参编著作
1.云计算与分布式系统:从并行处理到物联网,黄铠等著,机械工业出版社,2013.1
2.信息安全,华中科技大学出版社, 2011.01
3.网络信息安全理论与技术,华中科技大学出版社,2007.11。
4.C++ Builder应用程序开发实例与技巧,西安交通大学出版社,2005.9.
发表论文
2016:
1、QIN Zhongyuan, PAN Wanpeng, XU Ying, FENG Kerong, and YANG Zhongyun,An Efficient Scheme of Detecting Repackaged Android Applications,ZTE COMMUNICATIONS,2016,14(3),60-66。
2、秦中元,王志远,吴伏宝, 吴颖真, 游雁天, 徐倩怡,基于多级签名匹配算法的Android恶意应用检测,计算机应用研究,2016,33(3),891-895。
2015:
1.Zhongyuan Qin, Xinshuai Zhang, Kerong Feng, Qunfang Zhang, and Jie Huang, An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks,International Journal of Distributed Sensor Networks, vol. 2015, doi:10.1155/2015/691498,SCI,EI
2014:
1.Qin Z, Zhang X, Feng K, Zhang Q, Huang J. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter. Sensors. 2014; 14(10):17937-17951. SCI,EI
2、 Zhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu, Xinshuai Zhang, Jie Huang, A Novel Identity-based Security Scheme for Wireless Sensor Networks, 10th International Conference on Computational Intelligence and Security,Kunming, Yunnan, China,November 15-16, 2014.EI
3.Zhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang, A Novel Key Pre-distribution Scheme in Wireless Sensor Networks,10th International Conference on Computational Intelligence and Security,Kunming, Yunnan, China,November 15-16, 2014.EI
4.Yuying Wang, Zhongyuan Qin, Hengkang Wang, Jie Huang,A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks,10th International Conference on Computational Intelligence and Security,Kunming, Yunnan, China,November 15-16, 2014.EI
5.Huang, C.-T.,Huang, L.,Qin, Z.,Yuan, H.,Zhou, L.,Varadharajan, V.,Kuo, C.-C.J.,Survey on securing data storage in the cloud,APSIPA Transactions on Signal and Information Processing Volume 3, January 2014
2013:
1.秦中元,徐毓青,梁彪,张群芳,黄杰, 一种Android平台恶意软件静态检测方法.东南大学学报:自然科学版,2013,43(6):1162-1167。EI
2.Zhongyuan Qin, Zhongyun Yang, Yuxing Di,Qunfang Zhang , Xinshuai Zhang, Zhiwei Zhang, Detecting Repackaged Android Applications, The 3rd International Conference on Computer Engineering and Network,July 20-21, 2013,Shanghai, China.EI
3.Zhongyuan Qin , Xinshuai Zhang, Qunfang Zhang, Zhongyun Yang, An Efficient Method of Detecting Repackaged Android Applications. 5th International Conference on Multimedia Information Networking and Security (MINES 2013), November 1–3, 2013 in Beijing, China. EI
4.Zhongyuan Qin, Yuqing Xu, Yuxing Di, Qunfang Zhang, Jie Huang, Android Malware Detection Based On Permission And Behavior Analysis. 5th International Conference on Multimedia Information Networking and Security (MINES 2013), November 1–3, 2013 in Beijing, China. EI
5.Zhongyuan Qin, Yongxin Zheng, Yuying Wang, Jie Huang, RFID Tag Anti-collision Scheme Using Modular Arithmetic. International Conference on Computer Science and Information Technology (CSAIT 2013) September 21-23, 2013, Kunming, China. EI
6.Zhongyuan Qin, Yunyan Song, Qunfang Zhang, Jie Huang, Cloud Storage Retrievability Based On Third Party Audit,The International Workshop on Cloud Computing and Information Security (CCIS 2013), Nov. 9th-11th, 2013, Shanghai, China.
7.Wan, C.S.,Zhang, J.,Zhou, L.,Qin, Z.Y,Using the pairing function for distributed access control in cloud computing,Volume 774-776, 2013, Pages 1745-1751,2013 International Forum on Mechanical and Material Engineering, IFMME 2013; Guangzhou; China; 13 June 2013--14 June 2013。EI
2012:
1.Kejun Xin, Gang Li, Zhongyuan Qin, Qunfang Zhang, Malware Detection in Smartphone Using Hidden Markov Model,MINES 2012, 4th International Conference on Multimedia Information Networking and Security,Nanjing, China,Nov. 2-4,2012. EI
2.秦中元,沈日胜,张群芳,狄予兴。虚拟机系统安全综述,计算机应用研究,2012.29(5):1618-1622
3.Zhongyuan Qin , Qunfang Zhang, Changsheng Wan, Yuxing Di,State-of-the-art Virtualization Security in Cloud Computing,Journal of Information and Computational Science,2012,Vol.9(6):1487-1497。 EI
2011:
1.Zhongyuan Qin, Aiqun Hu, Qunfang Zhang, State-of-the-art Virtualization Security in Cloud Computing,CCICS 2011, The 8th China Conference of Information and Communication Security ,Hefei, China, June 25-26,2011.
2.Chun-Ting Huang, Zhongyuan Qin and C.-C. Jay Kuo , Multimedia Storage Security in Cloud Computing: An Overview, MMSP 2011, 13th international workshop on multimedia signal processing,Hangzhou, China,Oct. 17-19,2011. EI
3.Zhongyuan Qin, Nannan Chen, Qunfang Zhang, Yuxing Di,Mobile Phone Viruses Detection Based on HMM,MINES 2011, 3th International Conference on Multimedia Information Networking and Security, Shanghai, China,Nov. 4-6,2011.EI
专利:
1.秦中元,杨中云,一种软件相似度快速计算方法,申请号:201310229122.3
2.秦中元胡爱群,基于多点触摸位置序列的智能终端用户认证方法,申请号:201310483113.7
3.秦中元胡爱群杨中云,基于多幅图像切换的智能手机用户认证方法,申请号:201310485761.6
4.秦中元,孙雄,胡爱群,一种安卓市场中重包装应用的检测方法,申请号201210204247.6
5.秦中元,胡爱群,黄杰,蒋儒,吴亚军。基于网络处理器的移动互联网数据负载分配方法,发明专利号:ZL 2008 1 0019062.1。
6.黄杰,秦中元,黄秋岑。基于第3代移动通信网络监管的负载平衡方法,发明专利号:ZL200910032745.5
7.黄杰,秦中元,张晓晓,孙婷婷。基于FPGA的3G数据包过滤系统及方法,发明专利号:ZL200910033143.1
8.黄杰,秦中元,孙婷婷,张晓晓。基于FPGA的3G数据包重组系统及方法,申请号:200910033142.7
9.胡爱群,梁彪,秦中元,一种提高射频识别系统吞吐量的方法,发明专利号:ZL200510122602.5。