当前位置: X-MOL首页全球导师 国内导师 › 刘峰

个人简介

招生方向 信息对抗理论与技术,信息安全战略研究,密码学 教育背景 2003-09--2009-01 软件研究所 博士 1999-09--2003-07 山东大学 学士 发表著作 (1) 美国网络空间安全体系, Overview of the Cybersecurity System in USA, 科学出版社, 2015-01, 第 1 作者 (2) 视觉密码学理论、方法与应用, Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Second Edition), Springer-Verlag London, 2015-06, 第 1 作者 (3) Proceedings of 1st International Workshop on Science of Cybersecurity, Springer, 2018-08, 第 1 作者 (4) Proceedings of 2nd International Workshop on Science of Cybersecurity, Springer, 2019-11, 第 1 作者 专利成果 ( 1 ) 一种安全协议的形式化分析方法, 发明, 2010, 第 2 作者, 专利号: 201010578947.2 ( 2 ) 一种基于视觉密码的隐私保护显示器实现方法, 发明, 2016, 第 1 作者, 专利号: 201410542752.0 ( 3 ) 一种基于视觉密码的可视防复印技术, 发明, 2012, 第 1 作者, 专利号: 201210075522.9 ( 4 ) 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统, 发明, 2020, 第 1 作者, 专利号: 2017107899619 科研项目 ( 1 ) 视觉密码方案的构造, 主持, 国家级, 2010-01--2012-12 ( 2 ) 海云信息安全体系与共性技术研究, 参与, 部委级, 2012-01--2016-12 ( 3 ) 针对视觉密码应用的若干关键问题研究, 参与, 市地级, 2013-01--2013-12 ( 4 ) 中国科学院青年创新促进会, 主持, 部委级, 2014-01--2017-12 ( 5 ) 未来信息技术研究, 参与, 部委级, 2012-01--2016-12 ( 6 ) 视觉安全若干关键问题研究, 主持, 国家级, 2017-01--2020-12 ( 7 ) 多源QB获取, 主持, 部委级, 2018-09--2018-12 ( 8 ) 网络威胁发现与溯源支撑系统研发, 主持, 省级, 2019-07--2020-12 ( 9 ) 多源数据获取, 主持, 部委级, 2019-01--2022-12

研究领域

信息安全体系与战略,网络攻防演化理论,视觉安全理论与技术 Strategic and economic aspects of information security, Network Attack and Defense throey, visual security and cryptography

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

(1) WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense, IEEE International Conference on Web Services, 2020, 第 5 作者 (2) SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法, 信息安全学报, 2020, 第 6 作者 (3) A Heuristic Method for Network Modification against Cyber Epidemic Attacks, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2019, 第 2 作者 (4) Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network, IEEE International Conference on Communications, 2019, 第 2 作者 (5) Dynamical model for individual defence against cyber epidemic attacks, IET Information Security, 2019, 第 2 作者 (6) Visual Cryptograms of Random Grids via Linear Algebra, Multimedia Tools and Applications, 2018, 第 2 作者 (7) Temporal Integration Based Visual Cryptography Scheme and Its Application, 16th International Workshop on Digital-forensics and Watermarking, 2018, 第 2 作者 (8) Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources, 1st International Conference on Science of Cyber Security, 2018, 第 2 作者 (9) Protecting White-Box Cryptographic Implementations with Obfuscated Round Boundaries, SCIENCE CHINA Information Sciences, 2017, 第 3 作者 (10) Optimizing interconnections to maximize the spectral radius of interdependent networks, Physical Review E, 2017, 第 3 作者 (11) A White-Box AES-Like Implementation Based on Key-Dependent Substitution-Linear Transformations, Multimedia Tools and Applications, 2017, 第 2 作者 (12) Privacy monitor, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者 (13) Halftone Visual Cryptography with Complementary Cover Images, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者 (14) Collusive Attacks to Partition Authentication Visual Cryptography Scheme, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者 (15) Information Security Display Technology with Cheating Effect, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者 (16) An Adaptive Reversible Data Hiding Scheme for JPEG Images, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者 (17) Perfect Contrast XOR-based Visual Cryptography Schemes via Linear Algebra, Designs, Codes and Cryptography, 2016, 第 2 作者 (18) New insight into linear algebraic technique to construct visual cryptography scheme for general access structure, Multimedia Tools and Applications, 2016, 第 2 作者 (19) Cheating prevention visual cryptography scheme using Latin square, IET Information Security, 2016, 第 2 作者 (20) Basic Visual Cryptography Using Braille, International Journal of Digital Crime and Forensics, 2016, 第 2 作者 (21) The Distribution of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity, 12th International Conference on Information Security Practice and Experience, 2016, 第 4 作者 (22) The Linear Complexity and $2$-error Linear Complexity Distribution of $2^n$-Periodic Binary Sequences with Fixed Hamming Weight, 18th IEEE International Conference on Information and Communications Security, 2016, 第 4 作者 (23) Event Analogy Based Privacy Preservation in Visual Surveillance, International Workshop on Video Surveillance of The 7th Pacific-Rim Symposium on Image and Video Technology, 2016, 第 2 作者 (24) An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion, IWDW2015, 2015, 第 2 作者 (25) A New Construction of Tagged Visual Cryptography Scheme, IWDW2015, 2015, 第 2 作者 (26) 2D Barcodes for Visual Cryptography, Multimedia Tools and Applications, 2014, 第 2 作者 (27) Braille For Visual Cryptography, IEEE International Symposium on Multimedia, 2014, 第 2 作者 (28) k out of k extended visual cryptography scheme by random grids, Signal Processing, 2014, 第 2 作者 (29) ESSVCS: An Enriched Secre Sharing Visual Cryptography, Springer Transactions on Data Hiding and Multimedia Security, 2013, 第 1 作者 (30) Flexible Visual Cryptography Scheme Without Distortion and Its Application, Springer Transactions on Data Hiding and Multimedia Security, 2013, 第 1 作者 (31) Threshold visual secret sharing by random grids with improved contrast, Journal of Systems and Software, 2013, 第 2 作者 (32) Improving the Visual Quality of Size Invariant Visual Cryptography Scheme, Journal of Visual Communication and Image Representation, 2012, 第 1 作者 (33) Visual Cryptography for Natural Images and Visual Voting, Inscrypt2012, 2012, 第 2 作者 (34) On the Equivalence of Two Definitions of Visual Cryptography Scheme, ISPEC 2012, 2012, 第 2 作者 (35) Embedded Extended Visual Cryptography Schemes, IEEE Transactions on Information Forensics and Security, 2011, 第 1 作者 (36) Cheating Immune Visual Cryptography Scheme, IET Information Security, 2011, 第 1 作者 (37) Step Construction of Visual Cryptography Schemes, IEEE Transactions on Information Forensics and Security, 2010, 第 1 作者 (38) A New Definition of the Contrast of Visual Cryptography Scheme, Information Processing Letters, 2010, 第 1 作者 (39) Some Extensions on Threshold Visual Cryptography Schemes, The Computer Journal, 2010, 第 1 作者 (40) The Alignment Problem of the Visual Cryptography Scheme, Designs, codes and cryptography, 2009, 第 1 作者 (41) Color Visual Cryptography Schemes, IET Information Security, 2008, 第 1 作者

推荐链接
down
wechat
bug