当前位置: X-MOL首页全球导师 国内导师 › 胡春强

个人简介

胡春强,美国乔治华盛顿大学和重庆大学双博士。2019年入选“第三批重庆市学术技术带头人(后备)”。ACM,IEEE,CCF和中国密码学会会员。国家公派高级研究学者/访问学者/博士后项目通讯评审专家。曾为美国乔治华盛顿大学访问学者。目前以项目负责人身份承担国家自然科学基金(青年)项目1项,重庆市自然科学基金1项,重庆市留学人员回国创新支持计划项目1项(优秀资助),以主研身份参加中国国家自然科学基金项目(面上) 2项和美国NSF项目4项。目前已发表学术论文60余篇。包括在IEEE JSAC,IEEE TII,IEEE IoT, IEEE TBD, IEEE TMSCS, IEEE TPDS, IEEE TCC,IEEE TVT和IEEE INFOCOM等顶级期刊和会议上发表论文30多篇,曾荣获ACM PAMCO 2016和WASA2018最佳论文奖。 部分科研项目: 国家重点研发计划:高置信城市信-物融合系统关键技术研发与应用,2020.01-2022.12,子课题负责人 重庆市技术创新及应用发展专项重点项目:区块链隐私保护技术研发及应用,2019/08--2022/07,合作单位负责人 国家自然科学基金重点项目:移动社会媒体大数据共享交换中的隐私保护研究, 2020.01--2024.12,项目骨干 中央高校基本科研业务费“前沿交叉研究专项”重点项目:基于区块链的物联网智能安全和隐私保护机制研究,2019/05--2021/04,项目负责人 重庆市留学人员回国创新支持计划项目(优秀资助):云/雾计算环境下电子医疗数据安全和隐私保护关键技术研究,2018/09--.项目负责人 重庆市科技计划项目基础科学与前沿技术研究专项:智能医疗安全与隐私保护体系关键技术研究,2018/07--2021/06,项目负责人 国家自然科学基金青年基金项目:云/雾计算环境下电子医疗数据安全和隐私保护关键技术研究,2018/01--2020/12,项目负责人 国家自然科学基金项目面上项目:无线体域网中数据安全与隐私保护关键技术研究,2017/01--2020/12,项目参与(4/10) 国家自然科学基金项目面上项目:云计算框架下大规模科学计算安全外包协议研究,2015/01--2018/12,项目参与(2/10) News: [2020/05]Our paper is accepted by Elsevier Information Sciences Journal 2020. Congratulations to Yuwen [2020/05] Our paper is accepted by IEEE Internet of Things Journal 2020. Congratulations to Yuwen [2020/04] Our paper is accepted by IEEE Internet of Things Journal, 2020. [2019/06] Feihong Yang wins 2019 Outstanding Undergraduate Thesis Award of Chongqing University for his thesis "Implementation of School Anniversary Simulated Donation System Based on Blockchain Smart Contract." Congratulations to Feihong [2019/01] One paper is accepted by IEEE Transactions on Cybernetics 2019 [2018/11] One paper is accepted by IEEE INFOCOM 2019 [2018/08] Two papers are accepted by IEEE Symposium on Privacy-Aware Computing (PAC) 2018. [2018/05] One paper is accepted by IEEETransactions on Vehicular Technology. [2018/04] Two papers are accepted by WASA 2018. [2017/10] Dr. Hu is invited to give a research talk in Qufu Normal University. [2017/08] Dr. Hu is invited to give a research talk in CAS. [2017/07] Dr. Hu is invited to give a research talk in HotPrivacy Workshop in conjunction with IEEEPAC 2017 in Washington DC. Awards/Grants: Best Paper Award, WASA 2018. Best Paper Award, ACM PAMCO 2016. Graduate Merit Award, The George Washington University (GWU), 2016. Norris & Betty Hekimian Engineering Endowment Fellowship, GWU, 2013. Summer School Travel Grant, the 2nd WiFiUS, 2013. Student Travel Grant, GWU& NSF for attending to IEEE INFOCOM 2013 &ACM WiSec 2013. Student: Ph.D. Student: 蒲誉文 (2018.09--), 陈佳俊 (2019.09--), 叶青(2019.09--) Master Student: 王颖 (2018.09--),杨飞鸿(2019.09--),牟文浩(2019.09--),陈虹宇(2019.09--),姚飞(2019.09--),王宝琳(2020.09--),姜迪(2020.09--), 王天琪(2020.09--),赵阳(2020.09--) INVITED TALKS/PRESENTATIONS Securing Body Area Networks--Key Management and Access Control, Qufu Normal University, China, October, 2017. Achieving Privacy Preservation and Billing via Delayed Information Release, HotPrivacy Workshop in conjunction with IEEE PAC 2017, August 1-3, 2017, Washington DC. Big Data Security and Privacy--Access Control and Secure Computation, Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China, August, 2017. Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, North China University of Technology, March, 2017. Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, Shandong University, September, 2016. Securing Body Area Networks-Key Management and Access Control, Chongqing University of Technology, September, 2016. Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China, September, 2015. Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, Wireless Network and Information Perception Center, Beijing Jiaotong University, China, August, 2015.

