个人简介
李进,2007年博士毕业于中山大学(导师王燕鸣教授),2010年进入广州大学工作(高层次海外留学人才引进,教授/院长助理职务)。主要研究领域为云计算安全。主要研究方向包括云计算中的数据存储安全、加密数据检索、安全外包计算和公钥密码技术等。
主持承担了包括国家自然科学基金面上和青年项目、广东省自然科学基金等10余项课题,入选广东省教育厅高等学校优秀青年人才培养计划和广州市珠江科技新星等人才培养计划,2014年获得广东省自然科学杰出青年基金。
学术成果
目前已发表或录用的学术论文共90余篇,SCI检索论文37篇(共16篇一作),EI检索论文76篇,IEEE Trans.论文12篇。会议论文集和期刊5部/期:
• 期刊论文
• 13篇中国计算机学会(CCF)推荐的顶级A类IEEE Transactions系列期刊论文(第一作者4篇):7篇发表在高性能计算领域顶级刊物IEEE Transactions on Parallel and Distributed Systems;
• 17篇为中科院SCI期刊分区表二区以上论文(第一作者8篇,包括3篇SCI一区论文)。
• 会议论文
• 共发表30余篇国际学术会议论文,包括6篇CCF推荐B类及以上会议论文(含一篇顶级A类会议INFOCOM论文)。
• 2012-2014连续3年在信息安全顶级会议ESORICS发表论文;
上述成果获得了同行广泛引用,Google Scholar学术搜索论文引用总次数达2500余次,H-Index达到21,引用超过200次的论文共4篇(单篇论文最高引用次数453次),SCI引用总次数210余次。
学术经历
2002年9月– 2007年7月,中山大学,研究生、博士(硕博连读)
1998年9月–2002年7月,西南师范大学,本科、学士
工作经历
2013年9月–2014年3月,美国弗吉尼亚理工学院,访问教授
2013年8月–9月/2012年11–12月/2010年7–8月,香港城市大学,访问教授
2010年4月,广州大学,教授,广州市高层次人才引进
2009年2月–2010年1月,美国伊利诺理工大学,高级研究员
2007年10月–2009年1月,韩国科学技术院,博士后
2007年4月–2007年8月,香港中文大学,研究助理
2005年11月–2006年10月,香港中文大学,交换研究生
学术任职
青年副主编:Frontiers Computer Science (FCS) (Springer, SCI, 2013- )
杂志编辑:International Journal of Soft Computing and Networking
客座编辑:Future Generation Computer Systems (SCI期刊, Elsevier), Mobile Information Systems (SCI期刊), Journal of High Performance Systems Architecture(EI期刊), Journal of High Speed Network等多个期刊
学术会议程序委员会主席(PC Co-Chair)
The 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2014广州);
The 4th International conference on Emergence Information Data and Technology(EIDWT 2013西安);
国际学术会议分会主席(Track Chair/Workshop Chair)
The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015 Korea)和The 6th International Symposium on Cyberspace Safety and Security (CSS-2014 France)等
国际学术会议出版主席(Publicity Chair)
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2015 Finland);
The 8th International Conference onNetwork System Security (NSS-2014西安)
学术会议程序委员会委员(PC Committee)
Network System Security (NSS):2012/2013/2014;International Conference on Provable Security (ProvSec):2011/2013/2014;ISPEC: 2011/2014;International Conference on Communications(ICC): 2010/2012;等二十余个国际会议;
特邀报告
第七届中国信息安全博士论坛(2014)大会特邀报告
获奖情况
入选2022年全球“高被引科学家”名单(2022)
IEEE AINA 2014最佳论文奖(指导学生)
Springer ISPEC 2014最佳论文奖(指导学生)
IEEE CHINACOM 2009最佳论文奖(排名第一)
2013年度广州市青年岗位能手,广州市团委
中山大学优秀博士论文(2007)
广东省南粤优秀研究生(2006)
惠普(中国)优秀研究生(2005)
学术论文
1. Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick Lee, Wenjing Lou. Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Transactions on Parallel and Distributed Systems, 25(6): 1615-1625, 2014.中国计算机学会(CCF)推荐顶级A类期刊
2. Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang. Securely Outsourcing Attribute-based Encryption with Checkability. IEEE Transactions on Parallel and Distributed Systems, vol. 25 (8): 2201-2210, 2014.CCF推荐A类期刊
3. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou. Identity-based Encryption with Outsourced Revocation in Cloud Computing. IEEE Transactions on Computers.DOI.ieeecomputersociety.org/10.1109/TC.2013.208. In Press.2013.CCF推荐A类期刊
4. Jin Li, Yatkit Li, Xiaofeng Chen, Patrick Lee, Wenjing Lou. A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans. on Parallel and Distributed Systems.DOI.ieeecomputersociety.org/10.1109/TPDS.2014.2318320.In Press.2014.CCF推荐A类期刊
5. Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, Fatos Xhafa. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Trans. on Cloud Computing. (已录用)
6. Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli. Secure Deduplication Storage Systems Supporting Keyword Search. Journal of Computer and System Sciences.(已录用)CCF推荐B类期刊
7. Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, and Duncan S. Wong. Generic Security-Amplifying of Ordinary Digital Sigantures. Information Sciences, vol. 201, pp. 128-139, 2012. SCI一区,影响因子3.89
8. Jin Li, Kwangjo Kim. Hidden Attribute-based Signatures without Anonymity Revocation. Information Sciences, vol. 180(9): 1681-1689, Elsevier, 2010.SCI一区,影响因子3.89
