
李凤华 男 汉族 博导 信息工程研究所
Email: lifenghua@iie.ac.cn
Telephone: 010-82346330
Address: 19 Shucun Road, Haidian District, Beijing
Postcode: 100085
Research Areas
Network and System Security, Access Control, Data Security etc.
Education
M.S., Computer Systems architecture, Xidian University, Xi’an, China, January 1990.
B.S., Computer Software, Xidian University, Xi’an, China, June 1987.
Experience
Work Experience
(2) Professor, Beijing Electronic Science and Technology Institute, Beijing, July 1994-August 2011
(3) Assistant & Lecturer, Xidian University, March 1990-June 1994.
Honors & Distinctions
(2) Adjunct Ph.D. Professor, Subject of Information Security, University of Science and Technology of China, Hefei, China.
(3) Adjunct Ph.D. Professor, School of Network and Information Security, Xidian University, Xi’an, China, 2008-Present.
(4) Senior member, Chinese Institute of Electronics
(5) Senior member, China Computer Federation
(6) Member, Information Security Council of China, E-government and Office Automation, Chinese Information Technology Special Committee
(7) Member, the advisory group of General Administration of Press and Publication’s major science and technology project “Digital Copyright Protection Research and Development”
Publications
Papers
(1) Insider Threat Detection Using Generative Adversarial Graph Attention Networks, IEEE Global Communications Conference, 2023, 2nd author
(2) Efficiently Constructing Topology of Dynamic Networks, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2023, 1st author
(3) A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2023, 3rd author
(4) Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 6th author
(5) DP-Opt: Identify High Differential Privacy Violation by Optimization, Wireless Algorithms, Systems, and Applications, 2022, Corresponding author
(6) Survey on key technologies of covert channel in ubiquitous network environment, Journal on Communications, 2022, 1st author
(7) Detecting conflict of heterogeneous access control policies, DIGITAL COMMUNICATIONS AND NETWORKS, 2022, Corresponding author
(8) Multi-level local differential privacy algorithm recommendation framework, Journal on Communications, 2022, 5th author
(9) Efficiently Managing Large-Scale Keys in HDFS, IEEE International Conference on High Performance Computing and Communications (HPCC 2021,CCF-C), 2021, Corresponding author
(10) AdaPDP: Adaptive Personalized Differential Privacy, IEEE Conference on Computer Communications(IEEE INFOCOM,CCF-A), 2021, Corresponding author
(11) Research on cross-domain access control technology, Chinese Journal of Network and Information Security, 2021, 2nd author
(12) Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach, Proceedings of ICCS, 2021, 1st author
(13) Dynamic security-empowering architecture for space-ground integration information network, Journal on Communications, 2021, 3rd author
(14) Utility-aware Exponential Mechanism for Personalized Differential Privacy, 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020, Corresponding author
(15) Traffic characteristic based privacy leakage assessment scheme for Android device, Journal on Communications, 2020, 5th author
(16) Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs, IEEE WIRELESS COMMUNICATIONS, 2020, 1st author
(17) Securing instruction interaction for hierarchical management, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 1st author
(18) Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? IEEE International Conference on Communications (ICC), 2020, 4th author
(19) A Framework to Preserve User Privacy for Machine Learning as a Service, IEEE Global Communications Conference, 2020, Corresponding author
(20) Dynamically Empowering Security for Space-Terrestrial Integrated Information Network, Radio Communications Technology 2020, 1st author
(21) Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission, WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 5th author
(22) Exploiting location-related behaviors without the GPS data on smartphones, INFORMATION SCIENCES, 2020, 1st author
(23) Research on Space-Ground Network Security Guarantee Technology, Space-Integrated-Ground Information Networks, 2020, 1st author
(24) Construction of academic discipline of science and engineering and orientation for their ranking under the new situation, Chinese Journal of Network and Information Security, 2020, 1st author
