谢永-教授

阅读 发布日期:2024-06-13 11:04:49

姓    名:谢  永

联系方式:青海省西宁市城北区修远街2号

邮    编:810016

电子邮箱:mark.y.xie@qq.com

研究兴趣:网络与信息安全、人工智能及其安全、产业数字化

讲授课程:计算机网络、信息安全导论、云计算关键技术

个人资料:

谢永,博士(武汉大学,计算机科学与技术),教授、博士生导师,省级教学名师,入选青海省高端创新人才“千人计划”,青海省绿色算力产业专家咨询委员会委员,青海省计算机学会常务理事,青海省通信学会监事长,国家自然科学基金项目评审专家,全国大学生信息安全竞赛的评审专家,中国计算机学会杰出会员,计算机学会会员代表,计算机学会区块链专委委员,计算机学会数据发展委员会委员,中国密码学会和IEEE会员。担任TIFS、TDSC、IoT、TCE、Information Sciences、SCN及《计算机学报》《网络与信息安全学报》《通信学报》等期刊评审专家,《电子通信与计算机科学》等期刊编委。

主要从事人工智能应用与安全、网络与信息安全、产业数字化等方面的研究,主持或参与国家科技支撑计划项目、国家自然科学基金项目省部级项目等20余项。在TDSC、TMC、TIFS、NDSS、ISSTA以及计算机学报等会议或期刊上发表学术论文50余篇。授权国家发明专利与软件著作权20余项。荣获青海省科技进步奖1项。指导学生参加学科竞赛,获得国际级、国家级、省级奖项60多项。

工作经历:

2025/08-至今:青海理工学院,计算机与信息科学学院,教授

2018/01-2025/07:青海大学,计算机技术与应用系,副教授、教授

2005/07-2017/12:景德镇陶瓷大学,信息工程学院,讲师、副教授

主持科研项目:

(1) 国家基金项目,面向辅助诊疗的多源密态机器学习关键技术研究,2025.1-2028.12,项目号62462053,经费31万,主持。

(2) 国家基金项目,可证明安全的双服务器口令认证密钥交换的关键技术研究,2019.1-2022.12,项目号61862052,经费38万,主持。

(3)中国工业和信息化部,2020 年工业互联网创新发展工程项目,省级工业互联网安全态势感知平台, 2021.08-2023.12,项目号TC20H01C,经费1000万,联合主持人。

(4)青海省基金项目: 隐私保护的藏医诊疗数据机器学习方案关键技术研究, 2023.1-2025.12,项目号2023-ZJ-731,经费20万,主持。

(5)青海省基金项目: 云计算环境下生态大数据存储系统的数据完整性检测方案, 2019.1-2021.12,项目号2019-ZJ-7065,经费35万,主持。

教研项目:

(1)青海省一流本科课程建设项目,线下一流课程《计算机科学与技术导论》,谢永,2024.12-2026.11

(2)青海省“四新”研究与改革实践项目,西部高校新工科分层次个性化人才培养模式探索与实践——以青海理工学院计算机科学与技术专业为例,谢永,2025.1-2027.12

(3)青海省教育科学“十三五”规划课题,西部多民族地区高校的“课程思政”的内在价值与实践路径研究,谢永,2019.09-2022.08

获奖情况

(1) 2023年荣获青海省科技进步三等奖。

(2) 2022年荣获青海省“昆仑英才教学名师”。

(3) 2018年荣获青海省“高端创新人才千人计划”(引进拔尖人才)。

著作论文:

[1]  Xiaoxiao Li, Yong Xie#, Chunpeng Ge, Cong Peng, Meng Shen, ESVPH: Efficient Searchable and Verifiable Data Sharing Scheme with Partial Hidden Policy for IoT[J]. IEEE Transactions on Dependable and Secure Computing, 2025. (CCF-A)

[2]  Hongbo Jiang, Zhengliang Jiang, Wenjuan Tang, Yong Xie#, Ting Ye. RobustHealth: Non-Interactive Privacy-Preserving System for Heterogeneous Mobile Health Diagnosis[J]. IEEE Transactions on Mobile Computing, 2025. (CCF-A)

[3]  谢永, 周平超, 沈蒙, 张超, 康亚哲, 徐刚.TVPFL:可追溯和可验证的隐私保护联邦学习[J]. 中国科学 信息科学, 2025. (中文类CCF-A)

[4]  Xiaoxiao Li, Yong Xie#, Cong Peng, Entao Luo, Xiong Li, Zhili Zhou. EPREAR: An Efficient Attribute-based Proxy Re-encryption Scheme with Fast Revocation for Data Sharing in AIoT[J]. IEEE Transactions on Mobile Computing, 2025. (CCF-A)

[5]  Zheng Che , Meng Shen,Zhehui Tan, Hanbiao Du , Wei Wang,Yong Xie. Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning[J]. IEEE Transactions on Information Forensics and Security, 2025. (CCF-A)

[6]  Yazhe Kang, Yong Xie#, Libing Wu, Pingchao Zhou, Yue Du, Efficient Dropout-resilient and Verifiable Federated learning scheme for AIoT healthcare system, Journal of Systems Architecture[J]. 2025,103575, https://doi.org/10.1016/j.sysarc.2025. 103575. (CCF-B)

[7]  Pingchao Zhou, Yong Xie, Cong Peng, Yazhe Kang, Debiao He, Tianhong Mu. RLVP-FL: Robust and lightweight verifiable privacy- preserving federated learning scheme[J]. Computer Networks 273 (2025) 111747. (CCF-B)

