朱岩

师资队伍

<<

朱岩
(男)
Zhu yan
教授/博士生导师
党支部书记
办公地点:
机电信息楼202室 互联网安全实验室:http://crypto.ustb.edu.cn
电子邮箱:
zhuyan@ustb.edu.cn
科研方向:
网络与信息安全 密码学与安全计算 计算复杂性理论
 
简历
朱岩,男,1974年生,现为北京科技大学计算机与通信工程学院教授,曾于2005-2012年就职于北京大学计算机科学技术研究所,副研究员,硕士生导师,于2008-2009年在美国亚利桑那州立大学(Arizona State University)以访问副教授身份从事信息安全方面科研工作,于2012年在美国密西根大学(University of Michigan)以客座研究员身份从事访学活动。
代表性论文论著
目前已在国内外会议与期刊上以第一作者(通信作者)发表SCI/EI检索论文40多篇,已申请和授权专利8项,发表包括TPDS、TDSC、TSC、JSS、IJCIS、China-Science F、JCST、计算机学报、软件学报、电子学报等期刊,以及InfoCom、GlobeCom、ICDCS、CCS、CodaSpy、AsiaCCS、ACM SAC, IWDW、CollaborateCom、Wisec、Passat等,并在TPDS、TDSC、TCS、TKDE、JONS、JSS、JCST等国际杂志担当评审专家。主要代表性论文如下:
[1] Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, Changjun Hu. Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Transactions on Services Computing (TSC). 2013, Preprint. SCI
[2] Di Ma, Nitesh Saxena, Tuo Xiang, Yan Zhu. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing, IEEE Transactions on Dependable and Secure Computing (TDSC). Accepted, 2013. SCI
[3] Yan Zhu, Shanbiao Wang, Hongxin Hu, Gail-Joon Ahn. Secure Collaborative Integrity Verification For Hybrid Cloud Environments. International Journal of Cooperative Information Systems (IJCIS). 21, 165 (2012), 2012, pp. 165-198. SCI
[4] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Shimin Chen. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. Transactions on Parallel and Distributed Systems (TPDS). 23(12), 2012, pp.2231-2244.SCI
[5] Zhu Yan, Yu Mengyang, Hu HongXin. Efficient Construction of Provably Secure Steganography under Ordinary Covert Channels. Science China: Information Sciences (Series F). 2012, 2012 Vol. 55 (7): 1639-1649. SCI
[6] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau, Yu Chen. Efficient Audit Service Outsourcing for Data Integrity in Clouds, Journal of Systems and Software (JSS). 2011. 85 (2012), pp. 1083-1095. SCI
[7] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huai-Xi Wang, Shan-Biao Wang. Provably Secure Role-Based Encryption with Revocation Mechanism. 2011, Journal of Computer Science and Technology (JCST), 26(4): 696-710, July 2011, SCI
[8] Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu. Zero-knowledge Proofs of Retrievability. Science China: Information Sciences (Series F). 2011, 54(8): 1608–1617. SCI
[9] Huaixi Wang, Yan Zhu (Corresponding Authors), Zexing Hu, Rongquan Feng, Stephen S. Yau. Attribute-Based Signature with Policy-and-Endorsement Mechanism, Journal of Computer Science and Technology (JCST), 25(6), 2010, pp. 1293-1304. SCI
[10] Y. Zhu, D.G. Feng and Y.T. Yang. Convolutional Spread Spectrum Fingerprinting for Collusion Secure. International Workshop on Digital Watermarking (IWDW 2005), Springer Verlag, LNCS 3710, 2005, pp. 67-83. SCI
[11] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hongjia Zhao. Comparison-Based Encryption for Fine-grained Access Control in Clouds. Second ACM Conference on Data and Application Security and Privacy (ACM Codaspy2012), (Sponsored by ACM SIGSAC), San Antonio, USA, Feb 7-9, 2012, pp. 115-116.
[12] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Di Ma. Towards Temporal Access Control in Cloud Computing. The 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012). Orlando, Florida USA, March 25-30, 2012, pp. 2858-2862.
[13] Yan Zhu, Shanbiao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn. Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices. IEEE Global Communications Conference (IEEE GLOBECOM 2012). Anaheim, California, 2012
[14] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang, Mengyang Yu. Temporal Attribute Based Encryption in Clouds. 18th ACM Conference on Computer and Communications Security, Chicago, USA, Short paper (ACMCCS 2011), pp.881-883.
