1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號
劉吉強,教授,博士
郵 箱:jqliu@bjtu.edu.cn
個人履歷
2016.7-至今 北京交通大學研究生院 副院長
2011.9-2016.7 北京交通大學計算機與信息技術學院 副院長
2007.6-2011.9 北京交通大學計算機與信息技術學院計算機工程系 主任
2005.9-2006.9,2012.7-2013.2紐約州立大學布法羅分校計算機科學與工程系 訪問學者
2010.12-至今 北京交通大學計算機與信息技術學院 教授
2003.12-2010.12 北京交通大學計算機與信息技術學院 副教授
1999.7-2003.12 北京交通大學計算機與信息技術學院 講師
智能交通數據安全與隱私保護北京市重點實驗室副主任。教育部新世紀優秀人才(2011),首屆網絡安全優秀教師(2016),全國信息安全標準化技術委員會委員,中國保密協會隱私保護專委會委員,中國密碼學會安全協議專業委員會專家委員會成員/教育與科普工作委員會委員,全國計算機應急處理協調中心計算機網絡與信息安全專家委員會委員,中關村可信計算聯盟副理事長,國家保密教育培訓基地北京分基地副主任。
近年來主要從事可信計算,隱私保護,云計算安全等方面的研究工作,主持或參加國家、省部級等項目50余項,其中包括國家自然科學基金2項,863課題4項,973子課題2項,發改委信息安全專項課題1項,國防預研課題3項等,部分成果與企業合作已經成功轉化并推向市場,經濟效益顯著并于2006年獲得國家新產品證書(編號2006GR360004),“基于虛擬化技術的可信網絡終端系統”獲得2010年度教育部科學技術進步獎一等獎(排名第9)。發表論文150余篇,其中SCI/EI檢索80余篇,獲授權專利10余項,軟件著作登記權3項,編/譯著2部。擔任國家科技進步獎評審人,中直機關信息安全領域評標專家,國家自然科學基金、國家留學回國人員基金評審人。擔任國際國內期刊Information Sciences、Information System、CCPE、Frontiers of Computer Science、中國科學、軟件學報、電子學報等刊物的審稿人,信息網絡安全、信息安全研究期刊編委。
研究方向
可信計算,隱私保護,云計算安全等
發表論文和著作
代表性論文:
Xiao Zhang, Jiqiang Liu, Si Chen, Yongjun Kong, and Kui Ren, PriWhisper+: An Enhanced Acoustic Short-range Communication System for Smartphones, IEEE Internet of Things Journal, 2018
Heng Ye, Jiqiang Liu, Wei Wang,etc., Secure and efficient outsourcing differential privacy data release scheme in Cyber–physical system, Future Generation Computer Systems, 2018
Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu, Android single sign-on security: Issues, taxonomy and directions, Future Generation Computer Systems, Vol.89, p 402-420, December 2018
Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, Discovering communities of malapps on Android-based mobile cyber-physical systems, Ad Hoc Networks, v 80, p 104-115, November 2018
Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018)
Xinwei Gao, Jintai Ding, Lin Li, R.V. Saraswathy, Jiqiang Liu, Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS, Source: International Journal of Network Security, v 20, n 5, p 923-930, September 1, 2018
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Identity-Based Private Matching over Outsourced Encrypted Datasets, IEEE Transactions On Cloud Computing, Vol. 6,No. 3,PP 747-759, 2018
Lun Li , Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, Xiangliang Zhang, and Zonghua Zhang, CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles, IEEE Transactions On Intelligent Transportation Systems, v 19, n 7, p 2204-2220, July 2018
Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren, Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters , IEEE Transactions on Smart Grid, v 9, n 4, p 3313-3320, July 2018
Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu, Fingerprinting Android Malware Families, Frontiers of Computer Science, p 1-10, June 30, 2018
Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks, Information Sciences, v 433-434, p 1339-1351, April 2018
Ziqi Yan, Jiqiang Liu, Shaowu Liu, DPWeVote: differentially private weighted voting protocol for cloud-based decision-making, Enterprise Information Systems, p 1-21, March 9, 2018
Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu, Practical randomized RLWE-based key exchange against signal leakage attack, Source: IEEE Transactions on Computers, February 21, 2018
Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, Discovering and understanding android sensor usage behaviors with data flow analysis, World Wide Web, Vol. 21, No.1 PP 105-126, JAN 2018
Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers, Future Generation Computer Systems,Vol.78,No.3,PP 987-994, JAN 2018
Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Chen, Tong, Intention-aware multi-channel keyword extension for content security, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 788-794, July 16, 2018, Proceedings - 2018
Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang, An approach to generate topic similar document by seed extraction-based SeqGAN training for bait document, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 803-810, July 16, 2018,
Xiaoxuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu, Adversarial examples construction towards white-box Q table variation in DQN pathfinding training, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 781-787, July 16, 2018,
Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han, A PCA-based model to predict adversarial examples on Q-learning of path finding, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 773-780, July 16, 2018, Proceedings - 2018
Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206
Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv, Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. ICCCN 2018: 1-6
Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv, Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. ICCCN 2018: 1-2
Xu Gao, Wenjia Niu, Jiqiang Liu Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222
Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han, Designing mutual authentication protocols in industrial wireless network, Source: Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, p 153-158, May 25, 2018, Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018
