张凯

发布日期:2022-07-10      浏览次数:12445

姓名:张凯

性别:
学历:博士研究生职称: 副教授
电话:Email:zhangkaiecnu@163.com
办公地址:计电楼A504
个人简介:

张凯,男,19909月出生,博士,副教授/硕士生导师。上海市青年五四奖章个人,入选东方英才计划青年项目,上海市青年科技启明星(A类),上海市教学能手,上海市一流本科课程和课程思政示范课程负责人,上海市晨光学者,入选37000cm威尼斯“上电之翼”青年人才打造计划。上海市教育委员会“记功”1次。

 

【个人主页】https://kai9009.github.io/index

【招生信息】欢迎有志于从事信息安全领域研究的研究生和本科生同学加入课题组!

【研究兴趣】应用密码学、信息安全、区块链、可信人工智能

 

主要从事复杂网络环境下密态数据隐私流转研究,包括密态数据的可控共享、可信计算和可靠搜索,目前在EUROCRYPTASIACRYPTPKCACM AsiaCCSIEEE TIFS/TDSC/IoT-JTheoretical Computer Science等会议和期刊上发表高水平学术论文50余篇,申请国家发明专利20项,主持国家自然科学基金面上和青年科学基金项目、上海市科委、上海市教委、国家电网等科研项目,研究成果获2021年度中电联电力科技创新奖一等奖、2022年度上海市计算机学会科技进步奖一等奖等科技奖励4项。指导学生获第六届全国密码技术竞赛二等奖、第十八届“挑战杯”上海市大学生课外学术科技作品竞赛三等奖,指导的10余位研究生获得研究生国家奖学金、校长奖学金、企业奖学金。

 

主讲“计算机网络”、“计算机网络安全”、“区块链技术及应用”等课程,主持建设上海市一流本科课程和上海市课程思政示范课程,主持完成教育部产学合作协同育人项目、全国高等院校计算机基础教育研究会等课程建设和教改项目6项。担任第17-22期上海市属高校新教师岗前培训带教导师/授课师资。先后获得第四届上海高校青年教师教学竞赛一等奖、第二届上海市高校教师教学创新大赛一等奖、37000cm威尼斯青年教师教学竞赛一等奖/教学创新大赛特等奖/课程思政示范展示活动特等奖等教学竞赛奖励7项,发表教改论文6篇,获校教学成果奖二等奖、课程思政教学名师、中天科技奖教金、优秀教师、双师型教师、本科招生工作先进个人等荣誉。

 

2020.03-至今,37000cm威尼斯,37000cm威尼斯,副教授

2023.09-2024.07,上海交通大学,计算机科学与技术,访问学者,导师:朱浩瑾

2018.02-2020.03,37000cm威尼斯,37000cm威尼斯,讲师

2017.03-2017.09,新加坡南洋理工大学,研究助理,导师:WANG Huaxiong

2012.09-2017.12,华东师范大学,硕博连读,计算机软件与理论,导师:钱海峰、陈洁

2008.09-2012.06,山东师范大学,本科,计算机科学与技术


研究方向:

应用密码学、信息安全、区块链、可信人工智能

主讲课程:

计算机网络、计算机网络安全、区块链技术与应用

科研成果:

全部论文:

l   [Google Scholar]https://scholar.google.com/citations?hl=en&user=lthap-UAAAAJ

l   [DBLP]https://dblp.uni-trier.de/pid/55/957-16.html

 

代表性论文:

1.      Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian. Lavida: Large-universe, Verifiable and Dynamic Fine-grained Access Control for E-health Cloud. IEEE Transactions on Information Forensics and Security(IEEE TIFS), 19:2732-2745 (2024) [CCF-A]

2.      Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian. Registered Functional Encryptions from Pairings. 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) (2)2024: 373-402 [CCF-A类,国际三大密码会之一]

3.      Jun Zhao, Junqing Gong, Kai Zhang, Haifeng Qian. Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning. IEEE Transactions on Dependable and Secure Computing(IEEE TDSC), DOI: 10.1109/TDSC.2024.3380669, (2024) [CCF-A]

