General

李凤华 男 汉族 博导 信息工程研究所
Email: lifenghua@iie.ac.cn
Telephone: 010-82346330
Address: 19 Shucun Road, Haidian District, Beijing

Postcode: 100085

Research Areas

​Network and System Security, Access Control, Data Security etc.

Education

Ph.D., Computer Systems architecture, Xidian University, Xi’an, China, June 2009.
M.S., Computer Systems architecture, Xidian University, Xi’an, China, January 1990.
B.S., Computer Software, Xidian University, Xi’an, China, June 1987.

Experience


Work Experience
(1) Professor, Doctoral supervisor, Institute of Information Engineering, Chinese Academy of Science, Beijing, August 2011-Present.
(2) Professor, Beijing Electronic Science and Technology Institute, Beijing, July 1994-August 2011   
(3) Assistant & Lecturer, Xidian University, March 1990-June 1994.

Honors & Distinctions

(1) Best Paper Award for the paper "Achieving lightweight and secure access control in Multi-authority cloud" (Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu and Fangfang Shan) in the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM), Helsinki, Finland, 20-22 August, 2015.
(2) Adjunct Ph.D. Professor, Subject of Information Security, University of Science and Technology of China, Hefei, China.
(3) Adjunct Ph.D. Professor, School of Network and Information Security, Xidian University, Xi’an, China, 2008-Present.
(4) Senior member, Chinese Institute of Electronics
(5) Senior member, China Computer Federation
(6) Member, Information Security Council of China, E-government and Office Automation, Chinese Information Technology Special Committee
(7) Member, the advisory group of General Administration of Press and Publication’s major science and technology project “Digital Copyright Protection Research and Development”

