当前位置: X-MOL首页全球导师 国内导师 › 丁丽萍

个人简介

招生专业 081203-计算机应用技术 081203-计算机应用技术 081220-信息安全 招生方向 系统安全;可信计算;计算机取证 教育背景 1984-1988 山东大学数学系 运筹学专业 学士 1999-2002 北京科技大学信息学院 软件与理论 硕士 2003-2006 中国科学院软件研究所 博士 奖励信息 1、荣立个人三等功3次,集体三等功2次,个人嘉奖多次。 2、获公安部和北京市公安局科技成果奖励多次。 专利成果 1、用于计算机的电子取证方法和系统; 2、一种隐蔽信道标识方法。 发表著作 Liping Ding. Computer Forensics:Real-time Forensics OS Theory and Practice. Quanzhong Press, June, 2006. (in Chinese) Jie Zhang, Liping Ding. Police Command Theory and Practice of emergency. Quanzhong Press. December, 2004. (in Chinese) 科研活动 Recent Talks: ● Computer Forensics Under Cloud Computing, OWASP2010, 2010.10 ● Overview of Static Code Analysis , CSA SUMMIT, 2010,10 ● New Types of Network Forensics, National Police Training, 2010.12 科研项目 On-Going Research Projects: ● Major National Science and Technology Program (No. 2010ZX01037-001-002 -0) ● the Key Project of Chinese Academy of Sciences under grant No. KGCX2-YW-125. ● Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) ● Computer Forensics System Based on Cloud Computing. The Important Creative Special Purpose Fund Project of Shandong Province in China. Finished Research Projects : ● Major National Science and Technology Program (No. 2010ZX01037-001-002 -0) ● the Key Project of Chinese Academy of Sciences under grant No. KGCX2-YW-125. ● Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) ● Computer Forensics System Based on Cloud Computing. The Important Creative Special Purpose Fund Project of Shandong Province in China. ● Urban Security Early Warning System. Jun., 2003 . ● Beijing Public Security Technology Prevention Management System. Jan.,2004. ● Telephone Record Forensics Systme. Jan., 2008. ● Beijing Public Security Bureau Education and Training Management System.Jun.,2005. ● Research on Public Security Information Protection. Jun., 2005. Software Quality Assurance Platform Based on ISO9000& CMM.September,2003~March, 2004. ●l The National Natural Science Foundation of China : An investigation into the optimal task scheduling feasibility analysis and software implementation for real-time systems. October,2003~ October, 2006. ● Chinese Academy of Sciences jointly with the British Royal Society funded projects ● “Feedback control real-time scheduling and its application to intelligent robots”. April,2003—April,2006. ● Ministry of Education funded project for returned overseas students to start scientific research “Application of continuous optimal algorithm in discrete real-time system”. October,2003-October,2006. 参与会议 The Publicity Chair of e-Forensics2010 The Chair of 1st~4th National Computer Forensics Workshop The Cahir of 1st~6th CCFC 合作单位 1、公安部第三研究所; 2、山东省计算中心; 3、中国人民大学法学院。

