西安建筑科技大学
导师风采
常金勇
浏览量:1171   转发量:13

个人信息

Personal Information

  • 教授
  • 导师类别:硕士生导师
  • 性别: 男
  • 学历:博士研究生
  • 学位:博士

联系方式

Contact Information

  • 所属院系:信息与控制工程学院
  • 所属专业: 计算机科学与技术  、 电子信息
  • 邮箱 : changjinyong@xauat.edu.cn
  • 工作电话 : -

个人简介

Personal Profile

教育背景:

2016.4-2018.3北京大学数学科学学院,博士后
2012.9-2016.1中国科学院信息工程研究所,信息安全国家重点实验室,博士
2006.9-2009.6首都师范大学数学科学学院,硕士
2000.9-2004.7山西大学数学科学学院,学士。
工作经历:

2018.3至今西安建筑科技大学信息与控制工程学院
2009.7-2012.9长治学院数学系
2004.7-2006.9长治学院数学系。
社会兼职:

1.2014年至今,担任EI检索期刊《计算机研究与发展》审稿人。
2.2015年11月至今,担任中国保密协会隐私保护专委会会员。
3.2019年起,担任SCI期刊TheComputerJournal(CCFB类)审稿人。
4.担任MobiSec2019国际会议PC.
  • 研究方向Research Directions
人工智能系统安全,信息安全
2. 机电结构优化与控制 研究内容:在对机电结构进行分析和优化的基础上,运用控制理论进行结构参数的调整,使结构性能满足设计要求。1. 仿生结构材料拓扑优化设计, 仿生机械设计 研究内容:以仿生结构为研究对象,运用连续体结构拓扑优化设计理论和方法,对多相仿生结构(机构)材料进行2. 机电结构优化与控制 研究内容:在对机电结构进行分析和优化的基础上,运用控制理论进行结构参数的调整,使结构性能满足设计要求。1. 仿生结构材料拓扑优化设计, 仿生机械设计 研究内容:以仿生结构为研究对象,运用连续体结构拓扑优化设计理论和方法,对多相仿生结构(机构)材料进行整体布局设计。 整体布局设计。
团队展示


报考意向
招生信息
信息与控制工程学院
硕士研究生
  • 序号
  • 专业
  • 招生人数
  • 年份
报考意向
姓名:
手机号码:
邮箱:
毕业院校:
所学专业:
报考类型:
博士
硕士
个人简历*

上传附件

支持扩展名:.rar .zip .doc .docx .pdf .jpg .png .jpeg
成绩单*

上传附件

支持扩展名:.rar .zip .doc .docx .pdf .jpg .png .jpeg
其他材料:

上传附件

支持扩展名:.rar .zip .doc .docx .pdf .jpg .png .jpeg
备注:
科研项目

(1)    国家自然科学基金委员会, 面上项目,62476212,面向建筑物联网的智能传感节点可信协同机制研究,2025-012028-1250万元,在研,主持;

(2)    西电ISN全国重点实验室,开放课题,ISN-25-02,云--终端架构下数据安全传输与存储技术研究,2024-042026-036万元,在研,主持;

(3)    陕西省科技厅, 面上项目, 2022JM-365, 云雾一体化环境下物联网数据安全若干关键问题研究, 2022-01 2023-12, 5万元,已结题,主持;

(4)    信息安全国家重点实验室, 面上项目, 2021MS-04, 云数据完整性审计若干关键问题研究, 2021-05 2023-05, 3万元,已结题,主持;

(5)    国家自然科学基金委员会, 面上项目, 62072363, 面向不确定因素的天然气负荷预测及用户行为检测方法研究, 2021-012024-12, 56万元,已结题, 参与;

(6)    陕西省科技厅, 面上项目, 2020JM-486, 基于动力学传播行为的网络瓶颈与关键节点辨识, 2020-01 2021-12, 4万元, 结题, 参与;

(7)    陕西省科技厅, 面上项目, 2019JM18, 具有强安全性的同态认证机制研究, 2019-01 2020-12, 3万元, 结题, 主持;

