最新新闻列表

薛庆水

时间:2020-09-16浏览:3308设置

导师介绍

导师姓名

薛庆水

 

导师性别

职务职称

系主任  教授

所在院系

计算机科学与信息工程学院

一级学科

计算机科学与技术

二级学科

计算机软件与理论

研究方向

网络安全;代理密码学;位置基密码学

联系电话

021-60877249,15900739251

电子邮箱

xue-qsh@sit.edu.cn

个人简介

1971年出生于山东郓城。主要从事网络安全与密码学方面的教学科研工作。目前,主持完成国家自然科学基金面上项目1项,作为核心研究人员完成国家自然科学基金重点项目1项、国家自然科学基金A3前瞻项目1项、中国总装备部预研项目1项。作为骨干研究成员完成/在研课题项目包括国家973项目1项、国家863项目2项、国家自然科学基金项目3项、国家发展与改革委员会信息安全专项、国家教育部高等学校博士点基金、上海市科贸基金、上海市科委基础研究重点项目、华为科研基金等10余项国家、省部级及企业重要项目的研究。近年来,在Journal of Computational and Applied Mathematics、中国科学、Informatica、Journal of Communication and Computer等期刊及国际学术会议上发表学术论文70余篇,其中,SCI/EI检索40余篇。主编教材3部,参编3部,申请国家发明专利 8 项,其中,国防专利一项(已授权),撰写国家标准草案2份。曾多次赴加拿大、日本、韩国等国家和地区参加国际学术会议,并作为部分workshop的working session的Chair或Co-Chair。近年获得教育部创新群体奖、上海市自然科学二等奖、上海交通大学年度考核优秀、上海交通大学第十二届优秀教材一等奖、海润优秀教学科研奖、第十三届和十二届上海交通大学光华奖学金、YOCSEF上海2013-2014年度优秀活动奖和优秀委员奖等。目前为FUNDAMENTA INFORMATICAE、Journal of Systems and Software、Information Sciences、Informatica、Computers & Security、Security and Communication Networks、Journal of Computer Science and Technology、P2P Networking & Applications、软件学报、计算机科学技术学报、计算机学报、电子学报、计算机研究与发展、电子与信息学报等期刊审稿专家,系中国密码学会会员、中国CCF YOCSEF委员等。同时,还作为WASA2015 PC, NSFC A3 ANNUAL CONFERENCER CO-CHAIR, 以及ICINA2011、ICNECS2011、IWSSN2011、VTC2011- Fall、ICCASM2010 Reviewer、PDCAT 2004 reviewer、CHINACOM2007 Reviewer、NSS2007 Reviewer等。2013年8月作为执行主席在北京联合主办了CCF YOCSEF“大数据时代信息安全新挑战”学术报告会。

学习与工作经历

2019.1 - 至今     计算机科学与信息工程学院 教授

2016.8 - 2019.1   计算机科学与信息工程学院 副教授

2014.1 - 2015.1   加拿大安大略理工大学 访问学者

2005.8 - 2016.8   上海交通大学 副教授

2002.4 - 2005.6   上海交通大学 博士

1998.9 - 2000.12  山东大学 硕士

1991.9 - 1995.7   山东师范大学 本科

科研工作与成果

近年承担的主要科研项目

(1) 基于位置的认证协议研究(国家自然科学基金委面上项目)

(2) 基于位置的移动互联网安全管理与开发(横向项目)

(3) 轨道交通盾构掘进评判模型、安全技术体系构建及软件实现(协同创新基金)

近年发表论著(部分)

1. Qingshui Xue, Xingzhong Ju, Haozhi Zhu, Haojing Zhu, Fengying Li and Xiangwei Zheng. A Biometric-Based IoT Device Identity Authentication SchemeAICON2019, Harbin, People’s Republic of China, May 25-27, 2019

2. 薛庆水,李凤英. 基于云环境的双QoS约束多目标工作流调度.计算机工程与设计,Vol. 40, No. 8, 2019, pp. 2196-2203

3. Qingshui Xue, Haozhi Zhu, Xingzhong Ju, Haojing Zhu, Fengying Li and Xiangwei Zheng. A Video-Selection-Encryption Privacy Protection Scheme Based on Machine Learning in Smart Home EnvironmentAICON2019, Harbin, People’s Republic of China, May 25-27, 2019

4. 薛庆水,李凤英. 一种均衡的移动云计算任务迁移决策算法. 计算机应用与软件,Vol.36, No.12, 2019, pp.66-71

5. Xingzhong Ju, Qingshui Xue, Haifeng Ma, Jiageng Chen and Haozhi Zhu. The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment, ICCT 2019 ( 2019 IEEE 19th International Conference on Communication Technology), 16 - 19 October 2019, Xi'an, Chinapp. 312 - 316

6. Xiangwei Zheng, Yuang Zhang, Hui Zhang and Qingshui Xue. An RBF neural network–based dynamic virtual network embedding algorithm, Concurrency and Computation: Practice & Experience, March 2018

7. 薛庆水,李凤英. 我国走班制教学文献分析(2000-2017年):困境与发展. 现代远程教育研究,20183):78-88

8. 薛庆水李凤英. 人工智能(AI)教育应用的安全风险与应对之策. 远程教育杂志, 20184):88-94

9. Qingshui Xue, Fengying Li, Xiangwei Zheng, Minglei Shu, Yunxiang Liu, Zhiyong Shan and Wenju Li. Secure-Positioning-Protocol-Based Symmetric Cryptography2nd International Conference on Computational Modeling, Simulation and Applied MathematicsCMSAM 2017),Oct. 22-23, 2017, Beijing, China, pp. 298-303

10. Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia and Qingshui Xue. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter, The 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA2017), June 19-21, 2017,Guilin, China, LNCS 10251pp. 124-135

11. Zhen Li, Xiangwei Zheng, Yuang Zhang and Qingshui Xue. Multi-objective Virtual Network Embedding Algorithm based on Global Resource Capacity, 20th International  Conference on Computational Science and Engineering (IEEE CSE/EUC 2017), July 21-22, 2017, Guangzhou, China, Part 1, pp. 647 - 650

12. Hui Zhang, Xiangwei Zheng, Jie Tian and Qingshui Xue. A virtual network embedding algorithm based on RBF neural network. 20th International  Conference on Computational Science and Engineering (IEEE CSE/EUC 2017 ), July 21-22, 2017, Guangzhou, China, Part 1, pp. 393 - 396

13. Jinli Zhong, Suguo Du, Lu Zhou, Haojin Zhu, Fan Cheng, Cailian Chen and Qingshui Xue. Security Modeling and Analysis on Intra Vehicular2017 IEEE 86th Vehicular Technology Conference: VTC2017-Fall IEEE VTC Fall 2017),24–27 September 2017, Toronto, Canada

14. Qingshui Xue, Huafeng Chen, Fengying Li, Huajun Zhang and Zhenfu Cao.  Multi-Proxy Multi-Signature Binding Positioning Protocol, Security and Communication Networks2016

15. Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue and Weijia Jia. A Traffic Based Lightweight Attack Detection Scheme for VoLTE, IEEE GLOBECOM 2016, Dec. 4-8, Washington D.C., USA

16. Fengying LiQingshui XueHuajun Zhang and Erdong Deng. How to Improve Community Resident Autonomous Learning Based on Virtual Learning, International Management Review, 2016, Vol. 12, No. 1, pp. 60-72

17. Qingshui Xue, Fengying Li, Guojian Ge, Jiachen Shen and Zhenfu Cao. Position-Based Proxy Signcryption, The fourth IEEE/CIC International Conference on Communications (ICCC 2015), Shenzhen, China, Nov. 2-4, 2015

18. Fengying Li and Qingshui Xue. Research on community resident autonomous learning based on virtual learning, EEE'15 (The 2015 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government), July 27-30, 2015, Las Vegas, USA

19. Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang and Zhenfu Cao. Multi-Proxy Multi-Signature Binding Positioning Protocol, The 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2015), Aug. 10-12, 2015, Qufu, Shandong, China, LNCS 9204, pp. 9-18

20. Qingshui Xue, Fengying Li and Zhenfu Cao. Proxy Multi-Signature Binding Positioning Protocol, IEEE/CIC ICCC 2014 (Symposium on Privacy and Security in Commutations), IEEE Xplore, Oct. 13-15, 2014, Shanghai, China, pp. 166-170

21. Qingshui Xue, Fengying Li and Zhenfu Cao. Threshold proxy signature based on position, SECURWARE 2014 (The Eighth International Conference on Emerging Security Information, Systems and Technologies), Nov. 16-20, 2014, Lisbon, Portugal. pp. 151-156

22. Qingshui Xue, Fengying Li and Zhenfu Cao. positioning-protocol-based digital signature, WICON 2014 (The 8th International Wireless Internet Conference - Symposium on Wireless and Vehicular Communication), Nov. 13-14, 2014, Lisbon, Portugal

23. Fengying Li, Qingshui Xue and Haixia Li. Research on energy expenditure and strategy of MOOC, Modern Distance Education Research, 2014 (in Chinese)

24. Fengying Li, Qingshui Xue and Jianping Xu. Fuzzy-Identity-Authentication-Based MOOC Online Examination Learner Identity Authentication Pattern and Solution, MEHS 2014 (International Symposium Modern on Education and Human Sciences), Oct. 25-26, 2014, Zhangjiajie, China

25. Fengying Li, Jianping Xu and Qingshui Xue. Research on Authentication Technology Based on Proxy in Mobile Learning, MEHS 2014 (International Symposium Modern on Education and Human Sciences), Oct. 25-26, 2014, Zhangjiajie, China

26. Juan Lin, Qingshui Xue and Zhenfu Cao. Proxy-based Immediate Attribute Revocation KP-ABE, Computer Engineering, 2013in Chinese

27. Fengying Li, Yuxin Qi and Qingshui Xue. Research on Security of Virtual Learning Community Based on Big DataCollaboration Learning System Based on Threshold Proxy Signature, Journal of Distance Education, 2013,Vol. 4, pp. 76-82in Chinese

28. Fengying Li, Qingshui Xue and Jiping Zhang. The Model and Solution of Privacy Protection for Mobile Learning Based on Authentication, Modern Distance Education Research, 2013, Vol. 3, pp. 72-77in Chinese

29. Fengying Li, Qingshui Xue and Weimin Wu. Collaboration learning research based on threshold proxy signature, e-Education Research, 2013, Vol. 10, pp. 66-70in Chinese

社会学术团体兼职

中国密码学会会员

中国CCF YOCSEF委员

主要研究方向

网络安全,主要集中于基于位置的网络安全、IPV6安全、物联网安全;代理密码学研究与应用,主要包括代理签名、代理认证、代理授权;大数据安全密码方案设计与应用;基于身份、属性与自认证的公钥密码体制研究与应用;区块链技术研究与应用;新型密码体制与方案的设计、实现与应用。

近3年指导研究生的就业情况

已指导3位研究生毕业。


返回原图
/