JIANG Lin
Address:
Rm303B, Building #C, Harbin Institute of Technology (Shenzhen), Shenzhen University Town, Nanshan (518055)
Email:
zoeljiang@hit.edu.cn
Phone:
86-755-26033461
PERSONAL PROFILE
 
Research Assistant Professor, School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen)
Shenzhen Overseas High-Caliber Personnel Award (Peacock Plan C-Class)
Shenzhen High-level Professional Talent (Reserve Talent)
RESEARCH INTEREST
 
Cryptography, cloud security, big data security, privacy preserving machine learning
EDUCATION  
2006-2010
PhD Department of Computer Science, The University of Hong Kong
2002-2005
MPhil College of Information Science and Technology, Jinan University
1998-2002
Bachelor College of Information Science and Technology, Jinan University
RESEARCH & WORK EXPERIENCE  
2013-
Research Assistant Professor Harbin Institute of Technology (Shenzhen)
2011-2013
Postdoctor Shenzhen Graduate School, Harbin Institute of Technology
2010-2010
Research Assistant The University of Hong Kong
PROFESSIONAL QUALIFICATION & ACADEMIC SERVICE
 
2014
Member of IEEE, ACM, China Computer Federation (CCF), Chinese Association for Cryptographic Research (CACR), Chinese Association for Artificial Intelligence (CAAI), Hong Kong Information Security and Forensics Society (ISFS)
2014
Reviewer of Future Generation Computer Systems (FGCS), Concurrency and Computation Practice and Experience, Journal of System and Software (JSS), Information Processing Letter (IPL), Secure and Communication Networks (SCN), International Conference on Information and Communications Security (ICICS)
2014
PC member of ACM Asia Conference on Computer and Communications Security (AsiaCCS), International Conference on Information and Communications Security (ICICS), International Conference on Network and System Security (NSS)
RESEARCH PROJECTS
2016.8-2018.7
Shenzhen Research Foundation for Basic Research, Privacy preserving access control for cloud data in e-health, Principal Investigator
2016.8-2019.7
Shenzhen Key Technologies Program, Quantum private communication, Participant
2015.1-2017.12
National Natural Science Foundation for Young Scientists of China (NSFC), Attribute-based encryption with security mediator (Grant No. 61402136), Principal Investigator
2015.1-2017.12
Guangdong Natural Science Foundation, Attribute-based encryption supporting user revocation (Grant No. 2014A030313697), Principal Investigator
2015.1-2017.12
National High Technology Research and Development Program of China, Key techniques for user data privacy preserving in cloud computing (863 Program) (Grant No. 2015AA016008), Deputy Team Leade
2014.7-2016.7
Shenzhen International Cooperation Project, Data privacy preserving system for financial information security (Grant No. GJHZ20140422173959303), Participant
2014.1-2017.12
Funds for International Cooperation and Exchange of the National Natural Science Foundation of China (NSFC), Research problems on carving and tamper detection of fragmented multimedia evidence for forensic investigation (Grant No. 61361166006), Participant
2013.1-2013.12
Special Fund of National Nature Science Foundation of China (NSFC), Research on identity-based aggregate signature enabling invalid signature indication with application (Grant No. 61240011), Principal Investigator
RESEARCH ACHIEVEMENT & AWARDS
2015
The First National Cryptographic Technology Competition – Excellent Guide Teacher Award
2012
Science and Technology Progress Award of Shenzhen, Second prize, Ranking the third
PATENT
   