(8)    国家自然科学基金委员会, 青年科学基金项目, 61602061, 相关密钥安全性若干关键问题研究, 2017- 01-01 2019-12-31, 20万元, 结题, 主持;

(9)    中国博士后基金委, 面上项目(一等资助), 2017M610021, 公钥加密算法的明文依赖密钥及相关密钥 安全性研究, 2017-01 2018-04, 8万元, 结题, 主持;

(10) 国家自然科学基金委员会,面上项目,61402414, 对依赖密钥的明文进行安全加密的性质研究,2015-012018-1281万元,结题,参与;

(11) 国家自然科学基金委员会,青年项目,61402471,可证明安全的高效可搜索加密构造方法研究, 2015-012017-1224万元,结题,参与;

(12) 国家自然科学基金委员会,青年项目,61402468,具有用户部分属性撤销功能的基于属性加密算法研究,2015-012017-1225万元,结题,参与。


研究成果

  1. [1] Xinran, Hu, Jinyong Chang, T. Ahmad, et.al. Identity-Based Integrity Auditing Scheme with Sensitive Information Hiding for Proxy-Server-Assisted Cloud Storage Applications. IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2024.3491315, accepted.

    [2] Jing Song, Jinyong Chang, General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme, Clust. Comput, 27(5): 5663-5675 (2024).

    [3] Songrun Yang, Jinyong Chang, Identity-based remote data integrity auditing from lattices for secure cloud storage, Clust. Comput, 27(5): 5833-5844 (2024).
    [4] Zhong Wang, Funing Zhang, Anling Zhang, Jinyong Chang, LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid, Computer Commun,220: 35-42 (2024).
    [5] Xuening Guan, Jinyong Chang, Wei Zhang, Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage, Computer Commun, 224: 285-301 (2024).

    [6] Jinyong Chang, Xinyu Hao, Certificateless Dynamic Data Sharing Scheme with File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment, IEEE Internet Things J,11(6): 9630-9644 (2024).

    [7]Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang, Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network, IEEE Internet Things J., 11(7): 11540-11553 (2024).
    [8] Yufeng Yao, Jinyong Chang, Anling Zhang, Efficient Data Sharing Scheme with Fine-Grained Access Control and Integrity Auditing in Terminal-Edge-Cloud Network, IEEE Internet Things J. 11(16): 26944-26954 (2024).

    [9] Yuan Tian, Genqing Bian, Jinyong Chang,Ying Tang, Jian Li, Chong-Qiang Ye, A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity, Entropy 25(5): 742 (2023).

    [10] Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian, Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property, Clust. Comput, 25(1): 337-349 (2022).

    [11]Yixin Chen, Jinyong Chang, Identity-based proof of retrievability meets with identity-based network coding, Clust. Comput, 25(5): 3067-3083 (2022).

    [12] Jinyong Chang, Qiaochuan Ren, Yanyan Ji, Maozhi Xu, Rui Xue, Secure medical data management with privacy-preservation and authentication properties in smart healthcare system, Computer Networks 212: 109013 (2022).

    [13] Yubo Zhao, Jinyong Chang, Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage, Computer Networks 216: 109270 (2022).

    [14] Haiyan XiaoLifang Wang, Jinyong Chang, The differential fault analysis on block cipher FeW, Cybersecurity, 5(1): 28 (2022).
    [15] Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue, Identity-based remote data checking with a designated verifier, J.Cloud Comput.11: 7 (2022).

    [16] Jinyong Chang, Maozhi Xu, Rui Xue, Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications, Peer-to-Peer Netw. Appl. 15(4): 2021-2036 (2022).

    [17] Jinyong Chang, Bilin Shao,Yanyan Ji,Genqing Bian,Comment on A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage, IEEE Trans.Serv.Comput. 15(5): 2633-2634 (2022).

    [18] Jinyong Chang, Bilin Shao, Yanyan Ji, Maozhi Xu, Rui Xue, Secure network coding from secure proof of retrievability, Sci.China Inf. Sci., 64(12) (2021).

    [19] Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji, RKA Security for Identity-Based Signature Scheme, IEEE Access 8:17833-17841(2020).

