发表论文
(1) Cancelable biometric schemes for Euclidean metric and Cosine metric, CYBERSECURITY, 2023, 第 6 作者(2) General Constructions of Fuzzy Extractors for Continuous Sources, International Conference on Information Security and Cryptology (INSCRYPT 2023), 2023, 第 5 作者(3) A Secure and Practical Sample-then-lock Scheme for Iris Recognition, 26th International Conference on Pattern Recognition (ICPR), 2022, 第 5 作者(4) 基于k匿名数据集的鲁棒性水印技术研究, 信息网络安全, 2022, 第 4 作者(5) An Attribute-attack-proof Watermarking Technique for Relational Database, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2022, 第 2 作者(6) Anonymization of Quasi-Sensitive Attribute Sets in Aggregated Dataset, SECURITY AND COMMUNICATION NETWORKS, 2022, 第 4 作者(7) FAV-BFT: An Efficient File Authenticity Verification Protocol for Blockchain-Based File-Sharing System, CollaborateCom 2022: Collaborative Computing: Networking, Applications and Worksharing, 2022, 第 2 作者(8) VoFSQ An Efficient File-Sharing Interactive Verification Protocol, IEEE Symposium on Computers and Communications (ISCC), 2021, 第 2 作者(9) Verify a Valid Message in Single Tuple:A Watermarking Technique for Relational Database, DASFAA 2020, 2020, 第 1 作者(10) A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait, SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 第 3 作者(11) A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data, MOBILENETWORKSANDMANAGEMENTMONAMI2017, 2018, 第 4 作者(12) A Robust Iris Segmentation using Fully Convolutional Network with Dilated Convolutions, 2018 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2018), 2018, 第 3 作者(13) 多源异构数据的云平台安全态势评估系统, The Assessment System of Cloud Platform Security Situation Based on Multi-source Heterogeneous Data, 网络新媒体技术, 2017, 第 3 作者(14) A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017, 第 1 作者(15) Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-Keyword Searchable Encryption, SecureComm 2017, 2017, 第 1 作者(16) A Real-time Security Situation Assessment System Designed for Cloud Platform, INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER SCIENCE (AICS 2016), 2016, 第 3 作者(17) An Efficient Privacy-Preserving Ranked Keyword Search Method, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 通讯作者(18) 网络结构空间格局相似度分析以19382014年北京市骨干交通网络为例, A Similarity Evaluation Method on Spatial Patterns of Network Structures:A Case Study About Beijing Traffic-network Backbones from 1938 to 2014, 武汉大学学报信息科学版, 2016, 第 4 作者(19) 基于相似查询树的快速密文检索方法, Efficient Ciphertext Search Method Based on Similarity Search Tree, 软件学报, 2016, 第 4 作者(20) 基于密文云存储的媒资系统的设计与实现, Media Asset Systembased on Ciphertext Cloud Storage: Design and Implementation, 网络新媒体技术, 2016, 第 2 作者(21) 基于水印的音频审计网关的设计与实现, Design and implementation of audio audit gateway based on watermark, 计算机应用, 2016, 第 1 作者(22) 空间访问控制研究综述, A Review of Spatial Data Access Control, 网络新媒体技术, 2015, 第 1 作者(23) Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015, 第 2 作者(24) A Similarity Evaluation Algorithm and Its Application in Multi-Keyword Search on Encrypted Cloud Data, 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, 通讯作者(25) SOLS: A scheme for outsourced location based service, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 第 1 作者(26) Mutual dependency of features in multimodal biometric systems, ELECTRONICS LETTERS, 2015, 第 4 作者(27) A Cloud Security Assessment System Based on Classifying and Grading, IEEECLOUDCOMPUTING, 2015, 第 2 作者(28) Bee-Based IP Traceback, -, 2014, 第 1 作者(29) 基于等级保护的云计算安全防护体系研究, Cloud Computing Security Framework Based on Classified Protection, 中国数字医学, 2014, 第 3 作者(30) Optional Multi-biometric CryptosystemBased on Fuzzy Extractor, -, 2014, 第 1 作者(31) A Hierarchical Clustering Method For Big Data Oriented Ciphertext Search, 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, 通讯作者(32) 若干新型数据库隐蔽信道应用场景研究, Study on usage scenarios of several new database covert channels, 中国科学院研究生院学报, 2013, 第 3 作者(33) 集群数据库系统多指标动态负载均衡方法的设计与实现, A multi-criteria dynamic load balancing method for clustered databases: design and implementation, 中国科学院研究生院学报, 2012, 第 2 作者(34) Evaluation of the Impetuses of Scan Path in Real Scene Searching, COMPUTER VISION - ACCV 2010 WORKSHOPS, PT I, 2011, 通讯作者(35) 分布式短事务系统中提交协议的研究, Research on Commit Method in Distributed Short Transaction Systems, 计算机科学, 2011, 第 2 作者(36) 一种面向空间数据库矢量数据的授权模型与实现方法, An Authorization Model and Implementation for Vector Data in Spatial DBMS, 计算机研究与发展, 2011, 第 3 作者(37) 空间矢量数据细粒度强制查询访问控制模型及其高效实现, Fine-Grained Mandatory Query Access Control Model and Its Efficient Realization for Spatial Vector Data, 软件学报, 2011, 第 2 作者(38) 信息安全产品安全保证量化评估方法研究, A Research on Quantitative Evaluation the Assurance of Information Security Products, 电子学报, 2007, 第 1 作者