研究领域

研究领域:数据驱动安全,物联网安全与隐私保护, 区块链技术,应用密码学等

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Selected Publications(*corresponding author, # co-first author): [32]Yuwen Pu, Chunqiang Hu*, Shaojiang Deng, Arwa Alrawais, R^2PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme, to appear in IEEE Internet of Things Journal 2020 (JCR 1, IF: 9.936) [31] Chunqiang Hu*, Yuwen Pu, Feihong Yang, Ruifeng Zhao, Arwa Alrawai, Tao Xiang, Secure and Efficient Data Collection and Storage of IoT in Smart Ocean, to appear in IEEE Internet of Things Journal 2020 (JCR 1, IF: 9.936) [30] Yuwen Pu, Tao Xiang, Chunqiang Hu*, Arwa Alrawais, Hongyang Yan, An Efficient Blockchain-based Privacy Preserving Scheme for Vehicular Social Networks, Elsevier Information Sciences Journal, Vol.540, pp. 308-324, 2020 (JCR 1, CCF B, IF: 5.910) [29] Chao Wang, Jitong Li, Yunhua He, Ke Xiao, Chunqiang Hu*, Segmented Trajectory Clustering-Based Destination Prediction in IoVs, IEEE Access, Vol.8, pp. 98999-99009, 2020. (IF:3.745, JCR 1) [28]Ningzhi Deng, Shaojiang Deng, Chunqiang Hu*, Kaiwen Lei, An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing. IEEE Access 8: 42805-42815 (2020) (IF:3.745, JCR Q1) [27] Yuwen Pu, Jin Luo, Chunqiang Hu*, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang, Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing 2019: 3985232:1-3985232:11 (2019)(IF: 1.819, CCF C) [26]Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu*, Haibo Hu, An Efficient and Recoverable Data Sharing Mechanism for Edge Storage. WASA 2019: 247-259,(CCF C) [25]Ningzhi Deng, Shaojiang Deng, Chunqiang Hu*, Kaiwen Lei, An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing. WASA 2019: 84-97 (CCF C) [24]Hui Xia, Chunqiang Hu, Fu Xiao, Xiangguo Cheng, ZhenKuan Pan, An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Computer Networks 152: 210-220 (2019) (IF:3.03, CCF B, JCR Q1) [23] Lan Gao, Shaojiang Deng, Wei Ren, Chunqiang Hu, Differentially Private Consensus with Quantized Communication., to appear in IEEE Transactions on Cybernetics2019. [22] Hui Xia, Fu Xiao, San-shun Zhang, Chunqiang Hu, Xiuzhen Cheng, Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach., to appear in IEEE INFOCOM 2019 (CCF A) [21] Qin Hu, Shengling Wang,Chunqiang Hu, Jianhui Huang, Wei Li, Xiuzhen Cheng, Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services., IEEE Transactions on Vehicular Technology,Vol.67, No.8, 2018, pp.7698 -7711. (JCR 1, IF:5.379) [20] Arwa Alrawais, Abdulrahman Alhothaily, Xiuzhen Cheng Chunqiang Hu*, Jiguo Yu, SecureGuard: A Certificate Validation System in Public Key Infrastructure., IEEE Transactions on Vehicular Technology, Vol.67, No.6, 2018,pp.5399-5408 (JCR 1, IF:5.379) [19] Chunqiang Hu, Ruinian Li, Bo Mei, Wei Li, Arwa Alrawais, Rongfang Bie, Privacy-preserving combinatorial auction without an auctioneer. EURASIP Journal on Wireless Communications and Networking 2018: 38 (2018) (JCR 3, IF:1.592) [18] Chunqiang Hu, Hang Liu, Liran Ma, Yan Huo, Arwa Alrawais, Xiuhua Li, Hong Li, Qingyu Xiong, A Secure and Scalable Data Communication Scheme in Smart Grids. Wireless Communications and Mobile Computing 2018 (2018) (JCR 3, IF:1.819, CCF C) [17] Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, Limin Sun, CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids. Mathematical Foundations of Computing 1(1): 77-100 (2018) (SCI) [16] Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song, Chunqiang Hu*, Cryptographic algorithms for privacy-preserving online applications. Mathematical Foundations of Computing 1(4): 311-330 (2018) (SCI) [15]Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang, An Efficient Privacy-Preserving Data Aggregation Scheme for IoT., WASA, pp.164-176, 2018 (CCF C) (Best Paper Award) [14]Chunqiang Hu, Wei Li, Xiuzhen Cheng, Jiguo Yu, Shengling Wang, and Rongfang Bie, A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds., IEEE