张镇勇
发布时间: 2021-12-10 | 查看数:7997
个人基本情况介绍:
张镇勇,1991年生于湖北黄冈,贵州大学大数据学科特聘教授、学术学科带头人(培育)、网络空间安全系副主任、保密技术专业负责人、公共大数据国家重点实验室学术骨干。2015年6月毕业于中南大学自动化专业,获工学学士学位,同年免试进入浙江大学控制学院直攻博士(师从陈积明教授、程鹏教授),2020年6月获控制科学与工程专业博士学位。2018年10月至2019年10月,赴新加坡科技设计大学电子信息系交流访问。长期致力于智能系统安全研究,主要研究方向包括人工智能安全、智能电网安全、工控系统安全、元宇宙安全等国际前沿热点课题。相关研究成果在IEEE/ACM Trans.等控制/安全/网络等期刊/会议共发表学术论文50余篇,其中,以第一作者/通讯作者发表中科院1/2区论文20篇(包括IEEE TIFS、TMC、TCST、TSG、TPS、TCST、TCNS、IoT-J、Applied Energy、IEEE/CAA JAS、ACM TCPS等,IF>10论文10篇、CCF A类论文5篇),申请授权专利10余项,主编白皮书2本,获批国家CNVD/NVDB漏洞号15项,谷歌学术H值16。主持各类纵向项目10余项,包括国家自然科学基金。以第一执笔人撰写专报被中央部委采纳。获得国际安全顶级会议ACSAC杰出论文奖。受邀担任国际期刊CMC、FCAN、CNC、SNCS、MT编委、2022 ASCC、2022 SmartGridComm、2023 ICPS 论坛主席、TASE本地主席、IEEE TIFS、TSG、TPS等10余本顶级期刊审稿人。指导本科生以第一作者发表SCI论文、申请公开专利、获得挑战杯省级一等奖、获批国家级、省级大创项目。
欢迎认真踏实、吃苦耐劳、不愿躺平的本科生和研究生加入我们的团队!常年开放网络安全、计算机、控制、电气、人工智能、密码方向的研究生申请!
研究领域与方向:
人工智能安全、智能电网安全、工控系统安全、元宇宙安全
科研课题:
主持国家自然科学基金,省部级项目2项,厅级项目1项,其他纵向项目8项
学术论著:
[1]Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma. An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse, IEEE Transactions on Information Forensics & Security, Accepted. (CCF A, 中科院一区)
[2]邵宽,张镇勇(通讯作者), 杨科迪, 朱俊彦, 王鑫, 田有亮,马建峰. 基于国密的数字藏品网络拍卖隐私保护方法, 软件学报,即将刊出. (CCF A)
[3]Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Nyato, Moyuen Chow, and Jiming Chen. Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review, IEEE IoT-J, 2024, vol. 11, no. 11, pp. 18951-18975, June 1, 2024. (中科院一区)
[4]程鹏,张镇勇,魏强. 护卫国之重器:工控系统安全的矛与盾 , CCF CCCF, 2023. (特邀论文)
[5]Zhenyong Zhang,Bingdong Wang, Mengxiang Liu, Yan Qin, Jingpei Wang, Youliang Tian, and Jianfeng Ma. Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-based Smart Grid, IEEE IoT-J, 2023. (中科院一区)
[6]Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, and Jianying Zhou.SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic, ACSAC 2024. (杰出论文奖,安全领域顶会,CCF B)
[7]Lanting Zeng, Mingyang Sun, Xu Wan, Zhenyong Zhang, Ruilong Deng, and Yan Xu. Physics-Constrained Vulnerability Assessment of Deep Reinforcement Learning-based SCOPF, IEEE Transactions on Power Systems, vol. 38, no. 3, pp. 2690-2704, May 2023. (中科院一区)
[8]Zhenyong Zhang, Zhibo Yang, David K. Y. Yau, Youliang Tian, and Jianfeng Ma. Data Security of Machine Learning Applied in Low-carbon Smart Grid: A Formal Model for the Physics-constrained Robustness, Volume 347, 1 October 2023, 121405, Applied Energy. (中科院一区)
[9]Kedi Yang, Zhenyong Zhang (Co-first author), Youliang Tian, and Jianfeng Ma. A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse, IEEE Transactions on Information Forensics & Security, vol. 18, pp. 3817-3832, June 2023. DOI: 10.1109/TIFS.2023.3288689, to appear. (中科院一区)
[10]Zhenyong Zhang, Ruilong Deng, and David K. Y. Yau. Vulnerability of the Load Frequency Control Against the Network Parameter Attack, IEEE Transactions on Smart Grid, to appear. (中科院一区)
[11]Zhenyong Zhang, Ke Zuo, Ruilong Deng, Fei Teng, and Mingyang Sun. Cybersecurity Analysis of Data-Driven Power System Stability Assessment, IEEE Internet of Things Journal, vol. 10, no. 17, pp. 15723-15735, Sept. 2023. DOI: 10.1109/JIOT.2023.3264492, to appear. (中科院一区)
[12]Sha Peng, Zhenyong Zhang, Ruilong Deng, and Peng Cheng. Localizing False Data Injection Attacks in Smart Grid: A Spectrum-based Neural Network Approach, IEEE Transactions on Smart Grid, DOI: 10.1109/TSG.2023.3261970, to appear. (中科院一区)
[13]Mengzhi Wang, Peng Cheng, Zhenyong Zhang, Mufeng Wang, and Jiming Chen. Periodic Event-triggered MPC for Continuous-time Nonlinear Systems with Bounded Disturbances, IEEE Transactions on Automatic Control, to appear. (中科院一区)
[14]Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, and Jianfeng Ma. SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid. IEEE Transactions on Information Forensics & Security, vol. 18, pp. 581-596, Dec. 2022. DOI: 10.1109/TIFS.2022.3226868, to appear. (中科院一区)
[15]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, and Moyuen Chow. Security Enhancement of Power System State Estimation With An Effective and Low-cost Moving Target Defense. IEEE Transactions on Systems, Man and Cybernetics:Systems, vol. 53, no. 5, pp. 3066-3081, May 2023. DOI: 10.1109/TSMC.2022.3222793, to appear. (中科院一区)
