教师名录

张 媛媛 助理研究员

主页:

办公室电话:+86-21-

办公地点:SEIEE-1-

电子邮件:zhang-yy@cs.sjtu.edu.cn

实验室: 密码学与计算机安全实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务
Computer architecture security, software security, wireless network security
2005-2009 Ph.D, Shanghai Jiao Tong University
2002-2005 M.S, Wuhan University
1998-2002 B.S, Wuhan University
2010-2012 Postdoctoral Fellow, Institut National des Sciences Appliquées (INSA de Lyon)
2009-2012 Assistant Professor, East China Normal University
2002 Excellent undergraduate dissertation, Wuhan University
Journal papers:
[1] Yuanyuan Zhang, Dawu Gu and Juanru Li, “Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks,” Computer Communications, Elsevier Publication, vol.31, pp. 2959-2971, Aug. 2008. 
[2] Yuanyuan Zhang, Dawu Gu, Fangyong Hou, Mengqi Zeng and Tao Cheng, “Architecture Support for Memory Confidentiality and Integrity in Embedded Systems,” International Journal of Distributed Sensor Networks, Taylor & Francis, vol.5, Jan. 2009.
[3] Yuanyuan Zhang and Marine Minier, “How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks,” to appear in International Journal of Grid and Utility Computing. 
[4] Yuanyuan Zhang and Marine Minier, “Selective Forwarding Attacks Against Data and ACK Flows in Network Coding and Countermeasures,” Journal of Computer Networks and Communications, Taylor & Francis, vol.2012, Article ID 184783, 2012. doi:10.1155/2012/184783.


Conference papers:
[1] Y. Zhang, and M. Minier, “How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks,” in the 6th International Conference on Network and System Security(NSS2012), Wuyishan, Fujian, China, Nov.2012. 
[2] Y. Zhang, W. Znaidi, C. Lauradoux, and M. Minier, “Flooding attacks against network coding and countermeasures,” in the 5th International Conference on Network and System Security(NSS2011), Milan, Italy, Sep.2011.
[3] Yuanyuan Zhang and Junzhong Gu, “Using counter cache coherence to improve memory encryptions performance in multiprocessor systems,” in the 8th FTRA International Conference on Secure and Trust Computing, Data Management and Applications(STA2011), Loutraki, Greece, June.2011. 
[4] Yuanyuan Zhang, Dawu Gu and Bart Preneel, “Reliable key establishment scheme exploiting unidirectional links in wireless sensor networks,” in the 2008 IEEE/IFIP International Conference On Embedded and Ubiquitous Computing (EUC2008), Shanghai, China, Dec.2008. 
[5] Yuanyuan Zhang, Dawu Gu, “PWKEP: a pair-wise key establishment protocol for sensor networks providing provable security,” the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2008), Dalian, China, Oct. 2008. 
[6] Yuanyuan Zhang, Dawu Gu, Fangyong Hou, Mengqi Zeng and Tao Cheng, “Architecture support for memory confidentiality and integrity in embedded systems,” in the International Symposium on Computer and Sensor Networks and Systems (ISCSNS2008), Zhengzhou, China, Apr. 2008. 
[7] Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang and NingNan Song. “Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM,” in the International Conference on High Performance Computing and Communications (HPCC 2008), IEEE Computer Society, 964-970. Dalian, China, Sep.2008. 
[8] Yuanyuan Zhang, Dawu Gu, “Performance analysis of pair-wise key establishment protocols for sensor networks,” in the 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2007), Shanghai, China, Sep.2007. 
[9] Chuanhe Huang, Yuanyuan Zhang, and Xiaohua Jia, “An on-demand clustering mechanism for hierarchical routing protocol in ad hoc networks,” in the 2nd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2006), Wuhan, China, Sep.2006.
NSFC under Grant No.61103040, “Memory encryption and authentication based on address sequence abstraction”, 2012-2014.

联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013