1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號
分類:導師信息 來源:中國考研網 2016-04-19 相關院校:北京交通大學
基本信息
辦公電話:01051684198 電子郵件: jqliu@bjtu.edu.cn
通訊地址:北京市海淀區西直門外上園村3號 郵編:100044
教育背景與工作經歷
1999年畢業于北京師范大學獲理學博士學位,同年進入北方交通大學(現更名為北京交通大學)計算機與信息技術學院工作,歷任講師,副教授,教授,現為計算機與信息技術學院副院長,信息安全研究室主任,信息安全專業負責人,2005.9-2006.9,2012.7-2013.1紐約州立大學布法羅分校計算機科學與工程系訪問學者。
研究方向(順序不分先后)
網絡安全技術
計算機安全
計算機技術(專業學位)
招生專業
計算機與信息技術學院:信息安全碩士
計算機與信息技術學院:信息安全博士
計算機與信息技術學院:計算機科學與技術博士
計算機與信息技術學院:計算機科學與技術碩士
計算機與信息技術學院:計算機技術(專業學位)碩士
科研項目
廣東電網,大數據環境下數據安全研究,2015.1-2016.1,39.5萬,主持
隱私保護技術管理和法律研究,2014.8-2015.12,12萬,主持
戰略合作框架協議及密鑰管理系統項目,2014-06-01--2015-5-31,30.0萬元,主持
紅果園省部級"企事業":RSA-768數域篩法大數分解多項式選擇中的多項式根優化研究與工程實現,2013-12-01--2014-05-31,15.0萬元,參加
北京交通大學:上網行為管理系統軟件平臺,2013-10-08--2015-10-07,20.0萬元,主持
北京交通大學:互聯網網站備案關鍵技術研究 ,2013-09-04--2014-10-31,20.0萬元,參加
紅果園:基于云計算的涉密信息系統安全保密測評與檢查能力建設,2013-01-01--2014-12-31,80.0萬元,參加
紅果園:單向受控定制數據安全交換技術研究與系統研制,2013-10-01--2015-10-01,30.0萬元,主持
其它部市:移動互聯網應用審計平臺,2013-09-06--2014-09-06,15.0萬元,主持
紅果園:合作協議,2012-09-14--2013-09-14,49.8萬元,參加
紅果園:公安部第一研究所重要信息系統安全咨詢服務支撐平臺定制開發,2012-06-30--2013-12-31,45.0萬元,參加
教育部新世紀:面向電子病歷共享系統的安全與隱私保護技術研究,2012-04-08--2013-12-30,50.0萬元,主持
基本科研業務費:基于可信計算的涉密終端安全防護技術的研究,2012-07-01--2014-12-31,61.0萬元,主持
紅果園:保密學院建設,2011-11-25--2012-12-31,20.0萬元,參加
紅果園:基于國產可信計算平臺的涉密終端應用技術研究,2011-09-01--2012-09-30,46.0萬元,主持
紅果園:中辦國辦計算機系統建設中的保密防護技術研究,2011-07-01--2011-12-31,28.0萬元,參加
紅果園:電磁泄漏發射防護技術國外發展狀況研究,2011-07-01--2011-12-31,26.9631萬元,參加
紅果園:無線發射設備對“全國組織信息系統”的安全性研究,2011-07-01--2011-12-31,20.0369萬元,參加
紅果園:網絡重要設備電磁泄漏發射防護研究,2011-07-01--2011-12-31,25.0萬元,參加
北京交通大學:網絡文件安全保護與監控系統,2011-04-20--2013-12-31,15.36萬元,參加
紅果園:基于可信計算的電子文件密級標志安全技術研究,2011-04-01--2011-09-30,12.0萬元,參加
紅果園:艦載安全增強操作系統及安全管理系統研制,2010-10-01--2010-11-30,20.0萬元,參加
北京交大創新科技中心:惠州市惠陽區人民醫院醫院信息系統技術開發,2010-11-11--2011-06-30,125.0萬元,主持
其它部市:北京信息安全服務能力評估,2010-09-30--2010-12-31,10.0萬元,參加
紅果園:PCI密碼模塊及相關軟件技術服務,2010-07-10--2012-02-29,18.0萬元,參加
紅果園:基于Java Card體系結構的智能卡,2010-07-10--2013-07-10,15.0萬元,參加
紅果園:基于Java Key的安全開發套件,2010-07-10--2013-07-10,15.0萬元,參加
北京交通大學:Web安全防護系統,2010-06-22--2012-12-31,20.0萬元,參加
其它部市:信息安全人才培養體系及其發展模式的研究,2010-05-01--2011-04-30,15.0萬元,主持
