網(wǎng)站介紹 關(guān)于我們 聯(lián)系方式 友情鏈接 廣告業(yè)務(wù) 幫助信息
1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號
劉吉強,教授,博士
郵 箱:jqliu@bjtu.edu.cn
個人履歷
2016.7-至今 北京交通大學(xué)研究生院 副院長
2011.9-2016.7 北京交通大學(xué)計算機與信息技術(shù)學(xué)院 副院長
2007.6-2011.9 北京交通大學(xué)計算機與信息技術(shù)學(xué)院計算機工程系 主任
2005.9-2006.9,2012.7-2013.2紐約州立大學(xué)布法羅分校計算機科學(xué)與工程系 訪問學(xué)者
2010.12-至今 北京交通大學(xué)計算機與信息技術(shù)學(xué)院 教授
2003.12-2010.12 北京交通大學(xué)計算機與信息技術(shù)學(xué)院 副教授
1999.7-2003.12 北京交通大學(xué)計算機與信息技術(shù)學(xué)院 講師
智能交通數(shù)據(jù)安全與隱私保護北京市重點實驗室副主任。教育部新世紀(jì)優(yōu)秀人才(2011),首屆網(wǎng)絡(luò)安全優(yōu)秀教師(2016),全國信息安全標(biāo)準(zhǔn)化技術(shù)委員會委員,中國保密協(xié)會隱私保護專委會委員,中國密碼學(xué)會安全協(xié)議專業(yè)委員會專家委員會成員/教育與科普工作委員會委員,全國計算機應(yīng)急處理協(xié)調(diào)中心計算機網(wǎng)絡(luò)與信息安全專家委員會委員,中關(guān)村可信計算聯(lián)盟副理事長,國家保密教育培訓(xùn)基地北京分基地副主任。
近年來主要從事可信計算,隱私保護,云計算安全等方面的研究工作,主持或參加國家、省部級等項目50余項,其中包括國家自然科學(xué)基金2項,863課題4項,973子課題2項,發(fā)改委信息安全專項課題1項,國防預(yù)研課題3項等,部分成果與企業(yè)合作已經(jīng)成功轉(zhuǎn)化并推向市場,經(jīng)濟效益顯著并于2006年獲得國家新產(chǎn)品證書(編號2006GR360004),“基于虛擬化技術(shù)的可信網(wǎng)絡(luò)終端系統(tǒng)”獲得2010年度教育部科學(xué)技術(shù)進步獎一等獎(排名第9)。發(fā)表論文150余篇,其中SCI/EI檢索80余篇,獲授權(quán)專利10余項,軟件著作登記權(quán)3項,編/譯著2部。擔(dān)任國家科技進步獎評審人,中直機關(guān)信息安全領(lǐng)域評標(biāo)專家,國家自然科學(xué)基金、國家留學(xué)回國人員基金評審人。擔(dān)任國際國內(nèi)期刊Information Sciences、Information System、CCPE、Frontiers of Computer Science、中國科學(xué)、軟件學(xué)報、電子學(xué)報等刊物的審稿人,信息網(wǎng)絡(luò)安全、信息安全研究期刊編委。
研究方向
可信計算,隱私保護,云計算安全等
發(fā)表論文和著作
代表性論文:
Xiao Zhang, Jiqiang Liu, Si Chen, Yongjun Kong, and Kui Ren, PriWhisper+: An Enhanced Acoustic Short-range Communication System for Smartphones, IEEE Internet of Things Journal, 2018
Heng Ye, Jiqiang Liu, Wei Wang,etc., Secure and efficient outsourcing differential privacy data release scheme in Cyber–physical system, Future Generation Computer Systems, 2018
Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu, Android single sign-on security: Issues, taxonomy and directions, Future Generation Computer Systems, Vol.89, p 402-420, December 2018
Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, Discovering communities of malapps on Android-based mobile cyber-physical systems, Ad Hoc Networks, v 80, p 104-115, November 2018
Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018)
Xinwei Gao, Jintai Ding, Lin Li, R.V. Saraswathy, Jiqiang Liu, Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS, Source: International Journal of Network Security, v 20, n 5, p 923-930, September 1, 2018
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Identity-Based Private Matching over Outsourced Encrypted Datasets, IEEE Transactions On Cloud Computing, Vol. 6,No. 3,PP 747-759, 2018
Lun Li , Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, Xiangliang Zhang, and Zonghua Zhang, CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles, IEEE Transactions On Intelligent Transportation Systems, v 19, n 7, p 2204-2220, July 2018
Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren, Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters , IEEE Transactions on Smart Grid, v 9, n 4, p 3313-3320, July 2018
Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu, Fingerprinting Android Malware Families, Frontiers of Computer Science, p 1-10, June 30, 2018
Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks, Information Sciences, v 433-434, p 1339-1351, April 2018
Ziqi Yan, Jiqiang Liu, Shaowu Liu, DPWeVote: differentially private weighted voting protocol for cloud-based decision-making, Enterprise Information Systems, p 1-21, March 9, 2018
Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu, Practical randomized RLWE-based key exchange against signal leakage attack, Source: IEEE Transactions on Computers, February 21, 2018
Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, Discovering and understanding android sensor usage behaviors with data flow analysis, World Wide Web, Vol. 21, No.1 PP 105-126, JAN 2018
Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers, Future Generation Computer Systems,Vol.78,No.3,PP 987-994, JAN 2018
Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Chen, Tong, Intention-aware multi-channel keyword extension for content security, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 788-794, July 16, 2018, Proceedings - 2018
Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang, An approach to generate topic similar document by seed extraction-based SeqGAN training for bait document, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 803-810, July 16, 2018,
Xiaoxuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu, Adversarial examples construction towards white-box Q table variation in DQN pathfinding training, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 781-787, July 16, 2018,
Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han, A PCA-based model to predict adversarial examples on Q-learning of path finding, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 773-780, July 16, 2018, Proceedings - 2018
Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206
Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv, Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. ICCCN 2018: 1-6
Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv, Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. ICCCN 2018: 1-2
Xu Gao, Wenjia Niu, Jiqiang Liu Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222
Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han, Designing mutual authentication protocols in industrial wireless network, Source: Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, p 153-158, May 25, 2018, Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018
Fang Wu, Jigang Wang, Jiqiang Liu, Wei Wang, Vulnerability detection with deep learning, Source: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, v 2018-January, p 1298-1302, March 22, 2018, 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li, Post-Quantum Secure Remote Password Protocol from RLWE Problem, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10726 LNCS, p 99-116, 2018, Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Revised Selected Papers
Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R.V. Saraswathy, Zhe Liu , Fast discretized Gaussian sampling and post-quantum TLS ciphersuite, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10701 LNCS, p 551-565, 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings
Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Wu, Tong, A cross-modal CCA-based astroturfing detection approach, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 582-592, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Characterizing Android apps' behavior for effective detection of malapps at large scale, Future Generation Computer Systems, Vol. 75,PP 30-45, OCT 2017
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang. Hidden policy CP-ABE with Keyword Search, Science China Information Sciences, v 60, n 5, p 052105 (12 pp.), May 2017
Yang Yang, Jiqiang Liu, Lin Li, etc. Towards Robust Green Virtual Cloud Data Center Provisioning, IEEE Transactions On Cloud Computing,Vol.5, No. 2,PP 168-181 , APR-JUN 2017
Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking, IEEE ACCESS Vol. 5 ,PP 19012-19022, 2017
Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Han, Lei, A method to effectively detect vulnerabilities on path planning of VIN, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 374-384, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, Xiaoxuan Bai, Jingjing Liu, Yingxiao Xiang, Wu, Tong; Jiqiang Liu,, A hidden astroturfing detection approach base on emotion analysis, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10412 LNAI, p 55-66, 2017, Knowledge Science, Engineering and Management - 10th International Conference, KSEM 2017, Proceedings
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, IEEE Transactions on Services Computing, v 9, n 3, p 408-20, May-June 2016
Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem . The 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016
Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, Anomadroid: profiling Android application behaviors for identifying unknown malapps , The15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets . Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
Zhenliang Cai, Jian Wang, Jiqiang Liu, Novel feature selection algorithm for Chinese text categorization based on CHI . Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone . The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks , v 9, n 15, p 2816-2826, October 1, 2016
Zhonghua Wang, Zhen Han, Jiqiang Liu, Public verifiability for shared data in cloud storage with a defense against collusion attacks. SCIENCE CHINA Information Sciences 59(3): 39101:1-39101:3 (2016)
Bianqing Yuan, Jiqiang Liu, A universally composable secure grouping-proof protocol for RFID tags , Concurrency & Computation Practice & Experience, 2016 , 28 (6) :1872-1883
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang. Identity-based private matching over outsourced encrypted datasets. IEEE Transactions on Cloud Computing, Issue 99. DEC.2015
Wei Wang, Yongzhong He, Jiqiang Liu, Ylvain Gombault,Constructing important features from massive network traffic for lightweight intrusion detection, IET Information Security,Vol.9,No.6, 2015
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. SCIENCE CHINA Information Sciences, Vol.58,No.7, pp.166-180,2015
Bin Wang, Xiaolin Chang, Jiqiang Liu, Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter , Vol. 19, No. 4 , PP: 537-540, April 2015
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han,etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Information Sciences 295(2015):221-231
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, Vol.27 ,No.5, PP: 1092-1109,2015.4
Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, v 11, n 5, p 1863-1877, March 1, 2015
Guang Yang, Jiqiang Liu, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, Vol.11, No. 2, p 671-681, January 15, 2015
Xing Liu, Wei Wang, Jiqiang Liu, POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. ACM Conference on Computer and Communications Security 2015(CCS 2015): 1653-1655
Xing Liu, Jiqiang Liu, Wei Wang, Exploring sensor usage behaviors of Android applications based on data flow analysis. IPCCC 2015: 1-8
代表性著作:
科研項目及獲獎情況
科研項目:
主持或參加國家、省部級、校級以及橫向項目,其中包括國家自然科學(xué)基金2項,863課題4項,973子課題2項,國防預(yù)研課題3項等. 近年來主要課題包括:
教育部基本科研業(yè)務(wù)費重點項目,面向軍民融合的多域網(wǎng)絡(luò)互聯(lián)態(tài)勢感知關(guān)鍵技術(shù),編號2018JBZ103,負(fù)責(zé)人, 2018-2021
紅果園縱向,樣本擴充及關(guān)鍵詞語義擴展關(guān)鍵技術(shù)研究,負(fù)責(zé)人, 2017-2019
公司委托,基于桌面云的眾創(chuàng)平臺軟件設(shè)計與開發(fā),負(fù)責(zé)人, 2017-2018
國家自然科學(xué)基金課題,云平臺數(shù)據(jù)隱私保護關(guān)鍵技術(shù)研究,編號61672092,負(fù)責(zé)人, 2017-2020
紅果園省部級"企事業(yè)",信息采集合作協(xié)議, 負(fù)責(zé)人, 2016-2018
中國工程院重大咨詢課題子課題,可信的網(wǎng)絡(luò)空間安全保障體系,技術(shù)負(fù)責(zé)人, 2015-2018
公司委托,企業(yè)資源分享平臺軟件,負(fù)責(zé)人, 2015-2016
教育部新世紀(jì)人才,“面向電子病歷共享系統(tǒng)的安全與隱私保護技術(shù)研究” ,負(fù)責(zé)人, 2012-2014
保密局課題,“基于國產(chǎn)可信計算平臺的涉密終端應(yīng)用技術(shù)研究” ,負(fù)責(zé)人,2011-2012
自然科學(xué)基金“基于TCM的匿名證明和隱私保護”編號60973112,負(fù)責(zé)人, 2009-2012
獲獎情況:
2016年 國家網(wǎng)信辦 網(wǎng)絡(luò)安全優(yōu)秀教師
2011年 教育部 新世紀(jì)優(yōu)秀人才
2010年 教育部 科技進步一等獎 (排名第9)
2009年 北京交通大學(xué) 智瑾獎教獎優(yōu)秀青年教師
2007年 北京交通大學(xué) 優(yōu)秀主講教師
2007年 北京交通大學(xué) 五四青年獎?wù)芦@得者
授課及指導(dǎo)研究生
應(yīng)用密碼學(xué)與安全協(xié)議
離散數(shù)學(xué)
信息安全導(dǎo)論
來源未注明“中國考研網(wǎng)”的資訊、文章等均為轉(zhuǎn)載,本網(wǎng)站轉(zhuǎn)載出于傳遞更多信息之目的,并不意味著贊同其觀點或證實其內(nèi)容的真實性,如涉及版權(quán)問題,請聯(lián)系本站管理員予以更改或刪除。如其他媒體、網(wǎng)站或個人從本網(wǎng)站下載使用,必須保留本網(wǎng)站注明的"稿件來源",并自負(fù)版權(quán)等法律責(zé)任。
來源注明“中國考研網(wǎng)”的文章,若需轉(zhuǎn)載請聯(lián)系管理員獲得相應(yīng)許可。
聯(lián)系方式:chinakaoyankefu@163.com
掃碼關(guān)注
了解考研最新消息
網(wǎng)站介紹 關(guān)于我們 聯(lián)系方式 友情鏈接 廣告業(yè)務(wù) 幫助信息
1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號