1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 沪ICP备12018245号
刘吉强,教授,博士
邮 箱:jqliu@bjtu.edu.cn
个人履历
2016.7-至今 北京交通大学研究生院 副院长
2011.9-2016.7 北京交通大学计算机与信息技术学院 副院长
2007.6-2011.9 北京交通大学计算机与信息技术学院计算机工程系 主任
2005.9-2006.9,2012.7-2013.2纽约州立大学布法罗分校计算机科学与工程系 访问学者
2010.12-至今 北京交通大学计算机与信息技术学院 教授
2003.12-2010.12 北京交通大学计算机与信息技术学院 副教授
1999.7-2003.12 北京交通大学计算机与信息技术学院 讲师
智能交通数据安全与隐私保护北京市重点实验室副主任。教育部新世纪优秀人才(2011),首届网络安全优秀教师(2016),全国信息安全标准化技术委员会委员,中国保密协会隐私保护专委会委员,中国密码学会安全协议专业委员会专家委员会成员/教育与科普工作委员会委员,全国计算机应急处理协调中心计算机网络与信息安全专家委员会委员,中关村可信计算联盟副理事长,国家保密教育培训基地北京分基地副主任。
近年来主要从事可信计算,隐私保护,云计算安全等方面的研究工作,主持或参加国家、省部级等项目50余项,其中包括国家自然科学基金2项,863课题4项,973子课题2项,发改委信息安全专项课题1项,国防预研课题3项等,部分成果与企业合作已经成功转化并推向市场,经济效益显著并于2006年获得国家新产品证书(编号2006GR360004),“基于虚拟化技术的可信网络终端系统”获得2010年度教育部科学技术进步奖一等奖(排名第9)。发表论文150余篇,其中SCI/EI检索80余篇,获授权专利10余项,软件著作登记权3项,编/译著2部。担任国家科技进步奖评审人,中直机关信息安全领域评标专家,国家自然科学基金、国家留学回国人员基金评审人。担任国际国内期刊Information Sciences、Information System、CCPE、Frontiers of Computer Science、中国科学、软件学报、电子学报等刊物的审稿人,信息网络安全、信息安全研究期刊编委。
研究方向
可信计算,隐私保护,云计算安全等
发表论文和著作
代表性论文:
Xiao Zhang, Jiqiang Liu, Si Chen, Yongjun Kong, and Kui Ren, PriWhisper+: An Enhanced Acoustic Short-range Communication System for Smartphones, IEEE Internet of Things Journal, 2018
Heng Ye, Jiqiang Liu, Wei Wang,etc., Secure and efficient outsourcing differential privacy data release scheme in Cyber–physical system, Future Generation Computer Systems, 2018
Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu, Android single sign-on security: Issues, taxonomy and directions, Future Generation Computer Systems, Vol.89, p 402-420, December 2018
Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, Discovering communities of malapps on Android-based mobile cyber-physical systems, Ad Hoc Networks, v 80, p 104-115, November 2018
Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018)
Xinwei Gao, Jintai Ding, Lin Li, R.V. Saraswathy, Jiqiang Liu, Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS, Source: International Journal of Network Security, v 20, n 5, p 923-930, September 1, 2018
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Identity-Based Private Matching over Outsourced Encrypted Datasets, IEEE Transactions On Cloud Computing, Vol. 6,No. 3,PP 747-759, 2018
Lun Li , Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, Xiangliang Zhang, and Zonghua Zhang, CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles, IEEE Transactions On Intelligent Transportation Systems, v 19, n 7, p 2204-2220, July 2018
Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren, Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters , IEEE Transactions on Smart Grid, v 9, n 4, p 3313-3320, July 2018
Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu, Fingerprinting Android Malware Families, Frontiers of Computer Science, p 1-10, June 30, 2018
Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks, Information Sciences, v 433-434, p 1339-1351, April 2018
Ziqi Yan, Jiqiang Liu, Shaowu Liu, DPWeVote: differentially private weighted voting protocol for cloud-based decision-making, Enterprise Information Systems, p 1-21, March 9, 2018
Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu, Practical randomized RLWE-based key exchange against signal leakage attack, Source: IEEE Transactions on Computers, February 21, 2018
Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, Discovering and understanding android sensor usage behaviors with data flow analysis, World Wide Web, Vol. 21, No.1 PP 105-126, JAN 2018
Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers, Future Generation Computer Systems,Vol.78,No.3,PP 987-994, JAN 2018
Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Chen, Tong, Intention-aware multi-channel keyword extension for content security, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 788-794, July 16, 2018, Proceedings - 2018
Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang, An approach to generate topic similar document by seed extraction-based SeqGAN training for bait document, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 803-810, July 16, 2018,
Xiaoxuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu, Adversarial examples construction towards white-box Q table variation in DQN pathfinding training, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 781-787, July 16, 2018,
Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han, A PCA-based model to predict adversarial examples on Q-learning of path finding, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 773-780, July 16, 2018, Proceedings - 2018
Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206
Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv, Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. ICCCN 2018: 1-6
Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv, Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. ICCCN 2018: 1-2
Xu Gao, Wenjia Niu, Jiqiang Liu Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222
Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han, Designing mutual authentication protocols in industrial wireless network, Source: Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, p 153-158, May 25, 2018, Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018
Fang Wu, Jigang Wang, Jiqiang Liu, Wei Wang, Vulnerability detection with deep learning, Source: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, v 2018-January, p 1298-1302, March 22, 2018, 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017
Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li, Post-Quantum Secure Remote Password Protocol from RLWE Problem, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10726 LNCS, p 99-116, 2018, Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Revised Selected Papers
Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R.V. Saraswathy, Zhe Liu , Fast discretized Gaussian sampling and post-quantum TLS ciphersuite, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10701 LNCS, p 551-565, 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings
Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Wu, Tong, A cross-modal CCA-based astroturfing detection approach, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 582-592, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Characterizing Android apps' behavior for effective detection of malapps at large scale, Future Generation Computer Systems, Vol. 75,PP 30-45, OCT 2017
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang. Hidden policy CP-ABE with Keyword Search, Science China Information Sciences, v 60, n 5, p 052105 (12 pp.), May 2017
Yang Yang, Jiqiang Liu, Lin Li, etc. Towards Robust Green Virtual Cloud Data Center Provisioning, IEEE Transactions On Cloud Computing,Vol.5, No. 2,PP 168-181 , APR-JUN 2017
Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking, IEEE ACCESS Vol. 5 ,PP 19012-19022, 2017
Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Han, Lei, A method to effectively detect vulnerabilities on path planning of VIN, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 374-384, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, Xiaoxuan Bai, Jingjing Liu, Yingxiao Xiang, Wu, Tong; Jiqiang Liu,, A hidden astroturfing detection approach base on emotion analysis, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10412 LNAI, p 55-66, 2017, Knowledge Science, Engineering and Management - 10th International Conference, KSEM 2017, Proceedings
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, IEEE Transactions on Services Computing, v 9, n 3, p 408-20, May-June 2016
Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu, Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem . The 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016
Dan Su, Wei Wang, Xing Wang, Jiqiang Liu, Anomadroid: profiling Android application behaviors for identifying unknown malapps , The15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets . Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
Zhenliang Cai, Jian Wang, Jiqiang Liu, Novel feature selection algorithm for Chinese text categorization based on CHI . Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11
Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao, An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone . The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks , v 9, n 15, p 2816-2826, October 1, 2016
Zhonghua Wang, Zhen Han, Jiqiang Liu, Public verifiability for shared data in cloud storage with a defense against collusion attacks. SCIENCE CHINA Information Sciences 59(3): 39101:1-39101:3 (2016)
Bianqing Yuan, Jiqiang Liu, A universally composable secure grouping-proof protocol for RFID tags , Concurrency & Computation Practice & Experience, 2016 , 28 (6) :1872-1883
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang. Identity-based private matching over outsourced encrypted datasets. IEEE Transactions on Cloud Computing, Issue 99. DEC.2015
Wei Wang, Yongzhong He, Jiqiang Liu, Ylvain Gombault,Constructing important features from massive network traffic for lightweight intrusion detection, IET Information Security,Vol.9,No.6, 2015
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. SCIENCE CHINA Information Sciences, Vol.58,No.7, pp.166-180,2015
Bin Wang, Xiaolin Chang, Jiqiang Liu, Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter , Vol. 19, No. 4 , PP: 537-540, April 2015
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han,etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Information Sciences 295(2015):221-231
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, Vol.27 ,No.5, PP: 1092-1109,2015.4
Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, v 11, n 5, p 1863-1877, March 1, 2015
Guang Yang, Jiqiang Liu, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, Vol.11, No. 2, p 671-681, January 15, 2015
Xing Liu, Wei Wang, Jiqiang Liu, POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. ACM Conference on Computer and Communications Security 2015(CCS 2015): 1653-1655
Xing Liu, Jiqiang Liu, Wei Wang, Exploring sensor usage behaviors of Android applications based on data flow analysis. IPCCC 2015: 1-8
代表性著作:
科研项目及获奖情况
科研项目:
主持或参加国家、省部级、校级以及横向项目,其中包括国家自然科学基金2项,863课题4项,973子课题2项,国防预研课题3项等. 近年来主要课题包括:
教育部基本科研业务费重点项目,面向军民融合的多域网络互联态势感知关键技术,编号2018JBZ103,负责人, 2018-2021
红果园纵向,样本扩充及关键词语义扩展关键技术研究,负责人, 2017-2019
公司委托,基于桌面云的众创平台软件设计与开发,负责人, 2017-2018
国家自然科学基金课题,云平台数据隐私保护关键技术研究,编号61672092,负责人, 2017-2020
红果园省部级"企事业",信息采集合作协议, 负责人, 2016-2018
中国工程院重大咨询课题子课题,可信的网络空间安全保障体系,技术负责人, 2015-2018
公司委托,企业资源分享平台软件,负责人, 2015-2016
教育部新世纪人才,“面向电子病历共享系统的安全与隐私保护技术研究” ,负责人, 2012-2014
保密局课题,“基于国产可信计算平台的涉密终端应用技术研究” ,负责人,2011-2012
自然科学基金“基于TCM的匿名证明和隐私保护”编号60973112,负责人, 2009-2012
获奖情况:
2016年 国家网信办 网络安全优秀教师
2011年 教育部 新世纪优秀人才
2010年 教育部 科技进步一等奖 (排名第9)
2009年 北京交通大学 智瑾奖教奖优秀青年教师
2007年 北京交通大学 优秀主讲教师
2007年 北京交通大学 五四青年奖章获得者
授课及指导研究生
应用密码学与安全协议
离散数学
信息安全导论
来源未注明“中国考研网”的资讯、文章等均为转载,本网站转载出于传递更多信息之目的,并不意味着赞同其观点或证实其内容的真实性,如涉及版权问题,请联系本站管理员予以更改或删除。如其他媒体、网站或个人从本网站下载使用,必须保留本网站注明的"稿件来源",并自负版权等法律责任。
来源注明“中国考研网”的文章,若需转载请联系管理员获得相应许可。
联系方式:chinakaoyankefu@163.com
扫码关注
了解考研最新消息