(25) Dynamic countermeasures selection for multi-path attacks, COMPUTERS & SECURITY, 2020, 1st author
(26) An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks, 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, 1st author
(27) HideMe: Privacy-Preserving Photo Sharing on Social Networks, IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, 1st author
(28) Hierarchical scalable storage architecture for massive electronic bill, Journal on Communications, 2019, 1st author
(29) Privacy Computing: Concept, Computing Framework, and Future Development Trends, ENGINEERING, 2019, 1st author
(30) A game theoretic approach to cooperative intrusion detection, JOURNAL OF COMPUTATIONAL SCIENCE, 2019, Corresponding author
(31) Collection policy refining method for threat monitoring in complex network environment, Journal on Communications, 2019, 1st author
(32) Risk assessing and privacy-preserving scheme for privacy leakage in APP, Journal on Communications, 2019, 3rd author
(33) Research on Optimizing Security Control Mechanism of Networked System Based on Stackelberg Defender-Attacker Game, Cyber Security, 2019, 6th author
(34) High-performance and high-concurrency encryption scheme for Hadoop platform, Journal on Communications, 2019, 3rd author
(35) Privacy Computing: Concept, Computing Framework, and Future Development Trends, Privacy Computing: Concept, Computing Framework, and Future Development Trends, ENGINEERING, 2019, 1st author
(36) Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies, IEEE INTERNET OF THINGS JOURNAL, 2019, 1st author
(37) Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks, 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019, 6th author
(38) Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach, COMPUTATIONAL SCIENCE - ICCS 2019, PT I, 2019, 5th author
(39)Fuzzy evaluation for response effectiveness in cases of incomplete information, Journal on Communications, 2019, 1st author
(40) Security Measurement for Unknown Threats Based on Attack Preferences, SECURITY AND COMMUNICATION NETWORKS, 2018, 5th author
(41) A game-theoretic approach to advertisement dissemination in ephemeral networks, WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 3rd author
(42) SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, Elsevier Engineering, 2018, 1st author
(43) UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks, SECURITY AND COMMUNICATION NETWORKS, 2018, 4th author
(44) Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach, 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2018, 4th author
(45) 2-MR: A Two-Phase MapReduce Approach for Incremental Replication, International Conference on Big data Technologies (ICBDT 2018), 2018, 1st author
(46) Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services, 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018, 1st author
(47) DESC: enabling secure data exchange based on smart contracts, SCIENCE CHINA-INFORMATION SCIENCES, 2018, 7th author
(48) Cross-network access control mechanism for complex network environment, Journal on Communications, 2018, 1st author
(49) Resolving Access Conflicts: an Auction-based Incentive Approach, 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, Corresponding author
(50) Privacy-preserving Partner Selection for Ride-sharing Services, IEEE Transactions on Vehicular Technology, 2018, 1st author
(51) Real-time Data Incentives for IoT Searches, 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018, Corresponding author
(52) Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System, 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018, 1st author
(53) Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach, COMPUTATIONAL SCIENCE - ICCS 2018, PT I, 2018, Corresponding author
(54) Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 5th author
(55) Research Progress of Photo Privacy-Preserving Mechanisms in Online Social Network, Cyber Security, 2018, 1st author
(56) SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users, ENGINEERING, 2018, 1st author
(57) Privacy-Prese ving Partner Selection for Ride-Sharing Services, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 5th author
(58) Cloud outsourcing secret sharing scheme against covert adversaries, Journal on Communications, 2017, 6th author
(59) A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks, NETWORK AND SYSTEM SECURITY, 2017, 5th author
