导航菜单

涂山山

研究方向

移动边缘计算安全、可信计算、云安全审计和信息隐藏检测等方面的理论与应用研究工作。

个人简介

博士,副教授,硕士生导师。IEEE IEEE高级会员、中国密码学会会员。2014年在北京邮电大学获得计算机科学与技术博士学位;2013.10-2014.10受国家留学基金委资助到Essex大学联合博士培养;2014.10-2016.10在清华大学电子工程系从事博士后研究工作;2016.10-现在,北京工业大学计算机学院从事教学科研工作。

课程教学

本科生教学:学术写作课程、学术前沿课程

科研项目

1. 2021-2023,基于强化学习的雾计算无线通信安全技术研究,北京市自然科学基金-面上项目,负责人

2. 2021-2022,基于虚拟化的可信计算安全技术与实现,教育部—中国移动科研基金项目,负责人

3. 2019-2021,云存储数据机密性公开审计模型与方法,国家自然科学基金-青年项目,负责人

4. 2018-2021,移动互联网数据防护技术试点示范,科技部国家重点研发计划-子课题,负责人

5. 2019-2020,基于区块链的云数据安全融合机制与方法,北京市教委项目-科技计划项目,负责人

6. 2018-2020,面向5G增强/虚拟现实及通信与计算融合的移动边缘计算基础理论与关键技术,北京市自然科学基金-联合重点项目子课题,负责人

7.  2019-2020,基于arm处理器的嵌入式可信计算平台研发,企业合作项目,负责人

荣誉和获奖

“电力用户大数据智能画像技术及应用”,2017.10,获中国人工智能学会科学技术奖一等奖。

主要论文论著

[1] Yongjie Yang, Shanshan Tu, Raja Hashim Ali, Hisham Alasmary, Muhammad Waqas, Muhammad Nouman Amjad. Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism. CMC-Computers, Materials & Continua, 2023, 74(1): 801-815.

[2] Muhammad Waqas, Shanshan Tu∗, Jialin Wan, Talha Mir, Hisham Alasmary, Ghulam Abbas. Defense scheme against advanced persistent threats in mobile fog computing security. Computer Networks, 2023, 221: 109519.

[3] Suleman Munawar, Zaiwar Ali, Muhammad Waqas, Shanshan Tu, Syed Ali Hassan, Ghulam Abbas. Cooperative Computational Offloading in Mobile Edge Computing for Vehicles: A Model-Based DNN Approach. IEEE Transactions on Vehicular Technology, 2023, 72(3): 3376-3391.

[4] Shanshan Tu, Haoyu Yu, Akhtar Badshah, Muhammad Waqas, Zahid Halim, Iftekhar Ahmad. Secure Internet of Vehicles (IoV) with Decentralized Consensus Blockchain Mechanism. IEEE Transactions on Vehicular Technology, 2023, 1-10.

[5] Bei Gong, Guiping Zheng, Muhammad Waqas, Shanshan Tu, Sheng Chen. LCDMA: Lightweight Cross-domain Mutual Identity Authentication Scheme for Internet of Things. IEEE Internet of Things Journal, 2023, 1-1.

[6] Jiangjiang Zhang, Zhenhu Ning, Raja Hashim Ali, Muhammad Waqas, Shanshan Tu, Iftekhar Ahmad. A Many-objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem. IEEE Transactions on Mobile Computing, 2023, 1-18.

[7] Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Zhu Han. A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks. IEEE Transactions on Services Computing, 2023, 1-14.

[8] Haoyu Yu, Farman Ali, Shanshan Tu*, Hanen M. Karamti, Ammar Armghan, Fazal Muhammad, Fayadh Alenezi, Khurram Hameed, Nauman Ahmad. Deducing of Optical and Electronic Domains Based Distortions in Radio over Fiber Network. Applied Sciences, 2022, 12(2): 753.

[9] Muhammad Noman, Shanshan Tu*, Shahab Ahmad, Fahad Ullah Zafar, Haseeb Ahmad Khan, Sadaqat Ur Rehman, Muhammad Waqas, Adnan Daud Khan, Obaid ur Rehman. Assessing the reliability and degradation of 10-35 years field-aged PV modules. PLoS One, 2022, 17(1): e0261066.

[10] Xiaoping Wang,Shanshan Tu*,Wei Zhao,Chengjie Shi. A novel energy-based online sequential extreme learning machine to detect anomalies over real-time data streams. Neural Computing and Applications, 2022, 34(2): 823–831

[11] Shanshan Tu, Muhammad Waqas, Sadaqat Ur Rehman, Talha Mir, Zahid Halim, Iftekhar Ahmad. Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks. IEEE Transactions on Computational Social Systems, 2022, 9(1): 32-44.

[12] Muhammad Waqas, Shehr Bano, Fatima Hassan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas. Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications. CMC-Computers, Materials & Continua, 2022, 73(3): 4489-4499.

[13] Chao Fang, Hang Xu, Yihui Yang, Zhaoming Hu, Shanshan Tu, Kaoru Ota, Zheng Yang, Mianxiong Dong, Zhu Han, F. Richard Yu, Yunjie Liu. Deep-Reinforcement-Learning Based Resource Allocation for Content Distribution in Fog Radio Access Networks. IEEE Internet of Things Journal, 2022, 9(18): 16874-16883. WOS:000884575200012.

[14] Muhammad Waqas, Shanshan Tu*, Zahid Halim, Sadaqat Ur Rehman, Ghulam Abbas, Ziaul Haq Abbas. The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges. Artificial Intelligence Review, 2022 55(7): 5215–5261.

 

相关推荐: