1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 沪ICP备12018245号
分类:导师信息 来源:中国考研网 2016-04-19 相关院校:北京交通大学
基本信息
办公电话:01051684198 电子邮件: jqliu@bjtu.edu.cn
通讯地址:北京市海淀区西直门外上园村3号 邮编:100044
教育背景与工作经历
1999年毕业于北京师范大学获理学博士学位,同年进入北方交通大学(现更名为北京交通大学)计算机与信息技术学院工作,历任讲师,副教授,教授,现为计算机与信息技术学院副院长,信息安全研究室主任,信息安全专业负责人,2005.9-2006.9,2012.7-2013.1纽约州立大学布法罗分校计算机科学与工程系访问学者。
研究方向(顺序不分先后)
网络安全技术
计算机安全
计算机技术(专业学位)
招生专业
计算机与信息技术学院:信息安全硕士
计算机与信息技术学院:信息安全博士
计算机与信息技术学院:计算机科学与技术博士
计算机与信息技术学院:计算机科学与技术硕士
计算机与信息技术学院:计算机技术(专业学位)硕士
科研项目
广东电网,大数据环境下数据安全研究,2015.1-2016.1,39.5万,主持
隐私保护技术管理和法律研究,2014.8-2015.12,12万,主持
战略合作框架协议及密钥管理系统项目,2014-06-01--2015-5-31,30.0万元,主持
红果园省部级"企事业":RSA-768数域筛法大数分解多项式选择中的多项式根优化研究与工程实现,2013-12-01--2014-05-31,15.0万元,参加
北京交通大学:上网行为管理系统软件平台,2013-10-08--2015-10-07,20.0万元,主持
北京交通大学:互联网网站备案关键技术研究 ,2013-09-04--2014-10-31,20.0万元,参加
红果园:基于云计算的涉密信息系统安全保密测评与检查能力建设,2013-01-01--2014-12-31,80.0万元,参加
红果园:单向受控定制数据安全交换技术研究与系统研制,2013-10-01--2015-10-01,30.0万元,主持
其它部市:移动互联网应用审计平台,2013-09-06--2014-09-06,15.0万元,主持
红果园:合作协议,2012-09-14--2013-09-14,49.8万元,参加
红果园:公安部第一研究所重要信息系统安全咨询服务支撑平台定制开发,2012-06-30--2013-12-31,45.0万元,参加
教育部新世纪:面向电子病历共享系统的安全与隐私保护技术研究,2012-04-08--2013-12-30,50.0万元,主持
基本科研业务费:基于可信计算的涉密终端安全防护技术的研究,2012-07-01--2014-12-31,61.0万元,主持
红果园:保密学院建设,2011-11-25--2012-12-31,20.0万元,参加
红果园:基于国产可信计算平台的涉密终端应用技术研究,2011-09-01--2012-09-30,46.0万元,主持
红果园:中办国办计算机系统建设中的保密防护技术研究,2011-07-01--2011-12-31,28.0万元,参加
红果园:电磁泄漏发射防护技术国外发展状况研究,2011-07-01--2011-12-31,26.9631万元,参加
红果园:无线发射设备对“全国组织信息系统”的安全性研究,2011-07-01--2011-12-31,20.0369万元,参加
红果园:网络重要设备电磁泄漏发射防护研究,2011-07-01--2011-12-31,25.0万元,参加
北京交通大学:网络文件安全保护与监控系统,2011-04-20--2013-12-31,15.36万元,参加
红果园:基于可信计算的电子文件密级标志安全技术研究,2011-04-01--2011-09-30,12.0万元,参加
红果园:舰载安全增强操作系统及安全管理系统研制,2010-10-01--2010-11-30,20.0万元,参加
北京交大创新科技中心:惠州市惠阳区人民医院医院信息系统技术开发,2010-11-11--2011-06-30,125.0万元,主持
其它部市:北京信息安全服务能力评估,2010-09-30--2010-12-31,10.0万元,参加
红果园:PCI密码模块及相关软件技术服务,2010-07-10--2012-02-29,18.0万元,参加
红果园:基于Java Card体系结构的智能卡,2010-07-10--2013-07-10,15.0万元,参加
红果园:基于Java Key的安全开发套件,2010-07-10--2013-07-10,15.0万元,参加
北京交通大学:Web安全防护系统,2010-06-22--2012-12-31,20.0万元,参加
其它部市:信息安全人才培养体系及其发展模式的研究,2010-05-01--2011-04-30,15.0万元,主持
