基本信息
王思叶  女  硕导  中国科学院信息工程研究所
电子邮件: wangsiye@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号
邮政编码: 100093

招生信息

   
招生专业
083900-网络空间安全
招生方向
物联网安全

教育背景

2011-09--2023-01   北京交通大学   博士
2003-09--2006-03   上海交通大学   工学硕士
1999-09--2003-07   北京科技大学   工学学士

工作经历

   
工作简历
2012-01~现在, 中国科学院信息工程研究所, 高级工程师
社会兼职
2015-05-14-今,中国保密协会科学技术分会,

教授课程

保密技术
信号安全与目标识别
保密技术发展研讨

专利与奖励

   
奖励信息
(1) 省部级三等奖, 三等奖, 部委级, 2021
(2) 省部级科技三等奖, 三等奖, 部委级, 2021
(3) 省部级科技一等奖, 一等奖, 部委级, 2020
(4) 省部级科技三等奖, 三等奖, 部委级, 2018
(5) 省部级二等奖, 二等奖, 部委级, 2017
(6) 省部级二等奖, 三等奖, 部委级, 2013
(7) 省部级二等奖, 二等奖, 部委级, 2012
(8) 省部级二等奖, 二等奖, 部委级, 2008
专利成果
( 1 ) 克隆标签的检测方法及装置, 发明专利, 2022, 第 5 作者, 专利号: CN114154523A

