杨安家
姓名 | 杨安家 |
性别 | 教授 |
学校 | 暨南大学 |
部门 | 网络空间安全学院 |
学位 | 香港城市大学 |
学历 | 网络空间安全学院 |
职称 | 香港城市大学 |
联系方式 | 【发送到邮箱】 |
邮箱 | 【发送到邮箱】 |
人气 | |
软件产品登记测试 软件著作权666元代写全部资料 实用新型专利1875代写全部资料 集群智慧云企服 / 知识产权申请大平台 微信客服在线:543646 急速申请 包写包过 办事快、准、稳 |
导航 个人简介 学习经历 工作经历 研究方向 主要论文 主要著作 承担课题,个人信息 姓名: 杨安家 部门: 网络空间安全学院 性别: 男 职称: 教授 学位: 博士 毕业院校: 香港城市大学 电子邮箱: anjiayang@gmail.com 联系方式 Email: anjiayang@gmail.com 个人简介 杨安家,男,博士、教授。2011年9月至2015年8月就读于香港城市大学计算机系并获博士学位(导师为Duncan S. Wong教授)。2015年9月至2019年10月先后在香港城市大学和暨南大学进行博士后研究工作(合作导师分别为Gerhard P. Hancke教授、翁健教授),其中2018年至2019年在加拿大滑铁卢大学电子科学与工程系沈学民教授课题组进行学术访问。研究方向为应用密码学和信息安全,近5年主要在物联网安全、车载网络安全、区块链安全,以及云安全等方面展开工作。在NDSS、ESORICS、WiSec、ICICS、IEEE TIFS、IEEE TDSC、IEEE TMC、IEEE TPDS、IEEE TSC、IEEE TCC、IEEE TITS、IEEE TSG、IEEE TVT、IEEE TETC等密码学与信息安全著名国际会议和国际期刊上发表论文60余篇。主持或参与了国家重点研发计划子课题、国家自然科学基金面上项目、国家自然科学基金青年基金项目、广东省重点研发领域计划项目课题、中国博士后基金面上项目等多项项目。申请及获授权发明专利10余项,参与制定行业标准1项。担任《Security and Communication Networks》、《Symmetry》国际期刊的学术编委和客座编委。担任Globecom 2017-2023、TrustCom 2020-2023、UbiSec 2021-2022、PST 2023、Blockchain 2018-2023、WISTP 2017-2019等20余个国际会议程序委员会委员。长期担任IEEE TDSC、IEEE TIFS、IEEE TMC、ACM TECS、IEEE TII、IEEE TIE、IEEE IoTJ、《软件学报》等20多个国内外学术期刊以及ACNS、ACISP、SecureComm、ICICS、Globecom、TrustCom、Inscrypt等十余个国际学术会议的审稿人。个人主页:https://sites.google.com/view/anjia-yang/home?authuser=0 学习经历 2011.09-2015.08 香港城市大学 计算机系 博士2007.09-2011.06 吉林大学 计算机科学与技术(网络与信息安全专业) 本科 工作经历 2022.10-至今 暨南大学网络空间安全学院 教授2019.10-2022.10 暨南大学网络空间安全学院 副研究员2018.05-2019.09 滑铁卢大学电气与计算机工程系 访问学者2016.12-2019.10 暨南大学网络空间安全学院 博士后2015.09-2016.07 香港城市大学计算机系 博士后 研究方向 物联网安全、区块链安全、隐私计算、数据安全、应用密码学等。招生意向计划每年招收学术型硕士生1-2名,择优培养,培养模式规格严格。期待有一定的数学、密码基础,对应用密码学尤其是区块链安全、物联网安全、隐私计算等方向感兴趣的同学加入。计划每年招收专业型硕士生1名,具有丰富的编程经验优先。有意向读博士的同学在联系我时请附一份研究计划。友情提示:希望学生具有以下品质 (课题组要求严格,请慎重考虑是否加入!希望能找到志同道合的学生共同进步!):1)态度第一、能力第二。躺平族、忽悠族、混学位族等抱有摸鱼心态的请勿联系,以免双方都痛苦!2)有好奇心、强烈的求知/探索欲望和较独立的思考能力。3)有面对困难不轻易放弃的毅力,因为探索科学问题会经常遭遇失败,有坐冷板凳的思想准备,因为科研需要时间。4)有良好的沟通表达能力和英文书写能力。5)乐观开朗,热爱生活,具备团队精神。 主要论文 期刊论文[J50] Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen. Fuzzy Identity-based Matchmaking Encryption and Its Application, IEEE Transactions on Information Forensics & Security, in press, 2023[J49] Axin Wu, Weiqi Luo, Anjia Yang, Yinghui Zhang, Jianhao Zhu. Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing, IEEE Transactions on Services Computing, in press, 2023[J48] Tao Li(研究生), Anjia Yang*, Jian Weng, Min-Rong Chen, Xizhao Luo, Xiaohu Chen, and Changkun Jiang. Enabling Secure and Flexible Streaming Media with Blockchain Incentive, IEEE Internet of Things Journal, in press, 2023[J47] Shuyuan Lin, Anjia Yang, Taotao Lai, Jian Weng, and Hanzi Wang. Multi-motion Segmentation via Co-attention Induced Heterogeneous Model Fitting, IEEE Transactions on Circuits and Systems for Video Technology, in press, 2023[J46] Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li. VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder,IEEE Transactions on Dependable and Secure Computing, in press, 2023[J45] Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen. Backdoor-Resistant Public Data Integrity Verification Scheme based on Smart Contracts, IEEE Internet of Things Journal,vol. 10(16), pp. 