N/A
PAPER & BOOK PUBLICATIONS
Journal (first or corresponding author)
[J9] Zechao Liu, Zoe L. Jiang*, etc. Offline/Online Attribute-Based Encryption with Verified Outsourced Decryption, Concurrency and Computation: Practice and Experience. (SCI, IF 0.5, JCR 3, CCF C) (accepted)
[J8] Ye Li, Zoe L. Jiang*, etc. Outsourcing Privacy-preserving ID3 Decision Tree over Horizontal Partitioned Data for Multiple Parties, Int. J. of High Performance Computing and Networking (IJHPCN). (EI) (accepted)
[J7] Joseph Liu, M.H. Au, Junbin Fang, Zoe L. Jiang*, Willy Susilo, Jianying Zhou. Efficient Privacy-Preserving Charging Station Reservation System, the Computer Journal. (SCI, IF 0.787, JCR 3, CCF B) (doi: 10.1093/comjnl/bxv117)
[J6] Zoe L. Jiang, Junbin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, K. P. Chow, Lucas C. K. Hui, S. M. Yiu, and K. H. Pun. Maintaining Hard Disk Integrity with Digital Legal Professional Privilege (LPP) Data, IEEE Transactions on Information Forensics and Security, 8(1), pp. 821-828, 2013.5. (SCI, IF 2.065, JCR 1, CCF A)
[J5] Zoe L. Jiang, Junbin Fang, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, M.M. Sheng. k-Dimension Hashing scheme for Hard Disk Integrity Verification in Computer Forensics, Journal of Zhejiang University-SCIENCE C-Computers & Electronics, 12(10), pp. 809-818, 2011. (SCI, IF 0.308, JCR 4)
[J4] Junbin Fang, Zoe Lin Jiang*, Lucas C.K. Hui, S.M. Yiu. Checking Key Integrity Efficiently for High Speed Quantum Key Distribution by using Combinatorial Group Testing, Optics Communication, 284(1), pp.531-535, 2011. (SCI, IF 1.542, JCR 2)
[J3] Zoe L. Jiang, Junbin Fang, S.M. Yiu, K.P. Chow, Lucas C.K. Hui, Long Chen, Xiamu Niu, Xuan Wang. A Dual Cube Hashing Scheme for Solving Hard Disk Integrity Verification Problem, International Journal of Digital Content Technology and its Applications, 6(13), pp. 285-296, 2012. (EI)
[J2] Junbin Fang, Zoe L. Jiang*, S.M. Yiu, K.P. Chow, Lucas C.K. Hui, Long Chen, Xiamu Niu, Xuan Wang. An Efficient Scheme for Hard Disk Integrity Check in Digital Forensics by Hashing with Combinatorial Group Testing, International Journal of Digital Content Technology and its Applications, 5(2), pp. 300-308, 2011. (EI)
[J1] Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Y. Dong, S.H.Y. Wong. Chained Threshold Proxy Signature without and with Supervision, Journal of Software Engineering and Applications, 2(4), pp. 267-275, 2009.

Journal (others)
[J8] Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zeo L. Jiang and Xuan Wang*. Key Based Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing, Future Generation Computer Systems. (accepted) (SCI, IF2.786, JCR 1)
[J7] Zili Zhang, Xuan Wang, Kai Han, Zoe L. Jiang. A Novel Arc Segmentation Approach for Document Image Processing, International Journal of Pattern Recognition and Artificial Intelligence, 29(1), 2015.2. (SCI, IF 0.669)
[J6] Zili Zhang, Xuan Wang, Waqas Anwar, Zoe L. Jiang. A Comparison of Moments-based Logo Recognition Methods, Abstract and Applied Analysis, 2014, Article ID 854516, 2014.8. (SCI, IF 1.932)
[J5] 程丽, 蒋琳, 何孟飞. 面向MTK山寨手机的电子证据分析与取证, 信阳师范学院学报, 27(4), pp. 581-584, 2014.
[J4] Junbin Fang, Zoe L. Jiang, etc. Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design, Quantum Information Process, 13(6), pp. 1425-1435, 2014.6, doi: 10.1007/s11128-014-0737-7. (SCI, IF 2.960 , JCR 1)
[J3] Xianhua Song, Shen Wang, Siuming Yiu, Lin Jiang, Xiamu Niu. Detection of Image Region Duplication Using Spin Image, IEICE Transactions on Information and Systems, E96-D(7), pp. 1565-1568, 2013. (SCI, IF 0.191, JCR 4)
[J2] Man Ho Au, Joseph K. Liu, Junbin Fang, Zoe L. Jiang, Willy Susilo, Jianying Zhou. A New Payment System for Enhancing Location Privacy of Electric Vehicles, IEEE Transactions on Vehicular Technology, 63(1), pp. 3-18, 2014.1. (SCI, IF 2.642, JCR 1区, CCF B)
[J1] Junbin Fang, LIAO Chang‐jun, Zoe Lin Jiang, WEI Zheng‐jun, Jin‐dong WANG, Song‐hao LIU. Impact of Picosecond Laser Pulse Waveform on Detection Efficiency of Gated‐Mode Avalanche Photodiodes for Quantum Key Distribution, Optics Communications, 284(3), pp. 833-837, 2011. (SCI, IF 1.542, JCR 2)
CONFERENCE PAPERS/TALKS
 