( 2 ) 一种基于RFID和视觉融合的室内监控方法及系统, 发明专利, 2022, 第 7 作者, 专利号: CN113988228A

( 3 ) 一种RFID辅助多摄像头检测跟踪的室内监控方法及系统, 发明专利, 2022, 第 7 作者, 专利号: CN113962338A

( 4 ) 一种基于RFID和摄像机的人员定位方法及系统, 发明专利, 2021, 第 7 作者, 专利号: CN113705376A

( 5 ) 一种目标物体的行为检测方法及系统, 专利授权, 2019, 第 3 作者, 专利号: CN109308782A

( 6 ) 一种RFID双向认证方法, 专利授权, 2019, 第 1 作者, 专利号: CN109190725A

( 7 ) 针对CD‑ROM光盘介质的读写管控系统, 专利授权, 2017, 第 3 作者, 专利号: CN107240408A

( 8 ) 一种室内定位方法及室内定位系统, 专利授权, 2017, 第 2 作者, 专利号: CN106842123A

( 9 ) 基于RFID与摄像头的物品监控取证系统及方法, 发明专利, 2016, 第 3 作者, 专利号: CN105844832A

( 10 ) 基于射频识别的电子标签运动方向判断方法和系统, 专利授权, 2016, 第 1 作者, 专利号: CN105844191A

( 11 ) 一种基于条码技术的电子文档管理系统及方法, 发明专利, 2016, 第 3 作者, 专利号: CN105654273A

( 12 ) RFID中间件及RFID数据传输实现方法, 发明专利, 2016, 第 3 作者, 专利号: CN105631376A

( 13 ) 一种医院病案的监控方法及系统, 发明专利, 2016, 第 3 作者, 专利号: CN105631789A

( 14 ) 一种会议室文件监控方法及系统, 发明专利, 2015, 第 2 作者, 专利号: CN104881731A

( 15 ) 一种隔声性能检测系统, 发明专利, 2015, 第 4 作者, 专利号: CN104849352A

( 16 ) 一种二维码编码及解码方法, 发明专利, 2015, 第 3 作者, 专利号: CN104573781A

( 17 ) 一种一维条码编码及解码方法, 发明专利, 2015, 第 3 作者, 专利号: CN104573782A

( 18 ) 基于GIS的物品运动轨迹分析方法及装置, 发明专利, 2015, 第 3 作者, 专利号: CN104537325A

( 19 ) 基于Trivium算法的数据传输加密和解密的方法, 发明专利, 2015, 第 1 作者, 专利号: CN104506318A

( 20 ) 对USB Key验证、读取、加密、解密的方法, 发明专利, 2015, 第 1 作者, 专利号: CN104504322A

( 21 ) 局域网内移动介质及其电子文件流转轨迹跟踪方法及系统, 发明专利, 2015, 第 1 作者, 专利号: CN104298930A

( 22 ) 一种基于有源和无源的RFID数据采集和监控的方法, 发明专利, 2014, 第 2 作者, 专利号: CN104166862A

( 23 ) 基于RFID技术的定位方法、系统, 发明专利, 2014, 第 1 作者, 专利号: CN104090263A

( 24 ) 数据过滤方法和数据过滤系统, 发明专利, 2014, 第 2 作者, 专利号: CN104091138A

( 25 ) 一种基于RFID技术的大量物品集中监控方法, 发明专利, 2014, 第 2 作者, 专利号: CN104077673A

出版信息

   
发表论文
[1] Shuai Wang, 王思叶, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang. RP-Fusion:Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint. 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2024, 第 2 作者null(null): https://ieeexplore.ieee.org/document/10580694/authors#authors.
[2] Liang, Fei, 王思叶, Cao, Ziwen, Feng, Yue, Jiang,Shang, Zhang, Yanfang. BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on Probability. 2023 IEEE Symposium on Computers and Communications (ISCC). 2023, 第 11 作者https://ieeexplore.ieee.org/document/10218107.
[3] Jianguo Jiang, Shang Jiang, Yi Liu, Siye Wang, Yanfang Zhang, Yue Feng, Ziwen Cao. Wi-Gait: Pushing the limits of robust passive personnel identification using Wi-Fi signals. COMPUTER NETWORKS[J]. 2023, 第 11 作者http://dx.doi.org/10.1016/j.comnet.2023.109751.
[4] 张鹏, 赵晖, 张建强, 王思叶, 汪付强, 朱光慧, 吴晓明. ���������������������. 保密科学技术. 2023, 第 4 作者18-25, http://lib.cqvip.com/Qikan/Article/Detail?id=7109461181.
[5] Liang, Fei, 王思叶, Cao, Ziwen, Feng, Yue, Jiang,Shang, Zhang, Yanfang. BPCluster: An Anomaly Detection Algorithm for RFID Trajectory Based on Probability. 2023 IEEE Symposium on Computers and Communications (ISCC). 2023, 第 2 作者  通讯作者  https://ieeexplore.ieee.org/document/10218107.
[6] Jianguo Jiang, Shang Jiang, Yi Liu, Siye Wang, Yanfang Zhang, Yue Feng, Ziwen Cao. Wi-Gait: Pushing the limits of robust passive personnel identification using Wi-Fi signals. COMPUTER NETWORKS[J]. 2023, 第 4 作者  通讯作者  http://dx.doi.org/10.1016/j.comnet.2023.109751.
[7] 张鹏, 赵晖, 张建强, 王思叶, 汪付强, 朱光慧, 吴晓明. 声掩蔽技术浅析. 保密科学技术. 2023, 第 4 作者18-25, http://lib.cqvip.com/Qikan/Article/Detail?id=7109461181.
[8] Ziwen Cao, Jinxing Xie, Siye Wang, Yanfang Zhang, Yue Cui, Shang Jiang, Biao Jin. An Effective and Robust Method for Unauthorized Reader Detection Based on Tag���s Energy. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING[J]. 2022, 第 3 作者https://doaj.org/article/0459e5e088f347db8eb3c7c4797df0cd.
[9] 江上, 姜建国, 王思叶, 张艳芳, 冯越, 曹子文, 刘毅. RF-Gait: Gait Based Person Identification With COTS RFID. Wireless Communications and Mobile Computing[J]. 2022, 第 3 作者
