支强

发布者:黄有玉发布时间:2025-12-02浏览次数:2318

支 强     

     

个人简介

1990年生,2012年本科生交换项目留日,并于2020年取得名古屋大学博士学位(工学)。主要从事网络空间安全交叉领域的研究,聚焦于边缘智能与安全建模等关键技术,致力于构建可信、高效的分布式智能系统。联系方式:Emailzhi{at}jsnu.edu.cn

工作经历

2021.9 – 现在:江苏师范大学 人工智能与计算机学院 副教授

2020.4 - 2021.8东京工业大学 工学院 助理研究员

2020.4 - 2021.8日本电子情报通信学会(IEICE)东京事务总局 助理研究员

主讲课程

专业课:计算机网络,嵌入式系统,人工智能,深度学习,C++程序设计,计算机组成原理,智能优化与计算,最优化方法

选修课:专业英语,标准日本语

主要成就及荣誉

江苏省双创博士(2023)、应用情报技术者(Applied Information Technology Engineer)(日本-2019)、NEC财团优秀论文奖(2018)、日语能力JLPT一级(2014,2024)等。

主要研究业绩(第一/通讯作者)

Ÿ“DGDPFL: Dynamic Grouping and Privacy Budget Adjustment for Federated Learning in Networked Service Management”, IEEE Transactions on Network and Service Management, pp. 1-13, 2025.

Ÿ“Collaborative Metadata Indexing: A Privacy-Preserving Framework for Metadata Management in Vehicular Networks”, IEEE Transactions on Vehicular Technology, pp. 1-16, 2025.

ŸFedPDA: Personalized federated learning based on attribute similarity migration”, Information Sciences, vol. 720, no. 122553, 2025.

ŸA Dual-Layer Network Security Model for Smart Factories Based on the Sentinel Mechanism”, Computer Networks, vol. 271, no. 111580, 2025.

ŸAn Approach to Develop Assurance Models toward Safety of the Intended Functionality”, International Conference on Intelligent Computing, Ningbo, China, pp. 338-349, 2025.

Ÿ“ODFa2: Overall Defense Framework against Cyber-Attacks on Intelligent Connected Vehicles,” IEEE Transactions on Vehicular Technology, vol. 73, no. 5, pp. 6318-6331, 2024.

Ÿ“An Efficient Multiplex Network Model for Effective Honeypot Roaming against DDoS Attacks”, IEEE Transactions on Network Science and Engineering, 11(12), pp. 1909-1921, 2023.

Ÿ“Modeling and Analyzing Honeypot Roaming with a Multi-Layer Adaptive Network Approach and Redirection Mechanism”, China Communications, 2024.

Ÿ“Element quality indicator: A quality assessment and defect detection method for software requirement specification”, Heliyon, vol. 9, no. 5, e16469, 2023.

Ÿ“A Lightweight Secure Retrieval Model Applied to Intranet”, Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 3, pp. 274-282, 2023.

Ÿ“An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications”. Computer Systems Science and Engineering, vol. 46, no. 1, pp. 389-402, 2023.

Ÿ“A Defect Detection Method for the Primary Stage of Software Development”. Computers, Materials & Continua, vol. 74, no. 3, pp. 5141-5155, 2023.

Ÿ“Empirically Modeling Enterprise Architecture Using ArchiMate”. Computer Systems Science and Engineering, vol. 40, no.1, pp. 357–374, 2022.

Ÿ“An Evaluation of Value-Oriented Review for Software Requirements Specification”, Computer Systems Science and Engineering, vol. 37, no.3, pp. 149–168, 2021.

Ÿ“A Composite Safety Assurance Method for Developing System Architecture Using Model Checking”, International Journal of Systems and Software Security and Protection, vol. 12, no. 1, pp.78-89, 2021.

Ÿ“IMAF: A Visual Innovation Methodology Based on ArchiMate Framework”, International Journal of Enterprise Information Systems, Vol 16, pp. 31-52, 2020.

Ÿ“An Evaluation of Quantitative Non-Functional Requirements Assurance using ArchiMate”, IEEE Access, vol 8, 2020.

Ÿ“A Systematic Literature Review on Enterprise Architecture Visualization Methodologies”, IEEE Access, vol 8, 2020.

Ÿ“Automated Reasoning towards Quantitative Security Assurance”, International Conference on Software Engineering and Service Science, pp. 394-399, Beijing, China, 2019.

Ÿ“A Composite Dependability for Enterprise Architecture”, International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, pp. 1130-1137, Belgrade, Serbia, 2019.

Ÿ“ArchiMate Business Model Patterns to e-Healthcare”, Proceedings of KES-InMed-19 and KES-IIMSS-19 Conferences, Malta, 2019.

Ÿ合成安全性の研究”,6th D-Case研究会, Nagoya, Japan, 2019.

Ÿ“A Proposal for Developing EA Models toward Innovation”, International Congress on Advanced Applied Informatics, pp. 853-858, Toyama, Japan, 2019.

Ÿ“Visualized Assurance Approach for Enterprise Architecture”, Journal of information and communication convergence engineering, vol. 17, no. 2, pp. 117-127, 2019.

Ÿ“Aspect Analysis towards ArchiMate Diagrams”, Procedia Computer Science, vol. 159, pp. 973-980, 2019.

Ÿ“IMSA-Intra Model Security Assurance”, Journal of Internet Services and Information Security, vol. 8, no. 2, pp.18-32, 2018.

Ÿ“An Approach for Requirements Elicitation using Goal, Question, and Answer”, International Congress on Advanced Applied Informatics, pp. 847-852, Toyama, Japan, 2019.

Ÿ“Quantitative Evaluation in Security Assurance”, IEEE International Conference on Computer and Communications, pp. 2477-2483, Chengdu, China, 2018.

Ÿクラウドストレージにおける安全な検索機能の実装と評価”, 17th IEEEシンポジウム広島セクション, Okayama, Japan, 2016.

指导学生

ŸDongyi Han, Qiang Zhi, “DGDPFL: Dynamic Grouping and Privacy Budget Adjustment for Federated Learning in Networked Service Management”, IEEE Transactions on Network and Service Management, pp. 1-13, 2025.

ŸXiang Zhou, Qiang Zhi, et.al, “FedPDA: Personalized federated learning based on attribute similarity migration”, Information Sciences, vol. 720, no. 122553, 2025.

ŸYixin Liu, Qiang Zhi, A Dual-Layer Network Security Model for Smart Factories Based on the Sentinel Mechanism”, Computer Networks, vol. 271, no. 111580,2025.