刘昕
作者:
李钰    
发布时间:
2017-03-13    
点击次数:
   

姓名:刘昕
性别:
民族:
办公电话:15853273273
职务:
职称:副教授,博士,硕士生导师
电子邮箱:lx@upc.edu.cn,24688784@qq.com
个人简介:博士,副教授,硕士生导师,IEEE会员,ACM会员、中国计算机学会会员,CCF Yocsef青岛AC委员。 2016.2-2017.2,佛罗里达大学 访问学者,研究方向为物联网安全。2009.9-2012.6,南开大学  信息技术科学学院,运筹学与控制论,研究方向为网络安全,博士。2001.9-2004.7,青岛大学信息工程学院,计算机软件与理论,研究方向为并行处理系统,硕士。1993.9-1997.7,山东大学电子系,电子学及通信系统,本科。
研究领域

网络空间安全、物联网安全、社会计算、并行计算

科研项目

1.《利用社会信任构建协作防御体系》,计算机软件新技术国家重点实验室(南京大学)开放课题(KFKT2011B28),负责人,2011.6-2013.5 

2.《基于社会计算的P2P网络安全防护机制研究》,自主创新科研计划项目(No.13CX02027A)负责人,2013.1-2014.12  

3.《基于综合IM平台的网络恶意代码防护机制研究》,中国石油大学博士科研启动基金(Y1207013),负责人,2012.12-2014.11  

4.《基于社会计算的网络恶意代码防护机制研究》,国家自然基金(61309024),负责人,2014.1-2016.12  

5.《大数据环境下舆情热点实时发现与追踪》,中美计算机科学研究中心开放基金课题, 负责人,2016.4-2017.4  

6. 中国石油大学(华东)研究生教育研究与教学改革项目“计算机技术专业学位研究生协同创新培养机制研究”(YJ-B1408) 2014.12.25(2014.12-2016.9)

 
论文及著作

已发表SCI,EI收录论文30余篇,以下是部分论文列表: 

[1] Xin Liu, Feng Wang, Yang Yang, Jiuyun Xu, Pingjun Zou, Yiwen Wang. Defense against malicious URL spreading in micro-blog network with hub nodes, CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/cpe.3890,2016

[2] Xin Liu, Yao Wang, Dehai Zhao, Weishan Zhang, Leyi Shi. Patching by Automatically Tending to Hub Nodes Based on Social Trust, Computer Standards & Interfaces, 2016,44:94-101, DOI: 10.1016/j.csi.2015.08.001, 2016.02 (Volume 44, February 2016, Pages 94–101)

[3] Yang Yang, Hui Xu, Yanan Liu, Zhongwei Li, Weishan Zhang, Xin Liu. Feature Analysis of Important Nodes in Microblog, CSCloud 2015.11.3, NewYork

[4] Leyi Shi, Yao Wang, Xin Liu*. An ACO-Based Trust Inference Algorithm. the  9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2014,2014.11.8

[5] ZHANG WeiShan, CHEN LiCheng, LIU Xin, LU QingHua, ZHANG PeiYing, YANG Su. An OSGi-based flexible and adaptive pervasive cloud infrastructure. SCIENCE CHINA Information Sciences, 2014, 57(3): 032107(11)(SCIE)

[6] Xin Liu, Zhaojun Xin, Leyi Shi, Yao Wang. A Decentralized and Personalized Spam Filter Based on Social Computing, The 10th IEEE International Wireless Communications and Mobile Computing Conference,2014

[7] 刘昕, 贾春福, 石乐义, 辛兆君. 基于社会计算的IM恶意代码防御机制, 电子学报2013, Vol. 41(6): 1130-1139(20133916789707)

[8] Liu Xin, Xin Zhaojun, Shi Leyi. Automatic Patching Based on Social Computing in P2P Network, The 4th International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2013) Xi’an, China, 2013.9. pp.471-478基于社会计算的P2P网络自动补丁机制

[9] Liu Xin, Shi Leyi, Wang Yao, Xin Zhaojun, Fu Wenjing. A Dynamic Trust Inference Algorithm for Social Network. the  8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013

[10] 刘昕,贾春福,刘国友, 胡志超, 王冬. 基于社会信任的恶意网页协防机制, 通信学报,2012, 33(12): 11-18(20130415931883)

[11] 刘昕,贾春福,胡志超,刘国友,王冬. 对抗P2P蠕虫的邻居选择机制, 天津大学学报, 45(11), p1030-1038, 2012(20125215843074)

[12] Liu Xin, Hu Zhichao,Liu Guoyou, Jia Chunfu. Defending P2P Networks Based on Benign Worms, Journal of Computational Information Systems, 2011(7), p2532-2539 (EI收录: 20112814144087)

[13] Jia Chunfu, Liu Xin, Hu Zhichao,Liu Guoyou. Defending P2P Networks against Malicious Worms Based on Benign Worms, Advances in Electric and Electronics, 155 LNEE, p653-660, 2012 (EI收录: 20121314895984)

[14] Jianxi Fan, Xiaohua Jia, Xin Liu, Shukui Zhang, Jia Yu.Efficient unicast in bijective connection networks with the restricted faulty node set, Information Sciences, 181 (11), p2303-2315,2011(SCI收录: 000292622100018)

[15] 石乐义, 姜蓝蓝, 刘昕, 贾春福. 拟态式蜜罐诱骗特性的博弈理论分析,电子与信息学报, 2013, Vol. 35(5): 1063-1068

[16] Jia Chunfu, Liu Xin, Liu Guoyou, Hu Zhichao. Worm Containment Based on Double-neighbor Lists in P2P Overlay Networks, Proceedings of 2010 IEEE International Conference on Information Theory and Information Security (ICITIS 2010), p558-562, Beijing, China, December 17-19, 2010 (EI收录: 20110813676952)

[17] Leyi Shi, Xiaorui Wang, Wenjing Fu, Xin Liu, Zhen Qin. An improved anti-collision algorithm for ISO15693 RFID systems. CSS2012 (International Symposium on Cyberspace Safety and Security), Lecture Notes in Computer Science, LNCS 7672, Springer, Melbourne, Australia, 2012.12, p339-351.

[18] 石乐义, 李婕, 刘昕, 贾春福. 基于动态阵列蜜罐的协同网络防御策略研究. 通信学报, 33(11), p159-164, 2012 

[19] Chunfu Jia, Zhi Wang, Kai Lu, Xinhai Liu, Xin Liu. Directed Hidden-Code Extractor for Environment-Sensitive Malwares, Physics Procedia, Volume 24, Part C, p1621-1627,2012

[20] 贾春福, 王志, 刘昕, 刘昕海. 路径模糊:一种有效抵抗符号执行的二进制混淆技术, 计算机研究与发展, 48(11), p2111-2119, 2011

[21] Leyi Shi, Xiaorui Wang, Wenjing Fu, Xin Liu, and Zhen Qin. An Improved Anti-collision Algorithm for ISO15693 RFID Systems. Lecture Notes in Computer Science,2012.12

[22] Leyi Shi, Wenjing Fu, Cong Jia, Xin Liu, Chunfu Jia.  A Sensor Anonymity Enhancement Scheme Based on Pseudonym for Clustered Wireless Sensor Network China Communications, 2014.9

 

5项发明专利公开待授权。

指导研究生情况

 已毕业硕士2人,在读硕士3人。

获得荣誉

西海岸新区首批紧缺人才

2014年被评为优秀班主任

2015年东营市科技情报成果一等奖