研究领域

计算机取证;系统安全;可信计算

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Liping Ding, Yifei Guo, Jian Gu, and Jingzheng Wu. Proceedings of 2011 International Conference on Information and Industrial Electronics (ICIIE 2011) of IEEE. Pp.V2-262-V2-267. Chengdu, 2011,China. Liping Ding, Gujian, Yongji Wang, and Jingzheng Wu. Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. Proceedings of ICST Conference on Forensics Applications and Techniques in Telecommunications , Information and Multimedia. Shanghai, 2010, China. Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performance of Network Covert Timing Channel through Huffman Coding. The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010. Yasen Aizezi, Liping Ding, Dilixiati Maimaiti, Qiong Wan . Research on the Helper of EnCase for Digital Evidences in Uyghur-Kazak-Kyrgyz. Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. Proceedings of ICST Conference on Forensics Applications and Techniques in Telecommunications , Information and Multimedia. Shanghai, 2010, China. Jianchun Jiang, Weifeng Chen, Liping Ding. On Estimating Cyber Adversaries’ Capabilities: A Bayesian Model Approach. RAID 2010: 502-504. Yongji Wang, Jingzheng Wu, Haitao Zeng, Liping Ding, Xiaofeng Liao. Research on convert channel, 2010,21(9):2262-2288.(in Chinese) Ennan Zhai1, Qingni Shen1; Yonggang Wang; Tao Yang;Liping Ding; Sihan Qing; SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. Proceedings of APWeb 2011(T h e 1 3 t h A s i a - P a c i f i c W e b C o n f e r e n c e). April 18-20, 2011 Beijing, China. Xiaofeng Liao; Yongji Wang, Liping Ding. A Novel Duplicate Images Detection Method Based on PLSA Model. 2010 3rd International Conference on Machine Vision (ICMV 2010). Hongkong. 2010. Xiaofeng Liao, Yongji Wang, Liping Ding. Discovering Temporal Patterns from Images using Extended PLSA. International Conference on Multimedia Technology. Ningbo, China; IEEE. 2010 Tian Shuo, He Yeping, Ding Liping. A Countermeasure against Stack-smashing Attack Based on Canary Obtained through Nonlinear Transformation. Proceedings of 2010 2nd International Conference on Information and Multimedia Technology (ICIMT 2010), Hong Kong 12.28-12.30.2010 Ding Liping, Yang Qiusong , Sun Liang, Tong Jie, Wang Yongji. Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis. M.Li, B.Boehm, and L.J.Osterweil (Eds.): SPW2005, LNCS3840, Springer-Verlag Bferlin Heidelberg. (2005):235 – 248 DING Liping, WANG Yong-Ji. Research on relevant law and technology issues about computer forensics, Journal of Software, Vol.16, 2005(2):260-275. (in Chinese) DING Li-Ping, ZHOU Bo-Wen, WANG Yong-Ji. Capture and Storage of Digital Evidence Based on Security Operating System, Journal of Software,Vol.18No.7, (2007):1715-1729(in Chinese) DING Liping, WANG Yong-Ji. Computer Forensics Survey. Journal of Communication and Computer,Vol.8,( 2005):1-10(in Chinese) Liping Ding.Computer Crimes Investigation Need High Quality Polices. Journal of Beijing People’s Police College, Vol.6,(2000):12-16(in Chinese) Liping Ding. The Application of Information Mining in Computer Crimes Investitation. JOURNAL OF CHINESE PEOPLE’S PUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.3,( 2002):47-50. (in Chinese) Liping Ding. Study on the Risk Control of Public Security Information Systems. JOURNAL OF CHINESE PEOPLE’S PUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.4, ( 2004):71-73 (in Chinese) Liping Ding, Zong Wang. Study on the Information Leak through Mobile Phones and Public Security Information Assurance. Journal of Beijing People’s Police College, Vol.4,( 2004): 42-44 (in Chinese) Liping Ding. The principles and steps of computer forensics. JOURNAL OF CHINESE PEOPLE’S PUBLIC SECURITY UNIVERSITY SCIENCE AND TECHNOLOGY,Vol.1,( 2005): 71-73(in Chinese) Liping Ding. Study on the Computer Forensics Curriculums in Public Security Schools and Colleges. Journal of Beijing People’s Police College, Vol.2, (2005):25-28(in Chinese) Liping Ding, Yongji Wang. The verification and test of computer forensics tools. CHINA INFORMATION SECURITY, Vol.8,(2005):60-63. (in Chinese) Liping Ding. Computer Forensics Technologies on Network Data Stream. NETINFO SECURITY,Vol.6,( 2005):74-77(in Chinese) Liping Ding. The technological method of computer forensics and the research on its tools. CHINA INFORMATION SECURITY,Vol.8,( 2005): 32-36(in Chinese) Liping Ding. Research on Multi-Dimension Forensics Model, NETINFO SECURITY,Vol.10,( 2005):73-75 & Network and Computer Security(tansship),Vol.11,(2005):25-27(in Chinese)

推荐链接
down
wechat
bug