English

当前位置: 教师介绍 — 刘琴
刘琴   
教师介绍
无照片
刘琴
刘琴,女,1982年6月生,博士,助理教授,湖南长沙人,中共党员。2004年获得湖南师范大学计算机科学与技术专业工学学士学位,2007年获得中南大学计算机应用技术专业工学硕士学位,2012年获得中南大学计算机应用技术专业工学博士学位。在2010年-2012年间,以联合培养博士身份在美国天普大学(TempleUniversity)访问学习了两年。2013年10月加入湖南大学。2015年获得湖南省优秀博士论文奖励,2014年湖南省自然科学奖二等奖(排名第二),国际会议TrustCom2010最佳论文奖和CGC2012最佳学生论文奖。
中文名: 刘琴
英文名:
学历: 博士
职称: 助理教授
所属机构:
 软件工程系
快速导航: 研究方向 学术任职情况 科研项目 教育背景 学术论文 专利/软件著作权 联系方式
返回顶部 研究方向

云计算、大数据、社交网络

返回顶部 学术任职情况

[1]INFOCOM 2018 TPC member

[2]General Chair of TrustData 2017

[3]Track Chair of SpaCCS2017

[4]Guest Editor of Elsevier FGCS,Elsevier CAEE

曾担任国际期刊IJCSE客座编辑、BigTrust 2016,TrustData2015-2016的大会主席,IEEE ATC2015,IEEE EUC 2015程序 委员会主席。 



返回顶部 科研项目

¨  国家自然科学基金重点项目(批准号:61632009                              子课题负责人

  项目名称:面向网络计算的新一代操作系统及关键技术

  时间:2017.01-2021.12

¨  2016 CCF-腾讯犀牛鸟基金项目   (CCFTencentIAGR20160113)                  项目负责人

 项目名称:社交网络中隐私保护机制的研究

  时间:2016.07-2017.12 

¨   网络与交换技术国家重点实验室2016开放课题(SKLNST-2016-2-20)    项目负责人

 项目名称:个人健康记录云管理系统中的安全问题研究

  时间:2017.01-2017.12 

¨赛尔网下一代互联网技术创新项目              项目指导老师

 项目名称:基于IPv6 的安全云计算服务研究

  时间:2016.05-2017.12 

¨ 湖南省科技厅(自然基金)(批准号:湘财教指(201591号)                               项目负责人

 项目名称:面向安全云服务的加密关键技术研究

  时间:2015.01-2017.12 

¨ 湖南省教育厅(基础研究)(湖南省优秀博士论文资助项目)                               项目负责人

 项目名称:基于云计算平台的大数据安全机制研究

  时间:2015.01-2018.12 

¨  国家自然科学基金青年项目(批准号:61402161                                 项目负责人

  项目名称:云计算环境下可扩展的细粒度加密关键技术研究

  时间:2015.01-2017.12

¨  2014CCF-腾讯犀牛鸟基金项目 (协议编号:CCF-TencentIAGR20140104项目负责人

 项目名称:基于云计算平台的大数据安全机制研究

  时间:2014.07-2015.12 (已结题)

   

返回顶部 教育背景

[1] 2010.9―2012.9       美国天普大学   计算机信息科学系     联合培养博士研究生

                         指导老师:吴杰教授

[2] 2008.9―2012.12      中南大学       信息科学与工程学院   计算机应用技术     博士

                         指导老师:王国军教授

[3] 2004.9―2007.7       中南大学       信息科学与工程学院   计算机应用技术     硕士

[4] 2000.9―2004.7       湖南师范大学   数学与计算机学院     计算机科学与技术   学士


返回顶部 学术论文

刘琴在TPDSINS等国际期刊和CCSINFOCOM等国际会议上发表了论文50余篇。Google学术中单篇论文最高他引次数为350

期刊论文

   

  1. Q. Liu, G. Wang, F. Li, S. Yang , and J. Wu, "Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks," IEEE Transactions on Parallel and Distributed Systems (TPDS),2016.(CCF A类期刊)

  2. Q. Liu, Y. Guo, J. Wu, and G. Wang, "Effective Query Grouping Strategy in Clouds", Journal of Computer Science and Technology(JCST),2016.(CCF B类期刊)

  3. Q.Liu, G. Wang, X. Liu, T. Peng, and J. Wu,"Achieving Reliable and Secure Services in Cloud Computing Environments,"Computers and Electrical Engineering (CAEE), 2016.(IF: 1.084)

  •  X. Liu, Q. Liu, T. Peng, and J. Wu, "Dynamic Access Policy in Cloud-Based Personal Health Record (PHR) Systems," Information Sciences, 2016. (CCF B类期刊)

  • S. Zhang, Q. Liu, and Y. Lin, "Anonymizing Popularity in Online Social Network With Full Utility," Future Generation Computer Systems, 2016.(CCF C类期刊)

  • Q. Liu, G. Wang, J. Wu,"Consistency as a Service: Auditing Cloud Consistency," IEEE Transactions on Network and Service Management (TNSM),2014. (CCF C类期刊) 

  • Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Towards DifferentialQuery Services in Cost-Efficient Clouds," IEEE Transactions on Parallel and Distributed Systems (TPDS),2014. (CCF A类期刊) 

  • Q. Liu, G. Wang, and J. Wu, "Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment," Information Sciences, 2014.(CCF B类期刊)

  • Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Cooperative PrivateSearching in Clouds," Journal of Parallel and Distributed Computing(JPDC), 2012.(SCCF B类期刊)

  • Q. Liu, G. Wang, and J. Wu, "Secure and Privacy Preserving KeywordSearch for Cloud Storage," Journal of Network and Computer Applications(JNCA), 2012. (CCF C类期刊)

  • G. Wang, Q. Liu, and J. Wu, "Hierarchical Attribute-Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers," Computers & Security, 2011.(CCF B类期刊)

  • G. Wang, Q. Liu, and J. Wu, "Achieving Fine-Grained Access Control forSecure Data Sharing on Cloud Servers," Concurrency and Computation:Practice and Experience, 2011. (CCF C类期刊)

  • ----------------------------------------------------------------------------

   刘琴,刘旭辉,胡柏霜,张少波,"个人健康记录云管理系统中支持用户撤销的细粒度访问控制," 电子与信息学报,2016.(EI期刊)


会议论文

  Q. Liu, X. Nie, X. Liu, T. Peng, and J. Wu, "Verifiable Ranked Search over Dynamic     Encrypted Data in Cloud Computing," Proc. of IWQoS 2017. (CCF B类会议)

   B. Hu, Q. Liu, X. Liu, T. Peng, G. Wang, J. Wu,"DABKS: Dynamic Attribute-based       Keyword Search in Cloud Computing," Proc. of ICC 2017.(CCF C类会议) 

  • X. Nie, Q. Liu, X. Liu, T. Peng, and Y. Lin, "Dynamic Verifiable Search over Encrypted Data in Untrusted Clouds," Proc. of ICA3PP 2016.(CCF C类会议)

  • Q. Liu, G. Wang, J. Wu, and W. Chang, "User-Controlled Security Mechanism in Data-Centric Clouds," Proc. of HPCC 2015 (CCF C类会议)

  • X. Liu, Q. Liu, T. Peng and J. Wu, "HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems," Proc. of ICA3PP 2015 (CCF C类会议)

  • G. Wang, Q. Liu, Y. Xiang, J. Chen,"Security from the Transparent Computing Aspect," Proc. of ICNC 2014.(特邀论文)

  • G. Wang, Q. Liu, F. Li, S. Yang, and J. Wu, "Outsourcing Privacy-Preserving Social Networks to a Cloud," Proc. of INFOCOM 2013. (CCF A类会议)

  • Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient Information Retrieval for Ranked Queries in Cost-EffectiveCloud Environments," Proc of INFOCOM 2012. (CCF A类会议)

  • Q. Liu, G. Wang , and J. Wu, "Clock-based Proxy Re-encryption Scheme in Unreliable Clouds," Proc. of ICPP Workshop, 2012. (CCF B类会议)

  • Q. Liu, Y. Guo, J. Wu, and G. Wang, "Dynamic Grouping in Cloud Computing," Proc. of CGC 2012. (该文获得国际学术会议最佳学生论文奖即Best Student Paper Award)

  • G. Wang, Q. Liu, and J. Wu, "Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing," Proc. of ACM CCS 2010. CCF A类会议)

  • Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Reliable Re-encryption in Unreliable Clouds," Proc. of IEEE GLOBECOM 2011. (EI检索,CCF C类会议)

  • Q. Liu, G. Wang, and J. Wu,"Efficient Sharing of Secure Cloud Storage Services," Proc. of IEEE TSP 2010. (EI检索)

  • Q. Liu, G. Wang, and J. Wu, "An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing," Proc. of IEEE TrustCom 2009. (CCF C类会议)



其他参与论文

  • S. Zhang, L. Yaping, Q. Liu, et. al, "Secure Hitch in Location Based Social Networks," Computer Communications, 2017. (CCF C类期刊)

  • E. Luo, Q. Liu, J. H. Abawajy, and G. Wang, "Privacy-Preserving Multi-Hop Profile-Matching Protocol for Proximity Mobile Social Networks," FGCS, 2016. (CCF C类期刊)

  • T. Peng, Q. Liu, D. Meng,and G. Wang, "Collaborative Trajectory Privacy Preserving Scheme in Location-based Services," Information Sciences, 2016. (CCF B类期刊)

  • E Luo, Q Liu, and G Wang, "Hierachical Multi-authority and Attribute-based Encryption Friend Discovery Scheme In Mobile Social Networks," IEEE Communications Letters, 2016. (CCF C类期刊)

  • T. Peng, Q. Liu, and G. Wang, "A Multilevel Access Control Scheme for Data Security in Transparent Computing," Computing in Science and Engineering, 2016. (IF:1.361)

  • T. Peng, Q. Liu, D. Meng, and G. Wang, "Privacy Preserving in LBS based on Semi-trusted Third Party," Proc. of SpaCCS, 2016.

