
Education background
Ph.D. in Computer Science, Tsinghua University, Beijing, China, 2006;
Post Doctoral Fellow in Computer Science, University of Waterloo, Canada, 2009.
Social service
China Computer Federation: Vice Secretary-General of Petri Nets Technical Committee (2009).
Areas of Research Interests/ Research Projects
Trusted Clouding Computing
Security & Privacy
Wireless Communications and Mobile Computing
P2P System
National Basic Research Program of China (The 973 Program): Basic Research on Architecture and Key Techniques of Internet of Things (2010);
National Natural Science Foundation: Research on Security and Privacy Mechanisms of Network Coding (2010-2012);
Tsinghua University: Supporting Program for Young Professors (2009);
Institute of Information Science, Tsinghua University: Start-up Research Funding for Young Professors (2010).
Research Status
My research interests include Security, Privacy, and Applied Cryptography with current focuses on Security and Privacy in Cloud Computing, Wireless Ad Hoc Mesh, Sensor Network Security, Lower-layer Attack and Defense Mechanisms for Wireless Networks, Security and Privacy in Smart Grid, and Access Control with Attribute-based Cryptographic Techniques. In particular, my recent and current research efforts focus on two fronts of research topics. Firstly, I am interested in security and privacy issues in application-layer overlay networks, towards Delay/Disruption-tolerant, self-healing networking. Particularly, I am interested in providing graceful security and privacy schemes for network coding in multicast sessions. Secondly, I'm interested in security/privacy issues of clouding computing, 3GPP, multi-hop wireless networks, including mobile ad-hoc and sensor networks, particularly theoretical studies and application-layer solutions.
Honors And Awards
Tsinghua University: Excellent Ph.D Dissertation Award (2006).
Academic Achievement
[1] Xiaowei Chen, Yixin Jiang, and Xiaowen Chu, "Measurements, Analysis and Modeling of Private Trackers."Proc. of IEEE P2P, 2010 (Accept Rate < 23%)
[2] Xiaowen Chu and Yixin Jiang, "Secure Linear Network Coding for Peer-to-peer Applications."IEEE Networks, Special Issue on Future Internet, 2010.
[3] Peng Zhang, Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen. "P-Coding: Secure Network Coding against Eavesdropping Attacks", Proc. of IEEE INFOCOM, 2010.
[4] Yanfei Fan, Yixin Jiang, Haojin Zhu, and Xuemen (Sherman) Shen, "An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding." Proc. of IEEE INFOCOM, 2009.
[5] Yanfei Fan, Yixin Jiang, Haojin Zhu and Xuemen Shen. "PIE: Cooperative Peer-to-Peer Information Exchange in Network Coding Enabled Wireless Networks." IEEE Trans. on Wireless Communications, 2010, In Press.
[6] Yanfei Fan, Yixin Jiang, Haojin Zhu and Xuemen Shen. "Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks." IEEE Transactions on Wireless Communications, 2010, In Press.
[7] Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin (Sherman) Shen, and Chuang Lin. "An Efficient Dynamic-Identity based Signature Scheme for Secure Network Coding." Computer Networks, Vol. 54, Issue 1, pp. 28-40, Elsevier, 2010.
[8] ]Yixin Jiang, Yanfei Fan, Xuemen Shen, and Chuang Lin. "A Self-adaptive Probabilistic Packet Filtering Scheme against Entropy Attacks in Network Coding." Computer Networks, Vol. 53, Issue 18, pp. 3089-3101, Elsevier, 2009.
[9] Albert Wasef, Yixin Jiang, and Xuemin (Sherman) Shen. "DCS: An Efficient Distributed Certificate Service Scheme for Vehicular Networks," IEEE Trans. on Vehicular Technology, 2009.
[10] Yixin Jiang, Minghui Shi, Xuemin Shen, and Chuang Lin. "BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree." IEEE Trans. on Wireless Communication, Vol. 8, No. 4, pp.1974-1983, 2009.
[11] Xiaowen Chu, Yixin Jiang, Chuang Lin, and Hao Yin. "Providing Key Recovery Capability for Mobile Communications," Security and Communication Networks, Wiley, 2009.
[12] Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, and Minghui Shi. "Multiple key Sharing and Distribution Scheme with (n, t) Threshold Mechanism for NEMO Group Communications." IEEE Journal on Selected Areas in Communications, Vol.24, No.9. 2006.
[13] Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, and Minghui Shi. "Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Communication." IEEE Trans. on Wireless Communication, Vol.5, pp.2569-2577, 2006.
[14] Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, and Minghui Shi, "A DoS and Fault Tolerant Authentication Protocol for Group Communications in Ad Hoc Networks", Computer Communications, Elsevier, Vol.30, No.1, pp.2428-2441, 2007.
[15] Yixin Jiang, Chuang Lin, Minghui Shi, and Xuemin Shen. "Seal-healing Group Key Distribution with Time-limited User Revocation for Wireless Sensor Networks." Ad Hoc Networks, Elsevier, Vol.5, No.1, pp.14-23, 2007.
[16] Yixin Jiang, Chuang Lin, Hao Yin, and Zhen Chen. "A Mutual Authentication and Privacy Mechanism for WLAN Security." Wireless Communications and Mobile Computing, Wiley, Vol. 8, No.1, pp.101-112, 2008, Wiley.
[17] Minghui Shi, Yixin Jiang, Xuemin (Sherman) Shen, and Chuang Lin. "Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks", IEEE Wireless Communications, vol. 14, No. 5, pp. 38-46, 2007.
[18] Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, and Minghui Shi. "A Self-Encryption Authentication Protocol for Teleconference Services." International Journal of Security and Network, Vol.1, No.3/4, pp.198-205, 2006.
[19] Zong Su, Yixin Jiang, Chuang Lin, Fengyuan Ren, and Xiaowen Chu. "RPKE: Random Pairwise Key Establishment in Wireless Sensor Networks Using Auxiliary Nodes." EURASIP Journal on Wireless Communications and Networking, to appear, 2010 (Impact Factor: 0.976)
[20] Xiangzhen Kong, Chuang Lin, Yixin Jiang, Xiaowen Chu. "Efficient Dynamic Task Scheduling in Virtualized Data Centers with Fuzzy Prediction". Journal of Network and Computer Applications, Elsevier, to appear, 2010. (Impact Factor:1.271)
[21] Xiaowen Chu, Kai Ouyang, Hsiao-Hwa Chen, Jiangchuan Liu, and Yixin Jiang. "Homonymous Role in Role-Based Discretionary Access Control." Wireless Communications and Mobile Computing, Wiley, 2008.
[22] Minghui Shi, Xuemin (Sherman) Shen, Jon W. Mark, and Yixin Jiang. "User Authentication and Undeniable Billing Support for Agent-Based Roaming Service in WLAN/Cellular Integrated Mobile Networks." Computer Communications, Elsevier, Vol. 52, No. 9, pp. 1693-1702, 2008.