14269-14284,2023[J44] Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng. PPOLQ: Privacy-Preserving Optimal Location Query with Multiple-Condition Filter in Outsourced Environments, IEEE Transactions on Services Computing, in press, 2023[J43] Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang. PriGenX: Privacy-preserving Query, IEEE Transactions on Dependable and Secure Computing, in press, 2023[J42] Yaqing Song, Yuan Zhang, Chunxiang Xu, Shiyu Li, Anjia Yang, Nan Cheng, Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution against Irresponsible Service Providers, IEEE Internet of Things Journal, vol. 10(17), pp. 15563-15580, 2023[J41] Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu. pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2218-2233, 2023[J40] Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin (Sherman) Shen. Multi-client Secure and Efficient DPF-based Keyword Search for Cloud Storage, IEEE Transactions on Dependable and Secure Computing, in press, 2023[J39] Xiaohu Chen(研究生), Anjia Yang*, Jian Weng, Yao Tong, Cheng Huang, Tao Li, A Blockchain-based Copyright Protection Scheme with Proactive Defense, IEEE Transactions on Services Computing, vol. 16(4), pp. 2316-2329, 2023 [J38] Zilin Liu(研究生), Anjia Yang*, Huang Zeng, Changkun Jiang, and Li Ma, A Generalized Blockchain-Based Government Data Sharing Protocol,Security and Communication Networks, in press, 2023/1/17[J37] Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou, Scalable CCA-Secure Public-Key Authenticated Encryption with Keyword Search from Ideal Lattices in Cloud Computing, Information Sciences, vol. 624, pp. 777-795, 2023[J36] Lulu Han, Weiqi Luo, Anjia Yang, Yandong Zheng, Rongxing Lu, Junzuo Lai, Yudan Cheng, Fully Privacy-preserving Location Recommendation in Outsourced Environments, Ad Hoc Networks, vol. 141, pp. 1-12, 2023[J35] Tao Li(研究生), Anjia Yang*, Jian Weng, Yao Tong, Qingfu Pei. Concurrent and Efficient IoT Data Trading Based on Probabilistic Micropayments, Wireless Networks, vol. 29, pp.607–622, 2023[J34] 李涛(研究生), 杨安家*, 翁健, 郭梓繁. 基于智能合约的工业互联网数据公开审计方案, 软件学报, 2023, 34(3): 1491-1511(Tao Li (研究生), Anjia Yang*, Jian Weng, Zifan Guo. Public Auditing Scheme for Industrial Internet Data Based on Smart Contracts.Journal of Software, vol. 34(3), pp. 1491-1511(in Chinese), 2023) [J33] Xiaohu Chen(研究生), Anjia Yang*, Yao Tong, Jian Weng, Jiasi Weng, and Tao Li, A Multisignature-based Secure and OBU-Friendly Emergency Reporting Scheme in VANET, IEEE Internet of Things Journal, vol. 9(22), pp. 23130-23141, 2022[J32] Axin Wu, Anjia Yang*, Weiqi Luo* and Jinghang Wen, Enabling Traceable and Verifiable Multi-user Forward Secure Searchable Encryption in Hybrid Cloud, IEEE Transactions on Cloud Computing, vol. 11(2), pp. 1886-1898, 2023[J31] Xizhao Luo, Feng Zhou, Chongben Tao, Anjia Yang, Peiyun Zhang and Yonghua Chen, Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNN, IEEE Transactions on Intelligent Transportation Systems, vol. 23(11), pp. 20707-20720, 2022[J30] Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang and Jianfeng Ma, Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study with Multi-party Computation, IEEE Transactions on Dependable and Secure