1. 黄永峰,李松斌,《网络隐蔽通信》,清华大学出版社(国际首部系统介绍网络隐蔽通信技术专著)
  2. 黄永峰,《IP网络多媒体通信技术》,人民邮电出版社,2003.1
  3. 黄永峰,《因特网语音通信技术》,人民邮电出版社,2001,12(863高技术丛书)
  4. 黄永峰,厥勇等,《 Windows/Linux/UNIX综合组网技术》,清华大学出版社,2002.9
  5. 李星,黄永峰,《高速计算机互联网络》,人民邮电出版社,2005.6(“十五”国家重点图书出版规划项目)
  6. 王欣靖,李星,黄永峰,《网络新技术点评》,人民邮电出版社, 2003,12
  7. 黄永峰,李星,《计算机网络教程》,清华大学出版社,2006.2(清华大学信息技术学院系列教材)
  8. 黄永峰,邓泽,《Data&Voice Network》,人民邮电出版社, 2002.10
  9. 黄永峰,周可,《路由与交换》,人民邮电出版社, 2004.3(2011获得中国电子教育学会教材一等奖)
  10. 黄永峰、李建庆编著,《SIP协议及其应用》,人民邮电出版社,2009.1




  1. Covert voice over internet protocol communications based on spatial model SCIENCE CHINA Technological Sciences 2016,Janu.No.1Vol.59,pp117-128
  2. Structured microblog sentiment classification via social context regularization Neurocomputing 2016.1
  3. Personalized Microblog Sentiment Classification via Multi-Task Learning. AAAI 2016 In Proceedings of. AAAI
  4. Yubo Luo, Yongfeng Huang, Fufang Li, Chinchen Chang, “Text Steganography Based on Ci-poetry Generation Using Markov Chain Model”, KSII Transactions on Internet and Information Systems, 2016 Sept
  5. Fangzhao Wu, Yongfeng Huang. Sentiment Domain Adaptation with Multiple Sources. ACL 2016: 301-310. (CCF A,long paper, oral presentation,acceptance rate = 25.8%)
  6. Fangzhao Wu, Yongfeng Huang: Personalized Microblog Sentiment Classification via Multi-Task Learning. In Proceedings of AAAI 2016: 3059-3065. (CCF A,long paper, acceptance rate = 26%)
  7. Fangzhao Wu, Yongfeng Huang, Yangqiu Song: Structured microblog sentiment classification via social context regularization. Neurocomputing 175: 599-609 (2016). (SCI Journal, IF=2.39)
  8. Fangzhao Wu, Yongfeng Huang, Yangqiu Song, Shixia Liu. Towards Building a High-Quality Microblog-Specific Chinese Sentiment Lexicon. Decision Support Systems 87: 39-49 (2016). (SCI Journal, IF=2.6)
  9. Fangzhao Wu, Jinyun Shu, Yongfeng Huang, Zhigang Yuan. Co-Detecting Social Spammers and Spam Messages in Microblogging via Exploiting Social Contexts. Neurocomputing 201: 51-65 (2016). (SCI Journal, IF=2.39)
  10. Shanshan Tu, Shaozhang Niu, Hui Li. A Fine-grained Access Control and Revocation Scheme on Clouds, Journal of Wiley’s Concurrency and Computation: Practice & Experience[J]. 2016. 28: 1697–1714. (SCI),WOS:000374011400002(No. 61070207)
  11. Shanshan Tu, Yongfeng Huang, Chathura M. S. Magurawalage, Access control system based cloudlet and ABE for mobile cloud computing, Journal of Internet Technology[J] 2016. (SCI)(No.U1405254, 61271392)
  12. Shanshan Tu, Chunye Zhao, Yongfeng Huang, Towards Provenance Cloud SecurityAuditing Based onAssociation Rule Mining. Applied Mathematics and Computation[J], 2016. (SCI)
    (No.U1405254, U1536115, U1536207) (No. 2015M581101).
  13. Shanshan Tu, Huaizhou Tao, Yongfeng Huang. SSLSS: Semi-Supervised Learning-based Steganalysis Scheme for Instant Voice Communication Network. International Journal of Cooperative Information Systems [J], 2016. (SCI),(No.U1405254, U1536115, 61271392) (No. 2015M581101, 2016T90095)
  14. Haoyu Chen, Shanshan Tu, Chunye Zhao, Yongfeng Huang. Provenance Cloud Security Auditing System Based on Log Analysis, IEEE International Conference of Online Analysis and Computing Science (ICOACS 2016)[C], 2016: 155-159. (EI)
    Accession number: 20164002875520,(No. 2015M581101) (No. U1405254, U1536115, U1536207)
  15. Chunye Zhao, Shanshan Tu, Haoyu Chen, Yongfeng Huang. Efficient Association Rule Mining Algorithm Based on User Behavior for Cloud Security Auditing, IEEE International Conference of Online Analysis and Computing Science (ICOACS 2016)[C], 2016:145-149. (EI),Accession number: 20164002875518,(No. 2015M581101) (No. U1405254, U1536115, U1536207)
  16. Fei Zhong, Shanshan Tu, Chunye Zhao, Yongfeng Huang. Allocation model of reliability based on synergy principle, IEEE International Conference of Online Analysis and Computing Science (ICOACS 2016)[C], 2016:160-164. (EI)
    Accession number: 20164002875521
    (No. 2015M581101) (No. U1405254, U1536115, U1536207)
  17. Sadaqat Ur Rehman, Shanshan Tu, Yongfeng Huang, Zhongliang Yang. Face recognition: A novel un-supervised convolutional neural network method, IEEE International Conference of Online Analysis and Computing Science (ICOACS 2016)[C], 2016:139-144. (EI),Accession number: 20164002875517,(No. 2015M581101) (No. 61271392, U1405254, U1536115, U1536207)


