研究方向

智能手机安全;

无线网络安全

荣誉奖励

秦中元,男,1974年1月生,博士,副教授,硕士生导师,网络与信息安全工程系副主任,江苏省科技评审专家。1996年7月于西安交通大学计算机科学与工程系计算机软件专业获工学学士学位,1999年4月于西安交通大学电信学院获计算机系统结构专业工学硕士学位,2003年12月于西安交通大学获信息与通信工程博士学位,2003年12月至今,在东南大学信息科学与工程学院信息安全研究中心任教,2008年4月任副教授。2009年12月至2010年12月获国家留学基金委资助到美国南加州大学进行了为期一年的访问学者交流,合作教授为多媒体专家C.-C Jay Kuo教授和国际云计算专家Kai Hwang(黄铠)教授。先后主持和参与完成国家自然科学基金,国家863高科技计划,信息产业部信息安全计划等多项国家科研项目,发表学术论文50余篇。主要研究领域为智能手机安全和无线网络安全。

学术成果

参编著作

1.云计算与分布式系统:从并行处理到物联网,黄铠等著,机械工业出版社,2013.1

2.信息安全,华中科技大学出版社, 2011.01

3.网络信息安全理论与技术,华中科技大学出版社,2007.11

4.C++ Builder应用程序开发实例与技巧,西安交通大学出版社,2005.9.

发表论文

2016

1QIN Zhongyuan, PAN Wanpeng, XU Ying, FENG Kerong, and YANG ZhongyunAn Efficient Scheme of Detecting Repackaged Android ApplicationsZTE COMMUNICATIONS201614(3)60-66

2、秦中元,王志远,吴伏宝, 吴颖真, 游雁天, 徐倩怡,基于多级签名匹配算法的Android恶意应用检测,计算机应用研究,201633(3)891-895

2015

1.Zhongyuan Qin, Xinshuai Zhang, Kerong Feng, Qunfang Zhang, and Jie Huang, An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks,International Journal of Distributed Sensor Networks, vol. 2015, doi:10.1155/2015/691498SCIEI

2014

1.Qin Z, Zhang X, Feng K, Zhang Q, Huang J. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter. Sensors. 2014; 14(10):17937-17951. SCIEI

2       Zhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu Xinshuai Zhang, Jie Huang, A Novel Identity-based Security Scheme for Wireless Sensor Networks, 10th International Conference on Computational Intelligence and SecurityKunming, Yunnan, ChinaNovember 15-16, 2014.EI

3.Zhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang, A Novel Key Pre-distribution Scheme in Wireless Sensor Networks10th International Conference on Computational Intelligence and SecurityKunming, Yunnan, ChinaNovember 15-16, 2014.EI

4.Yuying Wang, Zhongyuan Qin, Hengkang Wang, Jie HuangA Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks10th International Conference on Computational Intelligence and SecurityKunming, Yunnan, ChinaNovember 15-16, 2014.EI

5.Huang, C.-T.,Huang, L.http://jszy.seu.edu.cn/_ueditor/themes/default/images/spacer.gif,Qin, Z.,Yuan, H.,Zhou, L.,Varadharajan, V.,Kuo, C.-C.J.Survey on securing data storage in the cloudAPSIPA Transactions on Signal and Information Processing Volume 3, January 2014

2013

1.秦中元,徐毓青,梁彪,张群芳,黄杰, 一种Android平台恶意软件静态检测方法.东南大学学报:自然科学版,2013436):1162-1167EI

2.Zhongyuan Qin, Zhongyun Yang, Yuxing Di,Qunfang Zhang , Xinshuai Zhang, Zhiwei Zhang, Detecting Repackaged Android Applications, The 3rd International Conference on Computer Engineering and NetworkJuly 20-21, 2013,Shanghai, China.EI

3.Zhongyuan Qin , Xinshuai Zhang, Qunfang Zhang, Zhongyun Yang, An Efficient Method of Detecting Repackaged Android Applications. 5th International Conference on Multimedia Information Networking and Security (MINES 2013), November 1–3,  2013 in Beijing, China. EI

