当前位置: X-MOL首页全球导师 国内导师 › 章丽平

个人简介

中国地质大学计算机学院信息安全系副主任。中国计算机学会会员、ACM会员。2013年11月至2014年11月,国家留学基金委公派到美国佛罗里达大学,计算机信息科学与工程学院进行学术访问,致力于网络安全研究。近年来,在国际SCI期刊和重要国际会议上发表学术论文30余篇,其中SCI收录20余篇,EI收录10余篇。主持国家自然科学基金青年基金项目、中国博士后基金面上项目、中国博士后基金别特资助项目、优秀青年教师基金等项目。作为主要成员参与国家自然科学基金面上项目,湖北省自然科学基金项目、武汉市科技攻关项目、重大地质调查项目等项目共20余项,作为国际学术会议分会主席多次参加国际学术会议和学术交流活动,应邀担任多个国际SCI期刊和会议的审稿人。 科研项目 1. 国家自然科学基金青年基金项目,基于生物Token和分形随机行走的VoIP网络安全通信理论与关键技术研究,主持。 2. 中国博士后科学基金特别资助项目,海量地学数据安全通信理论与关键技术研究,主持。 3. 中国博士后科学基金面上项目,环保物联网感知层异构数据隐密通信关键技术研究,主持。 4. ***研究所创新基金项目,***无线通信***,主持。 5. 武汉市科技攻关计划项目,物联网安全感知关键技术及仿真验证平台,排名第二。 6. 国家自然科学基金面上项目,基于随机分形计算的网络流媒体隐密通信理论和方法研究,排名第三。 7. 湖北省自然科学基金面上项目,基于云计算的在线视频转码关键技术研究,排名第三。 8. 国家自然科学基金面上项目,物联网轻量级健壮安全中的关键问题研究,排名第三。 教学项目 1.省级教学研究项目,面向创新能力培养的信息安全专业教学改革方法研究—以美国Florida大学,英国Salford大学本科教学培养模式为参照。 2.校级教学研究项目,面向创新能力培养的信息安全专业教学改革方法研究。 教材, 1.章丽平,王媛妮,李桂玲,刘然,《数据库原理及安全》,科学出版社,2020. 学生指导 1.2020年校优秀本科毕业论文优秀指导老师。 2.指导本科生获第十二届全国大学生信息安全竞赛二等奖。 3.2019级研究生朱越发表学术论文一篇。 4.2018级研究生魏榛发表学术论文一篇。 5.2017级研究生赵兰超发表学术论文一篇。 6.2016级研究生张艺馨获2017年硕士研究生国奖奖学金,发表学术论文一篇。 7.2015级研究生罗合发表学术论文一篇。 8.2014级研究生张云胜获 2014-2015年度“校级优秀研究生干部”,2016年研究生优秀毕业生。 9.2013级研究生朱邵辉获2015年硕士研究生国奖奖学金,2014-15年度“校级优秀研究生”,2013-14年度“学习先进个人”,2016年研究生优秀毕业生,发表学术论文一篇。