  1. Fangzhao Wu, Sixing Wu, Yongfeng Huang: Sentiment Domain Adaptation with Multi-Level Contextual Sentiment Knowledge. (accepted, CCF B,long paper, oral presentation,acceptance rate = 17.6%)
  2. Fangzhao Wu, Yangqiu Song, Yongfeng Huang: Microblog Sentiment Classification with Contextual Knowledge Regularization. In Proceedings of AAAI 2015: 2332-2338. (CCF A,long paper, acceptance rate = 26.67%)
  3. Fangzhao Wu, Yongfeng Huang: Collaborative Multi-domain Sentiment Classification. In Proceedings of ICDM 2015: 459-468. (CCF B,long paper, oral presentation,acceptance rate = 8.4%)
  4. Detection in Microblogging with Social Context Regularization. In Proceedings of CIKM 2015: 1601-1610. (CCF B,long paper, oral presentation,acceptance rate = 17.98%)
  5. Towards Efficient and Secure Access Control System for Cloud Computing China Communications[J] 2015, 12(12): 43-52
  6. Collaborative Multi-domain Sentiment Classification. ICDM In Proceedings of ICDM 2015, pp459-468.
  7. Shanshan Tu, Yongfeng Huang. Towards Efficient and Secure Access Control System for Mobile Cloud Computing, China Communications[J], 2015, 12(12): 43-52. (SCI)
    WOS:000367215100006,(No.U1405254, 61472092) (No.2015M581101) (No.2014BAH41B00)
  8. Shanshan Tu, Shaozhang Niu, Yongfeng Huang. An effective and secure access control system scheme in the cloud computing. Chinese Journal of Electronics[J] 2015, 24(3): 524-528. (SCI),WOS:000358027200015,(No.U1405254, 61370195)
  9. Shanshan Tu, Huaizhou Tao, Yongfeng Huang. Detection of Instant Voice Communication Steganography Based on Semi-Supervised Learning, J Tsinghuauniv (Sci & Tech)[J], 2015, 55(11): 1246-1252. (In Chinese, EI),Accession number: 20155201713362
  10. Shanshan Tu, Yongfeng Huang, et al. Hierarchical access control for mobile cloud computing. Proceedings of 12th China Information Hiding Workshop (CIHW2015)[C], Wuhan, China, April, 2015, pp. 560-569. 优秀论文奖(6/70).