红果园:可信计算密码平台,2009-09-01--2010-03-30,220.0万元,参加
北京交通大学:网络与信息安全模拟实训系统,2009-08-31--2010-08-31,10.0万元,主持
国家自然科学基金“面上”:基于TCM的匿名证明和隐私保护,2010-01-01--2012-12-31,31.0万元,主持
其它部市:关于信息系统安全保密必须从源头上加以治理的措施研究,2008-05-01--2009-12-31,15.0万元,参加
北京交通大学:应用软件特征识别---办理免税,2009-05-04--2010-05-04,65.0万元,主持
科技部“863”:虚拟个人计算机系统的可信支撑技术研究,2008-01-24--2009-09-30,46.0万元,主持
北京交大创新科技中心:信息安全试验平台开发,2008-02-26--2009-10-31,10.0万元,主持
科技部“863”:可信计算平台信任链建立关键技术,2007-12-18--2009-12-31,88.0万元,参加
红果园:网络计算现状研究,2007-11-20--2008-10-31,17.5万元,参加
北京市科委:终端安全体系结构研究及关键技术研发,2007-09-10--2009-09-10,40.0万元,参加
铁道部科技司:铁路信息系统应用与技术研究-铁路信息网络灾备系统安全防护与灾备恢复技术,2007-08-20--2008-03-31,30.0万元,参加
其它部市:可信计算技术和产业发展及相关对策研究,2007-05-01--2008-05-31,15.0万元,参加
科技部“973”:一体化网络与普适服务的体系理论与结构-3,2007-05-01--2012-08-31,20.0万元,参加
红果园:zzbb-jsjxy-韩臻-专项任务,2006-09-01--2008-06-30,25.0万元,参加
北京交大科技发展中心:计划项目,2006-11-10--2007-11-10,20.0万元,参加
北京交通大学:Socks VPN安全互联系统Ⅱ,2006-07-01--2007-09-30,15.0万元,参加
其它部市:信息安全教育现状分析和发展对策的研究,2005-12-01--2006-06-30,9.0万元,参加
北京交通大学:安全管理知识库Security Policy Pack,2005-06-01--2006-06-01,20.0万元,参加
其它部市:网络信息加密技术-PKI关键技术研究,2004-01-01--2004-12-01,10.0万元,参加
红果园:Kylin操作系统可信支撑模块研制,2004-11-01--2005-11-01,100.0万元,参加
其它部市:国家信息安全保障战略,2004-09-01--2005-06-01,10.0万元,参加
北京交通大学:Socks VPN安全互联系统,2004-07-15--2005-04-15,31.0万元,主持
北京交通大学:安全操作系统,2004-01-02--2004-12-31,33.8万元,参加
红果园:网络信息加密技术PKI关键技术研究2,2003-01-12--2003-12-12,15.0万元,参加
红果园:专项任务,2003-01-01--2004-12-30,20.0万元,参加
科技部:信息域网络安全体系结构研究,2002-09-01--2005-09-01,168.9万元,参加
科技部:(863)计算机信息系统安全体系结构研究,2002-10-12--2003-12-12,50.0万元,参加
科技部:(973)操作系统安全结构研究,2002-04-06--2004-04-06,10.0万元,参加
科技部:(973)基于对称密码的应用层安全体系结构研究,2002-04-06--2004-04-06,10.0万元,参加
教学工作
离散数学
应用密码学与安全协议
学术成果
期刊论文
Yanfeng Shi, Jiqiang Liu, Zhen Han, Qingji Zheng, Rui Zhang, Shuo Qiu. Attribute-Based Proxy Re-encryption with Keyword Search, 2014, PLoS ONE 9(12): e116325, doi:10.1371/journal.pone.0116325.
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks [J] , (2015)
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. Science China Information Sciences, 2015(Accepted)
Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter 2015(In press), DOI:10.1109/LCOMM.2015.2403832.
