General
李凤华 男 汉族 博导 信息工程研究所
Email: lifenghua@iie.ac.cn
Telephone: 010-82546866
Address: 北京市海淀区闵庄路甲89号
Postcode: 100195

Research Areas

Access Control, Network and System Security, Distributed Information System Security, Database Security etc.

Education

Ph.D., Computer Systems architecture, Xidian University, Xi’an, China, June 2009.
M.S., Computer Systems architecture, Xidian University, Xi’an, China, January 1990.
B.S., Computer Software, Xidian University, Xi’an, China, June 1987.

Experience


Work Experience
(1) Professor, Doctoral supervisor, Institute of Information Engineering, Chinese Academy of Science, Beijing, August 2011-Present.
(2) Professor, Beijing Electronic Science and Technology Institute, Beijing, July 1994-August 2011   
(3) Assistant & Lecturer, Xidian University, March 1990-June 1994.

Teaching Experience
   

Honors & Distinctions

(1) Best Paper Award for the paper "Achieving lightweight and secure access control in Multi-authority cloud" (Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu and Fangfang Shan) in the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM), Helsinki, Finland, 20-22 August, 2015.
(2) Adjunct Ph.D. Professor, Subject of Information Security, University of Science and Technology of China, Hefei, China.
(3) Adjunct Ph.D. Professor, School of Network and Information Security, Xidian University, Xi’an, China, 2008-Present.
(4) Senior member, Chinese Institute of Electronics
(5) Senior member, China Computer Federation
(6) Member, Information Security Council of China, E-government and Office Automation, Chinese Information Technology Special Committee
(7) Member, the advisory group of General Administration of Press and Publication’s major science and technology project “Digital Copyright Protection Research and Development”

Publications

   
Papers

Representative Papers: 