9. Jin Li, Zheli Liu, Xiaofeng Chen, Xiao Tan, Duncan Wong. L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowledge-Based Systems.DOI.org/10.1016/j.knosys.2014.04.010. In Press. Elsevier, 2014.SCI二区影响因子3.06
10. Jin Li,Xiaofeng Chen, Qiong Huang and Duncan S. Wong. Digital Provenance: Enabling Secure Data Forensics in Cloud Computing. Future Generation Computer Systems, 37: 259-266, Elsevier, 2013.SCI二区影响因子2.64
11. Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM), pp. 441-445, IEEE, 2010.CCF推荐A类会议
12. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma and Wenjing Lou. Fine-grained Access Control based on Outsourced Attribute-based Encryption. In Proceedings of The European Symposium on Research in Computer Security (ESORICS), pp. 592-609, Springer, 2013.CCF推荐B类会议当年唯一入选的中国大陆学者论文
13. Jin Li, Qian Wang, Cong Wang, and Kui Ren. Enhancing Attribute-based Encryption with Attribute Hierarchy. Mobile Networks and Applications (MONET), 16(5): 553-561, Springer-Verlag, 2011.SCI
14. Jin Li, Xiaofeng Chen, Xinyi Huang. New Attribute-based Authentication and Its Application in Anonymous Cloud Access Service.International Journal of Web and Grid Service, 2014.已录用SCI
15. Jin Li, Xiaofeng Chen, Efficient Multi-user Keyword Search Over Encrypted Data in Cloud Computing. Computing and Informatics, 32(4): 723-738, 2013.SCI
16.Xiaofeng Chen, Jin Liand Willy Susilo. Efficient Fair Conditional Payments for Outsourcing Computations.IEEE Transactions on Information and Forensics Security, 7(6): 1687-1694, 2012.CCF推荐A类期刊
17.Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou. New Algorithms for Secure Outsourcing Modular Exponentiations. IEEE Trans. on Parallel and Distributed Systems,25(9): 2386-2396, 2014.CCF推荐A类期刊
18.Xinyi Huang, Xiaofeng Chen, Jin Li, Xiang Yang and Li Xu. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. on Parallel and Distributed Systems, 25(7): 1767-1775, 2014.CCF推荐A类期刊
19.Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang. Secure Outsourced Attribute-based Signatures. IEEE Trans. on Parallel and Distributed Systems.DOI.ieeecomputersociety.org/10.1109/TPDS.2013.180. In Press. 2013.CCF推荐A类期刊
20.Xiaofeng Chen,Willy Susilo, Jin Li, Duncan S Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang. Efficient Algorithms for Secure Outsourcing of Bilinear Pairings. Theoretical Computer Science.已录用 CCF推荐B类期刊
21.Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang and Wenjing Lou. New Algorithms of Outsourcing Modular Exponentiations. In Proceedings of The European Symposium on Research in Computer Security (ESORICS), pp. 541-556, Springer, 2012.CCF推荐B类会议
22.Xiaofeng Chen, Jin Li, Jianfeng Ma, Jian Weng and Wenjing Lou. Verifiable Computation over Large Database with Incremental Updates. In Proceedings of The European Symposium on Research in Computer Security (ESORICS), Springer, 2014.CCF推荐B类会议
23.Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia. Privacy-preserving Data Utilization in Hybrid Clouds. Future Generation Computer Systems, 30: 98-106, 2014.(第一作者为本人与南开大学贾春福教授联合指导博士生)SCI二区影响因子2.64
24.Xiaofeng Chen,Willy Susilo, Fangguo Zhang,Haibo Tian, Jin Li, Identity-based trapdoor mercurial commitments and applications. Theoretical Computer Science, 412(39): 5498-5512, Elsevier, 2011.CCF推荐B类期刊
25.Cong Wang,Kui Ren, Wenjing Lou, Jin Li, Toward publicly auditable secure cloud data storage services. IEEE Network Magazine special issue on Future Internet: New Applications and Emerging Services, 24(4): 19-24, 2010.
26.Cong Wang,Ning Cao, Jin Li,Kui Ren, Wenjing Lou, Secure Ranked Keyword Search over Encrypted Cloud Data. The 30th International Conference on Distributed Computing Systems (ICDCS 2010), pp. 253-262 , IEEE, 2010.CCF推荐B类会议
27.Qian Wang, Cong Wang, Jin Li, Kui Ren and Wenjing Lou,Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. The 14th European Symposium on Research in Computer Security (ESORICS), 355-370, Springer-Verlag, 2009.CCF推荐B类会议