[10] Ziwen Cao, Jinxing Xie, Siye Wang, Yanfang Zhang, Yue Cui, Shang Jiang, Biao Jin. An Effective and Robust Method for Unauthorized Reader Detection Based on Tag’s Energy. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING[J]. 2022, 第 3 作者https://doaj.org/article/0459e5e088f347db8eb3c7c4797df0cd.
[11] 江上, 姜建国, 王思叶, 张艳芳, 冯越, 曹子文, 刘毅. RF-Gait: Gait Based Person Identification With COTS RFID. Wireless Communications and Mobile Computing[J]. 2022, 第 3 作者
[12] 王思叶. URTracker: unauthorized reader detection and localization using COTS RFID. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 12937 LNCS, p 339-350, 2021, Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Proceedings;. 2021, 第 1 作者
[13] Feng, Yue, Huang, Weiqing, Wang, Siye, Zhang, Yanfang, Jiang, Shang. Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach. COMPUTER NETWORKS[J]. 2021, 第 3 作者189: http://dx.doi.org/10.1016/j.comnet.2021.107922.
[14] 王思叶. URTracker: unauthorized reader detection and localization using COTS RFID. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 12937 LNCS, p 339-350, 2021, Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Proceedings;. 2021, 第 1 作者
[15] Feng, Yue, Huang, Weiqing, Wang, Siye, Zhang, Yanfang, Jiang, Shang. Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach. COMPUTER NETWORKS[J]. 2021, 第 3 作者189: http://dx.doi.org/10.1016/j.comnet.2021.107922.
[16] Zhu, Shaoyi, Huang, Weiqing, Jia, Chenggang, Wang, Siye, Li, Bowen, Zhang, Yanfang. RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2020, 第 4 作者16(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000580874100003.
[17] Huang, Weiqing, Liu, Yi, Zhu, Shaoyi, Wang, Siye, Zhang, Yanfang, IEEE. TSCNN: A 3D Convolutional Activity Recognition Network Based on RFID RSSI. 2020INTERNATIONALJOINTCONFERENCEONNEURALNETWORKSIJCNN. 2020, 第 4 作者
[18] Huang, Weiqing, Zhu, Shaoyi, Wang, Siye, Xie, Jinxing, Zhang, Yanfang, Wen, S, Zomaya, A, Yang, LT. Sparse Representation for Device-Free Human Detection and Localization with COTS RFID. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I. 2020, 第 11 作者11944: 639-654, http://dx.doi.org/10.1007/978-3-030-38991-8_42.
[19] Siye Wang, Ziwen Cao, Yanfang Zhang, Weiqing Huang, Jianguo Jiang. A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 第 11 作者2020: https://doaj.org/article/9ecd3aeeed404fa7b1d21f80a0c621cb.
[20] Zhu, Shaoyi, Huang, Weiqing, Jia, Chenggang, Wang, Siye, Li, Bowen, Zhang, Yanfang. RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2020, 第 4 作者16(4): http://dx.doi.org/10.1145/3399678.
[21] Huang, Weiqing, Liu, Yi, Zhu, Shaoyi, Wang, Siye, Zhang, Yanfang, IEEE. TSCNN: A 3D Convolutional Activity Recognition Network Based on RFID RSSI. 2020INTERNATIONALJOINTCONFERENCEONNEURALNETWORKSIJCNN. 2020, 第 4 作者
[22] Huang, Weiqing, Zhu, Shaoyi, Wang, Siye, Xie, Jinxing, Zhang, Yanfang, Wen, S, Zomaya, A, Yang, LT. Sparse Representation for Device-Free Human Detection and Localization with COTS RFID. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I. 2020, 第 11 作者11944: 639-654, http://dx.doi.org/10.1007/978-3-030-38991-8_42.
[23] Jiang, Jianguo, Jiang, Shang, Zhao, Bobai, Wang, Siye, Cai, Mengnan, Zhang, Yanfang, Qiu, M. CS-Dict: Accurate Indoor Localization with CSI Selective Amplitude and Phase Based Regularized Dictionary Learning. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT II. 2020, 第 4 作者12453: 677-689, 
[24] Siye Wang, Ziwen Cao, Yanfang Zhang, Weiqing Huang, Jianguo Jiang. A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 第 1 作者  通讯作者  2020: https://doaj.org/article/9ecd3aeeed404fa7b1d21f80a0c621cb.
[25] Wang, Siye, Ding, Chang, Huang, Weiqing, Zhang, Yanfang, Jiang, Jianguo, Zhu, Shaoyi, Cui, Yue, Lin, Junyu. Determination of an Indoor Target Position: An Accurate and Adaptable Approach Based on Differential Positioning. INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION[J]. 2019, 第 11 作者2019: https://doaj.org/article/e69631ff3e644bfcb209fdf2fdeaa002.
