近年来,以第一作者(或同等贡献作者)在 CRYPTO 2015(美密会,国际密码学领域排名第1,北航有史以来第1篇)、Indocrypt 2015、ICITS 2013、IEEE Transactions on Information Forensics and Security(中国计算机学会推荐A类期刊、Q1区)、Fuzzy Sets and Systems(Q1区)、IET Information Security等重要国际会议和期刊上发表高质量学术论文10余篇。主持国家自然科学基金青年基金项目、软件开发环境国家重点实验室自主研究课题、中央高校基本科研项目等。此外,担任多个重要的国际会议和期刊的评审人。近年发表的主要学术论文如下:
1. Yanqing Yao, Zhoujun Li. Differential Privacy With Bias-Control Limited Sources. IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1230-1241. (SCI, JCR分区: Q1, IF: 4.332, CCF:A类)
2. Yevgeniy Dodis,Yanqing Yao. Privacy with Imperfect Randomness. CRYPTO (2) 2015, vol. 9216, pages 463-482 (按姓氏排序) (EI,国际密码学领域排名第1,北航有史以来第1篇, CCF:A类)
3. Yanqing Yao, Jusheng Mi, Zhoujun Li. A novel variable precision (θ,σ)-fuzzy rough setmodel based on fuzzy granules. Fuzzy Sets and Systems, 236(1): 58-72, 2014. (SCI,计算机领域JCR分区: Q1, IF: 2.718)
4. Yanqing Yao, Jusheng Mi, Zhoujun Li. Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems. Fuzzy Sets and Systems, 170(1): 64-75, 2011. (SCI,计算机领域JCR分区: Q1,IF: 2.718)
5. Yanqing Yao, Zhoujun Li. A novel fuzzy identity based signature scheme based on the short integer solution problem. Computers & Electrical Engineering, 40(6): 1930-1939, 2014. (SCIE, JCR分区: Q3, IF: 1.57)
6. Hua Guo, Chang Xu, Zhoujun Li,Yanqing Yao, Yi Mu. Efficient and dynamic key management for multiple identities in identity-based systems. Information Sciences, 221: 579-590, 2013 (SCI, JCR分区: Q1, IF: 4.832,CCF:B类)
7. Yanqing Yao, Zhoujun Li. Security of Weak Secrets based Cryptographic Primitives via the Rényi Entropy. IET Information Security, 10(6): 442-450, 2016. (SCIE,JCR分区:Q3, IF: 1.037)
8. Yanqing Yao, Jusheng Mi, Zhoujun Li, Bin Xie. The construction of fuzzy concept lattices based on (θ,σ)-fuzzy rough approximation operators. Fundamenta Informaticae, 111(1): 33-45, 2011. (SCIE, 计算机领域JCR分区: Q3, IF: 0.687)
9. Yanqing Yao, Zhoujun Li. Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy. Information Theoretic Security-7 International Conference, ICITS 2013, Proceedings, Lecture Notes in Computer Science, 8317: 162-178, 2014. (EI)
10. Yanqing Yao, Zhoujun Li. Non-Malleable Extractors with Shorter Seeds and Their Applications. Indocrypt 2015, vol. 9462, pages: 293-311 (EI)
11. Yanqing Yao, Zhoujun Li, Hua Guo. A Novel Nonlinear Network Coding Signature Scheme Determined by the SIS Problem. International Journal of Security and Its Applications, 6(2): 403-408, 2012. (EI)
12. Yanqing Yao, Jusheng Mi. Fuzzy concept lattices determined by (θ, σ)-fuzzy rough approximation operators. Rough Sets and Knowledge Technology-4th International Conference, RSKT 2009, Lecture Notes in Computer Science, 5589: 601-609, 2009. (EI)
13. 姚燕青,李舟军.基于非完美随机源的密码学原语的安全性综述.信息安全学报,2016年第1卷第2期,pp.28-35.
|