紅果園:可信計算密碼平臺,2009-09-01--2010-03-30,220.0萬元,參加
北京交通大學:網絡與信息安全模擬實訓系統,2009-08-31--2010-08-31,10.0萬元,主持
國家自然科學基金“面上”:基于TCM的匿名證明和隱私保護,2010-01-01--2012-12-31,31.0萬元,主持
其它部市:關于信息系統安全保密必須從源頭上加以治理的措施研究,2008-05-01--2009-12-31,15.0萬元,參加
北京交通大學:應用軟件特征識別---辦理免稅,2009-05-04--2010-05-04,65.0萬元,主持
科技部“863”:虛擬個人計算機系統的可信支撐技術研究,2008-01-24--2009-09-30,46.0萬元,主持
北京交大創新科技中心:信息安全試驗平臺開發,2008-02-26--2009-10-31,10.0萬元,主持
科技部“863”:可信計算平臺信任鏈建立關鍵技術,2007-12-18--2009-12-31,88.0萬元,參加
紅果園:網絡計算現狀研究,2007-11-20--2008-10-31,17.5萬元,參加
北京市科委:終端安全體系結構研究及關鍵技術研發,2007-09-10--2009-09-10,40.0萬元,參加
鐵道部科技司:鐵路信息系統應用與技術研究-鐵路信息網絡災備系統安全防護與災備恢復技術,2007-08-20--2008-03-31,30.0萬元,參加
其它部市:可信計算技術和產業發展及相關對策研究,2007-05-01--2008-05-31,15.0萬元,參加
科技部“973”:一體化網絡與普適服務的體系理論與結構-3,2007-05-01--2012-08-31,20.0萬元,參加
紅果園:zzbb-jsjxy-韓臻-專項任務,2006-09-01--2008-06-30,25.0萬元,參加
北京交大科技發展中心:計劃項目,2006-11-10--2007-11-10,20.0萬元,參加
北京交通大學:Socks VPN安全互聯系統Ⅱ,2006-07-01--2007-09-30,15.0萬元,參加
其它部市:信息安全教育現狀分析和發展對策的研究,2005-12-01--2006-06-30,9.0萬元,參加
北京交通大學:安全管理知識庫Security Policy Pack,2005-06-01--2006-06-01,20.0萬元,參加
其它部市:網絡信息加密技術-PKI關鍵技術研究,2004-01-01--2004-12-01,10.0萬元,參加
紅果園:Kylin操作系統可信支撐模塊研制,2004-11-01--2005-11-01,100.0萬元,參加
其它部市:國家信息安全保障戰略,2004-09-01--2005-06-01,10.0萬元,參加
北京交通大學:Socks VPN安全互聯系統,2004-07-15--2005-04-15,31.0萬元,主持
北京交通大學:安全操作系統,2004-01-02--2004-12-31,33.8萬元,參加
紅果園:網絡信息加密技術PKI關鍵技術研究2,2003-01-12--2003-12-12,15.0萬元,參加
紅果園:專項任務,2003-01-01--2004-12-30,20.0萬元,參加
科技部:信息域網絡安全體系結構研究,2002-09-01--2005-09-01,168.9萬元,參加
科技部:(863)計算機信息系統安全體系結構研究,2002-10-12--2003-12-12,50.0萬元,參加
科技部:(973)操作系統安全結構研究,2002-04-06--2004-04-06,10.0萬元,參加
科技部:(973)基于對稱密碼的應用層安全體系結構研究,2002-04-06--2004-04-06,10.0萬元,參加
教學工作
離散數學
應用密碼學與安全協議
學術成果
期刊論文
Yanfeng Shi, Jiqiang Liu, Zhen Han, Qingji Zheng, Rui Zhang, Shuo Qiu. Attribute-Based Proxy Re-encryption with Keyword Search, 2014, PLoS ONE 9(12): e116325, doi:10.1371/journal.pone.0116325.
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks [J] , (2015)
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. Science China Information Sciences, 2015(Accepted)
Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter 2015(In press), DOI:10.1109/LCOMM.2015.2403832.