[26] Zhao, Bobai, Zhu, Dali, Xi, Tong, Wang, Siye, Wu, Di, ACM. Indoor localization based on subcarrier parameter estimation of LoS with Wi-Fi. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19). 2019, 第 4 作者80-89, http://dx.doi.org/10.1145/3360774.3360785.
[27] 王思叶. DCRRDT: A Method for Deployment and Control of RFID Sensors under Digital Twin-driven for Indoor Supervision. International Conference on Algorithms and Architectures for Parallel Processing. 2019, 第 1 作者
[28] 黄伟庆, 张艳芳, 曹籽文, 王思叶. ������������������������RFID������������������������������. 信息安全学报[J]. 2019, 第 4 作者4(3): 93-105, http://lib.cqvip.com/Qikan/Article/Detail?id=7002369087.
[29] Cai, Mengnan, Wang, Siye, Wu, Qinxuan, Jin, Yijia, Shen, Xinling, IEEE. DTCluster: A CFSFDP Improved Algorithm for RFID Trajectory Clustering Under Digital-twin Driven. 2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS). 2019, 第 2 作者
[30] 崔越, 王思叶, 诸邵忆. ���������������������������������������������������������������. 信息安全研究[J]. 2019, 第 2 作者5(7): 586-591, http://lib.cqvip.com/Qikan/Article/Detail?id=7002379683.
[31] Zhao, Bobai, Zhu, Dali, Xi, Tong, Jia, Chenggang, Jiang, Shang, Wang, Siye. Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi. COMPUTER NETWORKS[J]. 2019, 第 11 作者162: http://dx.doi.org/10.1016/j.comnet.2019.106864.
[32] Cai, Mengnan, Wang, Siye, Shen, Xinling, Jin, Yijia, ACM. A scheme for Anomalous RFID Trajectory Detection based on Improved Clustering Algorithm under Digital-Twin-Driven. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19). 2019, 第 2 作者126-134, http://dx.doi.org/10.1145/3360774.3360809.
[33] Siye Wang, Chang Ding, Weiqing Huang, Yanfang Zhang, Jianguo Jiang, Shaoyi Zhu, Yue Cui, Junyu Lin. Determination of an Indoor Target Position: An Accurate and Adaptable Approach Based on Differential Positioning. INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION[J]. 2019, 第 1 作者  通讯作者  2019: https://doaj.org/article/e69631ff3e644bfcb209fdf2fdeaa002.
[34] Zhao, Bobai, Zhu, Dali, Xi, Tong, Wang, Siye, Wu, Di, ACM. Indoor localization based on subcarrier parameter estimation of LoS with Wi-Fi. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19). 2019, 第 4 作者80-89, http://dx.doi.org/10.1145/3360774.3360785.
[35] 王思叶. DCRRDT: A Method for Deployment and Control of RFID Sensors under Digital Twin-driven for Indoor Supervision. International Conference on Algorithms and Architectures for Parallel Processing. 2019, 第 1 作者
[36] 黄伟庆, 张艳芳, 曹籽文, 王思叶. 基于布隆过滤器的RFID数据冗余处理算法研究. 信息安全学报[J]. 2019, 第 4 作者4(3): 93-105, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190307&flag=1.
[37] Cai, Mengnan, Wang, Siye, Wu, Qinxuan, Jin, Yijia, Shen, Xinling, IEEE. DTCluster: A CFSFDP Improved Algorithm for RFID Trajectory Clustering Under Digital-twin Driven. 2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS). 2019, 第 2 作者
[38] 崔越, 王思叶, 诸邵忆. “三叉戟”核潜艇存在严重网络安全隐患的启示. 信息安全研究[J]. 2019, 第 2 作者5(7): 586-591, http://lib.cqvip.com/Qikan/Article/Detail?id=7002379683.
[39] Zhao, Bobai, Zhu, Dali, Xi, Tong, Jia, Chenggang, Jiang, Shang, Wang, Siye. Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi. COMPUTER NETWORKS[J]. 2019, 第 6 作者  通讯作者  162: http://dx.doi.org/10.1016/j.comnet.2019.106864.
[40] Cai, Mengnan, Wang, Siye, Shen, Xinling, Jin, Yijia, ACM. A scheme for Anomalous RFID Trajectory Detection based on Improved Clustering Algorithm under Digital-Twin-Driven. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19). 2019, 第 2 作者126-134, http://dx.doi.org/10.1145/3360774.3360809.
[41] 赵博白, 诸邵忆, 毛锐, 陈超, 黄伟庆, 丁昶, 崔越, 王思叶, 张艳芳. ������������������������������RFID������������������������. 软件学报[J]. 2018, 第 8 作者29(7): 1922-1936, http://lib.cqvip.com/Qikan/Article/Detail?id=675582155.
[42] 姚欣楠, 陈恭亮, 王思叶, 张诗永. ������������������������������������������������. 保密科学技术[J]. 2018, 第 3 作者20-26, http://lib.cqvip.com/Qikan/Article/Detail?id=676053009.