(60) Impact Factor-Based Group Recommendation Scheme with Privacy Preservation in MSNs, 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017, 4th author
(61) Pricing Privacy Leakage in Location-Based Service, WASA, 2017, 1st author
(62) Small-world: Secure friend matching over physical world and social networks, INFORMATION SCIENCES, 2017, 1st author
(63) Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game, ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 4th author
(64) Who is Visible: Resolving Access Policy Conflicts in Online Social Networks, GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017, 4th author
(65) Cyberspace-Oriented Access Control: Model and Policies, 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, 1st author
(66) SRAM: A State-Aware Risk Assessment Model for Intrusion Response, IEEE International Conference on Data Science in Cyberspace(DSC), 2017, 1st author
(67) A Privacy-Preserving Method for Photo Sharing in Instant Message Systems, International Conference on Cryptography, Security and Privacy, 2017, 1st author
(68) Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field, IEEE International Symposium on UbiSafe Computing(UbiSafe), 2017, 1st author
(69) Server-aided private set intersection based on reputation, INFORMATION SCIENCES, 2017, Corresponding author
(70) TrackU: Exploiting User's Mobility Behavior via WiFi List, GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017, 1st author
(71) Spectral-clustering-based abnormal permission assignments hunting framework, Journal on Communications, 2017, 3rd author
(72) Pricing Privacy Leakage in Location-Based Services, WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 1st author
(73) A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks, IEEE Wireless Communications and Network Conference, 2016, 1st author
(74) Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information, International Conference on Computing, Networking and Communication, 2016, Corresponding author
(75)Research status and development trends of security assurance for space-ground integration information network, Journal on Communications, 2016, 1st author
(76) Achieving Secure and Accurate Friend Discovery Based on Friend-of-Friend's Recommendations, 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, 2nd author
(77) Hunting Abnormal Configurations for Permission-Sensitive Role Mining, IEEE Military Communications Conference, 2016, 5th author
(78)Research progress on secure data deduplication in cloud, Journal on Communications, 2016, 3rd author
(79) Privacy computing:concept,connotation and its research trend, Journal on Communications, 2016, 1st author
(80)Novel cyberspace-oriented access control model, Journal on Communications, 2016, 1st author
(81) Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends’ Recommendation, International Conference on Computing, Networking and Communication, 2016, 1st author
(82) Time Obfucation-Based Privacy-Preserving Scheme for Location-Based Services, IEEE Wireless Communications and Networking Conference(WCNC 2016), 2016, 1st author
(83) Role and Time-based Access Control with Efficient Revocation for Cloud Storage, 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, Corresponding author
(84) An IPv6 Routing Lookup Algorithm Using Weight-balanced Tree based on Prefix Value for Virtual Router, FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2016, 4th author
(85) Research progress on cloud data assured deletion based on cryptography, Journal on Communications, 2016, 2nd author
(86) A Network Monitor for HTTPS Protocol based on Proxy, FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2016, 4th author
(87) Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage, INTERNATIONALCONFERENCEONCOMPUTINGNETWORKINGANDCOMMUNICATION, 2016, Corresponding author
(88)Proxy-based privacy-preserving scheme for mobile Internet, Journal on Communications, 2015, 2nd author
(89) Public key encryption with multi-keywords search, Journal of Xidian University, 2015, 2nd author
(90)Efficient scheme for user's trajectory privacy, Journal on Communications, 2015, 1st author
(91) Achieving Secure Friend Discovery in Social Strength-Aware PMSNs, IEEE Military Communications Conference, 2015, Corresponding author
(92) UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks, Proceedings of the IEEE International Conference on Communications(ICC 2015), 2015, Corresponding author
