首页 | 学院概况 | 语言文字 | 人才培养 | 科学研究 | 学生园地 | 两学一做 | 师资团队 | 下载专区 | English 
教师风采
 

胡春强


  姓名:胡春强

  职称:研究员/博导

  研究方向:应用密码学,大数据和物联网安全与隐私保护

  邮箱:chu@cqu.edu.cn

      胡春强现任威尼斯在线平台“百人计划”研究员、博士生导师,美国乔治华盛顿大学和威尼斯在线平台双博士。ACM和IEEE会员。曾为美国乔治华盛顿大学访问学者,美国天主教大学博士后研究员。研究领域包括大数据和物联网安全,隐私感知计算,网络空间安全与隐私保护及应用密码学。目前以项目负责人身份承担国家自然科学基金(青年)项目1项,重庆市自然科学基金1项,重庆市留学人员回国创新支持计划项目1项(优秀资助),以主研身份参加中国国家自然科学基金项目(面上) 2项和美国NSF项目4项。目前已发表学术论文40余篇。包括在IEEE JSAC,IEEE TII,IEEE IoT, IEEE TBD, IEEE TMSCS, IEEE TPDS, IEEE TCC,IEEE TVT和IEEE INFOCOM等顶级期刊和会议上发表论文30多篇,曾荣获ACM PAMCO 2016最佳论文奖。曾担任多个国际会议程序委员会委员WASA,  IIKI等;同时担任40多个国际权威期刊和会议评审,包括IEEE TIFS, IEEE TII, IEEE TCYB, IEEE IoT, IEEE TPDS,IEEE TMC,IEEE TSC,IEEE TCC及会议评审IEEE INFOCOM 2015, 2016, 2017, 2018; IEEE Globecom 2016; IEEE MASS 2016; IEEE-ACM IWQoS 2014; IEEE MiSeNet 2014; WASA 2012, 2013, 2014, 2015, 2016, 2017; DCOSS 2012, 2014; Crowncom 2013, IEEE ICC 2013, 2015, 2016, 2018。


Google Scholar Citation:https://scholar.google.com/citations?user=IGmdR7YAAAAJ&hl=en   

Personal Homepage: https://sites.google.com/site/huchunqiangcharlie/ 

部分科研项目:

  • 重庆市留学人员回国创新支持计划项目(优秀资助):云/雾计算环境下电子医疗数据安全和隐私保护关键技术研究,2018/09.

  • 重庆市科技计划项目基础科学与前沿技术研究专项:智能医疗安全与隐私保护体系关键技术研究,2018/07--2021/06,项目负责人

  • 国家自然科学基金青年基金项目:云/雾计算环境下电子医疗数据安全和隐私保护关键技术研究,2018/01--2020/12,项目负责人

  • 国家自然科学基金项目面上项目:无线体域网中数据安全与隐私保护关键技术研究,2017/01--2020/12,项目参与(4/10)

  • 国家自然科学基金项目面上项目:云计算框架下大规模科学计算安全外包协议研究,2015/01--2018/12,项目参与(2/10)

News:

  • [2018/08] Two papers are accepted by IEEE Symposium on Privacy-Aware Computing (PAC) 2018.

  • [2018/05] One paper  is accepted by IEEE Transactions on Vehicular Technology.

  • [2018/04] Two papers are accepted by WASA 2018.

  • [2017/10] Dr. Hu is invited to give a research talk in Qufu Normal University.

  • [2017/08] Dr. Hu is invited to give a research talk in CAS.

  • [2017/07] Dr. Hu is invited to give a research talk in HotPrivacy Workshop in conjunction with IEEEPAC 2017 in Washington DC.

  • [2017/06] Our paper is accepted by IEEE Access.

  • [2017/05] Our paper is accepted by International Journal of Sensor Networks.

  • [2017/04] Our paper is accepted by IEEE Access.

  • [2017/04] Our paper is accepted by IEEE Transactions on Industrial Informatics.

  • [2017/03] Three papers are accepted by WASA 2017.

  • [2017/02] Our paper is accepted by IEEE Internet of Things Journal.

Awards/Grants:

  • Best Paper Award, WASA 2018.