Conference (first or corresponding author)
[C9] Zoe L. Jiang, Ruojing Zhang, Zechao Liu, S.M. Yiu, C.K. Hui, junbin Fang, Xuan Wang. A Revocable outsourcing Attribute-based Encryption, SPNCE2016. (accepted)
[C8] Zechao Liu, Zoe L. Jiang*, Xuan Wang, S.M. Yiu, Chunkai Zhang and Xiaomeng Zhao. Dynamic Attribute-Based Access Control in Cloud Storage Systems, the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 August, 2016. (EI, CCF C) (accepted)
[C7] Chuting Tan, Zoe L. Jiang(joint first author), Xuan Wang, S.M. Yiu, Junbin Fang, Jin Li, Yabin Jin, Jiajun Huang. Generic Construction on Verifiable Predicate Encryption, the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS2016), 16, May 30-June 03, 2016, pp. 889-894, Xi’an, China. (EI, CCF C) (doi: 10.1145/2897845.2897919)
[C6] Xiaoyan Liu, Zoe L. Jiang*, S.M. Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Junbin Fang. Outsourcing Two-party Privacy Preserving K-means Clustering Protocol in Wireless Sensor Networks, the 11th International Conference on Mobile Ad-hoc and Sensor Networks (IEEE MSN2015), 2015.12.16-18, pp. 124-133, Shenzhen, China. (EI) (doi: 10.1109/MSN.2015.42)
[C5] Yuechen Chen, Zoe L. Jiang(co-corresponding author), S.M. Yiu, Joseph K. Liu, M.H. Au, and Xuan Wang, Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator, the 2014 International Conference on Information and Communications Security (ICICS2014), 2014.12.16-17, LNCS 8958, pp. 274-289, doi: 10.1007/9780-3-319-21966-0_20. (EI, CCF C)
[C4] Zoe L. Jiang, Junbin Fang, S.M. Yiu, L.C.K. Hui. Secure End-to-end Browsing System with Mobile Composition, the 2nd International Conference on Internet Technology and Applications (iTAP 2011), pp.1-4, Wuhan, China, 2011. (EI)
[C3] Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Y. Dong, S.H.Y. Wong. Chained Threshold Proxy Signature without and with Supervision, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, Dec. 12-14, Vol. 3, pp. 837-840, 2008. (EI)
[C2] Zoe Jiang, Lucas Hui and Siu-Ming Yiu. Improving Disk Sector Integrity Using k-Dimension Hashing, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics IV, Vol. 285, No. 14, pp. 87-98, 2008. (EI, CCF C)
[C1] Zoe L. Jiang, Lucas C.K. Hui, K.P. Chow, S.M. Yiu and Pierre K.Y. Lai. Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, the 2007 International Workshop on Forensics for Future Generation Communication environments (F2GC-07), Proceedings of Future Generation Communication and Networking, Vol. 2, pp. 141-145, 2007. (EI)