4.Zhongyuan Qin, Yuqing Xu, Yuxing Di, Qunfang Zhang, Jie Huang, Android Malware Detection Based On Permission And Behavior Analysis. 5th International Conference on Multimedia Information Networking and Security (MINES 2013), November 1–3, 2013 in Beijing, China. EI

5.Zhongyuan Qin, Yongxin Zheng, Yuying Wang, Jie Huang, RFID Tag Anti-collision Scheme Using Modular Arithmetic. International Conference on Computer Science and Information Technology (CSAIT 2013) September 21-23, 2013, Kunming, China. EI

6.Zhongyuan Qin, Yunyan Song, Qunfang Zhang, Jie Huang Cloud Storage Retrievability Based On Third Party AuditThe International Workshop on Cloud Computing and Information Security (CCIS 2013), Nov. 9th-11th, 2013, Shanghai, China.

7.Wan, C.S.http://jszy.seu.edu.cn/_ueditor/themes/default/images/spacer.gif,Zhang, J.,Zhou, L.,Qin, Z.YUsing the pairing function for distributed access control in cloud computingVolume 774-776, 2013, Pages 1745-17512013 International Forum on Mechanical and Material Engineering, IFMME 2013; Guangzhou; China; 13 June 2013--14 June 2013EI

2012

1.Kejun Xin, Gang Li, Zhongyuan Qin, Qunfang Zhang Malware Detection in Smartphone Using Hidden Markov ModelMINES 2012, 4th International Conference on Multimedia Information Networking and SecurityNanjing, ChinaNov. 2-4,2012. EI

2.秦中元,沈日胜,张群芳,狄予兴。虚拟机系统安全综述,计算机应用研究,2012.29(5):1618-1622

3.Zhongyuan Qin , Qunfang Zhang, Changsheng Wan, Yuxing DiState-of-the-art Virtualization Security in Cloud ComputingJournal of Information and Computational Science2012Vol.9(6):1487-1497 EI

2011

1.Zhongyuan Qin, Aiqun Hu, Qunfang Zhang, State-of-the-art Virtualization Security in Cloud Computing,CCICS 2011, The 8th China Conference of Information and Communication Security Hefei, China, June 25-26,2011.

2.Chun-Ting Huang, Zhongyuan Qin and C.-C. Jay Kuo , Multimedia Storage Security in Cloud Computing: An Overview, MMSP 2011, 13th international workshop on multimedia signal processingHangzhou, ChinaOct. 17-19,2011. EI

3.Zhongyuan Qin, Nannan Chen, Qunfang Zhang, Yuxing Di,Mobile Phone Viruses Detection Based on HMM,MINES 2011, 3th International Conference on Multimedia Information Networking and Security Shanghai, ChinaNov. 4-6,2011.EI




专利:

1.秦中元,杨中云,一种软件相似度快速计算方法,申请号:201310229122.3

2.秦中元胡爱群,基于多点触摸位置序列的智能终端用户认证方法,申请号:201310483113.7

3.秦中元胡爱群杨中云,基于多幅图像切换的智能手机用户认证方法,申请号:201310485761.6

4.秦中元,孙雄,胡爱群,一种安卓市场中重包装应用的检测方法,申请号201210204247.6

5.秦中元,胡爱群,黄杰,蒋儒,吴亚军。基于网络处理器的移动互联网数据负载分配方法,发明专利号:ZL 2008 1 0019062.1

6.黄杰,秦中元,黄秋岑。基于第3代移动通信网络监管的负载平衡方法,发明专利号:ZL200910032745.5

7.黄杰,秦中元,张晓晓,孙婷婷。基于FPGA3G数据包过滤系统及方法,发明专利号:ZL200910033143.1

8.黄杰,秦中元,孙婷婷,张晓晓。基于FPGA3G数据包重组系统及方法,申请号:200910033142.7

9.胡爱群,梁彪,秦中元,一种提高射频识别系统吞吐量的方法,发明专利号:ZL200510122602.5