1. Fangzhao Wu, Jun Xu, Hang Li, Xin Jiang: Ranking Optimization with Constraints. In Proceedings of CIKM 2014: 1049-1058. (CCF B,long paper, oral presentation,acceptance rate = 21%)
2. Yingcai Wu, Shixia Liu, Kai Yan, Mengchen Liu, Fangzhao Wu: OpinionFlow: Visual Analysis of Opinion Diffusion on Social Media. IEEE Trans. Vis. Comput. Graph. 20(12): 1763-1772 (2014) (SCI Journal, IF=1.4, CCF A)


  1. Yong Feng Huang*, Shanyu Tang, Wanxia Yang. An Information – Theoretical Model for Streaming Media Based Stegosystems, Computer and Informatic, Vol.32, No.1, pp. 47-62.2013.1(SCI收录)
  2. Huang Yongfeng,Bao Chunlan An Information – Theoretical Model for Streaming Media Based Stegosystems,computer and informatic,Vol.20.N0.1,2013.P1-15
  3. Fangzhao Wu, Yangqiu Song, Shixia Liu, Yongfeng Huang, and Zhenyu Liu. 2013. Lead-lag analysis via sparse co-projection in correlated text streams. In Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM ’13). ACM, New York, NY, USA, 2069-2078.
  4. Bingkun Wang, Yulin Min, Yongfeng Huang, Xing Li, and Fangzhao Wu. 2013. Review rating prediction based on the content and weighting strong social relation of reviewers. In Proceedings of the 2013 international workshop on Mining unstructured big data using natural language processing. ACM, New York, NY, USA, 23-30.
  5. Long Ziyi; Cheng Fu Sui Jing; Sun Donghong; Huang Yongfeng, “Research on methods to identify the opinion leaders in internet community,” 2013 4th IEEE International Conference on Software Engineering and Service Science, pp.934-937, 23-25 May 2013
  6. 刘哲,黄永峰,罗芳,陈跻,王丙坤。网络新词识别方法研究,计算机工程与科学,vol.35 No.9, Sep.2013.
  7. Bingkun Wang, Yulin Min, Yongfeng Huang, Xing Li,Chinese reviews sentiment classification based on quantified sentiment lexicon and fuzzy set, ICIST 2013
  8. Yuan J, Huang Y, Li X, A Quantitation Method to the Imperceptibility of Hiding-Vector in Multi-dimensional Hiding Space[J]. Chinese Journal of Electronics, 2013. 4(22): 826-832.
  9. Yuan J, Huang Y, Li X. A Method to Build Subliminal Channel in Streaming Media with Multiple Steganography Methods: 1st IEEE China Summit and International Conference on Signal and Information Processing. 2013: Beijing, China[C].
  10. 袁键, 黄永峰, 李星. 动态量化码本上的量化索引调制隐写算法研究: 第十一届全国信息隐藏暨多媒体信息安全学术大会(CIHW2013). 2013: 西安[C].
  11. 李松斌, 黄永峰, 卢记仓. 基于统计模型及SVM的低速率语音编码QIM隐写检测[J]. 计算机学报, 2013. 36(6): 1168-1176.
  12. 师尚伟, 黄永峰, 胡萍. 网络流媒体多维隐藏理论的应用研究: 第十一届全国信息隐藏暨多媒体信息安全学术大会(CIHW2013). 2013: 西安[C].


