个人简介
2018年10月至2019年10月获得国家留学基金委资助,赴澳大利亚联邦科工组织(CSIRO),Data61进行学术访问,致力于隐私保护研究。今年来,在国际SCI期刊和重要会议上发表学术论文10余篇。主持国家自然科学基金青年基金项目。作为主要成员参与国家自然科学基金面上项目、国家自然科学基金青年基金项目、湖北省自然科学基金项目,应邀担任多个国际SCI期刊和会议的审稿人。
科研项目
(1)国家自然科学基金青年基金项目,61502440、基于负调查的云数据隐私保护关键问题研究、2016/01-2018/12、20万、已结题、主持。
(2)国家自然科学基金青年基金项目,61502439、高性能视频云转码服务的优化机制研究、2016/01-2018/12、21万、已结题、排名第二。
(3)国家自然科学基金面上项目,61175045、信息负表示理论及其应用研究、2012/01-2015/12、已结题、排名第二。
教育经历
[1] 2008.9-2013.6 中国科学技术大学 | 计算机 | 工学博士学位 | 博士研究生
工作经历
[1] 2013.7-至今 中国地质大学(武汉) | 计算机学院
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
(1) Ran Liu, Jinghui Peng and Shanyu Tang*. Multiple-negative Survey Method for Enhancing the Accuracy of Negative Survey-based Cloud Data Privacy: Applications and Extensions [J]. Engineering Applications of Artificial Intelligence, Volume 62, pp.350-358, 2017. (SCI, CCF C)
(2) Ran Liu, Wenjian Luo* and Lihua Yue. Hiding Multiple Solutions in a Hard 3-SAT Formula [J]. Data & Knowledge Engineering, Volume 100, Part A, pp.1-18, 2015. (SCI, CCF B)
(3) Ran Liu, Wenjian Luo* and Lihua Yue. Classifying and Clustering in Negative Databases[J]. Frontiers of Computer Science, 7(6): 864-874, 2013. (SCI, CCF C)
(4) Ran Liu, Jinghui Peng and Shanyu Tang*. An Efficient Approximation Method for Calculating Confidence Level of Negative Survey, Mathematical Problems in Engineering, 2015, 958154. (SCI)
(5) Ran Liu, Jinghui Peng and Shanyu Tang*. Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy, the 2015 International Workshop on Artificial Immune Systems (AIS-2015), July 17-18. (EI)
(6) Ran Liu, Xiang Wang and Can Wang, A Two-Factor Authentication Scheme based on Negative Databases, 2018 Symposium Series on Computational Intelligence, Bengaluru, November 18-21. (EI)
(7) Ran Liu, Mengxi Xie and Siqi Sun, Reconstructing positive surveys from negative surveys by improved artificial immune network, 2018 Symposium Series on Computational Intelligence, Bengaluru, November 18-21. (EI)
(8) Dongdong Zhao, Wenjian Luo*, Ran Liu and Lihua Yue. Negative Iris Recognition. IEEE Transactions on Dependable and Secure Computing, 15(1): 112 - 125, January, 2018. (SCI, CCF A)
(9) Dongdong Zhao, Wenjian Luo*, Ran Liu and Lihua Yue. Experimental Analyses of the K-hidden Algorithm. Engineering Applications of Artificial Intelligence, 62: 331-340, June, 2017. (SCI, CCF C)
(10) Wenjian Luo*, Ran Liu, Hao Jiang, Dongdong Zhao and Linli Wu. Three Branches of Negative Representation of Information: A Survey, IEEE Transactions on Emerging Topics in Computational Intelligence, 2018.12, (6): 411~425. (EI)