最新新闻列表

薛庆水

时间:2020-09-16浏览:6703设置

导师介绍

导师姓名

薛庆水

导师性别

职务职称

系主任  教授

所在院系

计算机科学与信息工程学院

一级学科

计算机科学与技术

二级学科

计算机软件与理论

研究方向

网络安全;代理密码学;人工智能安全

联系电话

021-60877249

电子邮箱

xue-qsh@sit.edu.cn

个人简介

1971年出生于山东郓城。主要从事网络安全与密码学方面的教学和科研工作。目前,主持完成国家自然科学基金面上项目1项,作为核心研究人员完成国家自然科学基金重点项目1项、国家自然科学基金中日韩A3前瞻项目2项、中国总装备部预研项目1项。作为骨干研究成员完成/在研课题项目包括国家973项目1项、国家863项目2项、国家自然科学基金项目3项、国家发展与改革委员会信息安全专项、国家教育部高等学校博士点基金、上海市科贸基金、上海市科委基础研究重点项目、华为科研基金等10余项国家、省部级及企业重要项目的研究。近年来,在Security and   Communication Networks Wireless Communications and   Mobile Computing Journal of Computational and   Applied Mathematics、中国科学、InformaticaJournal of Communication and Computer等期刊及国际学术会议上发表学术论文80余篇,其中,SCI/EI检索50余篇。主编教材3部,参编5部,申请国家发明专利 32   项,授权3项,其中,国防专利一项,撰写国家标准草案2份。曾多次赴加拿大、日本、韩国等国家和地区参加国际学术会议,并作为部分workshopworking sessionChairCo-Chair。近年获得教育部“****和创新团队发展计划”创新群体奖、上海市自然科学二等奖、上海市产学研合作优秀项目奖、上海交通大学年度考核优秀、上海交通大学第十二届优秀教材一等奖、海润优秀教学科研奖、第十三届和十二届上海交通大学光华奖学金、YOCSEF上海2013-2014年度优秀活动奖和优秀委员奖等。目前为FUNDAMENTA INFORMATICAEJournal of Systems   and SoftwareInformation SciencesInformaticaComputers & SecuritySecurity and Communication NetworksJournal   of Computer Science and TechnologyP2P Networking   & Applications、软件学报、计算机科学技术学报、计算机学报、电子学报、计算机研究与发展、电子与信息学报等期刊审稿专家,系中国密码学会会员、中国CCF YOCSEF委员等。

学习与工作经历

2019.1 - 至今     上海应用技术大学计算机科学与信息工程学院   系主任 教授

2016.8 - 2019.1   上海应用技术大学计算机科学与信息工程学院 系主任 副教授

2014.1 - 2015.1   加拿大安大略理工大学 访问学者

2005.8 - 2016.8   上海交通大学计算机科学与工程系 副教授

2002.4 - 2005.6   上海交通大学计算机科学与工程系 博士

1998.9 - 2000.12  山东大学计算机系   硕士

1991.9 - 1995.7   山东师范大学计算机系 本科

科研工作与成果

近年承担的主要科研项目

(1)      基于位置的认证协议研究(国家自然科学基金委面上项目)

(2)      基于位置的移动互联网安全管理与开发(横向项目)

(3)      轨道交通盾构掘进评判模型、安全技术体系构建及软件实现(协同创新基金)

(4)      信息安全实践基地建设(教育部产学合作协同育人项目)

(5)      基于移动位置的代理签名模型、系统及其软件实现(协同创新基金)

近年发表论著(部分)

1.          Fengying Li, Yifeng   He and Qingshui Xue. Progress, Challenges and Countermeasures of Adaptive   Learning: A Systematic Review. Educational Technology & Society24 (3), pp.   238-255, 2021.

2.          Zhiyong Shan, Erhao   Xu, Qingshui Xue. Improved particle swarm optimization algorithm based on   random disturbance, 2021 China Automation Congress (CAC 2021), October 22 –   24, 2021, Beijing, China

3.          Qingshui XueZongyang HouHaifeng Ma Xingzhong Ju Haozhi Zhu& Yue Sun.   Research on path planning optimization of intelligent robot in warehouse fire   fighting scene. EAI AICON2021 (3rd EAI International Conference on Artificial   Intelligence for Communications and Networks), October 23-24, 2021, Xining,   China, Part II, LNCST 397

4.          Qingshui Xue, Yue   Sun, Haifeng Ma, Zongyang Hou, Tianhao Zhang. Registration and Login Scheme   of Charity Blood Donation system Based on Blockchain Zero-Knowledge Proof. 2021   IEEE the 9th International Conference on Information, Communication and   Networks (ICICN 2021). November 25-28, 2021, Xi'an, China