  1. Yongfeng Huang, Chenghao Liu, Shanyu Tang, Sen Bai,Steganography Integrating into Low-bit Rate Speech Codec.IEEE Transactions on Information Forensics and Security, Volume: 7, Issue: 6, pp. 1865-1875, 2012, 12.
  2. Yongfeng Huang, L. Ying, J. Yuan, S. Tang。Network service registration based on role-goal-process-service meta-model in a P2P network.IET Communications, Volume: 6, Issue: 12, pp. 1632-1639, 2012.
  3. Lizhi Ying*, Yongfeng Huang,Jian Yuan,Yunlu Bai,A novel covert timing channel based on RTP and RTCP.Chinese Journal of Electronics, Vol.21, No.4, pp.711-714, 2012
  4. Songbin Li*, Huaizhou Tao*, Yongfeng Huang,Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis, J Zhejiang Univ.-Sci. C (Comput. & Electron.), Vol.13. No.8, P624-534. AUG., 2012.
  5. Bingkun WANG, Yongfeng HUANG, Wanxia YANG, Xing Li Short text classification based on strong feature thesaurus J Zhejiang Univ.-Sci. C (Comput. & Electron.). Vol.13. No.9, P649-659. Sept, 2012
  6. 李松斌*, 孙东红, 袁键,黄永峰.一种基于码字分布特性的G.729A压缩语音流隐写检测方法, 电子学报, 2012, 40(4)
  7. Lizhi Ying*, Xinhao Zhou*, Jian Yuan*, Yongfeng Huang.A novel focused crawler based on Breadcrumb navigation .Advances in Swarm Intelligence. Proceedings Third International Conference, ICSI 2012, pp. 264-271
  8. 应励志, 袁键, 黄永峰, 李星.基于数据及其控制协议的协同时分信息隐藏算法.北京邮电大学学报,成功申请全国信息隐藏大学优秀论文奖。
  9. Hongwei Zhao, Yongfeng Huang.An improve method for combination feature selection in web click-through data mining. ISISE 2012. [10] Zhen Yang, Yongfeng Huang, Huaizhou Tao, Wanxia Yang.Protocol of steganography in streaming media on VOIP network based on variable length coding.National conference on information technology and computer science, CITCS 2012, pp: 702-705

Selected papers before 2012

  1. Yongfeng Huang,Mingchao Chen, Jian Yuan .Key distribution in the covert communication based on Voip,Chinese Journal of Electronics, Vol.20,N0.2,P357-360,March,2011.
  2. Huang Yong feng, Li Xing .The Caching Strategy and Pre-storage Algorithms of the Media-stream Server, Chinese Journal of Electronics, 2006.6,Vol.15,No.2
  3. Huang Yong feng, Li Xing. Petri Net Modeling and Performance Analyzing for MGC, Chinese Journal of Electronics,2004.12,Vol.13, No.4, pp634-637
  4. Huang Yongfeng,Li Xing .Fast Echo Canceller In IP Telephony Gateway,Chinese Journal of Electronics.2004.2,No.1,Vol.13,pp96-105


