2,20th April 2013,366-372.

Qu H , Hou G , Guo Y , et al. Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2013, 2013:1-11.(SCI)

Zue Xu, Haipeng Qu. Design and Implementation of Testing and Management System on Special Information Security Products. Advanced Engineering and Materials, 2013, 711-716.

Zhandong Rong, BoYang, Haipeng Qu. The Design and Implementation of the Simulation Information System of Marine oil spill.Applied Mechanics and Materials,2013, 652-657.

Junqing Liang, Xi-Jun Lin and Feng Liu, CLPKE Against A Variation of Key Replacement Attack without Bilinear Pairing, Journal of Convergence Information Technology, 7(3), pp:137-142, 2012.(EI)

Haipeng Qu, Lina Chang, Lei Ma, Yanfei Xu, Guangwei Yang. DPEES: DDoS Protection Effectiveness Evaluation System.Recent Progress in DEIT,Vol. 2,2012,155~161.

Luan Xu, HongyuWei, Zhengbao Li, Haipeng Qu. PAR: Prioritized DTN Routing Protocol Based on Age Rumors. Recent Progress in Data Engineering and Internet Technology. Volume 2,2012,425-431.

魏红宇,曲海鹏,刘培顺,徐峦,盛兆勇.海洋环境云计算安全防护支撑体系的研究与构建. 中国海洋大学学报,第41卷增刊,2011年5月,429-432.

Feng Liu, Chuan-Kun Wu and Xi-Jun Lin, Some Extensions on Threshold Visual Cryptography Schemes, The Computer Journal, 53 (1). pp:107-119, 2010.(SCI)

Feng Liu, Chuan-Kun Wu and Xi-Jun Lin, A new definition of the contrast of visual cryptography scheme, Inf. Process. Lett, 110(7). pp:241-246, 2010.(SCI)

Feng Liu, Chuan-Kun Wu and Xi-Jun Lin, Step construction of visual cryptography schemes, IEEE Trans. on Information Forensics and Security,5(1), pp:27-38, 2010.(SCI)

李正宝,郭忠文,曲海鹏,洪锋,洪璐.E2DTS:水下传感器网络能量高效的分布式时间同步算法.通信学报, 31(9A), 2010,22-29.

林喜军,孙琳,武传坤,基于双线性映射的多对一加密认证方案,计算机研究与发展,2,pp:235-238,2009.(EI)

Zhengbo Li, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng Yang. UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network. Proceedings of Mass 2009, 918-923.

Zhang Wei, Pang Renbo, Pang Yanwei, Qu Haipeng. Self adaptive mail filtering POP3 proxy based on users' feedback, Journal of Tianjin University, 2009

Xi-Jun Lin,Chuan-Kun Wu and Feng Liu,Many-to-one Encryption and Authentication Scheme and Its Application,Journal of Commun.and Networks,10(1),pp:18-21,2008.(SCI)

Xi-Jun Lin,Chuan-Kun Wu and Feng Liu,Analysis of An Authenticated Identity-Based Multicast Scheme,IET Communication,2(7),pp:935-937,2008. (SCI)

冯庆云,曲海鹏,周英,郭忠文. 基于数据包标记的伪造IP DDoS攻击防御. 计算机工程,2008,34(19).

周英,曲海鹏,冯庆云,郭忠文. 信息安全风险评估中权重优化方法研究. 信息安全与通信保密,2008.2.

陈恺,冯登国,曲海鹏,张颖君. 高速以太网即时监控可定制内存访问模型. Proceedings of NetSec 2007.

曲海鹏,冯登国,苏璞睿. 基于有序标记的IP包追踪方案.电子学报,2006,1.

Haipeng Qu, Purui Su, Dengguo Feng. 基于TTL 信道的IP包标记追踪方案,proceedings of CNCC 2005.

曲海鹏,李德全,苏璞睿,冯登国. 一种分块标记的IP包追踪方案,计算机研究与发展,2005,12.

