删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

广西大学计算机与电子信息学院导师教师师资介绍简介-黄保华

本站小编 Free考研考试/2021-06-12

zdxkChs
category
工学
xkOne
计算机科学与技术(可授工学、理学学位)
xkTwo
信息安全与电子商务"}],"GH
XM
黄保华
CSRQ
XBM
1
DWH
30700
pic
http://prof.gxu.edu.cn/teacher-info/user-images/**.jpg
zzmm
群众
jiguan
zhicheng
副教授
topedu
研究生
ZHXWMC
博士
zhiwu
tel

yzbm
530004
email
bhhuang66@gxu.edu.cn
qq

weixin

address
广西南宁市大学东路100号
iscampus
1
dslb
硕士研究生导师
zdxkmlbh
08
zdyjxkbh
0812
zdejxkbh
0812Z1
dwh1
30700
zdxkmlbh2

zdyjxkbh2

zdejxkbh2

dwh2

zyyjfx
tbzrr
黄保华
isadmin
0
isview
0
firstLetter
h
jzgdqzt
11
sjgxrq":**00,"forEditDwmc
计算机与电子信息学院
dwUrl
http://scei.gxu.edu.cn/"},"showInfo":{"GH
show_CSRQ
1
show_zzmm
0
show_jiguan
1
show_zhicheng
0
show_tel
0
show_yzbm
0
show_email
0
show_qq
0
show_weixin
0
show_address
0
show_topedu
0
show_ZHXWMC
0"},"largeMsg":{"GH
**
zyxxjx
2007年毕业于华中科技大学计算机科学与技术学院,获博士学位;2009年从华中科技大学基础医学博士后流动站出站后到广西大学计算机与电子信息学院任教;2015年9月到2017年8月在弗吉尼亚联邦大学计算机科学系(Department of Computer Science, Virginia Commonwealth University)做访问****。
xsjz
(1)CCF(中国计算机学会)高级会员、CCF南宁分部执委,CACR(中国密码学会)、ACM和IEEE会员;(2)中国大学生信息安全竞赛评审专家,教育部学位论文网上通讯评议专家;(3)International Journal of Automation and Computing(IJAC), Ad Hoc Networks, Engineering Computations、EURASIP Journal on Wireless Communications and Networking、Heliyon等期刊审稿人;(4)American Journal of Operations Management and Information Systems(AJOMIS)编委。
zyyjskc
(1)网络安全技术;(2)信息内容安全;(3)无线网络安全;(4)电子商务与电子政务安全;(5)网络攻击与渗透技术;(6)容错与可信系统;(7)可信计算机与可信网络。
zyyjfx
信息安全
zckyxm
主持项目:(1)国家自然科学基金项目,车联网中不可信实体描述信息的安全高效传播模型研究,2020-2023(2)广西高等教育本科教学改革工程立项项目,以智能化攻防为特色的一流信息安全人才培养课程体系建设,2019-2021(3)技术转让项目,\"一种可信二维码中签名的隐藏方法及系统\"专利转让与技术服务,2018-2023(4)国家自然科学基金项目,基于树型自动机的数据库安全理论研究,2013-2016(5)南宁市科学研究与技术开发计划项目,云安全免疫系统研发,2012-2014(6)某单位信息安全工程项目,“085工程”项目数据库加密系统,2011-2012(7)广西大学博士启动基金项目,云安全的对等免疫模型研究,2009-2011(8)国家博士后科学基金项目,TNFR封闭肽三聚体化的P2P分子动力学模拟研究,2008-2009参与项目:(1)国家自然科学基金项目,海量数据压缩加密存储技术研究,2008-2011(2)“863”计划项目,分布式密文全文检索系统关键技术研究,2007-2009
qdcg
lw
获奖:(1)国家密码科技进步二等奖(省部级),SQY02加密数据库系统,第一完成人,2006;(2)广西科技进步二等奖,基于密文和网络行为监控的全通网络信息系统,第三完成人,2010;(3)湖北技术发明二等奖,基于手机令牌的动态身份认证系统,第七完成人,2007;(4)广西技术发明三等奖,分布式密文全文检索系统研制,第三完成人,2013。发明专利:(1)黄保华, 路松峰, 胡和平等. 基于存储加密的数据库安全保密支撑系统. 2009(2)黄保华, 霍林, 江锋. 一种可信二维码中签名的隐藏方法及系统. 2013主要论文:1.Xiaolu Cheng and Baohua Huang*, A Center-Based Secure and Stable Clustering Algorithmfor VANETs on Highways. Wireless Communications and Mobile Computing, 2019. 2019(1): p. 1-10. (SCI)2.Baohua Huang, Xiaolu Cheng, Caixia Huang, et al., Meet-Cloud for Secure and Accurate Distribution of Negative Messages in Vehicular Ad hoc Network. TSINGHUA SCIENCE AND TECHNOLOGY, 2018. 23(4): p. 377-388. (SCI/EI)3.Jiawei Mo, Baohua Huang*, Xiaolu Cheng, et al., Improving security and stability of ad hoc on-demand distance vector with fuzzy neural network in vehicular ad hoc network. International Journal of Distributed Sensor Networks, 2018. 14(10): p. 1-15. (SCI/EI)4.Xiaolu Cheng, Jiawei Mo and Baohua Huang*, Enhancing negative messages broadcasting with Meet-Table and TTL in VANET. EURASIP Journal on Wireless Communications and Networking, 2018. 2018:219: p. 1-8. (SCI/EI)5.黄保华, 吕琦 and 莫家威, 云存储中基于拼音相似度的密文模糊搜索方案. 计算机工程, 2018. 44(12): p. 112-117. 6.黄保华, 莫家威 and 吕琦, 基于模糊神经网络的稳定AODV协议改进方案. 计算机工程与科学, 2018. 40(11): p. 1974-1982. 7.Baohua Huang, Qi Lyu, Xiaolu Cheng, et al. PaJDBC: A Transparent Privacy-Aware Database Accessing Middleware for Java. in IEEE Symposium on Privacy-Aware Computing (PAC). 