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, Accepted by IEEE Transactions on Services Computing
Yanfeng Shi, Jiqiang Liu, etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Accepted by Information Sciences
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, 2014
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han. Multi-party identity-based symmetric privacy-preserving matching with cloud storage. Wuhan University Journal of Natural Sciences, Oct.2014, Vol 19, issue 5, pp 426-432
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014
Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communications, Vol.11, No.9, PP: 54-66 , SEP 2014
原变青, 刘吉强, 基于NFC的离线可分享移动优惠券方案, 山东大学学报(理学版), Vol.49, No.9, PP:24-29, 2014.9
Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE Mobile Cloud 2014, 2014.4
Shuo Qiu, Jiqiang Liu, etc, Identity-Based Symmetric Private Set Intersection,SocialCom2013 , 2013.9
Xun Chen, Zhen Han, Jiqiang Liu, Data protection technology in classified networks, Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, v 42, n 1, p 144-148, January 2013
Wang, Wenbo; Chang, Xiaolin; Liu, Jiqiang; Wang, Bin, Simulated annealing based resource allocation for cloud data centers, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 81-82, 2013
Chang, Xiaolin; Wang, Bin; Liu, Jiqiang; Wang, Wenbo; Muppala, Jogesh K. , Green cloud virtual network provisioning based ant colony optimization, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 1553-1560, 2013
Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala: Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718
Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun: Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29
Xiaolin Chang, Bin Wang, Jiqiang Liu: Network state aware virtual network parallel embedding. IPCCC 2012: 193-194
Guo, Yu ; Liu, Jiqiang; Shen, Changxiang,Trusted dynamic self-confidence migration of cloud service, International Journal of Advancements in Computing Technology, v 4, n 7, p 92-101, 2012
韩磊, 刘吉强, 魏学业,侯杰. 基于便携式可信平台模块的Ad Hoc网络密钥管理应用研究 。北京工业大学学报,2012,38(11):1676-1682。
韩磊,刘吉强,韩臻,魏学业,移动ad hoc网络预分配非对称密钥管理方案 。通信学报,2012,33(10):26-34。
黄学臻,韩臻,刘吉强.数据分级匿名的访问控制模型。第二十二届全国信息保密学术会议(IS2012)论文集:174-177。
陈勋,韩臻,刘吉强.涉密网络中的数据保护技术.第九届中国信息与通信安全学术会议CCICS 2012。
Jie Hou, Lei Han, Jiqiang Liu, Jia Zhao, Secure and Efficient Protocol for Position-based Routing in VANETs, ICADE p 142-148, 2012. 7
Yanfeng Shi, Jiqiang Liu, Zhen Han, Rongrong Fu. A Generic construction of certificateless signcryption. ICISCE 2012.
韩磊, 刘吉强, 赵佳, 魏学业. 移动Ad Hoc网络分布式轻量级CA密钥管理方案 .四川大学学报(工程科学版),2011,43(6):133-139.
Bin Xing, Zhen Han, Jiqiang Liu, Xiaolin Chang, Trust Bootstrapping of Para-Virtualized Domain, Applied Mechanics and Materials, v 182-183, p 2059-2065, 2012
Xuezhen Huang, Jiqiang Liu, Zhen Han, A Security and Privacy Model for Electronic Health Records, Proceedings of 2011 IEEE International Conference on Information Theory and Information Security, 2011, PP416- 420.
Jiqiang Liu, Sheng Zhong, Lei Han and Haifan Yao, An Identity-Based Cryptosystem for Encrypting Long Messages, International Journal of Innovative Computing, Information and Control,Volume 7, Number 6, PP.3295-3302, 2011
Rui Zhang, Jiqiang Liu, Zhen Han, RBTBAC: Secure Access and Management of EHR Data,International Conference on Information Society, PP494-499. 2011.7
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei: Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers of Computer Science in China 5(2): 169-180 (2011)
Ye Du, Jiqiang Liu, Ruhui Zhang, Jieyuan Li: A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers. JCP 6(10): 2021-2028 (2011)
Jiqiang Liu, Xun Chen, Zhen Han, Full and Partial Deniability for Authentication Schemes, Frontiers of Computer Science in China Volume 4, Number 4, 516-521,2010
Zhao, J., Han, Z., Liu, J., Zhang, R. Remote attestation based on trusted cryptography module, Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University 34 (2), pp. 33-37,2010
Han L, Liu JQ, Han Z. Research on Key Management Schemes for Mobile Ad Hoc Networks. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010:225-229.
Wang ZH, Han Z, Liu JQ, Detect Technology about Smart Card, PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, July 2010:723-728
Fan Wu, Sheng Zhong, Jiqiang Liu, An Optimal, Strategy-proof Scheme for Multi-path Traffic Assignment in Non-cooperative Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 3, 1012-1021, MARCH 2010
Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng: An IBE scheme using ECC combined public key. Computers & Electrical Engineering 36 (6): 1046-1054 (2010)
Xiaolin CHANG, Bin XING, Jiqiang Liu, “LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack”, In Proc. the 28th IEEE IPCCC, 2009.