Conference (others)
[C12] Tong Li, Zheli Liu, Jin L, Chunfu Jia, Zoe L. Jiang. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage, 21st Australian Conference on Information Security and Privacy (ACISP2016), Part II, LNCS 9723, pp. 153-169, Melbourne, Australia, 4-6 July, 2016. (EI, CCF C) (doi: 10.1007/978-3-319-40367-0 10)
[C11] Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe L. Jiang and Xuan Wang*. Key based reducer placement for data analytics across data centers considering bilevel resource provision in cloud computing, International Conference on Internet of Things and Big Data, Rome, Italy. April 23-25, 2016. (EI) (accepted).
[C10] Gangzhou, Yanbin Tang, Junbin Fang, Zoe L. Jiang, etc., Photo Forensics on Shanzhai Mobile Phone, the 8th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2013), LNCS 7992, pp. 454-464, 2013.8. (EI, CCF C)
[C9] Mengfei He, Junbin Fang*, Zoe L. Jiang, S.M. Yiu, K.P. Chow, Xiamu Niu. Digital forensic on MTK-based Shanzhai mobile phone with NAND Flash, the First International Conference on Digital Forensics and Investigation (ICDFI), Beijing, China Sept. 21-23, 2012.
[C8] Junbin Fang, Zoe Lin Jiang, S.M. Yiu, Lucas C.K. Hui, K.P. Chow, Mengfei He. Investigating the web-based contents on Shanzhai Mobile Phone. Seventh IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012), Vancouver BC, Canada, 2012. (EI)
[C7] Junbin Fang, Zoe L. Jiang, K.P. Chow, S.M. Yiu, Lucas C.K. Hui, Gang Zhou, Mengfei He, Yanbin Tang. Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones, Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII, pp. 129-142, Pretoria, South Africa, 2012. (EI)
[C6] Junbin Fang, Zoe L. Jiang, S.M. Yiu, K. P. Chow, L.C.K. Hui, Long Chen, Xiamu Niu. A Dual Cube Hashing Scheme for Solving LPP Integrity Problem, Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2011), pp. 1-7, Oakland, USA, 2011. (EI, best paper award)
[C5] Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui. Efficient key integrity verification for quantum cryptography using combinatorial group testing, Quantum Information and Computation VIII Conference 7702 - Proceedings of SPIE, Vol. 7702, Orlando, USA, Apr. 5-9, 2010. (EI)
[C4] Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui. Hard Disk Integrity Check by Hashing with Combinatorial Group Testing, the 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC-09), Jeju Island, Korea, Dec. 10-12, Vol. 1, pp. 569-574, 2009. (EI)
[C3] T.W. Chim, S.M. Yiu, L.C.K. Hui, Zoe L. Jiang, Victor O.K. Li. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs, 1st International Conference on Ad Hoc Networks (ADHOCNETS 2009), Ontario, Canada, Sep. 23-25, 2009. (EI)
[C2] S.H.Y. Wong, Zoe L. Jiang, L. C. K. Hui, S. M. Yiu. Two Efficient Proxy Signature Schemes for Delegation Chains With Nonrepudiation and Untraceability, Proceedings of The 2009 International Conference on Security and Management (SAM 2009), Las Vegas, USA, Jul. 13-16, Vol. 1, pp. 307-313, 2009.
[C1] Frank Y.W. Law, Pierre K.Y. Lai, Zoe L. Jiang, Ricci S.C. Ieong, Michael Y.K. Kwan, K.P. Chow, Lucas C.K. Hui, S.M. Yiu, C.F. Chong. Protecting Digital Legal Professional Privilege (LPP) Data, 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE2008), California, USA, pp. 91-101, 2008 (EI).
TEACHING/SUPERVISING EXPERIENCE
TEACHING EXPERIENCE
Designed and taught full-time master-level course on APPLIED CRYPTOGRAPHY (In English) Spring 2012, Fall 2012, 2014-2016
Designed and taught part-time master-level course on INFORMATION SECURITY ENGINEERING
Fall 2012
SUPERVISING EXPERIENCE
Retain Master Tutor qualifications in 2014
Updated:2019-02