    [20] Genqing Bian, Jinyong Chang, Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case, IEEE Access 8: 102958-102970 (2020).

    [21] Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl, Math. Comput. 386: 125478 (2020).

    [22] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian, Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited, IEEE Commun. Lett. 24(12): 2723-2727 (2020).
    [23] Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue, Certificateless Homomorphic Signature Scheme for Network Coding, IEEE/ACM Trans. Netw. 28(6): 2615-2628 (2020).

    [24] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian, Comment on A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding, IEEE Trans. Parallel Distributed Syst. 31(11): 2618-2619 (2020).

    [25] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian, Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited, IEEE Communications Letters, vol. 24(12), pp. 2723-2727, Dec., 2020.

    [26] Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian, Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited, Applied Mathematics and Computation, vol. 386, ID: 125478, 2020.

    [27] Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji, RKA Security for Identity-Based Signature Scheme, IEEE Access, vol. 8, pp. 17833-17841, 2020.

    [28] Jinyong Chang, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue, RKA Security of Identity-Based Homomorphic Signature Scheme, IEEE Access, 2019, 7: 50858-50868.

    [29] Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu, On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model, The Computer Journal, vol. 62(8), pp. 1232-1245, 2019.

    [30] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue, General Transformations from Single-Generation to Multi-Generation for Homomorphic Message Authentication Schemes in Network Coding, Future Generation Computer Systems, vol. 91, pp. 416-425, 2019.

    [31] Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations, Information Sciences, vol. 486, pp. 450-473, 2019.

    [32] Honglong Dai, Ding Wang, Jinyong Chang, and Mazhi Xu, On the RCCA Security of Hybrid Signcryption for Internet of Things. Wireless Communications and Mobile Computing, 2018.

    [33] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, Relaxing Enhanced Chosen-Ciphertext Security, IEICE Trans. Fund. Vol. E101-A, 2018.

    [34] Yanyan Ji, Jinyong Chang, Honglong Dai, and Maozhi Xu, On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme, IEICE Trans. Fund. Vol. E101-A, 2018.

    [35] Honglong Dai, Luxuan, Zhang, Yanyan Ji, Jinyong Chang, and Maozhi Xu, On the Key Dependent Message Security of DHIES, ICAIT 2017, pp. 322-328.

    [36] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, The ECCA Security of Hybrid Encryptions, SocialSec 2017, pp. 847-859.

    [37] Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang, Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size, The Computer Journal, Vol. 60(12), pp. 1785-1800, 2017.

    [38] Jinyong Chang, Honglong Dai, and Maozhi Xu, The KDM-CCA Security of REACT, ISPEC’2017, LNCS 10701, pp. 85-101, 2017.

    [39] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Homomorphic Network Coding Signature Schemes against Related-Key Attack in the Random Oracle. The 19th Annual International Conference on Information Security and Cryptology (ICISC-2016), LNCS 10157, pp. 239-253, 2017.

    [40] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Separations in Circular Security for Arbitrary Length Key Cycles-the CCA Case. Security and Communication Networks. Vol. 9(18), 2016.

    [41] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Security Analysis of a TESLA-Based Homomorphic MAC Schemes for Authentication in P2P Live Streaming System. Security and Communication Networks, Vol. 9(16), pp. 3309-3313, Nov. 2016.

    [42] Yu Chen, Jiang Zhang, Yi Deng, and Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptology ePrint Archive 2016: 1020.

    [43] Jinyong Chang and Rui Xue, Practical Key-Dependent Message Chosen-Ciphertext Security Based on Decisional Composite Residuosity and Quadratic Residuosity Assumptions. Security and Communication Networks, Vol. 8(8), pp. 1525-1536, May, 2015.

    [44] Jinyong Chang and Rui Xue, The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.4, pp. 1032-1037, April, 2015.

    [45] Jinyong Chang and Rui Xue, A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. Journal of Communications. Vol. 10(1), pp. 43-47, January, 2015.

    [46] Bei Liang, Hongda Li and Jinyong Chang, Constrained Verfiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015.