[43] Zhu, Dali, Zhao, Bobai, Wang, Siye. Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter. COMPUTER NETWORKS[J]. 2018, 第 11 作者141: 115-127, http://dx.doi.org/10.1016/j.comnet.2018.05.021.
[44] Zhu Shaoyi, Wang Siye, Zhang Fangtao, Zhang Yanfang, Feng Yue, Huang Weiqing, Wang G, Han Q, Bhuiyan MZA, Ma X, Loulergue F, Li P, Roveri M, Chen L. Environmentally Adaptive Real-time Detection of RFID False Readings in a New Practical Scenario. 2018IEEESMARTWORLDUBIQUITOUSINTELLIGENCECOMPUTINGADVANCEDTRUSTEDCOMPUTINGSCALABLECOMPUTINGCOMMUNICATIONSCLOUDBIGDATACOMPUTINGINTERNETOFPEOPLEANDSMARTCITYINNOVATIONSMARTWORLDSCALCOMUICATCCBDCOMIOPSCI. 2018, 第 2 作者338-345, http://dx.doi.org/10.1109/SmartWorld.2018.00090.
[45] Zhu Dali, Zhao Bobai, Wang Siye, Wu Di, Assoc Comp Machinery. Direct-path based fingerprint extraction algorithm for indoor localization. PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018). 2018, 第 3 作者11-18, http://dx.doi.org/10.1145/3286978.3286993.
[46] Wang, Siye, Zhu, Shaoyi, Zhang, Yanfang, IEEE. Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems. 2018IEEESYMPOSIUMONCOMPUTERSANDCOMMUNICATIONSISCC. 2018, 第 11 作者74-77, 
[47] 赵博白, 诸邵忆, 毛锐, 陈超, 黄伟庆, 丁昶, 崔越, 王思叶, 张艳芳. 基于恶意读写器发现的RFID空口入侵检测技术. 软件学报[J]. 2018, 第 8 作者29(7): 1922-1936, http://lib.cqvip.com/Qikan/Article/Detail?id=675582155.
[48] Zhu, Dali, Zhao, Bobai, Wang, Siye. Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter. COMPUTER NETWORKS[J]. 2018, 第 3 作者  通讯作者  141: 115-127, http://dx.doi.org/10.1016/j.comnet.2018.05.021.
[49] 姚欣楠, 陈恭亮, 王思叶, 张诗永. 基于手机传感器的物体运动状态研究. 保密科学技术[J]. 2018, 第 3 作者20-26, http://lib.cqvip.com/Qikan/Article/Detail?id=676053009.
[50] Zhu Shaoyi, Wang Siye, Zhang Fangtao, Zhang Yanfang, Feng Yue, Huang Weiqing, Wang G, Han Q, Bhuiyan MZA, Ma X, Loulergue F, Li P, Roveri M, Chen L. Environmentally Adaptive Real-time Detection of RFID False Readings in a New Practical Scenario. 2018IEEESMARTWORLDUBIQUITOUSINTELLIGENCECOMPUTINGADVANCEDTRUSTEDCOMPUTINGSCALABLECOMPUTINGCOMMUNICATIONSCLOUDBIGDATACOMPUTINGINTERNETOFPEOPLEANDSMARTCITYINNOVATIONSMARTWORLDSCALCOMUICATCCBDCOMIOPSCI. 2018, 第 2 作者338-345, http://dx.doi.org/10.1109/SmartWorld.2018.00090.
[51] Zhu Dali, Zhao Bobai, Wang Siye, Wu Di, Assoc Comp Machinery. Direct-path based fingerprint extraction algorithm for indoor localization. PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018). 2018, 第 3 作者11-18, http://dx.doi.org/10.1145/3286978.3286993.
[52] Wang, Siye, Zhu, Shaoyi, Zhang, Yanfang, IEEE. Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems. 2018IEEESYMPOSIUMONCOMPUTERSANDCOMMUNICATIONSISCC. 2018, 第 1 作者74-77, 
[53] Li, Min, Fu, Jingjing, Zhang, Yanfang, Zhang, Zhujun, Wang, Siye, Kong, Huafeng, Mao, Rui. An improved searching algorithm for indoor trajectory reconstruction. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2017, 第 5 作者13(11): https://doaj.org/article/3e01d458c92f461d806e3283e0b1e4f5.
[54] 黄伟庆. ������������������������������RFID������������������������������. 软件学报. 2017, 
[55] 王思叶. ������������������������������������. International Journal of Distributed Sensor Networks(IJDSN). 2017, 第 1 作者
[56] Huang Weiqing, Ding Chang, Wang Siye, Lin Junyu, Zhu Shaoyi, Cui Yue, Ma L, Khreishah A, Zhang Y, Yan M. Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 11 作者10251: 546-558, 
[57] 黄伟庆. ������������������������������������������������������������������. The 12th International Conference on Wireless Algorithms, Systems, and Applications. 2017, 
[58] Min Li, Jingjing Fu, Yanfang Zhang, Zhujun Zhang, Siye Wang, Huafeng Kong, Rui Mao. An improved searching algorithm for indoor trajectory reconstruction. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2017, 第 5 作者13(11): https://doaj.org/article/3e01d458c92f461d806e3283e0b1e4f5.
[59] 黄伟庆. 基于恶意读写器发现的RFID空口入侵检测技术研究. 软件学报. 2017, 