(93) Privacy-Preserving Strategies in Service Quality Aware Location-Based Services, IEEE International Conference on Communications, 2015, 1st author
(94) Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, Corresponding author
(95) A full lifecycle privacy protection scheme for sensitive data in cloud computing, PEE, 2015, 2nd author
(96) Multidimensional digital media-oriented access control scheme, Journal on Communications, 2015, 2nd author
(97) Achieving Lightweight and Secure Access Control in Multi-Authority Cloud, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, Corresponding author
(98) Bloom filter-based lightweight private matching scheme, Journal on Communications, 2015, 3rd author
(99) CL-TAP: An Efficient Certificate less Based Trusted Access Protocol for WLAN, CHINESE JOURNAL OF ELECTRONICS, 2014, 2nd author
(100) A User-based Document Management Mechanism in Cloud, 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, 3rd author
(101)A Secure Self-Destruction Scheme for Composite Documents with Attribute Based Encryption, Acta Electronica Sinica, 2014, 4th author
(102) A Secure Self-Destruction Scheme with IBE for the Internet Content Privacy, Chinese Journal of Computers, 2014, 4th author
(103) A Reliable Supervision Model and Implementation for the Trading of Digital Works, 2014, 1st author
(104) Secure and Privacy-Preserving Data Storage Service in Public Cloud, Journal of Computer Research and Development, 2014, 2nd author
(105) An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application, THE SCIENTIFIC WORLD JOURNAL, 2014, 2nd author
(106) Action-Based Multi-level Access Control Model, Journal of Computer Research and Development, 2014, 2nd author
(107) Network isolation communication scheme to resist against covert channel, Journal on Communications, 2014, 1st author
(108) Survey on security and privacy preserving for mobile internet service, Journal on Communications, 2014, 2nd author
(109) FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation, In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, 2013, Corresponding author
(110) Action-Based Multilevel Access Control for Structured Document, Journal of Computer Research and Development, 2013, 4th author
(111) Video Steganography with Multi-path Motion Estimation, MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013, 2013,
(112) An improved attack on clock-controlled shift register based on hardware implementation, SCIENCE CHINA-INFORMATION SCIENCES, 2013, 1st author
(113) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 5th author
(114) An Action-based Access Control Model Implementation for MLS Information Systems, 2012, 1st author
(115) General Purpose Framework Designing for Network Security Test Devices Based on Multi-core Processor, 2012, 2nd author
(116) An Action Based Access Control Model for Multi-level Security, INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 2nd author
(117) The Research on QDI Random Path Swapping, Acta Electronica Sinica, 2012, 4th author
(118) Action Based Access Control Model for Multi-level Security (MLS), In Proceedings of the 2012 International Conference on Information Security and Assurance (ISA 2012), 2012, 1st author
Patents
[1] 李凤华. 多用户数据流转控制与处理方法、装置、设备及介质. CN114866514B, 2023-02-28.
[2] 李凤华, 李晖, 谢绒娜, 张玲翠, 牛犇. 多方的数据安全计算方法、装置、电子设备和存储介质. CN114866317B, 2023-01-10.
[3] 王竹, 杨思琦, 李凤华. 一种电子凭据的防伪方法、装置、电子设备及存储介质. CN: CN113849860A, 2021-12-28.
[4] 李凤华, 房梁, 李子孚, 郭云川, 耿魁, 张玲翠, 陈操. 泛在网络拓扑图构建方法及网络安全防护方法. CN113824643A, 2021-12-21.
[5] 李子孚, 房梁, 李凤华, 张玲翠, 郭云川. 采集策略冲突检测方法、装置、电子设备和存储介质. CN111756691B, 2021-10-08.
[6] 李凤华, 冷斯远, 房梁, 李子孚, 张玲翠, 谢应科. 网络威胁感知系统及方法. CN113271318B, 2021-09-21.
[7] 李凤华, 陈佩, 张林杰, 房梁, 李子孚, 耿魁. 威胁驱动的协同采集方法及装置. CN111865899B, 2021-07-13.
[8] 李勇俊, 郭云川, 李凤华, 房梁. 一种链路洪泛攻击防护方法及装置. CN111726338B, 2021-07-13.
[9] 李凤华, 寇文龙, 耿魁, 曹晓刚, 谢绒娜. 一种支持差异化可协商的并行数据通信方法及装置. CN112994851A, 2021-06-18.
[10] 李凤华, 张玲翠, 郭云川. 一种网络安全防护方法及系统. CN111756692B, 2021-05-14.
[11] 牛犇, 李凤华, 张立坤, 陈亚虹. 面向联邦学习的隐私保护方法及装置. CN112668044A, 2021-04-16.
[12] 李晖, 王瑞, 李效光, 闫皓楠, 王靖仁, 萧明炽, 赵兴文, 李凤华. 一种智能模型信息泄漏程度评估方法、系统、介质、设备. CN112269987A, 2021-01-26.
[13] 李晖, 李效光, 闫皓楠, 王靖仁, 王瑞, 戴睿, 赵兴文, 李凤华. 模型提取攻击的动态防御方法、系统、介质、设备及应用. CN112269988A, 2021-01-26.
[14] 李凤华, 牛犇, 陈亚虹, 何媛媛. 一种基于匿名的位置隐私保护方法及装置. CN109067750B, 2020-12-29.
[15] 李凤华, 牛犇, 尹沛捷, 李晖. 一种轨迹数据处理方法及系统. CN111723166A, 2020-09-29.
[16] 李凤华, 诸天逸, 郭云川, 房梁, 成林. 一种跨域访问策略优化方法及装置. CN111611324A, 2020-09-01.