Computing, vol. 20(2), pp. 1243-1257, 2023[J29] Jingyi Zhang, Anjia Yang*, Qiao Hu, Gerhard P. Hancke and Zhe Liu, Revisiting Error-Correction in Pre-Commitment Distance-Bounding Protocols, IEEE Transactions on Industrial Informatics, vol. 18(10), pp. 7097-7106, 2022[J28] Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert Deng, A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing, KSII Transactions on Internet and Information Systems, vol. 15(8), pp. 2827-2848, 2021[J27] Xiang Liu, Anjia Yang*, Cheng Huang, Yuxian Li, Tao Li, and Ming Li, Decentralized Anonymous Authentication with Fair Billing for Space-Ground Integrated Networks, IEEE Transactions on Vehicular Technology, vol. 70(8), pp. 7764-7777, 2021[J26] Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, and Anjia Yang, DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks, IEEE Transactions on Dependable and Secure Computing,vol. 19(5), pp.3183-3199, 2022[J25] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, and Konstantinos Markantonakis, Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns, IEEE Internet of Things Journal, vol. 8(14), pp. 11607-11620, 2021 [J24] Anjia Yang, Jian Weng, Kan Yang, Cheng Huang and Xuemin (Sherman) Shen, Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks, IEEE Transactions on Intelligent Transportation Systems,vol. 23(2), pp. 1284-1298, 2022(ESI高被引论文)[J23] Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou and Duncan S. Wong, Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage, IEEE Transactions on Cloud Computing, vol. 9(1), pp. 212-225, 2021 (ESI高被引论文)[J22] Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen and Xiaodong Lin, Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing based Smart Grid, IEEE Transactions on Smart Grid, vol. 11(1), pp. 247-257, 2020[J21] Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu and Xiaodong Lin, Towards Blockchain-based Fair and Anonymous Ad Dissemination in Vehicular Networks, IEEE Transactions on Vehicular Technology, vol. 68(11), pp. 11248-11259, 2019[J20] Wenjie Yang, Jian Weng, Xinyi Huang, and Anjia Yang, A provably secure certificateless proxy signature scheme against malicious-but-passive KGC attacks, The Computer Journal, vol. 63(8), pp. 1139–1147, 2020[J19] Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang and Robert H. Deng, Looking Back! Using Early Versions of Android Apps as Attack Vectors, IEEE Transactions on Dependable and Secure Computing, vol. 18(2), pp. 652-666, 2021[J18] Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin and Xuemin (Sherman) Shen, DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation, IEEE Transactions on Vehicular Technology, vol. 68(5), pp. 4834-4845, 2019[J17] Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Liu Jia-Nan, Yang Xiang, Robert Deng. CrowdBC: A blockchain-based decentralized framework for crowdsourcing. IEEE Transactions on Parallel and Distributed Systems, vol. 30(6), pp. 1251-1266, 2019 (ESI高被引论文)[J16] Qiao Hu, Yuanzhen Liu, Anjia Yang* and Gerhard Hancke, Preventing Overshadowing Attacks in Self-Jamming Audio Channels, IEEE Transactions on Dependable and Secure Computing, vol. 18(1), pp. 