刘吉强

博士、教授、副院长

基本信息

办公电话:01051682192 电子邮件: jqliu@bjtu.edu.cn
通讯地址:北京市海淀区西直门外上园村3号 邮编:100044

教育背景

1994.9-1999.7北京师范大学数学所,获理学博士学位

1990.9-1994.7北京师范大学数学系,获理学学士学位

工作经历

2016.7-至今 北京交通大学研究生院 副院长

2011.9-2016.7 北京交通大学计算机与信息技术学院 副院长

2007.6-2011.9 北京交通大学计算机与信息技术学院计算机工程系 主任

2005.9-2006.92012.7-2013.2纽约州立大学布法罗分校计算机科学与工程系 访问学者

2010.12-至今 北京交通大学计算机与信息技术学院 教授

2003.12-2010.12 北京交通大学计算机与信息技术学院 副教授

1999.7-2003.12 北京交通大学计算机与信息技术学院 讲师

研究方向

  • 计算机安全
  • 人工智能及应用
  • 网络安全
  • 计算机技术
  • 软件工程
  • 人工智能
  • 网络与信息安全

招生专业

  • 计算机科学与技术硕士
  • 网络空间安全硕士
  • 计算机技术硕士
  • 软件工程硕士
  • 人工智能硕士
  • 计算机科学与技术博士
  • 网络空间安全博士
  • 网络与信息安全硕士
  • 网络与信息安全博士
  • 软件工程博士

科研项目

  1. 教育部基本科研业务费重点项目,面向军民融合的多域网络互联态势感知关键技术,编号2018JBZ103,负责人, 2018-2021
  2. 红果园纵向,样本扩充及关键词语义扩展关键技术研究,负责人, 2017-2019
  3. 公司委托,基于桌面云的众创平台软件设计与开发,负责人, 2017-2018
  4. 国家自然科学基金课题,云平台数据隐私保护关键技术研究,编号61672092,负责人, 2017-2020
  5. 红果园省部级"企事业",信息采集合作协议, 负责人, 2016-2018
  6. 中国工程院重大咨询课题子课题,可信的网络空间安全保障体系,技术负责人, 2015-2018
  7. 公司委托,企业资源分享平台软件,负责人, 2015-2016
  8. 教育部新世纪人才,“面向电子病历共享系统的安全与隐私保护技术研究” ,负责人, 2012-2014
  9. 保密局课题,“基于国产可信计算平台的涉密终端应用技术研究” ,负责人,2011-2012
  10. 自然科学基金“基于TCM的匿名证明和隐私保护”编号60973112,负责人, 2009-2012

教学工作

离散数学

应用密码学与安全协议

论文/期刊

1.     Heng Ye, Jiqiang Liu, Wei Wang,etc., Secure and efficient outsourcing differential privacy data release scheme in Cyber–physical system, Future Generation Computer Systems, 2018

2.     Xiao Zhang, Jiqiang Liu, Si Chen, Yongjun Kong, and Kui Ren, PriWhisper+: An Enhanced Acoustic Short-range Communication System for Smartphones, IEEE Internet of Things Journal, 2018

3.     Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu, Android single sign-on security: Issues, taxonomy and directions, Future Generation Computer Systems, Vol.89, p 402-420, December 2018

4.     Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, Discovering communities of malapps on Android-based mobile cyber-physical systems, Ad Hoc Networks, v 80, p 104-115, November 2018

5.     Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018)

6.     Xinwei Gao, Jintai Ding, Lin Li, R.V. Saraswathy, Jiqiang Liu,  Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS, Source: International Journal of Network Security, v 20, n 5, p 923-930, September 1, 2018

7.     Shuo Qiu, Jiqiang Liu,  Yanfeng Shi, Identity-Based Private Matching over Outsourced Encrypted Datasets, IEEE Transactions On Cloud Computing,  Vol. 6,No. 3,PP 747-759, 2018

8.     Lun Li , Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, Xiangliang Zhang, and Zonghua Zhang, CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles, IEEE Transactions On Intelligent Transportation Systems, v 19, n 7, p 2204-2220, July 2018

9.     Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren, Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters , IEEE Transactions on Smart Grid, v 9, n 4, p 3313-3320, July 2018

10.  Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu,  Fingerprinting Android Malware Families, Frontiers of Computer Science, p 1-10, June 30, 2018