2017. Washington, DC, USA: IEEE. August 1-4, 20178.Baohua Huang, Xiaolu Cheng and Wei Cheng. Meet-fog for accurate distribution of negative messages in VANET. in the Workshop on Smart Internet of Things (SmartIoT '17). 2017. San Jose, California. October 14, 2017 9.Baohua Huang and Wei Cheng. Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing. in the 12th International Conference on Wireless Algorithms, Systems, and Applications. 2017. Guilin, China: Springer. June 19-21, 201710.谢统义, 马岩 and 黄保华*, 数据库连接池上的终端用户追踪与审计. 桂林理工大学学报, 2017. 37(1): p. 203-207. 11.Baohua Huang, Jiawei Mo, Qi Lu, et al. Optimizing Propagation Network of Certificate Revocation in VANET with Meet-Table. in the 4th International Workshop on Network Optimization and Performance Evaluation. 2016. Zhangjiajie, China: Springer. Novermber 16-18, 201612.Baohua Huang, Fengwei Jia, Jiguo Yu, et al. A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI. in the 2nd ACM Workshop on Privacy-Aware Mobile Computing (PAMCO'16). 2016. Paderborn, Germany: ACM. July 05, 201613.黄保华, 王添晶 and 贾丰玮, 数据库中数值型数据的加密存储与查询方法. 计算机工程, 2016. 42(7): p. 123-128. 14.黄保华, 贾丰玮 and 王添晶, 云平台下基于属性的数据库访问控制策略. 计算机科学, 2016. 43(3): p. 167-173. 15.Baohua Huang, Tianjing Wang and Fengwei Jia. A Method of Encrypting and Querying String Data for Database. in the 3rd International Conference on Machinery, Materials and Information Technology Applications. 2015. Qingdao, China. 16.Tongyi Xie, Fan Peng, Feng Jiang, et al. Enhancing User Authentication and Encrypting Lob Data in OLE DB Provider for database. in the 3rd International Conference on Advanced Engineering Materials and Architecture Science. 2014. Huhhot,China. 17.Xingbang Tian, Baohua Huang* and Min Wu. A Transparent Middleware for Encrypting Data in MongoDB. in 2014 IEEE Workshop on Electronics, Computer and Applications. 2014. Ottawa, Canada: IEEE. May 8-9, 2014 18.Bao-Hua HUANG, Yan MA, Tian-Jing WANG, et al. Schema of Enhancing User Authentication and Encrypting Lob Data in JDBC Driver for Database. in 2014 International Conference on Computer Science and Network Security. 2014. Xi'an, China. April 12-13, 201419.Baohua Huang, Tianjing Wang, Yan Ma, et al. Schema of Enhancing User Authentication and Encrypting Lob Data in ODBC Driver for Database. in International Conference on Advances in Mechanical Engineering and Industrial Informatics. 2014. 20.Baohua Huang, Tianjing Wang, Yan Ma, et al. Encrypting Database Content with User Defined Function. in 2014 International Conference on Vehicle & Mechanical Engineering and Information Technology. 2014. Beijing, China. 21.Baohua Huang, Tianjing Wang, Yan Ma, et al. Security Problem Modeling of Database Connection Pool. in 2014 International Conference on Vehicle & Mechanical Engineering and Information Technology. 2014. Beijing China: Trans Tech Publications Ltd. 22.Baohua Huang, Yan Ma and Feng Jiang. Research on the Security Audit of Database Connection Pool. in 2014 International Conference on Vehicle & Mechanical Engineering and Information Technology. 2014. 23.黄保华 and 谢统义, 短信辅助的移动对等系统NAT穿越. 广西大学学报(自然科学版), 2014. 39(3): p. 650-655. 24.Baohua Huang, Feng Jiang and Yan Ma. Trusted 2D Barcode with Hidden Signature. in 2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2013). 2013. Guangdongzhou, China. 25.Baohua Huang, Tongyi Xie and Yan Ma. Anti SQL Injection with Statements Sequence Digest. in 2012 Spring World Congress on Engineering and Technology (SCET 2012) 2012. 26.黄保华, 马岩 and 谢统义, 用于SQL注入检测的语句块摘要树模型. 信息安全与技术, 2012. 3(3): p. 34-37.
zz
zl
ryyhj
zsxx":null}},
相关话题/广西大学 计算机与电子信息学院