45-57, 2021[J15] Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li and Xiaodong Lin, Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage, IEEE Transactions on Dependable and Secure Computing, vol. 19(3), pp. 1518-1531, 2022[J14] Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang, Notes on a provably-secure certificate-based encryption against malicious CA attacks, Information Sciences, vol. 463-464, pp. 86-91, 2018[J13] Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani, OTP-IoT: An ownership transfer protocol for the Internet of Things,Journal of Information Security and Applications, vol. 43, pp. 73-82, 2018[J12] Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang and Hailiang Li, REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks, IEEE NETWORK, vol. 32(5), pp. 118-123, 2018[J11] Anjia Yang, Yunhui Zhuang, Jian Weng*, Gerhard Hancke, Duncan S. Wong and Guomin Yang, Exploring Relationship between Indistinguishability-based and Unpredictability-Based RFID Privacy Models, Future Generation Computer Systems, vol. 82, pp. 315-326, 2018[J10] Elena Pagnin, Anjia Yang*(通讯作者), Qiao Hu, Gerhard Hancke, Aikaterina Mitrokotsa, HB+DB: Distance Bounding Meets Human Based Authentication, Future Generation Computer Systems, vol. 80, pp. 627-639, 2018[J9] Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, and Anjia Yang, Fully distributed certificateless threshold signature without random oracles, SCIENCE CHINA Information Sciences, Vol. 61, pp. 098101:1–098101:3, 2018[J8] Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong. Two-hop Distance-Bounding Protocols: Keep your Friends Close, IEEE Transactions on Mobile Computing, vol. 17(7), pp. 1723-1736, 2018[J7] Yunhui Zhuang, Anjia Yang*(通讯作者), Gerhard P. Hancke, Duncan S. Wong, Guomin Yang. Energy-Efficient Distance-Bounding with Residual Charge Computation, IEEE Transactions on Emerging Topics in Computing, vol. 8(2), pp. 365-376, 2020[J6] Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang. Strongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGC, Security and Communication Networks, to appear[J5] Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen. Security analysis of some diffusion mechanisms used in chaotic ciphers, International Journal of Bifurcation and Chaos, vol 27(10), pp. 1750155-1:13, 2017[J4] Anjia Yang*, Xiao Tan, Joonsang Baek, Duncan S. Wong, A New ADS-B Authentication Framework based on Efficient Hierarchical Identity-Based Signature with Batch Verification, IEEE Transactions on Services Computing, vol. 10(2), pp. 165-175, 2017[J3] Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard Hancke, Practical Limitation of Co-Operative RFID Jamming Methods in Environments without Accurate Signal Synchronization, Computer Networks, vol. 105, pp.224-236, 2016[J2] Anjia Yang*, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia, A New Unpredictability-Based RFID Forward Privacy Model and a Provably Secure Construction, Secure and Communication Networks, 2015, 8(16):2836-2849[J1] Kaitai Liang, Man Ho Au, Joseph K Liu, Willy Susilo, Duncan S Wong, Guomin Yang, Yong Yu, Anjia Yang, A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing, Future Generation Computer Systems, vol.52, pp.95-108, 2014会议论文[C13] Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng. Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead, the 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2023), Guangzhou, December 4-8, 2023[C12] Cheng Huang, Anjia Yang, Dongxiao Liu, Rongxing Lu, Sherman Shen. Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth, IEEE/CIC International Conference on Communications in China (ICCC), 10-12 August, Dalian, China, 2023 (EI, best paper award)[C11] Yuan Chen(研究生), Anjia Yang*, Zilin Liu, Qingfu Pei, Li Ma, A Crosschain-based Fair Exchange of Products for Poverty Alleviation, 19th International Computer Conference on Wavelet Active Media Technology and Information Processing, Chengdu, China, 2022(EI)[C10] Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, and Shun Hu, Fusion: Efficient and Secure Inference Resilient to Malicious Servers, Network and Distributed System Security Symposium (NDSS 2023), San Diego, CA, USA, 2023[C9] Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu, Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE, The 26st European Symposium on Research in Computer Security (ESORICS 2021), LNCS 12973, pp. 147-168, Darmstadt, Germany, 2021[C8] Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen, Efficient and Fully Secure Lattice-based IBE with Equality Test, Proceedings of the 23th International Conference on Information and Communications Security (ICICS 2021), LNCS 12919, pp. 301–318, Chongqing, China, 2021[C7] Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen, Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors, 16th International Conference on Information Security and Cryptology (Inscrypt 2020), LNCS 12612, pp. 202-220, Guangzhou, China, 2020[C6] Jingyi Zhang, Anjia Yang, Qiao Hu and Gerhard P. Hancke, Security Implications of Implementing Multistate Distance-Bounding Protocols, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19), in conjunction with ACM CCS'19[C5] Jia Xu*, Anjia Yang*, Jianying Zhou, Duncan S. Wong, Lightweight Delegatable Proofs of Storage, 21st European Symposium on Research in Computer Security (ESORICS 2016), 324-343, Heraklion, Greece, 2016[C4] Elena Pagnin, Anjia Yang, Gerhard Hancke, Katerina Mitrokotsa, Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding, 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015), 3:1-3:6, New York, USA, 2015[C3] Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie, A Highly Efficient RFID Distance Bounding Protocol Without Real-time PRF Evaluation, Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 451-464 Madrid, Spain, 2013[C2] Anjia Yang*,Yunhui Zhuang,Duncan S. Wong,Guomin Yang,A New Unpredictability-Based RFID Privacy Model,Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 479-492, Madrid, Spain, 2013[C1] Anjia Yang*, Yunhui Zhuang, Duncan S. Wong, An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), 285-292, Hong Kong, 2012 主要著作 [B1] Anjia Yang, Gerhard P. Hancke. RFID and Contactless Technology, Smart Cards, Tokens, Security and Applications, Springer International Publishing, ISBN 978-3-319-50500-8, pp. 