[60] 王思叶. 一种室内轨迹重建改进算法. International Journal of Distributed Sensor Networks(IJDSN). 2017, 第 1 作者
[61] Huang Weiqing, Ding Chang, Wang Siye, Lin Junyu, Zhu Shaoyi, Cui Yue, Ma L, Khreishah A, Zhang Y, Yan M. Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 11 作者10251: 546-558, 
[62] 黄伟庆. 一种基于差分定位原理的室内定位算法设计与实现. The 12th International Conference on Wireless Algorithms, Systems, and Applications. 2017, 
[63] Zhu, Dali, Chen, Junhuang, Zhang, Yanfang, Wang, Siye, Kong, Huafeng, IEEE. An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 4 作者1023-1029, 
[64] 张萌, 黄伟庆, 王思叶, 孙德刚. ������������������������������������������. 信息安全研究[J]. 2016, 第 3 作者2(2): 107-116, http://lib.cqvip.com/Qikan/Article/Detail?id=670052623.
[65] 王思叶. ���������������������Trivium���������RFID������������������������. the International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC 2016). 2016, 第 1 作者
[66] 王思叶. ������������DFS���BFS������������������������������������. 11th International Conference on Wireless Algorithm, Systems and Application(WASA). 2016, 第 1 作者
[67] Wu Di, Zhao Dongmei, Feng Weimiao, Wang Siye, Zhang Yu, IEEE. SPIN: An Active Location Verification Scheme for Wireless Sensor Networks. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE. 2016, 第 4 作者120-125, 
[68] Zhu, Dali, Chen, Junhuang, Zhang, Yanfang, Wang, Siye, Kong, Huafeng, IEEE. An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 4 作者1023-1029, 
[69] 张萌, 黄伟庆, 王思叶, 孙德刚. 物理空间信息安全技术发展综述. 信息安全研究[J]. 2016, 第 3 作者2(2): 107-116, http://lib.cqvip.com/Qikan/Article/Detail?id=670052623.
[70] 王思叶. 一种基于增强型Trivium算法的RFID挑战响应鉴别方法. the International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC 2016). 2016, 第 1 作者
[71] 王思叶. 一种基于DFS和BFS的室内轨迹重建增强型算法. 11th International Conference on Wireless Algorithm, Systems and Application(WASA). 2016, 第 1 作者
[72] Wu Di, Zhao Dongmei, Feng Weimiao, Wang Siye, Zhang Yu, IEEE. SPIN: An Active Location Verification Scheme for Wireless Sensor Networks. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE. 2016, 第 4 作者120-125, 
[73] Huang Weiqing, Ding Chang, Wang Siye, Hu Shuang, IEEE. An efficient clustering mining algorithm for indoor moving target trajectory based on the improved AGNES. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1. 2015, 第 3 作者1318-1323, http://dx.doi.org/10.1109/Trustcom-2015.524.
[74] 王思叶. ������������Agnes���������������������������������������������. TrustComm2015. 2015, 第 1 作者
[75] Sun Degang, Wang Hao, Zhang Yanfang, Wang Siye, Gao Li, Xu B. The Design of Efficient and Reliable Data Transmission Mechanism Applied in Vector Control System. 2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC). 2015, 第 4 作者479-483, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000377348700094.
[76] Huang Weiqing, Ding Chang, Wang Siye. A Comprehensive Method to Combine RFID Indoor Targets Positioning with Real Geographic Environment. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2015, 第 3 作者12(4): 1149-1169, https://www.webofscience.com/wos/woscc/full-record/WOS:000366127000002.
[77] 王思叶. ������RFID������������������������������������������������������������. Computer Science and Information Systems. 2015, 第 1 作者
[78] 朱大立, 荣文晶, 王思叶, 庞娜. ������������������������������RFID���������������. 通信学报[J]. 2015, 第 3 作者36(11): 2015188-1, http://lib.cqvip.com/Qikan/Article/Detail?id=666750776.
[79] Huang Weiqing, Ding Chang, Wang Siye, Hu Shuang, IEEE. An efficient clustering mining algorithm for indoor moving target trajectory based on the improved AGNES. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1. 2015, 第 3 作者1318-1323, http://dx.doi.org/10.1109/Trustcom-2015.524.
[80] 王思叶. 基于改进Agnes算法的室内移动目标轨迹汇聚算法. TrustComm2015. 2015, 第 1 作者