Transactions on Big Data, Vol.4, No.3, 2018, pp. 341-355 (The paper has been the 8th (02/2017), the 11th7(03/2017), the 17th (04/2017), the 34th (05/2017), the 40th (06/2017), the 47th (07/2017) most frequently accessed document from IEEEXplore for IEEE Transactions on Big Data.) [13] Kai Xing,Chunqiang Hu#*, Jiguo Yu, Xiuzhen Cheng and Fengjuan Zhang, Mutual Privacy Preserving k-Means Clustering in Social Participatory Sensing., IEEE Transactions on Industrial Informatics, Vol.13, No.4, 2017, pp. 2066-2076. (JCR 1, SCI, IF: 9.112) [12] Chunqiang Hu, Yan Huo, Efficient privacy-preserving dot-product computation for mobile big data. IET Communications 11(5): 704-712 (2017) (CCF C) [11]Chunqiang Hu, Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Carl Sturtivant, Hang Liu, A Secure and Verifiable Outsourcing Scheme for Matrix Inverse Computation., in IEEE NFOCOM 2017, pp. 1-9. (CCF Rank A) (Acceptance ratio: 20.9%) [10] Abudulrahman Alhothaily,Chunqiang Hu*, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng, Dechang Chen, A Secure and Practical Authentication Scheme Using Personal Devices., IEEE Access, Vol.5, No.1, 2017, pp.11677-11687. (JCR 1, SCI, IF: 3.244) [9] Arwa Alrawais, Abdulrahman Alhothaily,Chunqiang Hu*, Xiuzhen Cheng, Xiaoshuang Xing, An Attribute-Based Encryption Scheme to Secure Fog Communications., IEEE Access, Vol.5, 2017, pp:9131-9138 (JCR 1, SCI, IF: 3.244) [8] Yan Huo,Chunqiang Hu, Xiaowei Qi, Tao Jing, LoDPD: A Location Difference-based Proximity Detection Protocol., IEEE Internet of Things Journal, Vol.4, No.5, 2017, pp.1117-1124. (JCR 1, SCI, IF: 9.936) [7] Arwa Alrawais, Abdulrahman Alhothaily,Chunqiang Hu, Xiuzhen Cheng, Fog Computing for the Internet of Things: Security and Privacy Issues., IEEE Internet Computing, Vol. 21, No. 2, 2017, pp. 34-42 (SCI, IF: 1.4) (The paper has been the first ( from 03/2017 to 12/2017), the second (from 01/2018 to 07/2018), the third ( from 08/2018 to 10/2018), the first (11/2018) most frequently accessed document from IEEEXplore for IEEE Internet Computing.) (ESI高被引) [6] Chunqiang Hu, Ruinian Li, Wei Li, Jiguo Yu, Zhi Tian, Rongfang Bie. Efficient Privacy-Preserving Schemes for Dot-Product Computation in Mobile Computing., ACM PAMCO 2016, pp. 51-59. (Best Paper Award) [5] Chunqiang Hu, Hongjuan Li, Yan Huo, Tao Xiang and Xiaofeng Liao, Secure and Efficient Data Communication Protocol for Wireless Body Area Networks., IEEE Transactions on Multi-Scale Computing Systems, Vol. 2, No. 2, 2016, pp.94-107. (The paper has been the 4th (11/2016), the 3rd(11/2016), the 4th(01/2017), the 5th(02/2017), the 8th(03/2017), the 6th(04/2017), the 9th(05/2017), the 13th(06/2017), the 6th(07/2017), the 11th(08/2017), the 22nd(09/2017) the 14th(10/2017), the 12th(11/2017), the 28th(12/2017), the 12th(01/2018) most frequently accessed document from IEEEXplore for IEEE Transactions on Multi-Scale Computing Systems.) [4] Hongjuan Li, Xiuzhen Cheng, Keqiu Li,Chunqiang Hu, and Nan Zhang, Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks., IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.8, 2014, pp. 2190-2200. (SCI, Impact Factor: 2.173, CCF Rank A) [3] Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, and Chunqiang Hu, Outsourcing Large Matrix Inversion Computation to A Public Cloud., IEEE Transactions on Cloud Computing, Vol.1, No.1, 2013, pp. 78-87. (SCI) [2] Chunqiang Hu, Nan Zhang, Hongjuan Li, Xiuzhen Cheng, and Xiaofeng Liao, Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme., IEEE Journal on Selected Areas in Communications, Vol.31, No.9, 2013, pp.37-46. (SCI, IF: 11.42, CCF Rank A) [1] Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, and Dechang Chen, OPFKA: Secure and Efficient Ordered-Physiological-Feature based Key Agreement for Wireless Body Area Networks, in IEEE INFOCOM, pp.2322-2330, 2013. (CCF Rank A) (Acceptance ratio: 17%)