  • Q. Zhang, Q. Liu, and G. Wang, "A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data," Proc. of SpaCCS, 2016.

  • X. Yao, Y. Lin, Q. Liu, and Y. Zhang, "A Secure Hierarchical Deduplication System in Cloud Storage," Proc.of IWQoS 2016. (CCF B类会议)

  • Z. Xu, Y. Lin, and Q. Liu, "File Dynamic Integrity in a Multi-User Environment," Proc.of TrustCom, 2016. (CCF C类会议)

  • S. Zhang, Q. Liu, and G. Wang, "EnhancingLocation Privacy through User-Defined Grid in Location-Based Services," Proc. of TrustCom, 2016. (CCF C类会议)

  • X. Zhu, Q. Liu, and G. Wang, "A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing," Proc. of TrustCom, 2016. (CCF C类会议)

  • T. Peng, G. Wang, and Q. Liu, "Enhanced Location Privacy Preserving Scheme in Location-Based Services," IEEE Systems Journal, 2015 (IF: 1.27)

  • X. Yao, Y. Lin, Q. Liu, and S. Long, "Efficient and Privacy-Preserving Search in Multi-Source Personal Health Record Clouds, " Proc. of IEEE ISCC, 2015. (CCF C类会议)

  • X. Zhu, Q. Liu, and G. Wang, "Verifiable Dynamic Fuzzy Search over Encrypted Data in Cloud Computing," Proc. of ICA3PP, 2015. (CCF C类会议)

  • E. Luo, Q. Liu and G. Wang, "NMHP:A Novel Privacy Preserving Profile Matching Protocol in Multi-Hop Proximity Mobile Social Networks," Proc. of ICA3PP, 2015. (CCF C类会议)

  • S. Zhang, Q. Liu and G. Wang, "Deviation-based Location Switching Protocol for Trajectory Privacy Protection," Proc. of ICA3PP, 2015. (CCF C类会议)

  • H. Yin, Z. Qin, Q. Liu and J. Zhang, "A Universal and Privacy-preserving Query Results Verification Scheme for Secure Search over Encrypted Cloud Data," Proc. of ICA3PP, 2015. (CCF C类会议)

  • S. Zhang, Y. Lin, and Q. Liu, "Secure and Efficient Video Surveillance in Cloud Computing, " Proc. of IEEE MASS, 2014. (CCF C类会议)

  • W. Zhang,Y. Lin, S. Xiao, Qin Liu, T. Zhou, J. Liu, and X. Wang, "Secure Distributed Keyword Search in Multiple Clouds," Proc. of IWQoS, 2014. (CCF B类会议)

  • G. Wang, F. Yue, and Q. Liu, "A Secure Self-Destructing Scheme for Electronic Data," Journal of Computer and System Sciences, 2013. (CCF B类期刊).

  • G. Wang, Q. Du, W. Zhou, and Q. Liu, "A Scalable EncryptionScheme for Multi-Privileged Group Communications," Journal of Supercomputing, 2013.(CCF C类期刊).

    F. Yue, G. Wang, and Q. Liu, "A Secure Self-DestructingScheme for Electronic Data," Proc. of TrustCom, 2010. (CCF C类会议,该文获得国际学术会议最佳论文奖即BestPaper Award) 

  • Q. Du, G. Wang, and Q. Liu, "A Scalable EncryptionScheme for Multi-Privileged Group Communications," Proc. of TrustCom, 2010. (CCF C类会议)

  •  C. C. Tan, Q. Liu, and J. Wu, "Secure Lockingfor Untrusted Clouds," Proc. of IEEE Cloud, 2011. 

  • T. Peng, Q. Liu, G. Wang, "Privacy Preserving for Location-Based Services Using Location Transformation" Proc. of CSS, 2013. 

  • 张少波,刘琴,王国军;基于网格标识匹配的位置隐私保护方法,电子与信息学报,2016. (EI检索期刊) 

  • 张少波,Md Zakirul Alam Bhuiyan,刘琴,孟大成,王国军,移动社交网络中基于代理转发机制的轨迹隐私保护方法,电子与信息学报,2015. (EI检索期刊) 

  •  李超良,王国军,刘琴,一种支持隐私保护的物联网动态完整性检测方案,小型微型计算机,2014. (CSCD核心期刊)

  •  李超良,刘琴,王国军,基于双线性对的物联网远程数据完整性检测算法,中南大学学报,2014.(CSCD核心期刊)。 

  •  周志彬,刘琴,王国军,贾维嘉,采用群证明技术的RFID安全用药方案,小型微型计算机系统,2014(CSCD核心期刊)。





返回顶部 专利/软件著作权

[1]王国军,刘琴,刘湘勇,齐芳,一种净室云计算数据处理方法及系统,2014.03.07(申请时间), 中国,201410083476.6


返回顶部 联系方式

湖南大学 信息科学与工程学院(436),邮编:410082

Email:gracelq628@hnu.edu.cn;gracelq628@126.com


友情链接