Name | Junfeng Xu (中文简历) | |
Title | Associate Researcher | |
Department | Department of Cybersecurity | |
junfeng@cuc.edu.cn | ||
Courses Taught | Reverse Engineering and Software Security, Mobile Internet Security | |
Research Interest or Teaching Expertise | Software security, risk assessment, mobile security, IoT security, multimedia security, data security, etc. | |
Self-Introduction | Junfeng Xu, associate researcher at the School of Computer and Cyberspace Security, received Ph.D. in computer science from Dalian University of Technology in 2011. From 2011 to 2021, he worked in China Information Security Evaluation Center and joined Communication University of China in 2021. Long-time practitioner and educator of front-line cyberspace security, his primary business is on cybersecurity attack and defense, penetration testing, risk assessment, etc.He provided internet security training and lectures for PetroChina, CNOOC, China UnionPay, Beijing Agricultural and Commercial Bank, the Institute of International Relations, and others. As a CISP instructor, his main courses include physical security, endpoint security, cloud security, and business continuity courses. In recent years, he has participated in more than ten national and provincial information security research projects, including general projects of the National Natural Science Foundation of China and national key research and development projects, etc.; he has published more than twenty articles in academic journals and presented at more than a dozen domestic and international conferences | |
Publication | 1.Gongyu, Zhou; Guangquan, Xu; Jianye, Hao; Shizhan, Chen; Junfeng, Xu; Xi, Zheng; Generalized Centered 2-D Principal Component Analysis, IEEE Transactions on Cybernetics, 2020, 1(1):1-12. 2.Junfeng Xu, Keqiu Li, Geyong Min, Reliable and Energy-Efficient Multi-path Communications in Underwater Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 7, pp. 1326-1335, July, 2012 3.Junfeng Xu, Keqiu Li, Geyong Min, Energy-efficient Tree-based Multi-path Power Control for Underwater Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, pp. 2107-2116, Nov., 2012. 4.Junfeng Xu, Keqiu Li, Geyong Min, Asymmetric Multi-path Division Communications in Underwater Acoustic Networks with Fading Channels. Journal of Computer and System Sciences, Volume 79, Issue 2, March 2013, Pages 269–278. 5.Junfeng Xu, Keqiu Li, Yanming Shen, Geyong Min, An energy-efficient packet aggregation scheme for wireless sensor networks, International Journal of Computer Systems Science & Engineering; 2010, pp: 43-53. Yanming Shen, Keqiu Li, Junfeng Xu, Lu Li; Layered video multicast with a P2P cooperation approach, Journal of Network and Computer Applications; Journal of Network and Computer Applications, Volume 34, Issue 4, July 2011, Pages 1108–1112. | |
Projects | Scientific research projects 1.Research on modeling method and decision control of Android software security protection based on dynamic hardening (No. 61672534), 2017 National Natural Science Foundation of China General Project (Director, 710,000) (Project: Modeling and decision controlling schemes for Android Software Security Protection Based on dynamic reinforcement) 2.Context-aware protocol-independent intrusion detection mechanisms for wireless sensor networks (No. U1736115), a joint project of the National Natural Science Foundation of China in 2017 (ranked second, 630,000) (Project English name: Context-aware protocol independent intrusion detection schemes for Wireless Sensor Networks) 3.Research on Key Data Leakage Protection and High Security Identification Technologies for Smart Mobile Terminals (Project No. 2018YFB0803600), a topic of the National Key Research and Development Program of China in 2018, in the Pilot Demonstration of Mobile Internet Data Protection Technologies (Project No. 2018 YFB0803602). (Host, 490,000) (Project: Key technologies of data leakage protection and high security authentication for intelligent mobile terminal) | |
Admission Requirements | Postgraduate students: 1. Bachelor's degree in computer science and technology, computing/applied mathematics and related majors are preferred. 2. Responsible and self-motivated, competent to withstand hardships and hard work, and have a sense of teamwork.
1. I am looking for highly motivated and enthusiastic students. The ideal candidate(s) should be a proactive team player with good communication skills, and be able to work towards deadline and targets. 2. A bachelor’s degree in computer science and technology, computational mathematics, applied mathematics, or a relevant subject area is preferred. |