个人简介
招生方向
信息对抗理论与技术,信息安全战略研究,密码学
教育背景
2003-09--2009-01 软件研究所 博士
1999-09--2003-07 山东大学 学士
发表著作
(1) 美国网络空间安全体系, Overview of the Cybersecurity System in USA, 科学出版社, 2015-01, 第 1 作者
(2) 视觉密码学理论、方法与应用, Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Second Edition), Springer-Verlag London, 2015-06, 第 1 作者
(3) Proceedings of 1st International Workshop on Science of Cybersecurity, Springer, 2018-08, 第 1 作者
(4) Proceedings of 2nd International Workshop on Science of Cybersecurity, Springer, 2019-11, 第 1 作者
专利成果
( 1 ) 一种安全协议的形式化分析方法, 发明, 2010, 第 2 作者, 专利号: 201010578947.2
( 2 ) 一种基于视觉密码的隐私保护显示器实现方法, 发明, 2016, 第 1 作者, 专利号: 201410542752.0
( 3 ) 一种基于视觉密码的可视防复印技术, 发明, 2012, 第 1 作者, 专利号: 201210075522.9
( 4 ) 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统, 发明, 2020, 第 1 作者, 专利号: 2017107899619
科研项目
( 1 ) 视觉密码方案的构造, 主持, 国家级, 2010-01--2012-12
( 2 ) 海云信息安全体系与共性技术研究, 参与, 部委级, 2012-01--2016-12
( 3 ) 针对视觉密码应用的若干关键问题研究, 参与, 市地级, 2013-01--2013-12
( 4 ) 中国科学院青年创新促进会, 主持, 部委级, 2014-01--2017-12
( 5 ) 未来信息技术研究, 参与, 部委级, 2012-01--2016-12
( 6 ) 视觉安全若干关键问题研究, 主持, 国家级, 2017-01--2020-12
( 7 ) 多源QB获取, 主持, 部委级, 2018-09--2018-12
( 8 ) 网络威胁发现与溯源支撑系统研发, 主持, 省级, 2019-07--2020-12
( 9 ) 多源数据获取, 主持, 部委级, 2019-01--2022-12
研究领域
信息安全体系与战略,网络攻防演化理论,视觉安全理论与技术
Strategic and economic aspects of information security, Network Attack and Defense throey, visual security and cryptography
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
(1) WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense, IEEE International Conference on Web Services, 2020, 第 5 作者
(2) SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法, 信息安全学报, 2020, 第 6 作者
(3) A Heuristic Method for Network Modification against Cyber Epidemic Attacks, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2019, 第 2 作者
(4) Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network, IEEE International Conference on Communications, 2019, 第 2 作者
(5) Dynamical model for individual defence against cyber epidemic attacks, IET Information Security, 2019, 第 2 作者
(6) Visual Cryptograms of Random Grids via Linear Algebra, Multimedia Tools and Applications, 2018, 第 2 作者
(7) Temporal Integration Based Visual Cryptography Scheme and Its Application, 16th International Workshop on Digital-forensics and Watermarking, 2018, 第 2 作者
(8) Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources, 1st International Conference on Science of Cyber Security, 2018, 第 2 作者
(9) Protecting White-Box Cryptographic Implementations with Obfuscated Round Boundaries, SCIENCE CHINA Information Sciences, 2017, 第 3 作者
(10) Optimizing interconnections to maximize the spectral radius of interdependent networks, Physical Review E, 2017, 第 3 作者
(11) A White-Box AES-Like Implementation Based on Key-Dependent Substitution-Linear Transformations, Multimedia Tools and Applications, 2017, 第 2 作者
(12) Privacy monitor, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者
(13) Halftone Visual Cryptography with Complementary Cover Images, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者
(14) Collusive Attacks to Partition Authentication Visual Cryptography Scheme, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者
(15) Information Security Display Technology with Cheating Effect, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者
(16) An Adaptive Reversible Data Hiding Scheme for JPEG Images, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 2 作者
(17) Perfect Contrast XOR-based Visual Cryptography Schemes via Linear Algebra, Designs, Codes and Cryptography, 2016, 第 2 作者
(18) New insight into linear algebraic technique to construct visual cryptography scheme for general access structure, Multimedia Tools and Applications, 2016, 第 2 作者
(19) Cheating prevention visual cryptography scheme using Latin square, IET Information Security, 2016, 第 2 作者
(20) Basic Visual Cryptography Using Braille, International Journal of Digital Crime and Forensics, 2016, 第 2 作者
(21) The Distribution of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity, 12th International Conference on Information Security Practice and Experience, 2016, 第 4 作者
(22) The Linear Complexity and $2$-error Linear Complexity Distribution of $2^n$-Periodic Binary Sequences with Fixed Hamming Weight, 18th IEEE International Conference on Information and Communications Security, 2016, 第 4 作者
(23) Event Analogy Based Privacy Preservation in Visual Surveillance, International Workshop on Video Surveillance of The 7th Pacific-Rim Symposium on Image and Video Technology, 2016, 第 2 作者
(24) An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion, IWDW2015, 2015, 第 2 作者
(25) A New Construction of Tagged Visual Cryptography Scheme, IWDW2015, 2015, 第 2 作者
(26) 2D Barcodes for Visual Cryptography, Multimedia Tools and Applications, 2014, 第 2 作者
(27) Braille For Visual Cryptography, IEEE International Symposium on Multimedia, 2014, 第 2 作者
(28) k out of k extended visual cryptography scheme by random grids, Signal Processing, 2014, 第 2 作者
(29) ESSVCS: An Enriched Secre Sharing Visual Cryptography, Springer Transactions on Data Hiding and Multimedia Security, 2013, 第 1 作者
(30) Flexible Visual Cryptography Scheme Without Distortion and Its Application, Springer Transactions on Data Hiding and Multimedia Security, 2013, 第 1 作者
(31) Threshold visual secret sharing by random grids with improved contrast, Journal of Systems and Software, 2013, 第 2 作者
(32) Improving the Visual Quality of Size Invariant Visual Cryptography Scheme, Journal of Visual Communication and Image Representation, 2012, 第 1 作者
(33) Visual Cryptography for Natural Images and Visual Voting, Inscrypt2012, 2012, 第 2 作者
(34) On the Equivalence of Two Definitions of Visual Cryptography Scheme, ISPEC 2012, 2012, 第 2 作者
(35) Embedded Extended Visual Cryptography Schemes, IEEE Transactions on Information Forensics and Security, 2011, 第 1 作者
(36) Cheating Immune Visual Cryptography Scheme, IET Information Security, 2011, 第 1 作者
(37) Step Construction of Visual Cryptography Schemes, IEEE Transactions on Information Forensics and Security, 2010, 第 1 作者
(38) A New Definition of the Contrast of Visual Cryptography Scheme, Information Processing Letters, 2010, 第 1 作者
(39) Some Extensions on Threshold Visual Cryptography Schemes, The Computer Journal, 2010, 第 1 作者
(40) The Alignment Problem of the Visual Cryptography Scheme, Designs, codes and cryptography, 2009, 第 1 作者
(41) Color Visual Cryptography Schemes, IET Information Security, 2008, 第 1 作者