5.          孙悦,薛庆水,朱浩之,鞠兴忠,侯宗阳. 一种基于区块链零知识证明的注册登录方案. 计算机应用与软件. 2021

6.          Qingshui Xue, Zhen   Xue, Haifeng Ma, Yue Sun and Xuelei Shi. Design of Virtual Power Plant System   Model under Master-Slave Multi-chain. EPES2021 (International Conference on   Frontiers of Electrical Power & Energy Systems 2021), December 18-19,   2021, Zhuhai, China

7.          Haifeng Ma, HaiTao   Yu, Ji Zhang, Junhua Wang, Qingshui Xue, and Jiahai Yang. A Hierarchical   Provable Massive Data Migration Method under Multicloud Storage. Wireless   Communications and Mobile Computing, Volume 2021

8.          Haifeng Ma, Jiahai   Yang, Qingshui Xue, Xingzhong Ju, Haozhi Zhu, Tao Lin, Xinxin Yuan. A   not-same frequency remote data possession checking method [J]. Journal of   Shandong University (NATURAL SCIENCE), 2020, 55(5): 81-87

9.          Qingshui Xue,   Xingzhong Ju, Haozhi Zhu, Haojing Zhu, Fengying Li and Xiangwei Zheng. A   Biometric-Based IoT Device Identity Authentication SchemeAICON2019, Harbin,   People’s Republic of China, May 25-27, 2019

10.       薛庆水,李凤英. 基于云环境的双QoS约束多目标工作流调度.计算机工程与设计,Vol. 40, No. 8, 2019, pp. 2196-2203

11.       Qingshui Xue,   Haozhi Zhu, Xingzhong Ju, Haojing Zhu, Fengying Li and Xiangwei Zheng. A   Video-Selection-Encryption Privacy Protection Scheme Based on Machine   Learning in Smart Home EnvironmentAICON2019, Harbin, People’s Republic of China, May   25-27, 2019

12.       薛庆水,李凤英. 一种均衡的移动云计算任务迁移决策算法. 计算机应用与软件,Vol.36, No.12, 2019, pp.66-71

13.       Xingzhong Ju,   Qingshui Xue, Haifeng Ma, Jiageng Chen and Haozhi Zhu. The Research on   Identity Authentication Scheme of Internet of Things Equipment in 5G Network   Environment, ICCT 2019 ( 2019 IEEE 19th International Conference on   Communication Technology), 16 - 19 October 2019, Xi'an, Chinapp. 312 - 316

14.       Xiangwei Zheng,   Yuang Zhang, Hui Zhang and Qingshui Xue. An RBF neural network–based dynamic   virtual network embedding algorithm, Concurrency and Computation: Practice   & Experience, March 2018

15.       薛庆水,李凤英. 我国走班制教学文献分析(2000-2017年):困境与发展. 现代远程教育研究,20183):78-88

16.       薛庆水,李凤英. 人工智能(AI)教育应用的安全风险与应对之策. 远程教育杂志, 20184):88-94

17.       Qingshui Xue,   Fengying Li, Xiangwei Zheng, Minglei Shu, Yunxiang Liu, Zhiyong Shan and   Wenju Li. Secure-Positioning-Protocol-Based Symmetric Cryptography2nd International   Conference on Computational Modeling, Simulation and Applied MathematicsCMSAM 2017),Oct. 22-23, 2017,   Beijing, China, pp. 298-303

18.       Mingli Wu, Na Ruan,   Shiheng Ma, Haojin Zhu, Weijia Jia and Qingshui Xue. Detect SIP Flooding   Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter, The 12th   International Conference on Wireless Algorithms, Systems, and Applications   (WASA2017), June 19-21, 2017,Guilin, China, LNCS 10251pp. 124-135

19.       Zhen Li, Xiangwei   Zheng, Yuang Zhang and Qingshui Xue. Multi-objective Virtual Network   Embedding Algorithm based on Global Resource Capacity, 20th   International  Conference on   Computational Science and Engineering (IEEE CSE/EUC 2017), July 21-22, 2017,   Guangzhou, China, Part 1, pp. 647 - 650

20.       Hui Zhang, Xiangwei   Zheng, Jie Tian and Qingshui Xue. A virtual network embedding algorithm based   on RBF neural network. 20th International    Conference on Computational Science and Engineering (IEEE CSE/EUC 2017   ), July 21-22, 2017, Guangzhou, China, Part 1, pp. 393 - 396

21.       Jinli Zhong, Suguo   Du, Lu Zhou, Haojin Zhu, Fan Cheng, Cailian Chen and Qingshui Xue. Security   Modeling and Analysis on Intra Vehicular2017 IEEE 86th Vehicular Technology Conference:   VTC2017-Fall IEEE VTC Fall 2017),24–27 September 2017, Toronto, Canada