11.  Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks, Information Sciences, v 433-434, p 1339-1351, April 2018

12.  Ziqi Yan,  Jiqiang Liu, Shaowu Liu, DPWeVote: differentially private weighted voting protocol for cloud-based decision-making, Enterprise Information Systems, p 1-21, March 9, 2018

13.  Xinwei Gao, Jintai Ding, Lin Li,  Jiqiang Liu, Practical randomized RLWE-based key exchange against signal leakage attack, Source: IEEE Transactions on Computers, February 21, 2018

14.  Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang, Discovering and understanding android sensor usage behaviors with data flow analysis, World Wide Web, Vol. 21, No.1 PP 105-126, JAN 2018

15.  Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers, Future Generation Computer Systems,Vol.78,No.3,PP 987-994, JAN 2018

16.  Chunjing Qiu, Jiqiang Liu,  Yingxiao Xiang,   Wenjia Niu, Chen, Tong, Intention-aware multi-channel keyword extension for content security, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 788-794, July 16, 2018, Proceedings - 2018

17.  Shuanshuan Pang, Wenjia Niu,  Jiqiang Liu, Yingxiao Xiang,  Yingdi Wang, An approach to generate topic similar document by seed extraction-based SeqGAN training for bait document, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 803-810, July 16, 2018,

18.  Xiaoxuan Bai, Wenjia Niu,  Jiqiang Liu,  Xu Gao, Yingxiao Xiang,   Jingjing Liu, Adversarial examples construction towards white-box Q table variation in DQN pathfinding training, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 781-787, July 16, 2018,

19.  Yingxiao Xiang,   Wenjia Niu,  Jiqiang Liu, Tong Chen,  Zhen Han,  A PCA-based model to predict adversarial examples on Q-learning of path finding, Source: Proceedings - 2018 IEEE 3rd International Conference on Data Science in Cyberspace, DSC 2018, p 773-780, July 16, 2018, Proceedings - 2018

20.  Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206

21.  Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv, Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. ICCCN 2018: 1-6

22.  Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv, Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. ICCCN 2018: 1-2

23.  Xu Gao, Wenjia Niu, Jiqiang Liu Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222

24.  Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han,  Designing mutual authentication protocols in industrial wireless network, Source: Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, p 153-158, May 25, 2018, Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018

25.  Fang Wu, Jigang Wang, Jiqiang Liu, Wei Wang, Vulnerability detection with deep learning, Source: 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, v 2018-January, p 1298-1302, March 22, 2018, 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017

26.  Xinwei Gao,   Jintai Ding, Jiqiang Liu, Lin Li,  Post-Quantum Secure Remote Password Protocol from RLWE Problem, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10726 LNCS, p 99-116, 2018, Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Revised Selected Papers

27.  Xinwei Gao,  Lin Li,   Jintai Ding, Jiqiang Liu, R.V. Saraswathy, Zhe Liu , Fast discretized Gaussian sampling and post-quantum TLS ciphersuite, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10701 LNCS, p 551-565, 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings

28.  Xiaoxuan Bai, Yingxiao Xiang,   Wenjia Niu,  Jiqiang Liu, Tong Chen, Jingjing Liu,  Wu, Tong, A cross-modal CCA-based astroturfing detection approach, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 582-592, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings

29.  Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Characterizing Android apps' behavior for effective detection of malapps at large scale, Future Generation Computer Systems, Vol. 75,PP 30-45, OCT 2017

30.  Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang. Hidden policy CP-ABE with Keyword Search,  Science China Information Sciences, v 60, n 5, p 052105 (12 pp.), May 2017

31.  Yang Yang, Jiqiang Liu, Lin Li,  etc. Towards Robust Green Virtual Cloud Data Center Provisioning, IEEE Transactions On Cloud Computing,Vol.5, No. 2,PP 168-181 , APR-JUN 2017

32.  Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking, IEEE ACCESS  Vol. 5 ,PP 19012-19022, 2017

33.  Jingjing Liu, Wenjia Niu,  Jiqiang Liu,  Jia Zhao,  Tong Chen,  Yinqi Yang, Yingxiao Xiang,   Han, Lei, A method to effectively detect vulnerabilities on path planning of VIN, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10631 LNCS, p 374-384, 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings

34.  Tong Chen,  Noora Hashim Alallaq, Wenjia Niu,  Yingdi Wang, Xiaoxuan Bai, Jingjing Liu,  Yingxiao Xiang,   Wu, Tong; Jiqiang Liu,, A hidden astroturfing detection approach base on emotion analysis, Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 10412 LNAI, p 55-66, 2017, Knowledge Science, Engineering and Management - 10th International Conference, KSEM 2017, Proceedings

35.  Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, IEEE Transactions on Services Computing, v 9, n 3, p 408-20, May-June 2016

36.  Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu,  Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem . The 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016

37.  Dan Su, Wei Wang, Xing Wang, Jiqiang Liu,  Anomadroid: profiling Android application behaviors for identifying unknown malapps , The15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.

38.  Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang,  Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets . Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016

39.  Zhenliang Cai, Jian Wang, Jiqiang Liu,   Novel feature selection algorithm for Chinese text categorization based on CHI . Proceedings of the 13th IEEE International Conference on Signal Processing, 978-1-5090-1345-6, pp. 1035-1039, 2016-11

40.  Lun Li, Meihong Li, Jiqiang Liu,  Jia Zhao,  An SDKEY Data Protection and Sharing Scheme with Attribute-based Encryption for Smartphone . The 4th International Conference on Enterprise Systems Advances in Enterprise Systems, 978-0-7695-5984-1, pp. 104-109, 2016-11

41.  Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks , v 9, n 15, p 2816-2826, October 1, 2016

42.  Zhonghua Wang, Zhen Han, Jiqiang Liu, Public verifiability for shared data in cloud storage with a defense against collusion attacks. SCIENCE CHINA Information Sciences 59(3): 39101:1-39101:3 (2016)

43.  Bianqing Yuan, Jiqiang Liu, A universally composable secure grouping-proof protocol for RFID tags , Concurrency & Computation Practice & Experience, 2016 , 28 (6) :1872-1883

44.  Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang.  Identity-based private matching over outsourced encrypted datasets.  IEEE Transactions on Cloud Computing, Issue 99. DEC.2015

45.  Wei Wang, Yongzhong He, Jiqiang Liu, Ylvain Gombault,Constructing important features from massive network traffic for lightweight intrusion detection, IET Information Security,Vol.9,No.6, 2015

46.  Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73

47.  Xuezhen Huang, Jiqiang Liu,  Zhen Han, Privacy beyond sensitive values. SCIENCE CHINA Information Sciences, Vol.58,No.7, pp.166-180,2015

48.  Bin Wang, Xiaolin Chang, Jiqiang Liu, Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter , Vol.  19,   No.  4 , PP:  537-540, April 2015

49.  Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.

50.  Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han,etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Information Sciences 295(2015):221-231

51.  Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu,  OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, Vol.27 ,No.5, PP:  1092-1109,2015.4

52.  Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang, Privacy-preserving publishing for streaming data, Journal of Computational Information Systems, v 11, n 5, p 1863-1877, March 1, 2015

53.  Guang Yang, Jiqiang Liu, Threshold public key cryptosystem for encrypting long messages, Journal of Computational Information Systems, Vol.11, No. 2, p 671-681, January 15, 2015

54.  Xing Liu, Wei Wang, Jiqiang Liu, POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. ACM Conference on Computer and Communications Security 2015(CCS 2015): 1653-1655

55.  Xing Liu, Jiqiang Liu, Wei Wang, Exploring sensor usage behaviors of Android applications based on data flow analysis. IPCCC 2015: 1-8


专著/译著

专利

软件著作权

获奖与荣誉

2016年 网信办 网络安全优秀教师

2011年 教育部 新世纪优秀人才

2010年 教育部 科技进步一等奖 (排名第9

2009年 北京交通大学 智瑾奖教奖优秀青年教师

2007 北京交通大学 优秀主讲教师

2007 北京交通大学 五四青年奖章获得者

社会兼职

  • IEEE会员
  • 全国信息安全标准化技术委员会委员
  • 中国保密协会隐私保护专委会委员
  • 中国密码学会安全协议专业委员会专家委员会成员/教育与科普工作委员会委员
  • 全国计算机应急处理协调中心计算机网络与信息安全专家委员会委员
  • 网络空间安全专委会委员
  • 中关村可信计算联盟副理事长
  • 国家保密教育培训基地北京分基地副主任。