[17] 牛犇, 李凤华, 陈亚虹, 耿魁. 用于图像识别的隐私保护方法、装置和电子设备. CN111582284A, 2020-08-25.
[18] 牛犇, 李凤华, 陈亚虹, 毕文卿, 耿魁. 一种基于采样的个性化差分隐私保护方法及系统. CN111414641A, 2020-07-14.
[19] 牛犇, 李凤华, 陈亚虹, 毕文卿, 耿魁. 一种基于指数机制的个性化差分隐私保护方法及系统. CN111400755A, 2020-07-10.
[20] 李凤华, 牛犇, 何媛媛, 尹沛捷. 一种群组隐私信息发现方法及系统. CN110569655A, 2019-12-13.
[21] 李凤华, 牛犇, 杨志东, 王新宇. 一种基于隐私泄露评估的隐私信息保护方法及系统. CN110519218A, 2019-11-29.
[22] 李凤华, 张玲翠, 郭云川, 耿魁, 房梁, 李晖. 一种网络安全防护方法及系统. CN110493266A, 2019-11-22.
[23] 李凤华, 陈黎丽, 郭云川, 王震, 张玲翠. 采集代理部署方法及装置. CN110430158A, 2019-11-08.
[24] 郭云川, 李凤华, 李凌, 李勇俊, 耿魁, 房梁. 一种设备安全策略的配置方法及装置. CN110348201A, 2019-10-18.
[25] 郭云川, 李凤华, 张晗, 李勇俊, 房梁, 张玲翠. 入侵响应策略生成方法及装置. CN110290122A, 2019-09-27.
[26] 李凤华, 李勇俊, 郭云川, 杨正坤, 房梁, 冷斯远. 入侵响应措施确定方法及装置. CN110233845A, 2019-09-13.
[27] 王震, 李凤华, 段晨健, 郭云川. 一种网络系统漏洞风险评估方法及装置. CN110191120A, 2019-08-30.
[28] 李凤华, 牛犇, 贺坤, 王新宇. Android智能终端隐私保护方法及装置. CN110110544A, 2019-08-09.
[29] 李凤华, 牛犇, 王新宇, 李晖. 一种隐私泄漏风险评估方法及装置. CN109753808A, 2019-05-14.
[30] 李凤华, 王竹, 李子孚, 耿魁, 李莉. 一种基于外部威胁的采集策略生成方法及系统. CN109714312A, 2019-05-03.
[31] 李凤华, 耿魁, 李勇俊. 一种网络中的威胁处置管理方法及系统. CN109698819A, 2019-04-30.
[32] 李凤华, 李子孚, 殷丽华, 房梁, 陈黎丽. 一种数据协同采集方法及系统. CN109688106A, 2019-04-26.
[33] 李凤华, 张玲翠, 李莉, 周曙光. 一种威胁报警信息生成方法及系统. CN109688105A, 2019-04-26.
[34] 牛犇, 李凤华, 耿魁, 李晖, 陈亚虹. 一种个性化隐私保护方法及装置. CN109684865A, 2019-04-26.
[35] 李凤华, 谢绒娜, 张玲翠, 金伟, 李莉. 一种基于采集数据异常的采集策略生成方法及系统. CN109639648A, 2019-04-16.
[36] 李凤华, 郭云川, 金伟, 房梁, 殷丽华. 一种数据按需汇聚方法及装置. CN109618371A, 2019-04-12.
[37] 李凤华, 殷丽华, 郭云川, 房梁, 王竹. 一种数据实时汇聚方法及系统. CN109558442A, 2019-04-02.
[38] 牛犇, 李凤华, 陈亚虹. 位置隐私保护方法及装置. CN109525933A, 2019-03-26.
[39] 李凤华, 谢绒娜, 张玲翠. 一种网络中的威胁处置效果的确定方法及系统. CN109510828A, 2019-03-22.
[40] 李凤华, 郭云川, 耿魁, 谢绒娜. 一种汇聚节点的部署方法及装置. CN109495304A, 2019-03-19.
[41] 李凤华, 房梁, 郭云川, 单芳芳. 一种数据传输方法、接收方法、装置及系统. CN109462591A, 2019-03-12.