22.       Qingshui Xue,   Huafeng Chen, Fengying Li, Huajun Zhang and Zhenfu Cao.  Multi-Proxy Multi-Signature Binding   Positioning Protocol, Security and Communication Networks2016

23.       Na Ruan, Qi Hu, Lei   Gao, Haojin Zhu, Qingshui Xue and Weijia Jia. A Traffic Based Lightweight   Attack Detection Scheme for VoLTE, IEEE GLOBECOM 2016, Dec. 4-8, Washington   D.C., USA

24.       Fengying LiQingshui XueHuajun Zhang and   Erdong Deng. How to Improve Community Resident Autonomous Learning Based on   Virtual Learning, International Management Review, 2016, Vol. 12, No. 1, pp. 60-72

25.       Qingshui Xue,   Fengying Li, Guojian Ge, Jiachen Shen and Zhenfu Cao. Position-Based Proxy   Signcryption, The fourth IEEE/CIC International Conference on Communications   (ICCC 2015), Shenzhen, China, Nov. 2-4, 2015

26.       Fengying Li and   Qingshui Xue. Research on community resident autonomous learning based on   virtual learning, EEE'15 (The 2015 International Conference on e-Learning,   e-Business, Enterprise Information Systems, and e-Government), July 27-30,   2015, Las Vegas, USA

27.       Huafeng Chen,   Qingshui Xue, Fengying Li, Huajun Zhang and Zhenfu Cao. Multi-Proxy   Multi-Signature Binding Positioning Protocol, The 10th International   Conference on Wireless Algorithms, Systems, and Applications (WASA 2015),   Aug. 10-12, 2015, Qufu, Shandong, China, LNCS 9204, pp. 9-18

28.       Qingshui Xue,   Fengying Li and Zhenfu Cao. Proxy Multi-Signature Binding Positioning   Protocol, IEEE/CIC ICCC 2014 (Symposium on Privacy and Security in   Commutations), IEEE Xplore, Oct. 13-15, 2014, Shanghai, China, pp. 166-170

29.       Qingshui Xue,   Fengying Li and Zhenfu Cao. Threshold proxy signature based on position,   SECURWARE 2014 (The Eighth International Conference on Emerging Security   Information, Systems and Technologies), Nov. 16-20, 2014, Lisbon, Portugal.   pp. 151-156

30.       Qingshui Xue,   Fengying Li and Zhenfu Cao. positioning-protocol-based digital signature,   WICON 2014 (The 8th International Wireless Internet Conference - Symposium on   Wireless and Vehicular Communication), Nov. 13-14, 2014, Lisbon, Portugal

31.       Fengying Li,   Qingshui Xue and Haixia Li. Research on energy expenditure and strategy of   MOOC, Modern Distance Education Research, 2014 (in Chinese)

32.       Fengying Li,   Qingshui Xue and Jianping Xu. Fuzzy-Identity-Authentication-Based MOOC Online   Examination Learner Identity Authentication Pattern and Solution, MEHS 2014   (International Symposium Modern on Education and Human Sciences), Oct. 25-26,   2014, Zhangjiajie, China

33.       Fengying Li,   Jianping Xu and Qingshui Xue. Research on Authentication Technology Based on   Proxy in Mobile Learning, MEHS 2014 (International Symposium Modern on   Education and Human Sciences), Oct. 25-26, 2014, Zhangjiajie, China

34.       Juan Lin, Qingshui   Xue and Zhenfu Cao. Proxy-based Immediate Attribute Revocation KP-ABE,   Computer Engineering, 2013in Chinese

35.       Fengying Li, Yuxin   Qi and Qingshui Xue. Research on Security of Virtual Learning Community Based   on Big DataCollaboration Learning System Based on Threshold Proxy Signature,   Journal of Distance Education, 2013,Vol. 4, pp. 76-82in Chinese

36.       Fengying Li,   Qingshui Xue and Jiping Zhang. The Model and Solution of Privacy Protection   for Mobile Learning Based on Authentication, Modern Distance Education   Research, 2013, Vol. 3, pp. 72-77in Chinese

37.       Fengying Li,   Qingshui Xue and Weimin Wu. Collaboration learning research based on   threshold proxy signature, e-Education Research, 2013, Vol. 10, pp. 66-70in Chinese

社会学术团体兼职

中国密码学会会员

中国CCF YOCSEF委员

主要研究方向

网络安全(基于位置的网络安全、IPV6安全、物联网安全);代理密码学研究与应用(代理签名、代理认证、代理授权);大数据安全研究、方案设计与应用;基于身份、属性与自认证的公钥密码体制研究与应用;区块链技术研究与应用;人工智能安全研究与应用;新型密码体制的研究、设计、实现与应用。

3年指导研究生的就业情况

4位研究生毕业。

 


返回原图
/