4.      Kai Zhang, Minjun Deng, Bei Gong, Yinbin Miao, Jianting Ning. Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-based Industrial IoT. IEEE Internet of Things Journal (IEEE IoT-J), 11(2):3484-3496 (2024) [SCI-Q1]

5.      Jinguo Li, Yan Yan, Kai Zhang*, Chunlin Lia, Peichun Yuan. FPCNN: A Fast Privacy-Preserving Outsourced Convolutional Neural Network with Low-Bandwidth. Knowledge-Based Systems (KBS), 283: 111181 (2024) [SCI-Q1]

6.      Zhiyu Xu, Liangliang Wang, Yiyuan Luo, Yu Long, Kai Zhang, Hailun Yan, Kefei Chen. A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks. IEEE Internet of Things Journal(IEEE IoT-J), 11(8):13482-13495 (2024) [SCI-Q1]

7.      Kai Zhang, Xiaobing Shi, Jinguo Li, Yi Wu, Jianting Ning. TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription. Journal of Systems Architecture, (JSA) 153(103197): 1-12 (2024) [CCF-B]

8.      Kai Zhang, Zirui Guo, Liangliang Wang, Lei Zhang, Lifei Wei. Revocable Certificateless Provable Data Possession with Identity Privacy in Cloud Storage. Computer Standards & Interfaces(CSI), 90:103848 (2024) [CCF-B]

9.      Xiwen Wang, Kai Zhang*, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning. Non-interactive Boolean Searchable Asymmetric Encryption with Bilateral Access Control. The Computer Journal (COMPJ), 67(1): 179194 (2024) [CCF-B]

10.    Xiwen Wang, Kai Zhang*, Junqing Gong, Shi-Feng Sun, Jianting Ning. Updatable Searchable Symmetric Encryption: Definitions and Constructions. Theoretical Computer Science (TCS), 983: 114304 (2024) [CCF-B]

11.    Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian. Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions. IACR International Conference on Public-Key Cryptography, (PKC) 2024: 105-126, [IACR旗舰会议,CCF-B]

12.    Kai Zhang, Xiwen Wang, Jianting Ning, Junqing Gong, Xinyi Huang. Secure Cloud-Assisted Data Pub/Sub Service with Fine-grained Bilateral Access Control. IEEE Transactions on Information Forensics & Security (IEEE TIFS), 18 (2023): 5286-5301. [CCF-A]

13.    Kai Zhang, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu. Multi-Client Boolean File Retrieval with Adaptable Authorization Switching for Secure Cloud Search Services. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 20(6), 4621-4636 (2023) [CCF-A]

14.    Kai Zhang, Xiwen Wang, Jianting Ning, Xinyi Huang. Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. IEEE Transactions on Information Forensics & Security 18 (2023): 449-462. [CCF-A]

15.    Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian. Registered ABE via Predicate Encodings. 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT) 2023: 6697. [国际三大密码会]

16.    Yansong Chang, Kai Zhang, Junqing Gong, Haifeng Qian. Privacy-Preserving Federated Learning via Functional Encryption, Revisited. IEEE Transactions on Information Forensics & Security, 18 (2023): 1855-1869. [CCF-A]

17.    Zhe Jiang, Kai Zhang*, Liangliang Wang, Jianting Ning. Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search. The Computer Journal (COMPJ), 66(9): 22652278 (2023) [CCF-B]

18.    Zirui Guo, Kai Zhang*, Lifei Wei, Siyuan Chen, Liangliang Wang. RDIMM: Revocable and Dynamic Identity-Based Multi-Copy Data Auditing For Multi-Cloud Storage. Journal of Systems Architecture (JSA), 141: 102913 (2023). [ CCF-B]

19.    Haitang Lu, Jie Chen, Kai Zhang, Jianting Ning. Verifiable Conjunctive Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. The Computer Journal (COMPJ), 66(10): 23792392 (2023) [CCF-B]

