Junfeng Xu

发布时间:2022-06-14作者:

Name

Junfeng Xu (中文简历                


Title

Associate Researcher 

Department 

Department of Cybersecurity

E-Mail 

junfeng@cuc.edu.cn

Courses Taught 

Reverse Engineering and Software Security, Mobile Internet Security


Research Interest or 

Teaching Expertise

Software security, risk assessment, mobile security, IoT security, multimedia security, data security, etc.



Self-Introduction 

Junfeng Xu, associate researcher at the School of Computer and Cyberspace Security, received Ph.D. in 

computer science from Dalian University of Technology in 2011. From 2011 to 2021, he worked in China 

Information Security Evaluation Center and joined Communication University of China in 2021.

Long-time practitioner and educator of front-line cyberspace security, his primary business is on 

cybersecurity attack and defense, penetration testing, risk assessment, etc.He provided internet security 

training and lectures for PetroChina, CNOOC, China UnionPay, Beijing Agricultural and Commercial Bank, the 

Institute of International Relations, and others. As a CISP instructor, his main courses include physical 

security, endpoint security, cloud security, and business continuity courses.

In recent years, he has participated in more than ten national and provincial information security research 

projects, including general projects of the National Natural Science Foundation of China and national key 

research and development projects, etc.; he has published more than twenty articles in academic journals 

and presented at more than a dozen domestic and international conferences



Publication

1.Gongyu, Zhou; Guangquan, Xu; Jianye, Hao; Shizhan, Chen; Junfeng, Xu; Xi, Zheng; Generalized Centered 

2-D Principal Component Analysis, IEEE Transactions on Cybernetics, 2020, 1(1):1-12.

2.Junfeng Xu, Keqiu Li, Geyong Min, Reliable and Energy-Efficient Multi-path Communications in Underwater

Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 7, pp. 1326-1335, 

July, 2012

3.Junfeng Xu, Keqiu Li, Geyong Min, Energy-efficient Tree-based Multi-path Power Control for Underwater 

Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, pp. 2107-2116, 

Nov., 2012.

4.Junfeng Xu, Keqiu Li, Geyong Min, Asymmetric Multi-path Division Communications in Underwater 

Acoustic Networks with Fading Channels. Journal of Computer and System Sciences, Volume 79, Issue 2, 

March 2013, Pages 269–278.

5.Junfeng Xu, Keqiu Li, Yanming Shen, Geyong Min, An energy-efficient packet aggregation scheme for 

wireless sensor networks, International Journal of Computer Systems Science & Engineering; 2010, 

pp: 43-53.

Yanming Shen, Keqiu Li, Junfeng Xu, Lu Li; Layered video multicast with a P2P cooperation approach, Journal 

of Network and Computer Applications; Journal of Network and Computer Applications, Volume 34, Issue 4,

July 2011, Pages 1108–1112.



Projects

Scientific research projects

1.Research on modeling method and decision control of Android software security protection based on 

dynamic hardening (No. 61672534), 2017 National Natural Science Foundation of China General Project 

(Director, 710,000)

(Project: Modeling and decision controlling schemes for Android Software Security Protection Based on 

dynamic reinforcement)

2.Context-aware protocol-independent intrusion detection mechanisms for wireless sensor networks 

(No. U1736115), a joint project of the National Natural Science Foundation of China in 2017 (ranked second,

630,000)

(Project English name: Context-aware protocol independent intrusion detection schemes for Wireless Sensor

Networks)

3.Research on Key Data Leakage Protection and High Security Identification Technologies for Smart Mobile 

Terminals (Project No. 2018YFB0803600), a topic of the National Key Research and Development Program of

China in 2018, in the Pilot Demonstration of Mobile Internet Data Protection Technologies (Project No. 2018

YFB0803602). (Host, 490,000)

(Project: Key technologies of data leakage protection and high security authentication for intelligent mobile terminal)


Admission Requirements

Postgraduate students:

1. Bachelor's degree in computer science and technology, computing/applied mathematics and related 

majors are preferred.

2. Responsible and self-motivated, competent to withstand hardships and hard work, and have a sense of 

teamwork.

  

1. I am looking for highly motivated and enthusiastic students. The ideal candidate(s) should be a proactive

team player with good communication skills, and be able to work towards deadline and targets.

2. A bachelor’s degree in computer science and technology, computational mathematics, applied 

mathematics, or a relevant subject area is preferred.




返回原图
/