[1] Ben Niu, Yuanyuan He, Fenghua Li* and Hui Li. Achieving Secure Friend Discovery in Social Strength-Aware PMSNs. Proceedings of the 34th IEEE Military Communications Conference (MILCOM 2015), Tampa, United States. Otc. 26-28, 2015.
[2] Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu and Fangfang Shan, Achieving lightweight and secure access control in Multi-authority cloud, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , 2015. (TRUSTCOM2015) (Best Paper Award)
[3] Weihao Li, Ben Niu*, Hui Li, Fenghua Li. Privacy-preserving strategies in service quality aware location-based services. IEEE International Conference on Communications (ICC2015), London, UK. June. 8-12, 2015.
[4] Jin Cao, Hui Li, Maode Ma and Fenghua Li*. UGHA: uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. IEEE International Conference on Communications (ICC2015), London, UK. June. 8-12, 2015.
[5] Su Mang, Li Fenghua*, Shi Guozhen, Geng Kui, Xiong Jinbo, A user-centric data secure creation scheme in cloud computing, Chinese Journal of Electronics, to appear. 
[6] Su Mang, Li Fenghua*, Tang Zhi, Yu Yinyan, Zhou Bo. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application [J]. The Scientific World Journal, 2014: 1-13. 
[7] MA Zhuo*, LI Fenghua, MA Jianfeng and JI Wenjiang. CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN [J]. Chinese Journal of Electronics, 2014, 23(1): 142-146. 
[8] Shi Guozhen, Shen Ying, Li Fenghua. Research on Credible Regulation Mechanism for the Trading of Digital Works. Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Sep. 24-26, 2014, pp. 484-488.
[9] Boyand Wang*, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li. Preserving identity privacy on multi-owner cloud data during public verification[J]. Security and Communication Networks (SCN), 2014, 7(11): 2104-2113.
[10] MA Zhuo*, LI Fenghua, MA Jianfeng and JI Wenjiang. CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN[J]. Chinese Journal of Electronics, 2014, 23(1): 142-146.
[11] Su Mang, Li Fenghua*, Shi Guozhen. Action-Based Multi-level Access Control Model, Journal of Computer Research and Development, 2014, 51(7): 1604-1613.
[12] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao*, Patrick S. Chen. A full lifecycle privacy protection scheme for sensitive data in cloud computing [J]. Peer-to-Peer Networking and Applications (Peer-to-Peer Netw. Appl). June 20. 2014 .
[13] Shi Guozhen, Su Mang, Li Fenghua, Lou Jiapeng, Qiong Huang. A User-based Document Management Mechanism in Cloud, International Conference on Computational Intelligence and Security (CIS). Kunming, China. Nov. 15-16, 2014. pp. 377-381. 
[14] Kede Ma*, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8(3): 553-562. 
[15] Xiaocheng Hu, Weiming Zhang*, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li. Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8(5): 779-788. 
[16] Lei Li*, Xianghui Liu, Zheng Wang, Fenghua Li. An improved attack on clock-controlled shift registers based on hardware implementation[J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56(11): 1-10. 
[17] Boyang Wang, Baochun Li, Hui Li and Fenghua Li. Certificateless public auditing for data integrity in the cloud. IEEE Conference on Communications and Network Security (CNS), Washington, United states. Oct. 14-16, 2013. pp. 136-144.
[18] Yun Cao, Xianfeng Zhao, Fenghua Li, Nenghai Yu. Video steganography with multipath motion estimation. Proceedings of SPIE-The International Society for Optical Engineering (Proc SPIE Int Soc Opt Eng), Burlingame, United states. Feb. 5-7, 2013, pp. 86650K1-6. 
[19] SU Mang, SHI Guozhen, LI Fenghua, SHEN Ying, HUANG Qiong, WANG Miao-miao, Fine-grained description model and implementation of hypermedia document. Journal on Communications, 2013, 08, 34(z1): 223-229.
[20] Xiong Jinbo*, Yao Zhiqiang, Ma Jianfeng, Li Fenghua, Li Qi. Action-Based Multilevel Access Control for Structured Document. Journal of Computer Research and Development, 2013, 50(7): 1399-1408. 
[21] LI Fenghua, SHI Guozhen, ZHANG Jinghui, LI Li. Application of action-based access control model to multilevel security information systems. COMPUTER ENGINEERING AND DESIGN. 2012, 33(1): 106 - 110.
[22] Fenghua Li*, Guozhen Shi, Jinghui Zhang, Li Li. An Action-Based Access Control Model Implementation for MLS Information Systems. International Conference on Computer Application and System Modeling (ICCASM), Shenyang, China. Jul. 27-29, 2012. pp. 1080-1083. 
[23] QIU Qin*, TANG Zhi, LI Fenghua, YU Yinyan. A Personal DRM Scheme Based on Social Trust[J]. Chinese Journal of Electronics, 2012, 21(4): 719-724.
[24] Mang Su*, Fenghua Li, Guozhen Shi, Li Li. An Action Based Access Control Model for Multi-level Security [J]. International Journal of Security and Its Applications (Int. J. Secur. Appl), 2012, 6(2): 359-366.
[25] Li Fenghua*, Su Mang, Shi Guozhen, Ma Jianfeng. Research Status and Development Trends of Access Control Model. ACTA ELECTRONICA SINICA, 2012, 40(4): 805-813. 
[26] Su Mang*, Li Fenghua, Shi Guozhen, Li Li. Representation model of structured document for multilevel security. Journal on Communications, 2012, 33(SUPPL1): 222 - 227. 
[27] Fenghua Li, Wei Wang, Jianfeng Ma and Haoxin Su. Action-Based Access Control for Web Services. Journal of Information Assurance and Security, 2010, 05. 162 - 170. 
[28] LI Fenghua*, YAN Junzhi, XIE Rongna, MA Jianfeng. Research on the Programming Language for Symmetric Cryptographic Algorithms[J]. Chinese Journal of Electronics, 2010, 19(2): 303-306.
[29] Junzhi YAN*, Jianfeng MA, Fenghua LI, SangJae Moon. Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks[J]. AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10(2-3): 235-251. 
[30] YAO Zhiqiang*, PAN Rijing, LI Fenghua, WENG Bin. A Mesh Partitioning Approach for 3D Mesh Oblivious Watermarking[J]. Chinese Journal of Electronics, 2010, 19(4): 651-655.
[31] Fenghua Li*, Wei Wang, Jianfeng Ma and Haoxin Su. Action-Based Access Control for Web Services. International Conference on Information Assurance and Security (IAS), Xi’an, China. Aug. 18-20, 2009. pp. 637-642. 
[32] LI Fenghua*, WANG Wei, MA Jianfeng, LIU Hongyue. Access control model and its application for collaborative information systems[J]. Journal on Communications, 2008, 29(9): 116-123. 
[33] LI Fenghua*, WANG Wei, MA Jianfeng and SangJae Moon. Action-Based Access Control model [J]. Chinese Journal of Electronics, 2008, 17(3): 396-401.
[34] LI Fenghua*, WANG Wei, MA Jianfeng , LIANG Xiaoyan. Action-Based Access Control Model and Administration of Actions. ACTA ELECTRONICA SINICA, 2008, 36(10): 1881-1890. 
 