20.    Jun Zhao, Minghao Yang, Junqing Gong, Kai Zhang, Haifeng Qian. Bounded-collusion decentralized ABE with sublinear parameters. Theoretical Computer Science (TCS), 960: 113897 (2023). [CCF-B]

21.    Dingyu Shou, Chao Li, Zhen Wang, Song Cheng, Xiaobo Hu, Kai Zhang, Mi Wen, Yong Wang. An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model. The Computer Journal (COMJNL), Volume 67, Issue 5, May 2024, Pages 18511865, 2023. [CCF-B]

22.    Zhe Jiang, Xiwen Wang, Kai Zhang*, Junqing Gong, Jie Chen, Haifeng Qian. Revocable Identity-Based Matchmaking Encryption in the Standard Model. IET Information Security, Volume17, 17(4): 567-581 (2023). [CCF-C]

23.    Jianqiu Zeng, Kai Zhang*, Liangliang Wang, Jinguo Li. FedLVR: A Federated learning-Based Fine-Grained Vehicle Recognition Scheme in Intelligent Traffic System. Multimedia Tools and Applications (2023) [CCF-C]

24.    Minjun Deng, Kai Zhang*, Pengfei Wu, Mi Wen, Jianting Ning. DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes. IEEE Transactions on Cloud Computing (IEEE TCC), 11(4), 3510-3524 (2023) [CCF-C]

25.    Chunlin Li, Jinguo Li, Kai Zhang, Yan Yan, Jianting Ning. Verifiable Cloud-Based Data Publish-Subscribe Service with Hidden Access Policy. IEEE Transactions on Cloud Computing (IEEE TCC), 11(4), 3737-3749 (2023). [CCF-C]

26.    Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang. Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. IEEE Transactions on Information Forensics & Security 17 (2022): 1771 - 1784 [CCF-A]

27.    Jiasheng Chen, Liangliang Wang, Mi Wen, Kai Zhang, Kefei Chen. Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices. IEEE Internet of Things Journal (IEEE IoT) Volume: 9, Issue: 11, pp. 8967 - 8979, June1, 1 2022 [SCI一区]

28.    Mi Wen, Rong Xie, Kejie Lu, Liangliang Wang, Kai Zhang. FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid. IEEE Internet of Things Journal (IEEE IoT), Volume: 9, Issue: 8, pp. 6069-6080, April 15, 15 2022 [SCI一区]

29.    Kai Zhang, Jinhu Yu, Chao Lin, Jianting Ning. Blockchain-Based Access Control for Dynamic Device Management in Microgrid. Peer-to-Peer Networking and Applications (PPNA), volume 15, pages 1653–1668, 2022. [CCF-C]

30.    Ming Zeng, Haifeng Qian, Jie Chen, Kai Zhang. Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. IEEE Transactions on Cloud Computing (IEEE TCC), vol. 10, no. 1, pp. 426-438, 1 Jan.-March 2022. [CCF-C]

31.    Kai Zhang, Mi Wen, Rongxing Lu, Kefei Chen. Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization. IEEE Transactions on Dependable and Secure Computing 18(6): 2875-2887 (2021). [CCF-A]

32.    Kai Zhang, Zhe Jiang, Junqing Gong, Haifeng Qian. Updatable All-But-One Dual Projective Hashing and Its Applications. The 23rd International Conference on Information and Communications Security (ICICS) 2021:358-374. [CCF-C]

33.    Hailun Wang, Kai Zhang*, Lifei Wei, Lei Zhang. Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-based Microgrid Energy Trading. 21st International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP (3) 2021: 19-34 [CCF-C]

34.    Luping Wang, Jie Chen, Kai Zhang and Haifeng Qian. A Post-quantum Hybrid Encryption based on QC-LDPC code in the Multi-User Setting. Volume 835, 2 October 2020, Pages 82-96 [CCF-B]

