刘颖
近期热点
资料介绍
个人简历
教学工作计算机网络;下一代互联网研究性专题;IP路由原理与技术;软件工程;TCP/IP网络原理与技术;高等路由原理与技术(研究生课程)教育背景1996年~2000年,北京交通大学计算机科学与技术系 , 学士 2000年~2003年,北京交通大学电子信息工程学院, 硕士 2006年~2011年,北京交通大学电子信息工程学院, 博士 工作经历2003年~至今,工作于北京交通大学电子信息工程学院。 2014.06~2015.06,美国俄勒冈大学,国家公派访问学者。研究领域
研究方向信息网络电子与通信工程(专业学位)"专利[1] 刘颖,万明,张宏科,唐建强,用于标识分离映射网络的网络认证方法、装置以及系统,授权号:ZL201010221126.3 [2] 刘颖,万明,张宏科,唐建强,张栋纯,一种基于标识分离映射网络的路由映射欺骗防范方法,授权号:ZL201110127032.4 [3] 刘颖,张宏科,周华春,唐建强,基于身份与位置分离映射机制的DoS攻击防御方法,授权号:ZL 201110404999.2 [4] 刘颖,万明,张宏科,基于标识分离映射网络的映射缓存DoS攻击防御方法,授权号:ZL 201110306435.5 [5] 刘颖,万明,张宏科,周华春,唐建强,一种基于映射请求的DDoS检测与响应方法,授权号:ZL201110456012.1 [5] 刘颖,唐建强,周华春,张宏科,一种身份与位置分离体系下的安全移动性管理方法,授权号:ZL201210530551.X [7] 刘颖,唐建强,周华春,张宏科. 一种基于分离映射网络使用数字证书验证用户身份的方法,授权号:ZL200910093355.9 [8] 刘颖,张宏科,万明,姜巍. 一种标识分离映射网络中IPSec网关自动发现的方法,授权号:ZL201010515937.4 [9] 刘颖,万明,张宏科,唐建强. 用于标识分离映射网络的网络认证方法、装置以及系统,授权号:ZL201010221126.3 [10] 张宏科,刘颖,万明,唐建强. 用于标识分离映射网络的数据分析装置及其方法近期论文
论文/期刊1.Ying Liu, Ting Zhi, Hongke Zhang, et al. A Novel Content Popularity Prediction Algorithm Based on Auto Regressive Model in information-Centric IoT, IEEE ACCESS, 2019,Vol. 01, 27555-27564 (SCI检索) 2.YingLiu, JianqiangTang,Meng Zhang. Impact of Identifier-Locator Split Mechanismon DDoS Attacks, Journal of Information Science and Engineering, 2013, Vol. 29, 1097-1107(SCI检索) 3.Ying Liu, Yang Sun Lee, Hong-Ke Zhang, Tin-Yu Wu, and Chi-Hsiang Lo. Modelling and simulation for DDoS attacks mitigation in identifier-locator split network,International Journal Of Computer Mathematics,2013, Vol. 90,2541-2552 (SCI检索) 4.Ying Liu, Ming Wan, Hongke Zhang, Sidong Zhang, Han-Chieh Chao. Research on the Data Reconstruction Method Based on Identifier/Locator Separation Architecture. Journal of Internet Technology, Vol.12, No.4, 2011, pp.531-540.(SCI检索) 5.Ying Liu, Jianqiang Tang, Ming Wan, Hongke Zhang. Auto-Discovery Mechanism of Triggered IPSec Gateway in Separation Network. International Journal of Digital Content Technology and its Applications, Vol.6, No.21, 2012, pp.217-225(EI检索) 6. Ting Zhi,Ying Liu, et al. A Gini Impurity-Based Interest Flooding Attack Defence Mechanism in NDN, IEEE Communications Letters, 2018,Vol. 03, 538-541 (SCI检索) 7. Ying Liu, Ming Wan, Sidong Zhang, Hongke Zhang. Research of the network information monitoring system based on P2DR model. 2010 International conference on computer modeling and simulation. January 2010, Sanya, Hainan, China. pp 190-194. (EI检索:20101712882289) 8. Zhengyang Ai, Ying Liu, Fei Song, et al. A Smart Collaborative Charging Algorithm for Mobile Power Distribution in 5G Networks, IEEE ACCESS, 2018,Vol. 04, 28668-28679 (SCI检索) 9. Ming Wan, Ying Liu, Jianqiang Tang, Hongke Zhang. Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation. International Journal of computational intelligence systems, Vol.5, No.5, 2012, pp.868-877.(SCI检索) 10. 万明, 周华春, 刘颖, 张宏科. 基于身份标签的一体化网络接入认证方案. 铁道学报.Vol.34, No.8, Aug. 2012, pp.70-81. (EI:20124115547492)11. 万明, 刘颖, 张宏科. 位置与身份分离协议下一种基于信任度模型的新型映射机制. 通信学报. Vol.32, No.7, Jul. 2011, pp.133-145.12. Tang Jian-qiang, Liu Ying, Zhou Hua-chun, Zhang Hong-ke, A Network-based Secure Mobility Control Protocol in Locator/Identifier Separation Networks. Journal of Electronics & Information Technology, Vol. 35, No. 1, 2013, pp.151-158. 13. Jianqiang Tang, Ying Liu, Hongke Zhang, Building Lightweight Network-based Capabilities in Network with Locator/Identifier Separation. International Journal of Advancements in Computing Technology, Vol. 5, No. 3, 2013, pp. 86-94. 14. Ting Zhi, Ying Liu and Zhiwei Yan, An Entropy-SVM Based Interest Flooding Attack Detection Method in ICN, 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 2018, pp. 1-5. 15. Ming Wan, Ying Liu, Hongke Zhang. Security Analysis of M-to-N Mapping againstEavesdropping in Identifier-based Universal Network. Proceedings of 2011 4th IEEEInternational Conference on Broadband Network & Multimedia Technology (IC-BNMT2011). Shenzhen, China, Oct. 2011, pp.606-610.IEEE comsoc会员 中国通信学会高级会员 中国计算机学会会员 教育部学位论文评审专家 相关热点