Patents

[1] XXXXX. 申请号:201418000933.1。
[2] XXXXX. 申请号:201418005614.X。
[3] XXXXX. 申请号:201418009902.2。
[4] 李凤华,马建峰,王巍,丁振国. 可信平台模块TPM的体系系统及其提供服务的方法. 申请时间:2007.12.14,申请号:200710199230.5,授权公告日:2010.06.02,专利号:ZL200710199230.5。
[5] 李凤华,马建峰,李晖,王九林,孙春辉,阎军智,史国振,马卓. 支持线程级加解密的密码处理器及其密码运算操作方法. 申请时间:2008.12.15,申请号:200810232656.0,授权公告日:2012.03.28,专利号:ZL200810232656.0。
[6] 李凤华,史国振,李冬冬,李莉,苏铓,张晶辉,胡波. 一种IDS的检测方法及检测设备. 申请时间:2011.06.17,申请号:201110163258.X,授权公告日:2014.04.19,公开号:ZL201110163258.X。
[7] 李凤华,史国振,苏铓,谢绒娜,姚栋. 一种VPN设备的检测方法及检测系统. 申请时间:2011.10.18,申请号:201110316958.8,授权公告日:2014.04.02,公开号:ZL201110316958.8。
[8] 李凤华,汤帜,苏铓,俞银燕,吴槟,赵险峰. 一种超媒体的文档描述方法. 申请时间:2012.09.18,申请号:201210347861.8,公开时间:2013.02.13,公开号:CN102929913。
[9] 李凤华,俞银燕,苏铓,汤帜,赵险峰,吴槟. 多维数字媒体的资源使用控制方法及装置. 申请时间:2012.09.21,申请号:201210356902.X,公开时间:2013.01.30,公开号:CN102902898。
[10] 李凤华,冯玉才,史国振,付铨. 数据库数据加解密方法及装置. 申请时间:2013.05.22,申请号:201310192660.X,公开时间:2013.09.04,公开号:CN103279715。
[11] 李凤华,史国振,李晖. 一种业务数据的处理方法及系统. 申请时间:2013.06.03,申请号:201310217799.5,公开时间:2013.10.02,公开号:CN103338230。
[12] 李凤华,史国振,李晖,李莉. 一种支持并行运行算法的数据处理方法及装置. 申请时间:2013.08.30,申请号:201310389237.9,公开时间:2013.12.11,公开号:CN103440227。
[13] 李凤华,李晖,曹进,马建峰,张明星,耿魁. 一种通信网络中的节点发现方法及系统. 申请时间:2013.12.24,申请号:201310723937.7,公开时间:2014.04.02,公开号:CN103701700。
[14] 李凤华,冯玉才,史国振,付铨. 一种访问控制方法和装置. 申请时间:2014.01.03,申请号:201410003581.4,公开时间:2014.06.11,公开号:CN103853986。
[15] 李凤华,谈苗苗,赵甫,李昕,耿魁,刘振权. 一种抗隐蔽通道的信息隔离方法及装置. 申请时间:2014.07.28,申请号:201410363940.7,公开时间:2015.01.07,公开号:CN104270222。
[16] 李凤华,李莉,李晖,耿魁,史国振. 一种算法数据处理的同步方法及装置. 申请时间:2014.10.16,申请号:201410550488.5,公开时间:2015.03.04,公开号:CN104391751。
[17] 李凤华,谢绒娜,李晖,史国振. 一种通用的访问控制方法及装置. 申请时间:2015.05.29,申请号:201510289325.0,公开时间:2015.09.16,公开号:CN 104917761。

Research Interests

   

Conferences

   

Collaboration

(1) Ma Jianfeng, The Yangtze River scholar Professor, President of the Shcool of Computer, 973 project consulting expert group expert, Doctoral Supervisor of Computer systems architecture and cryptography.
(2) Xu Jin, Professor, Shcool of Information, Peking University, Doctoral Supervisor of Computer Science and Technology.
(3) Hu Changzhen, Pofessor, Vice president of  Beijing Institute of Technology, Doctoral Supervisor of Computer Science and Technology.
(4) Li Hui, Professor, President of the Shcool of Network and Information Security, Xidian University.

Students

已指导学生

王永科  硕士研究生  081201-计算机系统结构  

张翠  博士研究生  081201-计算机系统结构  

王彦超  博士研究生  081201-计算机系统结构  

陈灵江  硕士研究生  081201-计算机系统结构  

林佳楠  硕士研究生  081201-计算机系统结构  

刘洋鑫  硕士研究生  0812Z1-信息安全  

李宁  硕士研究生  085211-计算机技术  

王新宇  博士研究生  081201-计算机系统结构  

孙哲  博士研究生  0812Z1-信息安全  

何媛媛  博士研究生  081201-计算机系统结构  

余竞洋  硕士研究生  081201-计算机系统结构  

熊芳欣  硕士研究生  085211-计算机技术  

吕梦凡  硕士研究生  081201-计算机系统结构  

田博修  硕士研究生  081202-计算机软件与理论  

李丁焱  硕士研究生  081201-计算机系统结构  

现指导学生

陈天柱  博士研究生  0812Z1-信息安全  

张玲翠  博士研究生  0812Z1-信息安全  

王瀚仪  博士研究生  083900-网络空间安全  

金伟  博士研究生  081201-计算机系统结构  

李勇俊  博士研究生  083900-网络空间安全  

李子孚  博士研究生  083900-网络空间安全  

诸天逸  博士研究生  083900-网络空间安全  

尹沛捷  博士研究生  083900-网络空间安全  

陈佩  硕士研究生  085211-计算机技术  

杨志东  硕士研究生  085211-计算机技术  

冷斯远  博士研究生  083900-网络空间安全  

曹晓刚  硕士研究生  083900-网络空间安全