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, Accepted by IEEE Transactions on Services Computing
Yanfeng Shi, Jiqiang Liu, etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Accepted by Information Sciences
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, 2014
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han. Multi-party identity-based symmetric privacy-preserving matching with cloud storage. Wuhan University Journal of Natural Sciences, Oct.2014, Vol 19, issue 5, pp 426-432
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014
Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communications, Vol.11, No.9, PP: 54-66 , SEP 2014
原變青, 劉吉強, 基于NFC的離線可分享移動優惠券方案, 山東大學學報(理學版), Vol.49, No.9, PP:24-29, 2014.9
Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE Mobile Cloud 2014, 2014.4
Shuo Qiu, Jiqiang Liu, etc, Identity-Based Symmetric Private Set Intersection,SocialCom2013 , 2013.9
Xun Chen, Zhen Han, Jiqiang Liu, Data protection technology in classified networks, Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, v 42, n 1, p 144-148, January 2013
Wang, Wenbo; Chang, Xiaolin; Liu, Jiqiang; Wang, Bin, Simulated annealing based resource allocation for cloud data centers, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 81-82, 2013
Chang, Xiaolin; Wang, Bin; Liu, Jiqiang; Wang, Wenbo; Muppala, Jogesh K. , Green cloud virtual network provisioning based ant colony optimization, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 1553-1560, 2013
Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala: Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718
Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun: Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29
Xiaolin Chang, Bin Wang, Jiqiang Liu: Network state aware virtual network parallel embedding. IPCCC 2012: 193-194
Guo, Yu ; Liu, Jiqiang; Shen, Changxiang,Trusted dynamic self-confidence migration of cloud service, International Journal of Advancements in Computing Technology, v 4, n 7, p 92-101, 2012
韓磊, 劉吉強, 魏學業,侯杰. 基于便攜式可信平臺模塊的Ad Hoc網絡密鑰管理應用研究 。北京工業大學學報,2012,38(11):1676-1682。
韓磊,劉吉強,韓臻,魏學業,移動ad hoc網絡預分配非對稱密鑰管理方案 。通信學報,2012,33(10):26-34。
黃學臻,韓臻,劉吉強.數據分級匿名的訪問控制模型。第二十二屆全國信息保密學術會議(IS2012)論文集:174-177。
陳勛,韓臻,劉吉強.涉密網絡中的數據保護技術.第九屆中國信息與通信安全學術會議CCICS 2012。
Jie Hou, Lei Han, Jiqiang Liu, Jia Zhao, Secure and Efficient Protocol for Position-based Routing in VANETs, ICADE p 142-148, 2012. 7
Yanfeng Shi, Jiqiang Liu, Zhen Han, Rongrong Fu. A Generic construction of certificateless signcryption. ICISCE 2012.
韓磊, 劉吉強, 趙佳, 魏學業. 移動Ad Hoc網絡分布式輕量級CA密鑰管理方案 .四川大學學報(工程科學版),2011,43(6):133-139.
Bin Xing, Zhen Han, Jiqiang Liu, Xiaolin Chang, Trust Bootstrapping of Para-Virtualized Domain, Applied Mechanics and Materials, v 182-183, p 2059-2065, 2012
Xuezhen Huang, Jiqiang Liu, Zhen Han, A Security and Privacy Model for Electronic Health Records, Proceedings of 2011 IEEE International Conference on Information Theory and Information Security, 2011, PP416- 420.
Jiqiang Liu, Sheng Zhong, Lei Han and Haifan Yao, An Identity-Based Cryptosystem for Encrypting Long Messages, International Journal of Innovative Computing, Information and Control,Volume 7, Number 6, PP.3295-3302, 2011
Rui Zhang, Jiqiang Liu, Zhen Han, RBTBAC: Secure Access and Management of EHR Data,International Conference on Information Society, PP494-499. 2011.7
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei: Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers of Computer Science in China 5(2): 169-180 (2011)
Ye Du, Jiqiang Liu, Ruhui Zhang, Jieyuan Li: A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers. JCP 6(10): 2021-2028 (2011)
Jiqiang Liu, Xun Chen, Zhen Han, Full and Partial Deniability for Authentication Schemes, Frontiers of Computer Science in China Volume 4, Number 4, 516-521,2010
Zhao, J., Han, Z., Liu, J., Zhang, R. Remote attestation based on trusted cryptography module, Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University 34 (2), pp. 33-37,2010
Han L, Liu JQ, Han Z. Research on Key Management Schemes for Mobile Ad Hoc Networks. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010:225-229.
Wang ZH, Han Z, Liu JQ, Detect Technology about Smart Card, PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, July 2010:723-728
Fan Wu, Sheng Zhong, Jiqiang Liu, An Optimal, Strategy-proof Scheme for Multi-path Traffic Assignment in Non-cooperative Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 3, 1012-1021, MARCH 2010
Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng: An IBE scheme using ECC combined public key. Computers & Electrical Engineering 36 (6): 1046-1054 (2010)
Xiaolin CHANG, Bin XING, Jiqiang Liu, “LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack”, In Proc. the 28th IEEE IPCCC, 2009.