35.    Jinguo Li, Mi Wen and Kai Zhang. Cloud-Assisted Secure and Conjunctive Publish/Subscribe Service in Smart Grids. IET Information Security Volume 14, Issue 4, July 2020, p. 470–481 [CCF-C]

36.    Donghuan Yao, Mi Wen, Xiaohui Liang, Zipeng Fu, Kai Zhang and Baojia Yang. Energy Theft Detection with Energy Privacy Preservation in the Smart Grid. IEEE Internet of Things Journal 6(5): 7659-7669 (2019) [SCI一区]

37.    Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, Huaxiong Wang. Efficient Public Key Encryption with Equality Test in The Standard Model. Theoretical Computer Science 2019, 755: 65-80 [CCF-B]

38.    Ming Zeng, Kai Zhang*, Haifeng Qian, Xiaofeng Chen, Jie Chen. A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications. The Computer Journal 62(4): 563-578 (2019) [CCF-B]

39.    Ming Zeng, Jie Chen, Kai Zhang and Haifeng Qian. Public Key Encryption with Equality Test via Hash Proof System. Theoretical Computer Science 2019, 795: 20-35 [CCF-B]

40.    Daode Zhang, Kai Zhang*, Bao Li, Xianhui Lu, Haiyang Xue and Jie Li. Lattice-Based Dual Receiver Encryption and More. Australasian Conference on Information Security and Privacy, (ACISP) 2018: 520-538. [CCF-C]

41.    Hyung Tae Lee, Huaxiong Wang and Kai Zhang*. Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. Australasian Conference on Information Security and Privacy, (ACISP) 2018: 780-786. [CCF-C]

42.    Kai Zhang, Lifei Wei, Xiangxue Li and Haifeng Qian. Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing. Wireless Communications and Mobile Computing (WCMC), Volume 2017, Article ID 6128437, 11 pages [CCF-C]

43.    Kai Zhang, Lifei Wei, Xiangxue Li and Haifeng Qian. Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. International Conference on Wireless Algorithms, Systems, and Applications (WASA) 2017: 210-219 [CCF-C]

44.    Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao. Practical and Eicient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. ACM on Asia Conference on Computer and Communications Security (AsiaCCS) 2016:269-279. [CCF-C]

45.    Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen and Haifeng Qian. New Application of Partitioning Methodology: Identity-Based Dual Receiver Encryption. Security and Communication Networks (SCN), 2016, 9(18): 5789-5802. [CCF-C]

46.    Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou. Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. Australasian Conference on Information Security and Privacy (ACISP) 2016: 293-309 [CCF-C]

47.    张凯, 魏立斐, 李祥学, 陈洁, 钱海峰. 具备强表达能力的选择密文安全高效属性基加密方案. 计算机研究与发展 2016 Vol. 53 (10): 2239-2247 [CCF-A类(中文)]


科研项目


1.       国家自然科学基金面上项目,2024.1.1-2027.12.31,主持。

2.       东方英才计划青年项目,2024.1.1-2026,12,31,主持。

3.       上海市科技委员会“科技创新行动计划”启明星计划(A类),2022.06-2025.05,主持。

4.       国家自然科学基金青年科学基金项目,2019.1.1-2021.12.31,主持。

5.       上海市教育委员会/上海市教育发展基金会晨光计划,2019.1.1-2021.12.31,主持。

6.       37000cm威尼斯“上电之翼”青年人才打造计划,2021.01-2023.12,主持

7.       企业横向,星环信息科技(上海)有限公司,2019.07—2020.06,主持

8.       企业横向,国网上海市电力公司,2022.01-2022.12,主持

课程建设与教改项目

1.       教育部产学合作协同育人项目,2023.12—2024.11,主持

2.       上海高等学校课程思政示范课程,2024.6,主持

3.       上海高等学校一流本科课程,2021.12,主持

4.       全国高等院校计算机基础教育研究会教改项目,2021.01-2022.12,主持

5.       教育部产学合作协同育人项目, 2020.01—2021.12,主持

6.       上海高校青年教师培养资助计划,2019.01—2020.12,主持