Publications

   
Papers

1 Insider Threat Detection Using Generative Adversarial Graph Attention Networks, IEEE Global Communications Conference, 2023, 2nd author
2 Efficiently Constructing Topology of Dynamic Networks, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2023, 1st author
3 A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2023, 3rd author
4 Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 6th author
5 DP-Opt: Identify High Differential Privacy Violation by Optimization, Wireless Algorithms, Systems, and Applications, 2022, Corresponding author
6 Survey on key technologies of covert channel in ubiquitous network environment, Journal on Communications, 2022, 1st author
7 Detecting conflict of heterogeneous access control policies, DIGITAL COMMUNICATIONS AND NETWORKS, 2022, Corresponding author
8 Multi-level local differential privacy algorithm recommendation framework, Journal on Communications, 2022, 5th author
9 Efficiently Managing Large-Scale Keys in HDFS, IEEE International Conference on High Performance Computing and Communications (HPCC 2021CCF-C), 2021, Corresponding author
10 AdaPDP: Adaptive Personalized Differential Privacy, IEEE Conference on Computer CommunicationsIEEE INFOCOMCCF-A, 2021, Corresponding author
11 Research on cross-domain access control technology, Chinese Journal of Network and Information Security, 2021, 2nd author
12 Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach, Proceedings of ICCS, 2021, 1st author
13 Dynamic security-empowering architecture for space-ground integration information network, Journal on Communications, 2021, 3rd author
14 Utility-aware Exponential Mechanism for Personalized Differential Privacy, 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020, Corresponding author
15 Traffic characteristic based privacy leakage assessment scheme for Android device, Journal on Communications, 2020, 5th author
16 Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs, IEEE WIRELESS COMMUNICATIONS, 2020, 1st author
17 Securing instruction interaction for hierarchical management, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 1st author
18 Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? IEEE International Conference on Communications (ICC), 2020, 4th author
19 A Framework to Preserve User Privacy for Machine Learning as a Service, IEEE Global Communications Conference, 2020, Corresponding author
20 Dynamically Empowering Security for Space-Terrestrial Integrated Information Network, Radio Communications Technology 2020, 1st author
21 Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission, WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 5th author
22 Exploiting location-related behaviors without the GPS data on smartphones, INFORMATION SCIENCES, 2020, 1st author
23 Research on Space-Ground Network Security Guarantee Technology, Space-Integrated-Ground Information Networks, 2020, 1st author
24 Construction of academic discipline of science and engineering and orientation for their ranking under the new situation, Chinese Journal of Network and Information Security, 2020, 1st author
25 Dynamic countermeasures selection for multi-path attacks, COMPUTERS & SECURITY, 2020, 1st author
26 An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks, 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, 1st author
27 HideMe: Privacy-Preserving Photo Sharing on Social Networks, IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, 1st author
28 Hierarchical scalable storage architecture for massive electronic bill, Journal on Communications, 2019, 1st author
29 Privacy Computing: Concept, Computing Framework, and Future Development Trends, ENGINEERING, 2019, 1st author
30 A game theoretic approach to cooperative intrusion detection, JOURNAL OF COMPUTATIONAL SCIENCE, 2019, Corresponding author
31 Collection policy refining method for threat monitoring in complex network environment, Journal on Communications, 2019, 1st author
32 Risk assessing and privacy-preserving scheme for privacy leakage in APP, Journal on Communications, 2019, 3rd author
33  Research on Optimizing Security Control Mechanism of Networked System Based on Stackelberg Defender-Attacker Game, Cyber Security, 2019, 6th author
34 High-performance and high-concurrency encryption scheme for Hadoop platform, Journal on Communications, 2019, 3rd author
35 Privacy Computing: Concept, Computing Framework, and Future Development Trends, Privacy Computing: Concept, Computing Framework, and Future Development Trends, ENGINEERING, 2019, 1st author
36 Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies, IEEE INTERNET OF THINGS JOURNAL, 2019, 1st author
37 Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks, 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019, 6th author
38 Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach, COMPUTATIONAL SCIENCE - ICCS 2019, PT I, 2019, 5th author
39Fuzzy evaluation for response effectiveness in cases of incomplete information, Journal on Communications, 2019, 1st author
40 Security Measurement for Unknown Threats Based on Attack Preferences, SECURITY AND COMMUNICATION NETWORKS, 2018, 5th author
41 A game-theoretic approach to advertisement dissemination in ephemeral networks, WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 3rd author
42 SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, Elsevier Engineering, 2018, 1st author
43 UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks, SECURITY AND COMMUNICATION NETWORKS, 2018, 4th author
44 Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach, 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2018, 4th author
45 2-MR: A Two-Phase MapReduce Approach for Incremental Replication, International Conference on Big data Technologies (ICBDT 2018), 2018, 1st author
46 Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services, 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018, 1st author
47 DESC: enabling secure data exchange based on smart contracts, SCIENCE CHINA-INFORMATION SCIENCES, 2018, 7th author
48 Cross-network access control mechanism for complex network environment, Journal on Communications, 2018, 1st author
49 Resolving Access Conflicts: an Auction-based Incentive Approach, 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, Corresponding author
50 Privacy-preserving Partner Selection for Ride-sharing Services, IEEE Transactions on Vehicular Technology, 2018, 1st author
51 Real-time Data Incentives for IoT Searches, 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018, Corresponding author
52 Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System, 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018, 1st author
53 Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach, COMPUTATIONAL SCIENCE - ICCS 2018, PT I, 2018, Corresponding author
54 Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 5th author
55 Research Progress of Photo Privacy-Preserving Mechanisms in Online Social Network, Cyber Security, 2018, 1st author
56 SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, ENGINEERING, 2018, 1st author
57 Privacy-Prese ving Partner Selection for Ride-Sharing Services, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 5th author
58 Cloud outsourcing secret sharing scheme against covert adversaries, Journal on Communications, 2017, 6th author
59 A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks, NETWORK AND SYSTEM SECURITY, 2017, 5th author
60 Impact Factor-Based Group Recommendation Scheme with Privacy Preservation in MSNs, 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017, 4th author
61 Pricing Privacy Leakage in Location-Based Service, WASA, 2017, 1st author
62 Small-world: Secure friend matching over physical world and social networks, INFORMATION SCIENCES, 2017, 1st author
63 Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game, ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 4th author
64 Who is Visible: Resolving Access Policy Conflicts in Online Social Networks, GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017, 4th author
65 Cyberspace-Oriented Access Control: Model and Policies, 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, 1st author
66 SRAM: A State-Aware Risk Assessment Model for Intrusion Response, IEEE International Conference on Data Science in CyberspaceDSC, 2017, 1st author
67 A Privacy-Preserving Method for Photo Sharing in Instant Message Systems, International Conference on Cryptography, Security and Privacy, 2017, 1st author
68 Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field, IEEE International Symposium on UbiSafe Computing(UbiSafe), 2017, 1st author
69 Server-aided private set intersection based on reputation, INFORMATION SCIENCES, 2017, Corresponding author
70 TrackU: Exploiting User's Mobility Behavior via WiFi List, GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017, 1st author
71 Spectral-clustering-based abnormal permission assignments hunting framework, Journal on Communications, 2017, 3rd author
72 Pricing Privacy Leakage in Location-Based Services, WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 1st author
73 A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks, IEEE Wireless Communications and Network Conference, 2016, 1st author
74 Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information, International Conference on Computing, Networking and Communication, 2016, Corresponding author
75Research status and development trends of security assurance for space-ground integration information network, Journal on Communications, 2016, 1st author
76 Achieving Secure and Accurate Friend Discovery Based on Friend-of-Friend's Recommendations, 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, 2nd author
77 Hunting Abnormal Configurations for Permission-Sensitive Role Mining, IEEE Military Communications Conference, 2016, 5th author
78Research progress on secure data deduplication in cloud, Journal on Communications, 2016, 3rd author
79 Privacy computing:concept,connotation and its research trend, Journal on Communications, 2016, 1st author
80Novel cyberspace-oriented access control model, Journal on Communications, 2016, 1st author
81 Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends Recommendation, International Conference on Computing, Networking and Communication, 2016, 1st author
82 Time Obfucation-Based Privacy-Preserving Scheme for Location-Based Services, IEEE Wireless Communications and Networking Conference(WCNC 2016), 2016, 1st author
83 Role and Time-based Access Control with Efficient Revocation for Cloud Storage, 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, Corresponding author
84 An IPv6 Routing Lookup Algorithm Using Weight-balanced Tree based on Prefix Value for Virtual Router, FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2016, 4th author
85  Research progress on cloud data assured deletion based on cryptography, Journal on Communications, 2016, 2nd author
86 A Network Monitor for HTTPS Protocol based on Proxy, FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2016, 4th author
87 Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage, INTERNATIONALCONFERENCEONCOMPUTINGNETWORKINGANDCOMMUNICATION, 2016, Corresponding author
88Proxy-based privacy-preserving scheme for mobile Internet, Journal on Communications, 2015, 2nd author
89 Public key encryption with multi-keywords search, Journal of Xidian University, 2015, 2nd author
90Efficient scheme for users trajectory privacy, Journal on Communications, 2015, 1st author
91 Achieving Secure Friend Discovery in Social Strength-Aware PMSNs, IEEE Military Communications Conference, 2015, Corresponding author
92 UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks, Proceedings of the IEEE International Conference on Communications(ICC 2015), 2015, Corresponding author
93 Privacy-Preserving Strategies in Service Quality Aware Location-Based Services, IEEE International Conference on Communications, 2015, 1st author
94 Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, Corresponding author
95 A full lifecycle privacy protection scheme for sensitive data in cloud computing, PEE, 2015, 2nd author
96 Multidimensional digital media-oriented access control scheme, Journal on Communications, 2015, 2nd author
97 Achieving Lightweight and Secure Access Control in Multi-Authority Cloud, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, Corresponding author
98 Bloom filter-based lightweight private matching scheme, Journal on Communications, 2015, 3rd author
99 CL-TAP: An Efficient Certificate less Based Trusted Access Protocol for WLAN, CHINESE JOURNAL OF ELECTRONICS, 2014, 2nd author
100 A User-based Document Management Mechanism in Cloud, 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, 3rd author
101A Secure Self-Destruction Scheme for Composite Documents with Attribute Based Encryption, Acta Electronica Sinica, 2014, 4th author
102 A Secure Self-Destruction Scheme with IBE for the Internet Content Privacy, Chinese Journal of Computers, 2014, 4th author
103 A Reliable Supervision Model and Implementation for the Trading of Digital Works, 2014, 1st author
104 Secure and Privacy-Preserving Data Storage Service in Public Cloud, Journal of Computer Research and Development, 2014, 2nd author