学术兼职

Professional Affiliations and Service: Member of CCF (11/2017---) Member of IEEE (01/2014--) Member of ACM (01/2016--) Technical Program Committee (TPC) member: IIKI 2014, 2015, 2016; WASA 2014, 2015, 2016. Journal Referee: [1] IEEE Transactions on Parallel \& Distributed Systems (TPDS), [2] IEEE Transactions on Information Forensics and Security (TIFS), [3] IEEE Transactions on Services Computing (TSC), [4] IEEE Transactions on Mobile Computing, [5] IEEE Transactions on Cloud Computing, [6] IEEE Transactions on Industrial Informatics, [7] IEEE Transactions on Cybernetics, [8] IEEE Internet of Things Journal, [9] EURASIP Journal on Wireless Communications and Networking, [10] Information Sciences, [11] International Journal of Computer Networks, [12] International Journal of Sensor Networks, [13] International Journal of Distributed Sensor Networks, [14] Journal of Applied Mathematics, [15] Neural Computing and Applications, [16] Journal of Network and Systems Management, [17] International Journal of Communication Systems, [18] Peer-to-Peer Networking and Applications, [19] IET Communications, [20] IEEE Access, [21] Computers \& Security, [22] Mobile Information Systems, [23] The Computer Journal, [24] IETE Journal of Research, [25] Multimedia Tools and Applications, [26] Security and Communication Networks, [27] Digital Communications and Networks, [28] Ad Hoc Networks, [29] Computer Networks Conference Referee: [1] IEEE INFOCOM 2015, 2016, 2018; [2] IEEE ICC 2013, 2015, 2016, 2018; [3] IEEE Globecom 2016; [4] IEEE MASS 2016; [5] IEEE-ACM IWQoS 2014; [6] IEEE MiSeNet 2014; [7] WASA 2012, 2013, 2014, 2015, 2016, 2017; [8] DCOSS 2012, 2014; [9] Crowncom 2013.

推荐链接
down
wechat
bug