Fang Wu, Jigang Wang, Jiqiang Liu, Wei Wang, Vulnerability detection with deep learning, Source: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, v 2018-January, p 1298-1302, March 22, 2018, 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li, Post-Quantum Secure Remote Password Protocol from RLWE Problem, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10726 LNCS, p 99-116, 2018, Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Revised Selected Papers
Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R.V. Saraswathy, Zhe Liu , Fast discretized Gaussian sampling and post-quantum TLS ciphersuite, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10701 LNCS, p 551-565, 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings
Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Wu, Tong, A cross-modal CCA-based astroturfing detection approach, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 582-592, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Characterizing Android apps' behavior for effective detection of malapps at large scale, Future Generation Computer Systems, Vol. 75,PP 30-45, OCT 2017
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang. Hidden policy CP-ABE with Keyword Search, Science China Information Sciences, v 60, n 5, p 052105 (12 pp.), May 2017
Yang Yang, Jiqiang Liu, Lin Li, etc. Towards Robust Green Virtual Cloud Data Center Provisioning, IEEE Transactions On Cloud Computing,Vol.5, No. 2,PP 168-181 , APR-JUN 2017
Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking, IEEE ACCESS Vol. 5 ,PP 19012-19022, 2017
Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Han, Lei, A method to effectively detect vulnerabilities on path planning of VIN, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 374-384, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, Xiaoxuan Bai, Jingjing Liu, Yingxiao Xiang, Wu, Tong; Jiqiang Liu,, A hidden astroturfing detection approach base on emotion analysis, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10412 LNAI, p 55-66, 2017, Knowledge Science, Engineering and Management - 10th International Conference, KSEM 2017, Proceedings
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, IEEE Transactions on Services Computing, v 9, n 3, p 408-20, May-June 2016
Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem . The 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016
Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, Anomadroid: profiling Android application behaviors for identifying unknown malapps , The15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets . Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
Zhenliang Cai, Jian Wang, Jiqiang Liu, Novel feature selection algorithm for Chinese text categorization based on CHI . Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone . The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks , v 9, n 15, p 2816-2826, October 1, 2016
Zhonghua Wang, Zhen Han, Jiqiang Liu, Public verifiability for shared data in cloud storage with a defense against collusion attacks. SCIENCE CHINA Information Sciences 59(3): 39101:1-39101:3 (2016)
Bianqing Yuan, Jiqiang Liu, A universally composable secure grouping-proof protocol for RFID tags , Concurrency & Computation Practice & Experience, 2016 , 28 (6) :1872-1883
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang. Identity-based private matching over outsourced encrypted datasets. IEEE Transactions on Cloud Computing, Issue 99. DEC.2015
Wei Wang, Yongzhong He, Jiqiang Liu, Ylvain Gombault,Constructing important features from massive network traffic for lightweight intrusion detection, IET Information Security,Vol.9,No.6, 2015
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. SCIENCE CHINA Information Sciences, Vol.58,No.7, pp.166-180,2015
Bin Wang, Xiaolin Chang, Jiqiang Liu, Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter , Vol. 19, No. 4 , PP: 537-540, April 2015
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han,etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Information Sciences 295(2015):221-231
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, Vol.27 ,No.5, PP: 1092-1109,2015.4
Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, v 11, n 5, p 1863-1877, March 1, 2015
Guang Yang, Jiqiang Liu, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, Vol.11, No. 2, p 671-681, January 15, 2015
Xing Liu, Wei Wang, Jiqiang Liu, POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. ACM Conference on Computer and Communications Security 2015(CCS 2015): 1653-1655
Xing Liu, Jiqiang Liu, Wei Wang, Exploring sensor usage behaviors of Android applications based on data flow analysis. IPCCC 2015: 1-8
代表性著作:
科研項目及獲獎情況
科研項目:
主持或參加國家、省部級、校級以及橫向項目,其中包括國家自然科學基金2項,863課題4項,973子課題2項,國防預研課題3項等. 近年來主要課題包括:
教育部基本科研業務費重點項目,面向軍民融合的多域網絡互聯態勢感知關鍵技術,編號2018JBZ103,負責人, 2018-2021
紅果園縱向,樣本擴充及關鍵詞語義擴展關鍵技術研究,負責人, 2017-2019
公司委托,基于桌面云的眾創平臺軟件設計與開發,負責人, 2017-2018
國家自然科學基金課題,云平臺數據隱私保護關鍵技術研究,編號61672092,負責人, 2017-2020
紅果園省部級"企事業",信息采集合作協議, 負責人, 2016-2018
中國工程院重大咨詢課題子課題,可信的網絡空間安全保障體系,技術負責人, 2015-2018
公司委托,企業資源分享平臺軟件,負責人, 2015-2016
教育部新世紀人才,“面向電子病歷共享系統的安全與隱私保護技術研究” ,負責人, 2012-2014
保密局課題,“基于國產可信計算平臺的涉密終端應用技術研究” ,負責人,2011-2012
自然科學基金“基于TCM的匿名證明和隱私保護”編號60973112,負責人, 2009-2012
獲獎情況:
2016年 國家網信辦 網絡安全優秀教師
2011年 教育部 新世紀優秀人才
2010年 教育部 科技進步一等獎 (排名第9)
2009年 北京交通大學 智瑾獎教獎優秀青年教師
2007年 北京交通大學 優秀主講教師
2007年 北京交通大學 五四青年獎章獲得者
授課及指導研究生
應用密碼學與安全協議
離散數學
信息安全導論
來源未注明“中國考研網”的資訊、文章等均為轉載,本網站轉載出于傳遞更多信息之目的,并不意味著贊同其觀點或證實其內容的真實性,如涉及版權問題,請聯系本站管理員予以更改或刪除。如其他媒體、網站或個人從本網站下載使用,必須保留本網站注明的"稿件來源",并自負版權等法律責任。
來源注明“中國考研網”的文章,若需轉載請聯系管理員獲得相應許可。
聯系方式:chinakaoyankefu@163.com
掃碼關注
了解考研最新消息