姚燕青
近期热点
资料介绍
个人简历
学习经历\r2010.09-2015.07 北京航空航天大学计算机学院 计算机软件与理论 工学博士 \r2012.08-2014.08 纽约大学柯朗数学科学研究所计算机系应用数学(全美第一)联培博士生 \r\r工作经历\r2020.7至今 北京航空航天大学网络空间安全学院 副教授 \r2018.5-2020.7 北京航空航天大学网络空间安全学院 助理教授 \r2017.1-2018.4 北京航空航天大学计算机学院 助理教授 \r2015.8-2016.12 北京航空航天大学计算机学院 讲师 \r\r荣誉及奖励\r2021年获北京航空航天大学教学成果奖特等奖(12/18)\r2021年获第六届全国密码技术竞赛优秀指导教师奖(学生获一等奖)\r2020年获北京航空航天大学第十批青年拔尖人才支持计划\r2020年获第三届中青杯全国大学生数学建模竞赛优秀指导老师奖 (学生获一等奖)\r2019年获第五届全国密码技术竞赛优秀指导教师奖(学生获二等奖)\r2019年获北京航空航天大学教学成果奖一等奖(5/7)\r2019年获第二届中青杯全国大学生数学建模竞赛优秀指导老师奖(学生获一等奖)\r2018年获中国密码学会优秀博士学位论文奖\r2018年获北京航空航天大学“学科评估优秀组织奖”\r2016年获北京航空航天大学“蓝天新秀”称号研究领域
"密码学(如基于非完美随机源的密码学、基于格的密码学、弹性泄漏非延展密码编码学等)、隐私保护技术(如差分隐私、可搜索加密、区块链隐私保护等)、人工智能安全等"近期论文
Yevgeniy Dodis, Yanqing Yao. Privacy with Imperfect Randomness. CRYPTO (2) 2015, vol. 9216, pages 463-482. ( EI, 按姓氏排序, 国际密码学领域顶会, 北航首篇, CCF:A类)\r\rYanqing Yao, Zhoujun Li. Differential Privacy With Bias-Control Limited Sources. IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1230-1241. (SCI, JCR分区: Q1, IF: 6.211, CCF:A类)\r\rYanqing Yao, Zhoujun Li, Hua Guo. A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes. Information Sciences, 2020, 516: 505-514. (SCI, JCR分区: Q1, IF: 5.524, CCF:B类)\r\rYanqing Yao, Zhengde Zhai, Jianwei Liu, Zhoujun Li. Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage. IEEE Access, 2019, 7: 164544-164555. (SCI, JCR分区: Q1, IF: 4.098)\r\rYanqing Yao. A Generalized Constraint of Privacy: α-Mutual Information Security. IEEE Access, 2019, 7: 36122-36131. (SCI, JCR分区: Q1, IF: 4.098)\r\rYanqing Yao, Jusheng Mi, Zhoujun Li. A novel variable precision (θ,σ)-fuzzy rough set model based on fuzzy granules. Fuzzy Sets and Systems, 2014, 236(1): 58-72. (SCI, 计算机领域 JCR分区: Q1, IF: 2.907)\r\rYanqing Yao, Jusheng Mi, Zhoujun Li. Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems. Fuzzy Sets and Systems, 2011, 170(1): 64-75. (SCI, JCR分区: Q1,IF: 2.907)\r\rYanqing Yao, Zhoujun Li. Security of Weak Secrets based Cryptographic Primitives via the Rényi Entropy. IET Information Security, 2016, 10(6): 442-450. (SCIE,JCR分区:Q3, IF: 0.949,中国密码学会:B类)\r\rYanqing Yao, Zhoujun Li. A novel fuzzy identity based signature scheme based on the short integer solution problem. Computers & Electrical Engineering, 2014, 40(6): 1930-1939. (SCIE, JCR分区: Q2, IF: 2.189)\r\rYanqing Yao, Jusheng Mi, Zhoujun Li, Bin Xie. The construction of fuzzy concept lattices based on (θ,σ)-fuzzy rough approximation operators. Fundamenta Informaticae, 2011, 111(1): 33-45. (SCIE, JCR分区: Q2, IF: 1.204)\r\rHua Guo, Chang Xu, Zhoujun Li, Yanqing Yao, Yi Mu. Efficient and dynamic key management for multiple identities in identity-based systems. Information Sciences, 2013, 221: 579-590. (SCI, JCR分区: Q1, IF: 5.524,CCF:B 类)\r\rXuefeng Xu, Yanqing Yao, Lei Cheng. Deep Learning Algorithms Design and Implementation Based on Differential Privacy. ML4CS (1) 2020: 317-330. (EI)\r\rXianfu Cheng, Yanqing Yao, Ao Liu. An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm. ML4CS (1) 2020: 340-354. (EI)\r\rAo Liu, Yanqing Yao, Xianfu Cheng. Recommender Systems with Condensed Local Differential Privacy. ML4CS (1) 2020: 355-365. (EI)\r\rYanqing Yao, Zhoujun Li. Non-Malleable Extractors with Shorter Seeds and Their Applications. Indocrypt 2015, vol. 9462, pages 293-311. (EI)\r\rYanqing Yao, Zhoujun Li. Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy. Information Theoretic Security-7 International Conference, ICITS 2013, vol. 8317, pages 162-178. (EI)\r\rYanqing Yao, Zhoujun Li, Hua Guo. A Novel Nonlinear Network Coding Signature Scheme Determined by the SIS Problem. International Journal of Security and Its Applications, 2012, 6(2): 403-408. (EI)\r\rYanqing Yao, Jusheng Mi. Fuzzy concept lattices determined by (θ, σ)-fuzzy rough approximation operators. Rough Sets and Knowledge Technology-4th International Conference, RSKT 2009, vol. 5589, pages 601-609. (EI)\r\r姚燕青, 李舟军. 基于非完美随机源的密码学原语的安全性综述.信息安全学报,2016, 1(2): 28-35.\r\r姚燕青, 米据生. 直觉模糊集上的混合单调包含度. 计算机科学,2010, 37(1): 251-257, 274. (原文被评为CRSSC-CWI-CGrC’ 2009优秀学生论文)中国密码学会会员担任第三届International Conference on Machine Learning for Cyber Security的Program Committee 委员担任IEEE Transactions on Vehicular Technology、IEEE Transactions on Fuzzy Systems、Information Sciences等多个重要的国际会议和期刊的评审人 相关热点