CVE-2017-8380;CVE-2017-9503;CVE-2017-8112;CVE-2018-5122;CVE-2018-11211;CVE-2018-5122;CVE-2019-19887;CVE-2019-19888;CVE-2019-19930;CVE-2019-19931;CVE-2019-19944;CVE-2019-19957;CVE-2019-19958;CVE-2019-20056;CVE-2019-20205;CVE-2020-6617;CVE-2020-6618;CVE-2020-6619;CVE-2020-6620;CVE-2020-6621;CVE-2020-6622;CVE-2020-6623;CVE-2020-6838;CVE-2020-6840;CVE-2020-7054;CVE-2020-12825;CVE-2020-15395;CVE-2020-15469
2014.04主办“青岛移动4G杯”第二届青岛高校网络攻防竞赛暨国内高校邀请赛
2014.10参加第五届XDCTF决赛,第四名。(张晓帅,赵汉青)
2014.11参加XCTF联赛HCTF总决赛,获三等奖。(樊荣,王伟,赵硕,黄佳)
2014.11参加第三届山东省大学生信息安全知识大赛,获团体第一,个人第一、第四、第五(张晓帅,赵汉青,庄园)
2015.11参加EICS⁺ 工控系统信息安全攻防竞赛,获优秀奖
2016.08参加全国大学生信息安全竞赛决赛,获第五名(张晓帅,赵汉青,张焱宇,孙磊,申一鸣,邢禹)
2016.09参加北控水务杯全国第二届工控系统信息安全攻防竞赛,获第三名(刘重庆,朱延勇,张焱宇)
2016.09参加山东省物联网创新应用大赛-信息安全攻防大赛,获一等奖(孙磊、邢禹、申一鸣)
2016.11参加“浪潮杯”第五届山东省大学生网络安全技能大赛,获个人第一名、团体二等奖。(申一鸣等)
2016.12参加全国网安高校联赛(X-NUCA)决赛,获三等奖(张焱宇,孙磊,申一鸣,邢禹,苏赫,房建)
2017.05参加2017国际安全极客大赛极棒(GeekPwn)年中赛,获100000奖金,排名2(孙磊,赵汉青)
2017.06参加腾讯信息安全争霸赛,获团体第7名,入选腾讯安全“百人计划”( 邢禹、张焱宇、孙磊、申一鸣)
2017.08参加中国互联网安全领袖峰会并做议题分享(张焱宇)
2017.08参加IEEE Trustcom 2017
2017.09参加首届国际机器人网络安全大赛,获优胜奖(Mech-Whale:庄园、王高洲、殷正峰、沈然等)
2017.11参加全国高校网络信息安全管理运维挑战赛,全国高校第7名,获三等奖(申一鸣、杨海峰、施睿)
2017.11参加“中孚信息杯”第六届山东省大学生网络安全技能大赛决赛,获个人第一名、团体一等奖(申一鸣等)
2017.12参加“恒泰实达杯”全国第三届工控系统信息安全攻防竞赛,获优秀奖
2017.12参加2017中国智能汽车大赛(CIVC),获信息安全组优秀奖(韩忠寿等)
2018年 加入360 IoT安全人才培养计划
2018.05参加Tencent CTF决赛
2018.07主办QCTF个人赛暨XMan入营赛()
2018.07参加第十一届全国大学生信息安全竞赛创新实践能力赛总决赛,获二等奖()
2018.08参加2018(第五届)中国网络安全技术对抗赛,获人工智能安全夺旗赛第三名、智能安全破解挑战赛优胜奖(Mech-Whale战队,孙磊)
2018.09参加2018年“黄鹤杯”RHG机器人网络安全大赛,获季军,奖金5万元(Mech-Whale战队:殷正峰、孙磊、刘凯、张润雨)
2018.102018 GeekPwn国际安全极客大赛“最佳技术奖”(张焱宇)
2018.11参加“科来杯”第七届山东省大学生网络安全技能大赛决赛,获获个人第一名、团体一等奖(申一鸣等)
2018.12参加360举办的 48小时黑客马拉松IoT破解大奖赛,获冠军,奖金58000元(孙磊、房建、吕文杰、张政)
2018.12参加2018 Black Hat Europe(庄园)
2019.05参加第三届世界智能驾驶挑战赛信息安全挑战赛,获优秀奖(邢超群,张晓华,张家辉,周晓云)
2019.07获2019年山东省大学生优秀科技社团称号(Blue-Whale信息安全研究团队)
2019.07参加BCTF百度人工智能安全对抗赛,获三等奖(Mech-Whale)
2019.07参加2019 WCTF世界黑客大师赛新锐赛,获季军,奖金2万元。(孙磊、申一鸣、房建等)
2019.08参加第七届互联网安全大会,获年度“靠谱黑客奖”、“靠谱团队奖”、“守正育人奖”(孙磊等)
2019.10参加IPCCC 2019.
2020.06参加BCTF,首轮排名1