  • Best Paper Award, ACM PAMCO 2016.

  • Graduate Merit Award, The George Washington University (GWU), 2016.

  • Norris & Betty Hekimian Engineering Endowment Fellowship, GWU, 2013.

  • Summer School Travel Grant, the 2nd WiFiUS, 2013.

  • Student Travel Grant, GWU& NSF for attending to IEEE INFOCOM 2013 &ACM WiSec 2013.

Student:

  • Ph.D. Student: 蒲誉文 (2018.09--)

  • Master Student: 罗进 (2018.09--), 王颖 (2018.09--)

Selected Publications(*corresponding author, # co-first author)

  • Peer-Reviewed Journals:

    [23] Qin Hu, Shengling Wang, Chunqiang Hu, Jianhui Huang, Wei Li, Xiuzhen Cheng, ''Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services,''  to appear in IEEE Transactions on Vehicular Technology.

    [22] Arwa Alrawais, Abdulrahman Alhothaily, Jiguo Yu, Chunqiang Hu*, Xiuzhen Cheng, ''SecureGuard: A Certificate Validation System in Public Key Infrastructure,'' to appear in IEEE Transactions on Vehicular Technology.

    [21] Chunqiang Hu, Hang Liu, Liran Ma, Yan Huo, Arwa Alrawais, Xiuhua Li, Hong Li, Qingyu Xiong, "A Secure and Scalable Data Communication Scheme in Smart Grids," to appear in Wireless Communications and Mobile Computing (WCMC) (SCI, IF: 1.899, CCF Rank C)

    [20]Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, Limin Sun."CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids." Mathematical Foundations of Computing. Vol.1, No.1, 2018, pp.77-100.

    [19]Chunqiang Hu, Ruinian Li, Bo Mei, Wei Li, Arwa Alrawais and Rongfang Bie, Privacy-Preserving Combinatorial Auction Without an Auctioneer," EURASIP Journal on Wireless Communications and Networking, 2018, 38: 1-8 (SCI, Impact Factor: 1.529)

    [18] Yanfei Lu, Xu Wang, Chunqiang Hu, Hui Li, Yan Huo,  "A Traceable Threshold Attribute-Based Signcryption for m-Healthcare Social Network," International Journal of Sensor Networks, Vol.26, No.1, 2018, pp.43-53 (SCI)

    [17] Yan Huo, Yuqi Tian, Chunqiang Hu, Qinghe Gao, Tao Jing, "A Location Prediction-based Helper Selection Scheme for Suspicious Eavesdroppers," EURASIP Journal on Wireless Communications and Mobile Computing (WCMC), Vol. 2017, 2017, Article ID 1832051, pp. 1-11. (SCI, Impact Factor: 1.899, CCF Rank C)

    [16]Liang Huang, Xin Fan, Yan Huo, Chunqiang Hu, Yuqi Tian, Jin Qian, "A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI,"  IEEE Access, Vol.5, 2017, pp. 26476-26486. (SCI, Impact Factor: 3.244)

    [15] Abudulrahman Alhothaily, Chunqiang Hu*, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng, Dechang Chen, "A Secure and Practical Authentication Scheme Using Personal Devices," IEEE Access, Vol.5, No.1, 2017, pp.11677-11687. (SCI, IF: 3.244)

    [14] Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu*, Xiuzhen Cheng, Xiaoshuang Xing, "An Attribute-Based Encryption Scheme to Secure Fog Communications,"  IEEE Access, Vol.5, 2017, pp:9131-9138 (SCI, IF: 3.244)

    [13] Kai Xing, Chunqiang Hu #*, Jiguo Yu, Xiuzhen Cheng and Fengjuan Zhang,"Mutual Privacy Preserving k-Means Clustering in Social Participatory Sensing," IEEE Transactions on Industrial Informatics, Vol.13, No.4, 2017, pp. 2066-2076. (SCI, IF: 6.764)

    [12] Yan Huo, Chunqiang Hu, Xiaowei Qi, Tao Jing, "LoDPD: A Location Difference-based Proximity Detection Protocol,"  IEEE Internet of Things Journal, Vol.4, No.5, 2017, pp.1117-1124. (SCI, IF: 7.596)