    [47] Bei Liang, Hongda Li and Jinyong Chang, The Generic Construction of Adaptively Secure Identity-Based Aggregate Signatures in the Random Oracle Model from Standard Signatures. CANS 2015.

    [48] Bei Liang, Hongda Li and Jinyong Chang, The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015.

    [49] Haidong Liu, Zhaoli Liu and Jinyong Chang, Existence and Uniqueness of Positive Solutions of Nonlinear Schrodinger Systems. Proceedings of the Royal Society of Edinburgh, 145A, 365-390, 2015.

    [50] Fei Tang, Hongda Li and Jinyong Chang, Multi-Use Unidirectional Proxy Re-Signatures of Constant Size Without Random Oracles. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.3, pp. 898-905, 2015.

    [51] Fei Tang, Hongda Li and Jinyong Chang, Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.2, pp. 762-766, 2015.

    [52] Jinyong Chang and Rui Xue, KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. In 11th International Conference on Security and Cryptography, SECRYPT 2014, pp. 299-306, Vienna, Austria.

    [53] Jinyong Chang and Rui Xue, On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E97-A, No.11, pp. 2267-2271, November, 2014.

    [54] Meihua Wei, Jinyong Chang and Lan Qi, Existence and Statility of Positive Steady-State Solutions for a Lotka-Volterra System with Intraspecific Competition. Advances in Difference Equations. May 30, 2014.

    [55] Jinyong Chang and Rui Xue, General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. Journal of Software. Vol. 9(10), pp. 2557-2563, October, 2014.

    [56] 常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性. 密码学报,1(3): 235-243, 2014.

    [57] Jinyong Chang, Note on Ground States of a Nonlinear Schrodinger System. Journal of Mathematical Analysis and Applications. 381(2), pp. 957-962, September, 2011.

    [58] Jinyong Chang and Zhaoli Liu, Ground States of Nonlinear Schrodinger Systems. Proceedings of the American Mathematics Society. 138(2), pp. 687-693, Feb. 2010.

     

     

    学术专著

    常金勇著,公钥加密体制下的 KDM 加密方案和安全性研究,哈尔滨工业大学出版社,2020.4.

    发明专利

    [1] 常金勇; 邵必林; 边根庆; 籍艳艳; 段东立; 任乔川; 陈怡心; 管学宁; 赵宇博; 一种应用于智慧医疗系统的高效数据管理方法, 2021-11-16, 中国, 202111146688.0

    [2] 常金勇; 邵必林; 边根庆; 籍艳艳; 贾雷刚; 张维琪; 张翔; 叶娜 ; 一种适用于多副本-多云情形下的无证书云审计方法, 2020-8-31, 中国, 202010366211.2

    [3] 常金勇; 边根庆; 邵必林; 籍艳艳; 贾雷刚; 段东立; 张维琪; 张翔; 胡珍; 胡晓丽; 一种适用于第三方审计的高效云数据完整性验证方法, 2019-10-19, 中国, 201910996223.0

    [4] 张芙宁; 常金勇; 籍艳艳; 田源; 适用于雾-云物联网应用场景下的重签名公共审计方法, 2024-4-30, 中国,2024105406782

    [5] 张芙宁; 常金勇; 籍艳艳; 田源; 一种能高效容错并抵抗串通攻击的轻量化数据聚合方法, 2024-4-30, 中国,2024105406763

     

    科研奖励

    常金勇(3/4); 多机理耦合的复杂系统临界相变分析及抗毁性评估, 陕西省教育厅, 陕西省高等学校科学技术研究优秀成果奖, 省部二等奖, 2022


学生信息
当前位置:教师主页 > 学生信息
入学日期
所学专业
学号
学位
招生信息
当前位置:教师主页 > 招生信息
招生学院
招生专业
研究方向
招生人数
推免人数
考试方式
招生类别
招生年份

西安建筑科技大学研究生院招生办公室

360eol提供技术支持

Copyright © 2011 -All Rights Reserved 苏ICP备08015343号-4

文件上传中...

分享
回到
首页
回到
顶部