Rui Zhang, Jiqiang Liu, Shuanghe Peng. A Trusted Bootstrap Scheme on EFI, 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), PP200-204, 2009. 11
Lei Han, Jiqiang Liu, Dawei Zhang, Zhen Han, and Xueye Wei, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI,PP140-143, International Conference on Multimedia Information Networking and Security, PP140-143,2009 .11
Jiqiang Liu, Sheng Zhong, A Practical Time Bound Hierarchical Key Scheme,Vol.5, No.10, International Journal of Innovative Computing, Information and Control,PP3241-3248, 2009.10(ISSN 1349-4198)
Yao Qi, Liu Ji-Qiang, Han Zhen, Shen Chang-Xiang, Research on Linux network packet buffer recycling toward multi-core processor, Journal of Communications,Vol.30, No.9, PP102-108,2009.9
Du Ye, Liu Jiqiang, Li Jieyuan. Design and Implementation of a Defense Mechanism for SQL Injection Attack. Proceedings of ICACTE, Cairo, Egypt, 2009.9
Li, Meihong; Liu, Jiqiang; Hai, Lei. A USB Flash Disk-Based Model of Mobile TPM with Mass Storage, International Conference on Engineering Management and Service Sciences(EMS 2009), Beijing, China, 2009.9
韩磊,刘吉强,韩臻,魏学业,基于移动终端的VPN安全访问控制,第六届中国信息和通信安全学术会议,PP861-866, 2009
刘吉强,赵佳,赵勇, 可信计算中远程自动匿名证明的研究,计算机学报,Vol.32, No.7, PP 1304-1310,2009.7
Li MeiHong,Liu JiQiang,USB key-based approach for software protection,2009 International Conference on Industrial Mechatronics and Automation, ICIMA 2009,PP151-153, 2009. 5
Jiqiang Liu, Sheng Zhong, Analysis of Kim-Jeon-Yoo Password Authentication Schemes, Cryptologia,Volume 33 , Issue 2,Pages 183-187,2009.4
章睿,刘吉强,赵佳,一种基于ID的传感器网络密钥管理方案,电子与信息学报,Vol.31, No.4, PP 929-933,2009.7
赵佳,韩臻,刘吉强,沈昌祥,XTR体制下基于身份特征的数字签名算法,信号处理, 2009年3月, 25(3): 498-502.
Fan Wu; Jiqiang Liu, Sheng Zhong,An Efficient Protocol for Private and Accurate Mining of Support Counts,Pattern Recognition Letters, Volume 30, Issue 1, January 2009, 80–86
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Time-bound Dynamic Secret Sharing Scheme,Journal of Communications,Vol.29. Suppl., PP1-6, 2008.11
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Identity Based Digital Signature Algorithm Of Xtr System,ICSP08,2008.10
Jia Zhao, Zhen Han, Jiqiang Liu, etc., A Noninterference-based Trusted Chain Model, Journal of Computer Research and Development, 45(6):974~980,2008
Liu Weiwei,Han Zhen, Liu Jiqiang, Shen Changxiang, Trust extended object-oriented security model,IET 2nd International Conference on Wireless, Mobile and Multimedia Networks, ICWMMN 2008,PP486-489,2008.10
Jiqiang Liu, Jia Zhao, Zhen Han, A Remote Anonymous Attestation Protocol in Trusted Computing, The 4th International Workshop on Security in Systems and Networks (SSN2008), 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008),PP1-7,2008.4
Jiqiang Liu, Sheng Zhong, Weimin Tang, A Remote Authentication Scheme Based Smart Cards,ITESS08,Vol.1,PP1175-1177,2008.5
Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu, Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts, IEEE ICC 2008
赵勇,刘吉强等,基于任务的访问控制模型研究,Vol.34, No.5, PP:28-30,计算机工程, 2008
Fan Wu, Sheng Zhong, and Jiqiang Liu, Cost-effective Traffic Assignment for Multipath Routing in Selfish Networks, IEEE GlobeCom, PP: 453-457,2007
获奖与荣誉
教育部 新世纪优秀人才
教育部 科技进步一等奖 (排名第9)
北京交通大学 优秀主讲教师
北京交通大学 五四青年奖章获得者
北京交通大学 智瑾奖教金优秀青年教师
社会兼职
IEEE会员
中国计算机学会会员
中国密码学会会员
中国密码学会教育工作委员会委员
全国计算机应急处理协调中心计算机网络与信息安全专家委员会委员
扫码关注
考研信息一网打尽