  1. 基于新型密码算法的大数据保护机制与方法 国家重点研发专项(基础理论)(课题)2016.8-2021.8
  2. 面向公共安全事件的垂直搜索理论模型和方法 国家自然基金联合重点项目 2016.1-2019.12
  3. 云数据安全审计模型与新方法 国家自然基金联合重点项目 2015.1-2018.12
  4. 网络流媒体多维隐藏空间模型 国家自然基金面上项目 2012.1-2016.12
  5. 海量WEB非确定数据集成与分析技术 国家863项目(课题) 2012.10-2015.10
  6. 跨媒体分布式垂直搜索及舆情分析的关键技术 教育部自主科研项目 2011.10-2014.10
  7. 科技部中欧国家合作项目,科技部中欧合作项目子课题,2008.10-2011.10
  8. 新一代可信互联网的基础应用—可信的P2P和BBS,科技部支撑计划子课,2008.6-2010.10
  9. 新一代可信互联网的基础应用–中欧可信高速互联网试验平台,科技部支撑计划子课题,2008.6-2010.10
  10. 分布式联邦搜索引擎,国家发改委CNGI项目,2008.10-2011.8
  11. 流媒体播放软件,横向项目,2008.6-2009.12
  12. 基于综合特征的数字图像盲取证技术研究,国家自然基金, 2008.12-2011.12
  13. VoIP隐蔽通信关键技术及原型系统 国家863项目 2007.8-2010.10
  14. 网络流媒体自适应信息隐藏方法 国家自然基金面上项目 2007.1-2010.12
  15. 网络隐蔽信道及其对抗关键技术研究 国家某部委(保密) 2007.1-2016.12
  16. 面向城市交通按需服务平台 国家973项目(课题) 2007.10-2011.10
  17. 流煤体自适应信息隐藏方法和理论研究,国家自然基金,2007.12-2010.12
  18. 自组织随机覆盖网络建模和优化方法,国家自然基金,2007.12-2010.12
  19. 演示示范-城市交通按需服务平台,国家973项目子课题, 2007.12-2011.12
  20. 网络流媒体信息隐藏及其检测技术,部委专项,2005.10-2013.10
  21. 基于VoIP的隐密通信的关键技术及原型系统,科技部863项目,2006.10-2009.9
  22. 基于SIP的VoIP和IP TV 系统,国家发改委CNGI项目,2007.9-2008.9
  23. 基于单向累计函数P2P网络中节点信任算法,微软国际合作项目,2006.1-2007.3
  24. 互联网存储管理系统,发改委专项,2006.6-2007.12
  25. 基于SIP的流媒体P2P播放网络模型的研究,教育部重点实验室基金,2005.12-2006.12
  26. 网络存储数据行为研究,科技部专项,2005.1-2006.12
  27. 基于VoIP的信息隐藏,国际合作项目,2005.10-2006.12
  28. 基于SIP的大规模端到端多媒体通信系统,国家863重大计划,2005.8-2006.8
  29. 数字医院设计及电子病历软件, 横向,2005.10-2006.7
  30. “复杂系统的需求工程”中子项目“验证示范平台—北京城市交通按需回答系统”(973项目)
  31. “基于网络的隐蔽通信及其检测技术”,国家部委科研基金
  32. “下一代互联网平台建设”子项目“SIP P2P流媒体播放网络”,985-2项目
  33. “基于ORIENT的远程医疗系统”,科技部中欧合作项目
  34. “基于真实地址的P2P网络技术”,科技部支撑计划子项目
  35. “基于WLAN的移动多媒体通信系统”子项目“基于SIP的VoIP和IP TV 系统”,国家发改委CNGI项目
  36. “大规模网络路由与组播实验”,CNGI-04-13-2T)
  37. “信息与网络安全体系研究-网络安全示范系统”,973项目
  38. “新一代互联网络体系结构及其协议理论研究”,国家自然科学基金重大研究项目:90104002
  39. “IP电话网关”,横向合作
  40. “因特网信息智能检索系统关键技术的研究”,清华大学基础研究基金项目
  41. “基于真实地址网络体系结构及应用”子项目“SIP的大规模端到端多媒体通信系统”,863重大计划
  42. “IPV6典型应用子项目—大型场馆灯光控制”,国家发改委项目
  43. “ 基于互联网的信息隐藏”,国际合作
  44. “IPv6下的智能网络存储系统”子项目“互联网存储管理系统”,国家发改委CNGI项目


  1. 基于分层模型的流媒体隐蔽通信方法,专利号:zl200810104402.0 国家发明专利 2008
  2. 基于会话初始化协议的流媒体直播P2P网络方法,,专利号:200610011473.7 国家发明专利 2009
  3. 基于真实地址的可信任BBS地址验证方法,专利号:zl201010184764.2 国家发明专利 2010
  4. G.729A压缩语音流信息隐藏检测装置及检测方法,专利号:zl201110435163.9 国家发明专利 2011
  5. 基于IPV6网SIP协议的远程医疗实时信息交互方法,专利号:201010034389.3, 国家发明专利 2010
  6. 虚拟市话转换器的实现方法,专利号:zl2007 10195200.7 国家发明专利 2007
  7. 基于网络事件模型的新闻事件监测方法和装置,专利号:201610074912.2 国家发明专利 (审批中)
  8. 基于海量微博文本和用户信息的网络新词自动提取的方法,专利号:201610324541.9 国家发明专利(审批中)
  9. 微博情感分类器的构建方法及构建装置,专利号:201610824487.4 国家发明专利(审批中)


  1. 混合云存储系统及关键技术 中国电子学会科学技术奖 一等奖 2015.12
  2. 基于网络流媒体的隐蔽通信及其检测的关键技术 中国电子学会科学技术奖 二等奖 2013.12
  3. 面向城市交通按需服务平台 高等学校科技进步奖 二等奖 2011.11
  4. 基于SIP P2P流媒体直播的关键技术及应用系统 中国电子学会科学技术奖 二等奖 2010.12