351-385, 2017 承担课题 数据安全与隐私保护下的机器学习技术,国家重点研发计划,子课题负责人,2021-2025基于区块链的数据安全共享关键技术研究,国家自然科学基金面上项目,项目负责人,2021-2024非可信环境下大数据安全融合关键技术,广东省重点领域研发计划,课题负责人,2020-2023面向政务数据跨部门协同的区块链技术研究与应用,广东省重点领域研发计划,课题负责人,2020-2023RFID距离边界协议安全与隐私机制的研究,国家自然科学基金青年基金,项目负责人,2018-2020RFID距离边界协议关键问题的研究,中国博士后科学基金面上项目,项目负责人,2017-2019基于众包的群体感知隐私保护研究,国家自然科学基金面上项目,第三参与人,2018-2021基于Service Chain的数据中心网络资源调度问题研究,国家自然科学基金面上项目,第四参与人,2018-2021人工智能自适应在线教育方法研究与应用,国家自然科学基金面上项目,第三参与人,2019-2022车载自组网中信任建模关键问题研究,国家自然科学基金青年基金,第二参与人,2019-2021 发明专利 [1].Anjia Yang, Xiaohu Chen, Jian Weng, Tao Li, Jiasi Weng, Jia-Nan Liu. Method for constructing emergency reporting system of vehicle networking based on multi-signatures, 美国专利,US18/150345,申请日期:2023年1月5日,授权日期:2023年8月11日[2].Anjia Yang, Zifan Guo, Jian Weng, Yao Tong, Fuqing Pei, Changkun Jiang. Lightweight duplicates-removing cryptograph integrity audit method and system,南非专利,ZA202300638,申请日期:2023-01-16,授权日期:2023-03-29[3].Jian Weng, Ming Li, Jiasi Weng, Yue Zhang, Anjia Yang, Weiqi Luo, Method and system for secure blockchain-based vehicular digital forensics,美国专利,US11223487B2,授权日期:2022年1月11日[4].翁健; 李明; 张悦; 陈墩金; 杨安家; 罗伟其, 基于区块链与代理重加密的可信基因检测及数据共享方法,ZL201711062477.2, 授权日期:2020年5月8日,已转化,17万元[5].杨安家;李涛;翁健;刘家男;陈小虎;李明;温靖航,一种基于区块链与概率支付的流媒体平台实现方法,ZL202110752401.2,申请日期:2021年7月2日,授权日期:2023年4月7日[6].杨安家;陈小虎;翁健;李涛;翁嘉思;刘家男,一种基于多重签名的车联网紧急事件汇报系统构建方法,ZL202210290875.4,申请日期:2022年3月23日,授权日期:2022年10月11日[7].杨安家;陈小虎;翁健;童瑶;李涛;李明;江常坤,一种基于双认证阻止签名和区块链的版权保护方法,CN202211603862.4,申请日期:2022年12月13日[8].杨安家;郭梓繁;翁健;童瑶;裴清福;江常坤,一种轻量级可去重的密文完整性审计方法及系统,CN202211569337.5,申请日期:2022年12月8日[9].杨安家;刘子琳;翁健;童瑶;李涛;裴清福,一种基于区块链与支付通道网络的数据交易平台实现方法,CN202310858396.2,申请日期:2023年07月12日[10].孟家乐; 杨安家; 李勇标; 王琨; 刘晓冬; 李明,基于区块链与自然语言处理的众包数据库构建方法及装置,CN202010786272.4,2020年8月7日[11].翁健;刘家男;温靖航;李明;杨安家;谭武征;一种高效抗远程服务攻击的外包数据访问方法,ZL202110075675.2,申请日期:2021年1月20号,授权日期:2022年10月14日 讲授课程 本科生课程《数据结构》《数据结构实验》《安全通论》《网络空间安全与风险管理》研究生课程《现代密码学》 社会职务 国内外学术期刊任职1.Security and Communication Networks, 学术编委,2021/3-至今2.Symmetry,专题 “The Study of Network Security and Symmetry”,客座编委, 2022/3/28-2023/2/283.Security and Communication Networks, 专题“Security Threats and Defenses for Connected Vehicles”,客座编委,2021/2/5-2021/6/114.ICC 2021, session chair5.18th Annual International Conference on Privacy, Security, and Trust (PST 2021), session chair6.中国密码学会2023年密码芯片学术会议(Crypto IC 2023)组织委员会委员国内外学术会议任职担任ICC 2023、IEEE Globecom 2017-2023, IEEE TrustCom 2019-2022, UbiSec 2021, PST 2021、2023, IEEE Blockchain 2018-2022, WISTP 2017-2019, RFIDSec 2016等20余个国际学术会议的程序委员会委员。担任国内外学术会议/期刊审稿人长期担任IEEE TDSC/TIFS/TMC/TSC/TITS/TCC/TII/TIE/TVT/TETC/TBD/TCCN/IOTJ/Communication Letters、ACM Transactions on Embedded Computing Systems、Designs,Codes and Cryptography、Computers & Security、Computer Networks、Future Generation Computer Systems、Journal of Computer Security、Security and Communication Networks、软件学报等国内外学术期刊,以及TrustCom 2020-2021, GlobeCom 2017-2020, ICC 2019-2020, IEEE Blockchain Conference 2018-2020, ICCC 2018, ICA3PP 2017, Inscrypt 2017, CCNIS 2017, RFIDSec 2016, ACNS 2014, ACISP 2014, SecureComm 2014, IEEE CloudCom 2014, ICICS 2014等国内外学术会议的审稿人。社会职务1.全国大学生信息安全竞赛专家委员会委员2.广东省基础与应用基础研究基金项目评审专家3.国家自然科学基金面上项目、地区科学基金项目评审专家4.广东省数字政府资源池专家5.中国自动化学会工业物联网技术与应用专委会 |