[8]  Shaojun Zuo, Yong Xie#, Hehua Yao, Zhijie Ke. TPFL: Privacy- Preserving Personalized Federated Learning Mitigates Model Poisoning Attacks [J]. Information Sciences, 2025, 702 (1):1-17. (CCF-B)

[9]  Gang Xu, Shiyuan Xu, Xinyu Fan, Yong Xie. RAT Ring: Event Driven Publish/Subscribe Communication Protocol for IIoT by Report and Traceable Ring Signature[J]. IEEE Transactions on Industrial Informatics, 2025. (CCF-C)

[10]  Wang, Xiao, Yong Xie# Dingyi Sui, Shaolong Ge. An improved biometric authentication and key agreement scheme based on fuzzy extractor for Wireless Body Area Networks. Journal of Information Security and Applications 91 (2025): 104047. (CCF-C)

[11]  Wang, Hui, Yong Xie#, Min Luo, Yining Liu, Syed Hamad Shirazi. EAPDS: Efficient Auditable and Privacy-preservation Data Sharing Scheme Based on Attribute-Based Encryption for IoMT." IEEE Internet of Things Journal (2025). (CCF-C)

[12]  Muhammad Asad Saleem, Xiong Li, Zahid Ghaffar, Yong Xie, Guijuan Wang. Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment. IEEE Internet of Things Journal (2025). (CCF-C)

[13]  Zhijie Ke, Yong Xie#, Shirazi S H, et al. EPRFL: An efficient privacy-preserving and robust federated learning scheme for fog computing[J]. China Communications, 2025, 22(4): 202-222.

[14]  Ruoli Zhao, Yong Xie#, Debiao He, Kim-Kwang Raymond Choo and Zoe L. Jiang, Pratical Privacy-preserving Convolutional Neural Network Inference Framework with Edge Computing for Health Monitoring[J]. IEEE Transactions on Network Science and Engineering, 2024,doi: 10.1109/TNSE.2024.3434643.

[15]  Songsong Zhang, Yiling Liu, Tiegan Gao, Yong Xie#. Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network[J]. IEEE Internet of Things Journal, 2024. Doi: 10.1109/JIOT.2024.3407714. (CCF-C)

[16]  Zicong Gao, Chao Zhang, Hangtian Liu, Wenhou Sun, Liehui Jiang, Yong Xie . Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis[C]. Network and Distributed System Security (NDSS) Symposium 2024. (CCF-A)

[17]  Shaojun Zuo, Yong Xie#, Libing Wu, Jing Wu. ApaPRFL: Robust Privacy-Preserving Federated Learning Scheme Against Poisoning Adversaries for Intelligent Devices Using Edge Computing[J]. IEEE Transactions on Consumer Electronics, 2024, 70(1):725-734.

[18]  Hui Wang, Yong Xie#, Yining Liu, Xiong Li, Phuntsog Dorje. Data verifiable personalized access control electronic healthcare record sharing based on blockchain in IoT environment[J]. IEEE Internet of Things Journal, 2024,11(4): 5696-5707. (CCF-C)

[19]  Songtao Yang, Yubo He, Kaixiang Chen, Yong Xie, et al. 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing[C]//Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis(ISSTA). 2023: 867-879. (CCF-A)

[20]  Xiaoxiao Li, Yong Xie#, Hui Wang, Xing Su, Haifeng Li. dAPRE: Efficient and reliable attribute-based proxy re-encryption using DAG for data sharing in IoT[J]. IEEE Transactions on Consumer Electronics, doi: 10.1109/TCE.2023. 3346028.

[21]  Songsong Zhang, Yong Xie#, Min Luo, Debiao He, Kim-Kwang Raymond Choo. DssP: Efficient dual-Server secret sharing protocol based on password authentication for cloud storage services[J]. IEEE Systems Journal, 2022, 16(2): 2172-2182.

[22]  Dingyi Shui, Yong Xie#, Libing Wu, Yining Liu, Xing Su. Lightweight three-party key agreement for V2G networks with physical unclonable function[J]. Vehicular Communications, 2024, https://doi.org/10.1016/j.vehcom.2024.100747.

[23]  Ruoli Zhao,Yong Xie#,Hong Cheng,Xingxing Jia, Syed Zamad Shirazi. ePMLF: Efficient and privacy-preserving machine learning framework based on fog computing[J]. International Journal of Intelligent Systems, 2023, 2023(1): 1-16. (CCF-C)

[24]  Ruoli Zhao, Yong Xie#, Xingxing Jia, Hongyuan Wang, Neeraj Kumar. Practical privacy preserving aided disease diagnosis with multi-class SVM in outsourced environment[J]. Security and Communication Networks, 2022,22(1): 1-17. (CCF-C)

[25] 谢永, 李香, 张松松, 吴黎兵. 一种可证安全的车联网无证书聚合签名改进方案[J]. 电子与信息学报, 2020, 42(05): 1125-1131.

[26]  Xiang Li, Ping Liu, Songsong Zhang, Yong Xie#. An improved secure and efficient group key agreement scheme in VANETs, International Journal of Communication System[J]. 2021, 35(3): 1-15.

[27]  Ruoli Zhao, Yong Xie#, Lijun Zhang, et al. An efficient and privacy preserving computation framework for Tibetan medicine[C]//2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 2023: 53-58.

[28]  Xing Su, Yong Xie#, Hui Wang, Blockchain-based privacy-preserving authentication key agreement protocol for industrial wireless sensor networks[C]//2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2023: 234-241. (CCF-C)

[29]  Ping Liu, Syed Shirazi, Wei Liu, Yong Xie#. pKAS: A secure password-based key agreement scheme for the edge cloud[J]. Security and Communication Networks, 2021, 2021(1): 1-10. (CCF-C)

关闭

推荐资讯