[15] Di Ma, Nitesh Saxena, Babins Shrestha, Tuo Xiang and Yan Zhu. Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures. Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013), Accepted, 2013.
[16] Di Ma, Yan Zhu. End-to-End Aggregate Authentication of Time-Series Data. 2013 ACM Asia Public-Key Cryptography Workshop (AsiaPKC 2013) and 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Accepted, 2013.
[17] Y. Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, Shimin Chen. Collaborative Integrity Verification in Hybrid Clouds, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2011), Orlando, Florida, USA, October 15-18, 2011, pp. 191-200.
[18] Yan Zhu, Di Ma, Shanbiao Wang. Multi-keyword Secure Data Retrieval Based on Dual Range Comparison. The 32nd International Conference on Distributed Computing Systems and the 3rd Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012).Macau, China, June 28-21, 2012
[19] Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds, the 26th Symposium on Applied Computing (ACM SAC2011), March 21-25, 2011, Taiwan, to print.
[20] Yan Zhu, Zexing Hu, Huaixi Wang, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau. Efficient Provable Data Possession for Hybrid Clouds, 17th ACM Conference on Computer and Communications Security (ACM CCS 2010), Chicago, USA, Short paper, 2010, pp. 756-758.
[21] Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang, Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy, 5th ACM Symposium on Information, Computer, and Communications security, ACM AisaCCS 2010, Beijing, China, pp. 314-319.
[22] Yan Zhu, Zexing Hu, Huaixi Wang, Gail-Joon Ahn, Hongxin Hu. Convergence Based Access Control for Social Network, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2010), Chicago, USA, Regular paper, 2010, pp.328-338.
[23] Dijiang Huang, Zhibin Zhou, Yan Zhu. Gradual Identity Exposure Using Attribute-Based Encryption, 2th IEEE International Conference on Information Privacy, Security, Risk and Trust, Minnesota (Passat2010), USA, Regular paper, 2010, pp. 881-888.
[24] Yan Zhu, Wei Zou, XinShan Zhu. Collusion Secure Convolutional Fingerprinting Information Codes. ACM Symposium on InformAtion, Computer and Communications Security (AsiaCCS 2006), ACM Press, 2006, pp. 266-274. EI:20071810579577
[25] XinShan Zhu, Zhi Tang, Yan Zhu. Image-adaptive watermarking based on perceptually shaping watermark blockwise, ACM Symposium on InformAtion, Computer and Communications Security (AsiaCCS 2006), ACM Press, 2006, pp.175-181. EI:20071810579570
[26] Yan Zhu, Chang-Tsun Li and Hong-Jia Zhao. Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain. International Symposium on Information Assurance and Security (IAS 2007), Manchester, United Kingdom, IEEE, 2007, pp. 478-483. EI:9874558
[27] Yan Zhu, DdengGuo Feng and YangTian Yang. Ownership Proofs of Digital Works Based on Secure Multiparty Computation. Journal of Software(软件学报), Vol. 17(1), 2006, pp. 157-166. EI:8839193,
[28] 朱岩, 韩心慧,叶志远,杨永田. 扩频卷积指纹及其安全性分析. 计算机学报. Vol.29 (6), 2006, pp. 960-968. EI:9157460,
[29] 朱岩,孙中伟,杨永田,冯登国. 扩频CDMA水印性能分析及其多小波域内的应用研究. 计算机学报. Vol.28 (8), 2005, pp. 1376-1385. EI: 8751662.
[30] 朱岩,杨永田,冯登国.合谋安全的扩频卷积指纹信息码. 软件学报. Vol.17 (7), 2006, pp. 1617-1626. EI:9115431.
[31] 朱岩,杨永田,叶志远,邹维,冯登国.购买者透明的非对称扩频指纹方案.电子学报. Vol.34 (6), 2006, pp. 1037-1041. EI:9124812
[32] 朱岩,冯登国,杨永田.多小波变换域内基于扩频和量化的混合水印研究.电子学报. Vol.34 (10), 2006, pp. 1817-1822. EI:9421913.
[33] 孙中伟,朱岩,冯登国.一种基于局部最大势检验的DWT域水印检测器及其性能研究.电子学报. Vol. 33 (5), 2005, pp. 864-867. EI
科研业绩
曾先后主持或参加多项国家自然基金、国家863计划、“十一五”国家密码发展基金、国家242计划等科研课题。
获得奖励 / 专利
1.一种基于反馈传播的分布式计算网络构建方法及其系统,专利号: ZL200810172676.3
2.一种具有容错功能的密码学分布式计算与分步检验方法,专利号: ZL200810111190.9
3.一种具有层次关系的公钥广播加密方法,专利号: 200910222921.1
4.一种分布式计算中基于密码学的除法协议构造方法,专利申请号: 200910222922.6
5.一种可用于分布式计算的逻辑比较的计算方法,专利号: 200810180439.1