105 An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application, THE SCIENTIFIC WORLD JOURNAL, 2014, 2nd author
106 Action-Based Multi-level Access Control Model, Journal of Computer Research and Development, 2014, 2nd author
107 Network isolation communication scheme to resist against covert channel, Journal on Communications, 2014, 1st author
108 Survey on security and privacy preserving for mobile internet service, Journal on Communications, 2014, 2nd author
109 FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation, In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, 2013, Corresponding author
110 Action-Based Multilevel Access Control for Structured Document, Journal of Computer Research and Development, 2013, 4th author
111 Video Steganography with Multi-path Motion Estimation, MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013, 2013, 
112 An improved attack on clock-controlled shift register based on hardware implementation, SCIENCE CHINA-INFORMATION SCIENCES, 2013, 1st author
113 Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 5th author
114 An Action-based Access Control Model Implementation for MLS Information Systems, 2012, 1st author
115 General Purpose Framework Designing for Network Security Test Devices Based on Multi-core Processor, 2012, 2nd author
116 An Action Based Access Control Model for Multi-level Security, INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 2nd author
117 The Research on QDI Random Path Swapping, Acta Electronica Sinica, 2012, 4th author
118 Action Based Access Control Model for Multi-level Security (MLS), In Proceedings of the 2012 International Conference on Information Security and Assurance (ISA 2012), 2012, 1st author