    [11] Chunqiang Hu, Yan Huo, "Efficient Privacy-Preserving Dot-Product Computation for Mobile Big Data," IET Communications, Vol.11, No.5, 2017, pp. 704-712. (SCI, CCF Rank C)

    [10] Chunqiang Hu, Wei Li, Xiuzhen Cheng, Jiguo Yu, Shengling Wang, and Rongfang Bie, "A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds,"  to appear in IEEE Transactions on Big Data 2017. (The paper has been the 8th (02/2017), the 11th(03/2017), the 17th (04/2017), the 34th (05/2017), the 40th (06/2017), the 47th (07/2017) most frequently accessed document from IEEEXplore for IEEE Transactions on Big Data.)

    [9] Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, Xiuzhen Cheng, "Fog Computing for the Internet of Things: Security and Privacy Issues," IEEE Internet Computing, Vol. 21, No. 2, 2017, pp. 34-42 (SCI, IF: 1.4) (The paper has been the first ( from 03/2017 to 12/2017), the second (01/2018) most frequently accessed document from IEEEXplore for IEEE Internet Computing.)

    [8] Wei Li, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, and  Rongfang Bie,"Secure Multi-Unit Sealed First-Price Auction Mechanism," Security and Communication Networks Journal. Vol. 9, No. 16, 2016, pp. 3833-3843. (SCI, CCF Rank C)

    [7] Chunqiang Hu, Hongjuan Li, Yan Huo, Tao Xiang and Xiaofeng Liao, "Secure and Efficient Data Communication Protocol for Wireless Body Area Networks," IEEE  Transactions on Multi-Scale Computing Systems, Vol. 2, No. 2, 2016, pp.94-107. (The paper has been the 4th (11/2016), the 3rd(11/2016), the 4th(01/2017), the 5th(02/2017), the 8th(03/2017), the 6th(04/2017), the 9th(05/2017), the 13th(06/2017), the 6th(07/2017), the 11th(08/2017), the 22nd(09/2017) the 14th(10/2017), the 12th(11/2017), the 28th(12/2017), the 12th(01/2018) most frequently accessed document from IEEEXplore for IEEE  Transactions on Multi-Scale Computing Systems.)

    [6] Tao Jing, Ping Lin, Yanfei Lu, Chunqiang Hu, and Yan Huo, "FPODG: A Flexible and Private Proximity Testing Based on ``One Degree'' Grid," International Journal of Sensor Networks, Vol.20, No.3, pp. 199-207, 2016. (SCI)

    [5] Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Chunqiang Hu, and Nan Zhang, "Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.25, No.8, 2014, pp. 2190-2200. (SCI, Impact Factor: 2.173, CCF Rank A)

    [4] Chunqiang Hu, Nan Zhang, Hongjuan Li, Xiuzhen Cheng, and Xiaofeng Liao, "Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme," IEEE Journal on Selected Areas in Communications, Vol.31, No.9, 2013, pp.37-46. (SCI, IF: 8.085, CCF Rank A)

    [3] Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, and Chunqiang Hu, "Outsourcing Large Matrix Inversion Computation to A Public Cloud," IEEE Transactions on Cloud Computing, Vol.1, No.1, 2013, pp. 78-87. (SCI)

    [2] Chunqiang Hu, Xiaofeng Liao, and Xiuzhen Cheng,"Verifiable Multi-Secret Sharing Schemes based on LFSR sequences,"  Theoretical Computer Science, Issue:445, 2012, pp. 52-62. (SCI, CCF Rank B)

    [1] Chunqiang Hu, Xiaofeng Liao, and Di Xiao,"Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem,"  International Journal of Wavelets, Multi-resolution and Information Processing, Vol.10, No.3, 2012, pp.1-18(1250023). (SCI, IF: 1.306)

  • Peer-Reviewed Conference/Workshop Papers:

    [21]Wei Li, Chunqiang Hu*, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai, Privacy Preser-ving Data Collection in Context-Aware Applications, to appear in IEEE Symposium on Privacy-Aware Computing (PAC) 2018.