[81] Sun Degang, Wang Hao, Zhang Yanfang, Wang Siye, Gao Li, Xu B. The Design of Efficient and Reliable Data Transmission Mechanism Applied in Vector Control System. 2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC). 2015, 第 4 作者479-483, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000377348700094.
[82] Huang Weiqing, Ding Chang, Wang Siye. A Comprehensive Method to Combine RFID Indoor Targets Positioning with Real Geographic Environment. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2015, 第 3 作者12(4): 1149-1169, https://www.webofscience.com/wos/woscc/full-record/WOS:000366127000002.
[83] 王思叶. 一种RFID室内目标定位技术与地理信息环境结合的方法. Computer Science and Information Systems. 2015, 第 1 作者
[84] 朱大立, 荣文晶, 王思叶, 庞娜. 基于树形模型的轻量级RFID组证明协议. TONGXIN XUEBAO[J]. 2015, 第 3 作者36(11): 15-24, https://doaj.org/article/53d5a918ed7b43329cf98d8167e01aa0.
[85] 姜建国. ������������������������RFID������������������������������������. 软件学报. 2014, 
[86] 印曦, 王思叶, 黄伟庆. 2014���������������������������������. 中国信息安全[J]. 2014, 第 2 作者102-104, http://lib.cqvip.com/Qikan/Article/Detail?id=662929174.
[87] 罗元剑, 姜建国, 王思叶, 景翔, 丁昶, 张珠君, 张艳芳. ������������������������RFID������������������������������. 软件学报[J]. 2014, 第 3 作者25(8): 1713-1728, http://lib.cqvip.com/Qikan/Article/Detail?id=661808238.
[88] 王思叶, 景翔, 罗元剑, 丁昶. ���������������������������������������������. 计算机工程与设计[J]. 2014, 第 1 作者35(7): 2572-2576, http://lib.cqvip.com/Qikan/Article/Detail?id=661588424.
[89] 王思叶. ������������RFID������������������������������������������. 2014 2nd International Conference on Systems and Informatics (ICSAI 2014). 2014, 第 1 作者
[90] Huang Weiqing, Ding Chang, Wang Siye, Jing Xiang, Luo YuanJian, Zhang Yanfang, Zhang Zhujun, IEEE. An Efficient Visualization Method of RFID Indoor Positioning Data. 2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI). 2014, 第 3 作者497-504, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000382386000090.
[91] 姜建国. 基于有限状态机的RFID流数据过滤与清理技术研究. 软件学报. 2014, 
[92] 印曦, 王思叶, 黄伟庆. 2014年日本信息安全现状分析. 中国信息安全[J]. 2014, 第 2 作者102-104, http://lib.cqvip.com/Qikan/Article/Detail?id=662929174.
[93] 王思叶, 景翔, 罗元剑, 丁昶. 多源异构的动态目标跟踪技术研究. 计算机工程与设计[J]. 2014, 第 1 作者35(7): 2572-2576, http://lib.cqvip.com/Qikan/Article/Detail?id=661588424.
[94] 罗元剑, 姜建国, 王思叶, 景翔, 丁昶, 张珠君, 张艳芳. 基于有限状态机的RFID流数据过滤与清理技术. 软件学报[J]. 2014, 第 3 作者25(8): 1713-1728, http://lib.cqvip.com/Qikan/Article/Detail?id=661808238.
[95] 王思叶. 一种关于RFID室内定位数据的高效可视化方法. 2014 2nd International Conference on Systems and Informatics (ICSAI 2014). 2014, 第 1 作者
[96] Huang Weiqing, Ding Chang, Wang Siye, Jing Xiang, Luo YuanJian, Zhang Yanfang, Zhang Zhujun, IEEE. An Efficient Visualization Method of RFID Indoor Positioning Data. 2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI). 2014, 第 3 作者497-504, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000382386000090.
[97] 王思叶, 祁峰. RFID���������������������������������������. 保密科学技术[J]. 2012, 第 1 作者69-71, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479685.
[98] 王思叶, 祁峰. RFID应用安全前沿技术综述(下). 保密科学技术[J]. 2012, 第 1 作者69-71, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479685.
[99] 王思叶, 祁峰. RFID���������������������������������������. 保密科学技术[J]. 2011, 第 1 作者70-73, http://lib.cqvip.com/Qikan/Article/Detail?id=1003480163.
[100] 王思叶, 祁峰. RFID应用安全前沿技术综述(上). 保密科学技术[J]. 2011, 第 1 作者70-73, http://lib.cqvip.com/Qikan/Article/Detail?id=1003480163.
[101] 王思叶, 陈恭亮. ���������������������������������. 信息安全与通信保密[J]. 2006, 第 1 作者100-101, http://lib.cqvip.com/Qikan/Article/Detail?id=22440969.
[102] 王思叶, 陈恭亮. 电子签名法若干问题研究. 信息安全与通信保密[J]. 2006, 第 1 作者100-101, http://lib.cqvip.com/Qikan/Article/Detail?id=22440969.
[103] 王思叶, 董平. ������������������������������������. 电气电子教学学报[J]. 2003, 第 1 作者25(5): 73-77, http://lib.cqvip.com/Qikan/Article/Detail?id=8543002.
[104] 王思叶, 董平. 电基础远程教学平台的实现. 电气电子教学学报[J]. 2003, 第 1 作者25(5): 73-77, http://lib.cqvip.com/Qikan/Article/Detail?id=8543002.
发表著作
(1) 无线传感器网络:技术、协议与应用, 电子工业出版社, 2019-04, 第 2 作者