Patents

[1] 李凤华多用户数据流转控制与处理方法、装置、设备及介质. CN114866514B, 2023-02-28.
[2] 李凤华, 李晖, 谢绒娜, 张玲翠, 牛犇多方的数据安全计算方法、装置、电子设备和存储介质. CN114866317B, 2023-01-10.

[3] 王竹, 杨思琦, 李凤华一种电子凭据的防伪方法、装置、电子设备及存储介质. CN: CN113849860A, 2021-12-28.

[4] 李凤华, 房梁, 李子孚, 郭云川, 耿魁, 张玲翠, 陈操泛在网络拓扑图构建方法及网络安全防护方法. CN113824643A, 2021-12-21.

[5] 李子孚, 房梁, 李凤华, 张玲翠, 郭云川采集策略冲突检测方法、装置、电子设备和存储介质. CN111756691B, 2021-10-08.

[6] 李凤华, 冷斯远, 房梁, 李子孚, 张玲翠, 谢应科网络威胁感知系统及方法. CN113271318B, 2021-09-21.

[7] 李凤华, 陈佩, 张林杰, 房梁, 李子孚, 耿魁威胁驱动的协同采集方法及装置. CN111865899B, 2021-07-13.

[8] 李勇俊, 郭云川, 李凤华, 房梁一种链路洪泛攻击防护方法及装置. CN111726338B, 2021-07-13.

[9] 李凤华, 寇文龙, 耿魁, 曹晓刚, 谢绒娜一种支持差异化可协商的并行数据通信方法及装置. CN112994851A, 2021-06-18.

[10] 李凤华, 张玲翠, 郭云川一种网络安全防护方法及系统. CN111756692B, 2021-05-14.

[11] 牛犇, 李凤华, 张立坤, 陈亚虹面向联邦学习的隐私保护方法及装置. CN112668044A, 2021-04-16.

[12] 李晖, 王瑞, 李效光, 闫皓楠, 王靖仁, 萧明炽, 赵兴文, 李凤华一种智能模型信息泄漏程度评估方法、系统、介质、设备. CN112269987A, 2021-01-26.

[13] 李晖, 李效光, 闫皓楠, 王靖仁, 王瑞, 戴睿, 赵兴文, 李凤华模型提取攻击的动态防御方法、系统、介质、设备及应用. CN112269988A, 2021-01-26.

[14] 李凤华, 牛犇, 陈亚虹, 何媛媛一种基于匿名的位置隐私保护方法及装置. CN109067750B, 2020-12-29.

[15] 李凤华, 牛犇, 尹沛捷, 李晖一种轨迹数据处理方法及系统. CN111723166A, 2020-09-29.

[16] 李凤华, 诸天逸, 郭云川, 房梁, 成林一种跨域访问策略优化方法及装置. CN111611324A, 2020-09-01.

[17] 牛犇, 李凤华, 陈亚虹, 耿魁用于图像识别的隐私保护方法、装置和电子设备. CN111582284A, 2020-08-25.

