Calculated based on number of publications stored in Pure and citations from Scopus
20092025

Research activity per year

Personal profile

Personal profile

Name: Tian Donghai
Disciplines: Computer Science and Technology, Cyberspace Security
Title: Associate Professor
Tel: 010-68913468
E-mail: donghaitad@gmail.com, donghaitad@126.com
Address: School of Computer Science, Beijing Institute of Technology, No.5 Zhongguancun South Street, Haidian District, Beijing Personal Information
In March 2012, he received his doctorate degree in computer application from Beijing Institute of Technology. From August 2009 to August 2011, he was sponsored by China Scholarship Council to study in Pennsylvania State University in the United States under the guidance of Professor Liu Peng, a well-known expert in the field of international information security. He is currently the first author (or corresponding author) of IEEE Transactions on Cloud Computing, Software: More than 20 papers have been published in Practice and Experience, Computer Networks, Future Generation Computer Systems, NDSS, ISC, SecureComm and other important journals and conferences at home and abroad. Two national invention patents were authorized, and one academic monograph was published.
As the project leader, he presided over 7 vertical research projects, including: National Natural Science Foundation of China, State Key Laboratory of Information Security, Key Laboratory of Network Evaluation Technology of Chinese Academy of Sciences (2 projects), Shanghai Key Laboratory of Information Security Comprehensive Management Technology Research (2 projects), and Basic Research Fund of Beijing Institute of Technology (2 projects). As a key member of Beijing Key Laboratory of Software Security Engineering Technology of the university, he participated in a number of national and ministerial scientific research projects such as the Ministry of Science and Technology, the Ministry of Finance and the Administration of Science and Industry for National Defense.
He is a member of the program committee of many international academic conferences, and a reviewer of many important SCI journals such as IET Information Security, Computer Networks, Computers & Electrical Engineering, etc. Served as the degree center of the Ministry of Education relevant degree awarding unit sampling degree thesis communication evaluation expert, national college student information security competition evaluation expert, National Natural Science Foundation communication evaluation expert.

Research Interests

Research Direction
Software security (based on deep learning), malware analysis and detection (combining machine learning and program analysis technology), Android system security, big data security (based on data mining technology), cloud computing security (virtualization technology)

Education

Personal Information
In March 2012, he received his doctorate degree in computer application from Beijing Institute of Technology. From August 2009 to August 2011, he was sponsored by China Scholarship Council to study in Pennsylvania State University in the United States under the guidance of Professor Liu Peng, a well-known expert in the field of international information security. He is currently the first author (or corresponding author) of IEEE Transactions on Cloud Computing, Software: More than 20 papers have been published in Practice and Experience, Computer Networks, Future Generation Computer Systems, NDSS, ISC, SecureComm and other important journals and conferences at home and abroad. Two national invention patents were authorized, and one academic monograph was published.
As the project leader, he presided over 7 vertical research projects, including: National Natural Science Foundation of China, State Key Laboratory of Information Security, Key Laboratory of Network Evaluation Technology of Chinese Academy of Sciences (2 projects), Shanghai Key Laboratory of Information Security Comprehensive Management Technology Research (2 projects), and Basic Research Fund of Beijing Institute of Technology (2 projects). As a key member of Beijing Key Laboratory of Software Security Engineering Technology of the university, he participated in a number of national and ministerial scientific research projects such as the Ministry of Science and Technology, the Ministry of Finance and the Administration of Science and Industry for National Defense.
He is a member of the program committee of many international academic conferences, and a reviewer of many important SCI journals such as IET Information Security, Computer Networks, Computers & Electrical Engineering, etc. Served as the degree center of the Ministry of Education relevant degree awarding unit sampling degree thesis communication evaluation expert, national college student information security competition evaluation expert, National Natural Science Foundation communication evaluation expert.

Professional Experience

Personal Information
In March 2012, he received his doctorate degree in computer application from Beijing Institute of Technology. From August 2009 to August 2011, he was sponsored by China Scholarship Council to study in Pennsylvania State University in the United States under the guidance of Professor Liu Peng, a well-known expert in the field of international information security. He is currently the first author (or corresponding author) of IEEE Transactions on Cloud Computing, Software: More than 20 papers have been published in Practice and Experience, Computer Networks, Future Generation Computer Systems, NDSS, ISC, SecureComm and other important journals and conferences at home and abroad. Two national invention patents were authorized, and one academic monograph was published.
As the project leader, he presided over 7 vertical research projects, including: National Natural Science Foundation of China, State Key Laboratory of Information Security, Key Laboratory of Network Evaluation Technology of Chinese Academy of Sciences (2 projects), Shanghai Key Laboratory of Information Security Comprehensive Management Technology Research (2 projects), and Basic Research Fund of Beijing Institute of Technology (2 projects). As a key member of Beijing Key Laboratory of Software Security Engineering Technology of the university, he participated in a number of national and ministerial scientific research projects such as the Ministry of Science and Technology, the Ministry of Finance and the Administration of Science and Industry for National Defense.
He is a member of the program committee of many international academic conferences, and a reviewer of many important SCI journals such as IET Information Security, Computer Networks, Computers & Electrical Engineering, etc. Served as the degree center of the Ministry of Education relevant degree awarding unit sampling degree thesis communication evaluation expert, national college student information security competition evaluation expert, National Natural Science Foundation communication evaluation expert.

Research Achievement


代表性学术成果
1. Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu. Semi-synchronized Non-blocking Concurrent Kernel Cruising. IEEE Transactions on Cloud Computing, 2020. (SCI, 中科院JCR一区)
2. Wenjie Wang, Donghai Tian, Weizhi Meng, Xiaoqi Jia, Runze Zhao, Rui Ma. MSYM: A Multichannel Communication System for Android Devices. Computer Networks, 2020. (CCF B类SCI期刊)
3. Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu. KEcruiser: A Novel Control Flow Protection for Kernel Extensions. Future Generation Computer Systems, 2019. (SCI, 中科院JCR一区)
4. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu: A policy-centric approach to protecting OS kernel from vulnerable LKMs. Software Practice and Experience: 1269-1284, 2018. (CCF B类SCI期刊)
5. Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue: An online approach to defeating ROP attacks. Concurrency and Computation: Practice and Experience, accepted, 2018. (SCI)
6. Tian Donghai, Jia Xiaoqi, Chen Junhua, Hu Changzhen: A Concurrent Security Monitoring Method for Virtualization Environments. China Communications, 2016. (SCI)
7. Tian Donghai, Jia Xiaoqi, Chen Junhua, Hu Changzhen, Xue Jingfeng: A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules. China Communications, 2016. (SCI)
8. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu: Defeating buffer overflow attacks via virtualization. Computers & Electrical Engineering: 1940-1950, 2014. (SCI)
9. Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu: Semantic aware attribution analysis of remote exploits. Security and Communication Networks, 2013. (SCI)
10. Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu: Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. In Proceedings of the 18th Network and Distributed System Security Symposium (NDSS), 2012. (系统安全国际顶级会议)
11. Xi Xiong, Donghai Tian, Peng Liu: Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. In Proceedings of the 18th Network and Distributed System Security Symposium (NDSS), 2011. (系统安全国际顶级会议)
所获奖励
第十一届“世纪杯”学生课外活动学术科技作品竞赛三等奖(指导教师)
第十五届“世纪杯”学生课外活动学术科技作品竞赛三等奖(指导教师)

Fingerprint

Dive into the research topics where Donghai Tian is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or