科研活动

   
科研项目
( 1 ) 物联网安全关键技术及仿真平台研究, 参与, 国家任务, 2013-01--2015-12
( 2 ) XXX管控应用示范, 负责人, 国家任务, 2015-07--2016-07
( 3 ) XX标准编制, 负责人, 国家任务, 2015-07--2016-07
( 4 ) XX技术要求, 负责人, 国家任务, 2017-07--2018-07
( 5 ) xx系统研制, 负责人, 国家任务, 2018-08--2019-07
( 6 ) XXXX方案设计, 负责人, 境内委托项目, 2019-01--2019-04
( 7 ) XXX应用示范, 负责人, 国家任务, 2019-06--2020-06
( 8 ) XX研制和规范编制, 负责人, 中国科学院计划, 2020-09--2021-06
( 9 ) XXXXX室研制, 负责人, 国家任务, 2020-12--2021-11
( 10 ) XXX管控体系研究, 负责人, 国家任务, 2021-09--2023-09

指导学生

已指导学生

蔡梦楠  硕士研究生  085211-计算机技术  

谢金兴  硕士研究生  085211-计算机技术  

梁飞  硕士研究生  085400-电子信息  

现指导学生

王帅  硕士研究生  083900-网络空间安全  

潘泊凡  硕士研究生  081203-计算机应用技术  

白广轩  硕士研究生  083900-网络空间安全  

刘文睿  硕士研究生  085400-电子信息