[18] 牛犇, 李凤华, 陈亚虹, 毕文卿, 耿魁一种基于采样的个性化差分隐私保护方法及系统. CN111414641A, 2020-07-14.

[19] 牛犇, 李凤华, 陈亚虹, 毕文卿, 耿魁一种基于指数机制的个性化差分隐私保护方法及系统. CN111400755A, 2020-07-10.

[20] 李凤华, 牛犇, 何媛媛, 尹沛捷一种群组隐私信息发现方法及系统. CN110569655A, 2019-12-13.

[21] 李凤华, 牛犇, 杨志东, 王新宇一种基于隐私泄露评估的隐私信息保护方法及系统. CN110519218A, 2019-11-29.

[22] 李凤华, 张玲翠, 郭云川, 耿魁, 房梁, 李晖一种网络安全防护方法及系统. CN110493266A, 2019-11-22.

[23] 李凤华, 陈黎丽, 郭云川, 王震, 张玲翠采集代理部署方法及装置. CN110430158A, 2019-11-08.

[24] 郭云川, 李凤华, 李凌, 李勇俊, 耿魁, 房梁一种设备安全策略的配置方法及装置. CN110348201A, 2019-10-18.

[25] 郭云川, 李凤华, 张晗, 李勇俊, 房梁, 张玲翠入侵响应策略生成方法及装置. CN110290122A, 2019-09-27.

[26] 李凤华, 李勇俊, 郭云川, 杨正坤, 房梁, 冷斯远入侵响应措施确定方法及装置. CN110233845A, 2019-09-13.

[27] 王震, 李凤华, 段晨健, 郭云川一种网络系统漏洞风险评估方法及装置. CN110191120A, 2019-08-30.

[28] 李凤华, 牛犇, 贺坤, 王新宇. Android智能终端隐私保护方法及装置. CN110110544A, 2019-08-09.

[29] 李凤华, 牛犇, 王新宇, 李晖一种隐私泄漏风险评估方法及装置. CN109753808A, 2019-05-14.

[30] 李凤华, 王竹, 李子孚, 耿魁, 李莉一种基于外部威胁的采集策略生成方法及系统. CN109714312A, 2019-05-03.

[31] 李凤华, 耿魁, 李勇俊一种网络中的威胁处置管理方法及系统. CN109698819A, 2019-04-30.

[32] 李凤华, 李子孚, 殷丽华, 房梁, 陈黎丽一种数据协同采集方法及系统. CN109688106A, 2019-04-26.

[33] 李凤华, 张玲翠, 李莉, 周曙光一种威胁报警信息生成方法及系统. CN109688105A, 2019-04-26.

[34] 牛犇, 李凤华, 耿魁, 李晖, 陈亚虹一种个性化隐私保护方法及装置. CN109684865A, 2019-04-26.

[35] 李凤华, 谢绒娜, 张玲翠, 金伟, 李莉一种基于采集数据异常的采集策略生成方法及系统. CN109639648A, 2019-04-16.

[36] 李凤华, 郭云川, 金伟, 房梁, 殷丽华一种数据按需汇聚方法及装置. CN109618371A, 2019-04-12.

[37] 李凤华, 殷丽华, 郭云川, 房梁, 王竹一种数据实时汇聚方法及系统. CN109558442A, 2019-04-02.

[38] 牛犇, 李凤华, 陈亚虹位置隐私保护方法及装置. CN109525933A, 2019-03-26.

[39] 李凤华, 谢绒娜, 张玲翠一种网络中的威胁处置效果的确定方法及系统. CN109510828A, 2019-03-22.

[40] 李凤华, 郭云川, 耿魁, 谢绒娜一种汇聚节点的部署方法及装置. CN109495304A, 2019-03-19.

[41] 李凤华, 房梁, 郭云川, 单芳芳一种数据传输方法、接收方法、装置及系统. CN109462591A, 2019-03-12.

[42] 李凤华, 耿魁, 张玲翠网络通信加密解密方法及电子设备. CN109450852A, 2019-03-08.

[43] 李凤华, 李勇俊, 耿魁, 房梁一种网络中的威胁处置策略分解方法及系统. CN109413088A, 2019-03-01.