研究领域

网络安全,系统安全

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

科研论文 (1) L. Zhang, Z. Wei, W. Ren, X. Zheng, K. Raymond Choo, N. Xiong, “SIP: An Efficient and Secure Information Propagation Scheme in E-health Networks,” IEEE Transactions on Network Science and Engineering, DOI 10.1109/TNSE.2021.3063174, 2021. (2) L. Zhang, Y. Zhu, W. Ren, Y. Wang, K. Raymond Choo, N. Xiong, “An Energy Efficient Authentication Scheme based on Chebyshev Chaotic Map for Smart Grid Environments,”IEEE Internet of Things Journal, 2021, Accepted. (3) L. Zhang, L. Zhao, S. Yin, C. Chi, R. Liu, Y. Zhang, “A lightweight authentication scheme with privacy protection for smart grid communications,” Future Generation Computer systems, vol. 100, pp. 770-778, 2019. (4) L. Zhang, Y. Zhang, S. Tang, H. Luo, “Privacy Protection for E-health Systems by Means of Dynamic Authentication and Three-factor Key Agreement,” IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2795-2805, 2018. (5) L. Zhang, H. Luo, L. Zhao, Y. Zhang, “Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement,” Journal of Medical Systems, vol. 40, pp. 1-13, 2018. (6) Y. Liu, S. Tang, R. Liu, L. Zhang, Z. Ma, “Secure and robust digital image watermarking scheme using logistic and RSA encryption,” Expert Systems with Applications, vol. 97, pp. 95-105, 2018. (7) L. Zhang, S. Zhu, S. Tang, “Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme,” IEEE Journal of Biomedical and Health Informatics, vol. 21, no. 2, pp. 465-475, 2017. (IEEE Transactions on Information Technology in Biomedicine) (8) L. Zhang, S. Tang, S. Zhu, “Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol,” Wireless Networks, vol. 23, no. 6, pp. 1901-1916, 2017. (9) J. Peng, S. Tang, L. Zhang, Ran Liu, “Information retrieval of mass encrypted data over multimedia networking with n-Level vector model-based relevancy ranking,” Multimedia Tools and Applications, vol. 76, pp. 2569-2589, 2017. (10) L. Zhang, S. Tang, S. Zhu, “A Lightweight Privacy Preserving Authenticated Key Agreement Protocol for SIP-based VoIP,” Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 108-126, 2016. (11) L. Zhang, S. Tang, S. Zhu, “An Energy Efficient Authenticated Key Agreement Protocol for SIP-based Green VoIP Networks,” Journal of Network and Computer Applications, vol. 59, pp.126-133, 2016. (12) Y. Jiang, S. Tang, L. Zhang, M. Xiong, and Y. J. Yip, “Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 12, no. 4, 54, pp. 1-20, 2016. (13) L. Zhang, S. Tang,Y. Jiang “Dynamic key updating with voice quality preserving for Voice over Internet Protocol based on steganography,” 3rd Annual International Conference on Wireless Communication and Sensor Network,Wuhan, Hubei, China,2016.12.10-2016.12.11 (14) L. Zhang, S. Zhu, “Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 39, no. 5, pp. 1-11, 2015. (15) L. Zhang, S. Tang, J. Chen and S. Zhu, “Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography,” Wireless Personal Communications, vol. 81, no. 1, pp. 53-75, 2015. (16) W. Zhang, S. Tang, L. Zhang, Z. Ma, J. Song, “Chaotic Stream Cipher-based Secure Data Communications over Intelligent Transportation Network,” International Journal of Antennas and Propagation, vol. 2015, pp. 1-10, 2015. (17) L. Zhang, S. Tang, Z. Cai, “Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications,” IET Communications, vol. 8, no. 1, pp. 83-91, 2014. (18) L. Zhang, S. Tang, Z. Cai, “Cryptanalysis and improvement of password authenticated key agreement for session initiation protocol using smart cards,” Security and Communication Networks, vol.7, pp. 2405-2411, 2014. (19) L. Zhang, S. Tang, Z. Cai, “Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card,” International Journal of Communication Systems, vol. 27, no. 11, pp. 2691-2702, 2014. (20) Tang ShanYu, Jiang YiJing, Zhang LiPing, Zhou ZhangBing, “Audio steganography with AES for real-time covert voice over internet protocol communications,” SCIENCE CHINA Information Sciences, vol. 57, no. 3, pp. 1-14, 2014. (21) W. Zhang, Q. Chen, J. Li, L. Zhang, S. Tang, “Security improvement in ETC network using RC4-logistic chaotic encryption,” Intl. Conf. on Advances In Computer and Electronics Technology - ACET 2014, pp. 34-38, Hong Kong, 2014.8.26-8.27. 教学论文 2.章丽平,信息安全专业双语教学研究——以《数据库及安全》课程为例,软件导刊,2017,(3):193-195. 3.章丽平,面向创新能力培养的信息安全专业教学改革探讨,中国教育信息化,2017,(8):12-14.

推荐链接
down
wechat
bug