[42] 李凤华, 耿魁, 张玲翠. 网络通信加密解密方法及电子设备. CN109450852A, 2019-03-08.
[43] 李凤华, 李勇俊, 耿魁, 房梁. 一种网络中的威胁处置策略分解方法及系统. CN109413088A, 2019-03-01.
[44] 李凤华, 张玲翠, 耿魁. 一种网络中的威胁处置策略生成方法及系统. CN109361690A, 2019-02-19.
[45] 李凤华, 牛犇, 王瀚仪, 耿魁, 王竹. 一种位置隐私保护方法及装置. CN109121133A, 2019-01-01.
[46] 李凤华, 牛犇, 孙哲, 何媛媛, 房梁, 王震, 陈佩. 一种图像隐私保护方法及系统. CN108197453A, 2018-06-22.
[47] 李凤华, 谈苗苗, 赵甫, 李昕, 耿魁, 刘振权. 一种抗隐蔽通道的信息隔离方法及装置. CN104270222A, 2015-01-07.
[48] 李凤华, 汤帜, 苏铓, 俞银燕, 吴槟, 赵险峰. 一种超媒体的文档描述方法. CN102929913A, 2013-02-13.
[49] 李凤华, 俞银燕, 苏铓, 汤帜, 赵险峰, 吴槟. 多维数字媒体的资源使用控制方法及装置. CN102902898A, 2013-01-30.
Collaboration
Students
已指导学生
王永科 硕士研究生 081201-计算机系统结构
张翠 博士研究生 081201-计算机系统结构
王彦超 博士研究生 081201-计算机系统结构
陈灵江 硕士研究生 081201-计算机系统结构
林佳楠 硕士研究生 081201-计算机系统结构
刘洋鑫 硕士研究生 0812Z1-信息安全
李宁 硕士研究生 085211-计算机技术
王新宇 博士研究生 081201-计算机系统结构
孙哲 博士研究生 0812Z1-信息安全
何媛媛 博士研究生 081201-计算机系统结构
余竞洋 硕士研究生 081201-计算机系统结构
熊芳欣 硕士研究生 085211-计算机技术
陈天柱 博士研究生 0812Z1-信息安全
张玲翠 博士研究生 0812Z1-信息安全
吕梦凡 硕士研究生 081201-计算机系统结构
田博修 硕士研究生 081202-计算机软件与理论
王瀚仪 博士研究生 083900-网络空间安全
金伟 博士研究生 081201-计算机系统结构
李勇俊 博士研究生 083900-网络空间安全
李子孚 博士研究生 083900-网络空间安全
李丁焱 硕士研究生 081201-计算机系统结构
尹沛捷 博士研究生 083900-网络空间安全
陈佩 硕士研究生 085211-计算机技术
冷斯远 博士研究生 083900-网络空间安全
田敏求 博士研究生 083900-网络空间安全
李超洋 硕士研究生 083900-网络空间安全
邵鸿宇 硕士研究生 085211-计算机技术
曹晓刚 博士研究生 083900-网络空间安全
郭垚鑫 硕士研究生 085412-网络与信息安全
鲁育铭 硕士研究生 083900-网络空间安全
诸天逸 硕士研究生 083900-网络空间安全
现指导学生
罗海洋 博士研究生 083900-网络空间安全
陈操 博士研究生 083900-网络空间安全
田月池 博士研究生 083900-网络空间安全
李恒 博士研究生 083900-网络空间安全
杨浚海 博士研究生 083900-网络空间安全
文一通 博士研究生 083900-网络空间安全
郭守坤 博士研究生 083900-网络空间安全
邝彬 博士研究生 083900-网络空间安全
许金波 博士研究生 083900-网络空间安全
张晶辉 博士研究生 083900-网络空间安全
彭知源 硕士研究生 085400-电子信息
张芊龙 博士研究生 083900-网络空间安全
乐浩天 硕士研究生 081201-计算机系统结构
吴玥 硕士研究生 083900-网络空间安全
岳佳琪 博士研究生 083900-网络空间安全
任婷 博士研究生 083900-网络空间安全
马菁菁 硕士研究生 083900-网络空间安全