[16]Zhenyong Zhang* and David K. Y. Yau. CoRE: Constrained Robustness Evaluation of Machine Learning-based Stability Assessment for Power Systems. IEEE/CAA Journal of Automatica Sinica, vol. 10, no. 2, pp. 557–559, Feb. 2023. (中科院一区)
[17]Zhenyong Zhang, Yan Qin, Jingpei Wang, Hui Li, and Ruilong Deng. Detecting the One-shot Dummy Attack on the Power Industrial Control Processes with An Unsupervised Data-Driven Approach. IEEE/CAA Journal of Automatica Sinica, vol. 10, no. 2, pp. 550–553, Feb. 2023. (中科院一区)
[18]Zhenyong Zhang* and Ruilong Deng. Impact Analysis of Moving Target Defense on the Frequency Stability in Smart Grid. IEEE/CAA Journal of Automatica Sinica, vol. 10, no. 1, pp. 275–277, Jan. 2023. (中科院一区)
[19]Jingpei Wang, Mufeng Wang,Zhenyong Zhang*, and Hengye Zhu. Towards A Trust Evaluation Framework against Malicious Behaviors of Industrial IoT. IEEE Internet of Things Journal, vol. 9, no. 21, pp. 21260-21277, Nov. 2022. DOI: 10.1109/JIOT.2022.3179428, to appear.(中科院一区)
[20]Jingpei Wang, Zhenyong Zhang, and Mufeng Wang. A Trust Management Method against Abnormal Behavior of Industrial Control Networks under Active Defense Architecture. IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2549-2572, Sept. 2022, DOI: 10.1109/TNSM.2022.3173398, to appear.(中科院二区)
[21]Zhenyong Zhang, Mingyang Sun, Ruilong Deng, Chongqing Kang, and Mo-Yuen Chow. Physics-Constrained Robustness Evaluation of Intelligent Security Assessment for Power Systems. IEEE Transactions on Power Systems, vol. 38, no. 1, pp. 872-884, Jan. 2023. DOI: 10.1109/TPWRS.2022.3169139, to appear.(中科院一区)
[22]Zhenyong Zhang, Youliang Tian, Ruilong Deng, and Jianfeng Ma. A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid. IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17912-17925, Sept. 2022. DOI: 10.1109/JIOT.2022.3161790, to appear.(中科院一区)
[23]Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng and Jiming Chen. Converter-based Moving Target Defense Against Deception Attacks in DC Microgrids. IEEE Transactions on Smart Grid, DOI: 10.1109/TSG.2021.3129195, to appear.(中科院一区)
[24]Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, and Ruilong Deng. Explicit Analysis on Effectiveness and Hiddenness of Moving Target Defense in AC Power Systems. IEEE Transactions on Power Systems, vol. 37, no. 6, pp. 4732-4746, Nov. 2022. DOI: 10.1109/TPWRS.2022.3152801, to appear.(中科院一区)
[25]Zhenyong Zhang, Ruilong Deng, Peng Cheng, and Qiang Wei. “On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber-Physical Systems”, IEEE Internet of Things Journal, vol. 9, no. 11, pp. 8720-8736, June 2022, DOI: 10.1109/JIOT.2021.3118065.(中科院一区)
[26]Zhenyong Zhang, Shibo He, Yuanchao Shu, and Zhiguo Shi. “A Self-Evolving WiFi-based Indoor Navigation System Using Smartphones”, IEEE Transactions on Mobile Computing, vol. 19, no. 8, pp. 1760-1774, Aug. 2020.(CCF A, 中科院二区)
[27]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, and Jiming Chen. “Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid”, IEEE Transactions on Information Forensics & Security, vol.15, no. 1, pp. 2320-2335, Feb. 2020.(中科院一区)
[28]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, Peng Cheng, and Jiming Chen. “On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power Grid”, ACM Transactions on Cyber-physical Systems, vol. 4, no. 3, pp. 1-29, March. 2020.(ACM顶刊)
[29]Zhenyong Zhang, Junfeng Wu, Peng Cheng, and Jiming Chen. “Secure State Estimation using Hybrid Homomorphic Encryption Scheme”, IEEE Transactions on Control Systems Technology, vol. 29, no. 4, pp. 1704-1720, July 2021.(中科院二区)
[30]Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, and Peng Cheng. “Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-based Smart Grid”, IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6608-6623, Apr. 2021.(中科院一区)
[31]Zhenyong Zhang, Ruilong Deng, Peng Cheng, and Moyuen Chow. “Strategic Protection against FDI Attacks with Moving Target Defense in Power Grids”, IEEE Transactions on Control of Network Systems, vol. 9, no. 1, pp. 245-256, March 2022. DOI: 10.1109/TCNS.2021.3100411
教学课程:
《算法设计与分析》、《高级算法设计与分析》、《计算机网络》、《物联网安全》、《信息安全实践》
教学格言:
事上无难事,只怕有心人。
电子邮件:
zhangzy@gzu.edu.cn