    [20]Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang, "An Efficient Privacy-Preserving Data Aggregation Scheme for IoT,"  to appear in WASA 2018 (CCF C)

    [19] Jingjing Fan, Yan Huo, Xin Fan, Chunqiang Hu, Guanlin Jing, "A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications,"  to appear in WASA 2018 (CCF C)

    [18] Abdulrahman Alhothaily, Arwa Alrawais, Chunqiang Hu*, Wei Li, Xiuzhen Cheng, "One-Time-Username: A Threshold-based Authentication System," Procedia Computer Science. Vol. 129, 2018, pp. 426-432.

    [17] Honglu Liang, Jiguo Yu, Chunqiang Hu, Lu Zhang, Qi Sun, "SA Framework based De-anonymization of Social Networks," Procedia Computer Science. Vol. 129, 2018, pp. 358-363.

    [16] Lu Zhang, Jiguo Yu, Chunqiang Hu, Honglu Jiang, Qi Sun, "Fine-grained Access Control with Privacy Support and Network Service Optimization in Ad hoc Network," Procedia Computer Science. Vol. 129, 2018, pp. 372-374.

    [15] Ying Deng, Chunqiang Hu*, Rongrong Deng, Denghui Liang, "A Secure Communication Architecture in the Smart Grid," to appear in  International Conference on Information, Cybernetics, and Computational Social Systems (ICCSS) 2017, pp. 668-672.

    [14] Chunqiang Hu, Yan Huo, Liran Ma, Hang Liu, Shaojiang Deng, Liping Feng, "An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids," in the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 469-482, 2017. (CCF Rank C) (Acceptance ratio: 29.4%)

    [13] Xin Fan, Liang Huang, Yan Huo, Chunqiang Hu, Yuqi Tian,"Space Power Synthesis-based Cooperative Jamming for Unknown Channel State Information," in the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 483-495, 2017. (CCF Rank C) (Acceptance ratio: 29.4%)

    [12] Yuqi Tian, Yan Huo, Chunqiang Hu, Qinghe Gao, Tao Jing,"A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers," in the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 854-859, 2017. (Short Paper) (CCF Rank C)

    [11] Chunqiang Hu, Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Carl Sturtivant, Hang Liu, "A Secure and Verifiable Outsourcing Scheme for Matrix Inverse Computation," in INFOCOM 2017, pp. 1-9. (CCF Rank A) (Acceptance ratio: 20.9%)

    [10] Talal Alharbi, Ahamed Aljuhani, Hang Liu, Chunqiang Hu, "Smart and Lightweight DDoS Detection Using NFV," in ACM ICCDA, pp.220-227, 2017.

    [9] Chunqiang Hu, Ruinian Li, Wei Li, Jiguo Yu, Zhi Tian, Rongfang Bie. "Efficient Privacy-Preserving Schemes for Dot-Product Computation in Mobile Computing," ACM PAMCO 2016 in conjunction with ACM MobiHoc 2016, pp. 51-59. (Best Paper Award)

    [8] Abdulrahman Alhothaily, Chunqiang Hu, Arwa Alrawais, Xiuzhen Cheng, "An Efficient Remote Authentication Scheme Using Dynamic Usernames," to appear in ICCCN 2016. (CCF Rank C)

    [7] Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, and Limin Sun,"An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications," in the 11th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 418-437, 2015. (CCF Rank C)(Acceptance ratio: 27%)

    [6] Maya Larson, Chunqiang Hu, Ruinian Li, Wei Li, and Xiuzhen Cheng,"Secure Auctions without an Auctioneer via Verifiable Secret Sharing," in ACM PAMCO'15: 2015 Workshop on Privacy-Aware Mobile Computing in conjunction with ACM MobiHoc, pp.1-6, 2015.