[44] 李凤华, 张玲翠, 耿魁一种网络中的威胁处置策略生成方法及系统. CN109361690A, 2019-02-19.

[45] 李凤华, 牛犇, 王瀚仪, 耿魁, 王竹一种位置隐私保护方法及装置. CN109121133A, 2019-01-01.

[46] 李凤华, 牛犇, 孙哲, 何媛媛, 房梁, 王震, 陈佩一种图像隐私保护方法及系统. CN108197453A, 2018-06-22.

[47] 李凤华, 谈苗苗, 赵甫, 李昕, 耿魁, 刘振权一种抗隐蔽通道的信息隔离方法及装置. CN104270222A, 2015-01-07.

[48] 李凤华, 汤帜, 苏铓, 俞银燕, 吴槟, 赵险峰一种超媒体的文档描述方法. CN102929913A, 2013-02-13.

[49] 李凤华, 俞银燕, 苏铓, 汤帜, 赵险峰, 吴槟多维数字媒体的资源使用控制方法及装置. CN102902898A, 2013-01-30.


Collaboration

(1) Ma Jianfeng, The Yangtze River scholar Professor, President of the Shcool of Computer, 973 project consulting expert group expert, Doctoral Supervisor of Computer systems architecture and cryptography.
(2) Xu Jin, Professor, Shcool of Information, Peking University, Doctoral Supervisor of Computer Science and Technology.
(3) Hu Changzhen, Pofessor, Vice president of  Beijing Institute of Technology, Doctoral Supervisor of Computer Science and Technology.
(4) Li Hui, Professor, President of the Shcool of Network and Information Security, Xidian University.

Students

已指导学生

王永科  硕士研究生  081201-计算机系统结构  

张翠  博士研究生  081201-计算机系统结构  

王彦超  博士研究生  081201-计算机系统结构  

陈灵江  硕士研究生  081201-计算机系统结构  

林佳楠  硕士研究生  081201-计算机系统结构  

刘洋鑫  硕士研究生  0812Z1-信息安全  

李宁  硕士研究生  085211-计算机技术  

王新宇  博士研究生  081201-计算机系统结构  

孙哲  博士研究生  0812Z1-信息安全  

何媛媛  博士研究生  081201-计算机系统结构  

余竞洋  硕士研究生  081201-计算机系统结构  

熊芳欣  硕士研究生  085211-计算机技术  

陈天柱  博士研究生  0812Z1-信息安全  

张玲翠  博士研究生  0812Z1-信息安全  

吕梦凡  硕士研究生  081201-计算机系统结构  

田博修  硕士研究生  081202-计算机软件与理论  

王瀚仪  博士研究生  083900-网络空间安全  

金伟  博士研究生  081201-计算机系统结构  

李勇俊  博士研究生  083900-网络空间安全  

李子孚  博士研究生  083900-网络空间安全  

李丁焱  硕士研究生  081201-计算机系统结构  

尹沛捷  博士研究生  083900-网络空间安全  

陈佩  硕士研究生  085211-计算机技术  

李超洋  硕士研究生  083900-网络空间安全  

邵鸿宇  硕士研究生  085211-计算机技术  

郭垚鑫  硕士研究生  085412-网络与信息安全  

诸天逸  硕士研究生  083900-网络空间安全  

现指导学生

冷斯远  博士研究生  083900-网络空间安全  

罗海洋  博士研究生  083900-网络空间安全  

陈操  博士研究生  083900-网络空间安全  

田敏求  博士研究生  083900-网络空间安全  

田月池  博士研究生  083900-网络空间安全  

曹晓刚  博士研究生  083900-网络空间安全  

李恒  博士研究生  083900-网络空间安全  

杨浚海  博士研究生  083900-网络空间安全  

文一通  博士研究生  083900-网络空间安全  

郭守坤  博士研究生  083900-网络空间安全  

鲁育铭  硕士研究生  083900-网络空间安全  

邝彬  博士研究生  083900-网络空间安全  

许金波  博士研究生  083900-网络空间安全  

张晶辉  博士研究生  083900-网络空间安全  

彭知源  硕士研究生  085400-电子信息  

张芊龙  博士研究生  083900-网络空间安全  

乐浩天  硕士研究生  081201-计算机系统结构  

吴玥  硕士研究生  083900-网络空间安全