Rui Zhang, Jiqiang Liu, Shuanghe Peng. A Trusted Bootstrap Scheme on EFI, 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), PP200-204, 2009. 11
Lei Han, Jiqiang Liu, Dawei Zhang, Zhen Han, and Xueye Wei, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI,PP140-143, International Conference on Multimedia Information Networking and Security, PP140-143,2009 .11
Jiqiang Liu, Sheng Zhong, A Practical Time Bound Hierarchical Key Scheme,Vol.5, No.10, International Journal of Innovative Computing, Information and Control,PP3241-3248, 2009.10(ISSN 1349-4198)
Yao Qi, Liu Ji-Qiang, Han Zhen, Shen Chang-Xiang, Research on Linux network packet buffer recycling toward multi-core processor, Journal of Communications,Vol.30, No.9, PP102-108,2009.9
Du Ye, Liu Jiqiang, Li Jieyuan. Design and Implementation of a Defense Mechanism for SQL Injection Attack. Proceedings of ICACTE, Cairo, Egypt, 2009.9
Li, Meihong; Liu, Jiqiang; Hai, Lei. A USB Flash Disk-Based Model of Mobile TPM with Mass Storage, International Conference on Engineering Management and Service Sciences(EMS 2009), Beijing, China, 2009.9
韓磊,劉吉強,韓臻,魏學業,基于移動終端的VPN安全訪問控制,第六屆中國信息和通信安全學術會議,PP861-866, 2009
劉吉強,趙佳,趙勇, 可信計算中遠程自動匿名證明的研究,計算機學報,Vol.32, No.7, PP 1304-1310,2009.7
Li MeiHong,Liu JiQiang,USB key-based approach for software protection,2009 International Conference on Industrial Mechatronics and Automation, ICIMA 2009,PP151-153, 2009. 5
Jiqiang Liu, Sheng Zhong, Analysis of Kim-Jeon-Yoo Password Authentication Schemes, Cryptologia,Volume 33 , Issue 2,Pages 183-187,2009.4
章睿,劉吉強,趙佳,一種基于ID的傳感器網絡密鑰管理方案,電子與信息學報,Vol.31, No.4, PP 929-933,2009.7
趙佳,韓臻,劉吉強,沈昌祥,XTR體制下基于身份特征的數字簽名算法,信號處理, 2009年3月, 25(3): 498-502.
Fan Wu; Jiqiang Liu, Sheng Zhong,An Efficient Protocol for Private and Accurate Mining of Support Counts,Pattern Recognition Letters, Volume 30, Issue 1, January 2009, 80–86
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Time-bound Dynamic Secret Sharing Scheme,Journal of Communications,Vol.29. Suppl., PP1-6, 2008.11
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Identity Based Digital Signature Algorithm Of Xtr System,ICSP08,2008.10
Jia Zhao, Zhen Han, Jiqiang Liu, etc., A Noninterference-based Trusted Chain Model, Journal of Computer Research and Development, 45(6):974~980,2008
Liu Weiwei,Han Zhen, Liu Jiqiang, Shen Changxiang, Trust extended object-oriented security model,IET 2nd International Conference on Wireless, Mobile and Multimedia Networks, ICWMMN 2008,PP486-489,2008.10
Jiqiang Liu, Jia Zhao, Zhen Han, A Remote Anonymous Attestation Protocol in Trusted Computing, The 4th International Workshop on Security in Systems and Networks (SSN2008), 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008),PP1-7,2008.4
Jiqiang Liu, Sheng Zhong, Weimin Tang, A Remote Authentication Scheme Based Smart Cards,ITESS08,Vol.1,PP1175-1177,2008.5
Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu, Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts, IEEE ICC 2008
趙勇,劉吉強等,基于任務的訪問控制模型研究,Vol.34, No.5, PP:28-30,計算機工程, 2008
Fan Wu, Sheng Zhong, and Jiqiang Liu, Cost-effective Traffic Assignment for Multipath Routing in Selfish Networks, IEEE GlobeCom, PP: 453-457,2007
獲獎與榮譽
教育部 新世紀優秀人才
教育部 科技進步一等獎 (排名第9)
北京交通大學 優秀主講教師
北京交通大學 五四青年獎章獲得者
北京交通大學 智瑾獎教金優秀青年教師
社會兼職
IEEE會員
中國計算機學會會員
中國密碼學會會員
中國密碼學會教育工作委員會委員
全國計算機應急處理協調中心計算機網絡與信息安全專家委員會委員
掃碼關注
考研信息一網打盡