    [5] Maya Larson, Ruinian Li, Chunqiang Hu, Wei Li, Xiuzhen Cheng, and Rongfang Bie, "A Bidder-Oriented Privacy-Preserving VCG Auction Scheme," in the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp.284-294, 2015. (CCF Rank C)(Acceptance ratio: 27.1%)

    [4] Maya Larson, Wei Li, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, and Rongfang Bie,"A Secure Multi-Unit Sealed First-Price Auction Mechanism," in the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 295-304, 2015. (CCF Rank C)(Acceptance ratio: 27.1%)

    [3] Chunqiang Hu, Fan Zhang, Tao Xiang, and Xiao Xiao, "A Practically Optimized Implementation of Attribute Based Cryptosystems," in the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), pp.197-204, 2014. (CCF Rank C) (Acceptance ratio: 31.7%)

    [2] Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, and Dechang Chen, "OPFKA: Secure and Efficient Ordered-Physiological-Feature based Key Agreement for Wireless Body Area Networks,"  in IEEE INFOCOM, pp.2322-2330, 2013. (CCF Rank A) (Acceptance ratio: 17%)

    [1] Chunqiang Hu, Fan Zhang, Xiuzhen Cheng, Xiaofeng Liao, and Dechang Chen,"Securing communications between external users and wireless body area networks," in ACM HotWiSec, pp.31-35, 2013.

Professional Affiliations and Service:

  • Member of IEEE (Since 01/2014)

  • Member of  ACM (Since 01/2016)

  • Technical Program Committee (TPC) member: IIKI 2014, 2015, 2016; WASA 2014, 2015, 2016.

  • Journal Referee:

    [1] IEEE Transactions on Parallel \& Distributed Systems (TPDS),

    [2] IEEE Transactions on Information Forensics and Security (TIFS),

    [3] IEEE Transactions on Services Computing (TSC),

    [4] IEEE Transactions on Mobile Computing,

    [5] IEEE Transactions on Cloud Computing,

    [6] IEEE Transactions on Industrial Informatics,

    [7] IEEE Transactions on Cybernetics,

    [8] IEEE Internet of Things Journal,

    [9] EURASIP Journal on Wireless Communications and Networking,

    [10] Information Sciences,  

    [11] International Journal of Computer Networks,

    [12] International Journal of Sensor Networks,

    [13] International Journal of Distributed Sensor Networks,

    [14] Journal of Applied Mathematics,

    [15] Neural Computing and Applications,

    [16] Journal of Network and Systems Management,

    [17] International Journal of Communication Systems,

    [18] Peer-to-Peer Networking and Applications,

    [19] IET Communications,

    [20] IEEE Access, 

    [21] Computers \& Security,

    [22] Mobile Information Systems,

    [23] The Computer Journal,

    [24] IETE Journal of Research,

    [25] Multimedia Tools and Applications,

    [26] Security and Communication Networks,

    [27] Digital Communications and Networks,

    [28] Ad Hoc Networks,

    [29] Computer Networks

  • Conference Referee:

    [1] IEEE INFOCOM 2015, 2016, 2018;

    [2] IEEE ICC 2013, 2015, 2016, 2018;

    [3] IEEE Globecom 2016; 

    [4] IEEE MASS 2016;

    [5] IEEE-ACM IWQoS 2014;

    [6] IEEE MiSeNet 2014;

    [7] WASA 2012, 2013, 2014, 2015, 2016, 2017;

    [8] DCOSS 2012, 2014;

    [9] Crowncom 2013.

INVITED TALKS/PRESENTATIONS

  • Securing Body Area Networks--Key Management and Access Control, Qufu Normal University, China, October, 2017.

  • Achieving Privacy Preservation and Billing via Delayed Information Release, HotPrivacy Workshop in conjunction with IEEE PAC 2017, August 1-3, 2017, Washington DC.

  • Big Data Security and Privacy--Access Control and Secure Computation, Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China, August, 2017.

  • Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, North China University of Technology, March, 2017.

  • Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, Shandong University, September, 2016.

  • Securing Body Area Networks-Key Management and Access Control,  Chongqing University of Technology, September, 2016.

  • Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications,  Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China, September, 2015.

  • Privacy-Preserving and Secure Cryptographic Schemes for Wireless Applications, Wireless Network and Information Perception Center, Beijing Jiaotong University, China, August, 2015.

 


Copyright ? 2011-2020 威尼斯在线平台 大数据与软件学院. All Rights Reserved
地址:重庆市大学城·威尼斯在线平台虎溪校区行政楼B2栋 电话:65678333  65112331 邮政编码:401331


XML 地图 | Sitemap 地图