杨安家

发布时间:2023-06-20

个人信息


姓名: 杨安家

部门: 网络空间安全学院

性别: 男

职称: 教授

学位: 博士

毕业院校: 香港城市大学

电子邮箱: anjiayang**********



联系方式

Email: anjiayang**********


个人简介

杨安家,男,博士、教授。20119月至20158月就读于香港城市大学计算机系并获博士学位(导师为Duncan S. Wong教授)。20159月至201910月先后在香港城市大学和暨南大学进行博士后研究工作(合作导师分别为Gerhard P. Hancke教授、翁健教授),其中2018年至2019年在加拿大滑铁卢大学电子科学与工程系沈学民教授课题组进行学术访问。研究方向为应用密码学和信息安全,近5年主要在物联网安全、车载网络安全、区块链安全,以及云安全等方面展开工作。在NDSSESORICSWiSecICICSIEEE TIFSIEEE TDSCIEEE TMCIEEE TPDSIEEE TSCIEEE TCCIEEE TITSIEEE TSGIEEE TVTIEEE TETC等密码学与信息安全著名国际会议和国际期刊上发表论文60余篇。主持或参与了国家重点研发计划子课题、国家自然科学基金面上项目、国家自然科学基金青年基金项目、广东省重点研发领域计划项目课题、中国博士后基金面上项目等多项项目。申请及获授权发明专利10余项,参与制定行业标准1项。担任《Security and Communication Networks》、《Symmetry》国际期刊的学术编委和客座编委。担任Globecom 2017-2023TrustCom 2020-2023UbiSec 2021-2022PST 2023Blockchain 2018-2023WISTP 2017-201920余个国际会议程序委员会委员。长期担任IEEE TDSCIEEE TIFSIEEE TMCACM TECSIEEE TIIIEEE TIEIEEE IoTJ、《软件学报》等20多个国内外学术期刊以及ACNSACISPSecureCommICICSGlobecomTrustComInscrypt等十余个国际学术会议的审稿人。

个人主页:https://sites.google.com/view/anjia-yang/home?authuser=0


学习经历

2011.09-2015.08 香港城市大学 计算机系 博士

2007.09-2011.06 吉林大学 计算机科学与技术(网络与信息安全专业) 本科


工作经历

2022.10-至今 暨南大学网络空间安全学院 教授

2019.10-2022.10 暨南大学网络空间安全学院 副研究员

2018.05-2019.09 滑铁卢大学电气与计算机工程系 访问学者

2016.12-2019.10 暨南大学网络空间安全学院 博士后

2015.09-2016.07 香港城市大学计算机系 博士后


研究方向

物联网安全、区块链安全、隐私计算、数据安全、应用密码学等。


招生意向


计划每年招收学术型硕士生1-2,择优培养,培养模式规格严格。期待有一定的数学、密码基础,对应用密码学尤其是区块链安全、物联网安全、隐私计算等方向感兴趣的同学加入。


计划每年招收专业型硕士生1,具有丰富的编程经验优先。


有意向读博士的同学在联系我时请附一份研究计划。


友情提示:

希望学生具有以下品质 (课题组要求严格,请慎重考虑是否加入!希望能找到志同道合的学生共同进步!)

1)态度第一、能力第二。躺平族、忽悠族、混学位族等抱有摸鱼心态的请勿联系,以免双方都痛苦!

2)有好奇心、强烈的求知/探索欲望和较独立的思考能力。

3)有面对困难不轻易放弃的毅力,因为探索科学问题会经常遭遇失败,有坐冷板凳的思想准备,因为科研需要时间。

4)有良好的沟通表达能力和英文书写能力。

5)乐观开朗,热爱生活,具备团队精神。


主要论文

期刊论文

[J50] Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen. Fuzzy Identity-based Matchmaking Encryption and Its ApplicationIEEE Transactions on Information Forensics & Security, in press, 2023

[J49] Axin Wu, Weiqi Luo, Anjia Yang, Yinghui Zhang, Jianhao Zhu. Efficient Bilateral Privacy-Preserving Data Collection for Mobile CrowdsensingIEEE Transactions on Services Computing, in press, 2023

[J48] Tao Li(研究生)Anjia Yang*, Jian Weng, Min-Rong Chen, Xizhao Luo, Xiaohu Chen, and Changkun Jiang. Enabling Secure and Flexible Streaming Media with Blockchain IncentiveIEEE Internet of Things Journal, in press, 2023

[J47] Shuyuan Lin, Anjia Yang, Taotao Lai, Jian Weng, and Hanzi Wang. Multi-motion Segmentation via Co-attention Induced Heterogeneous Model FittingIEEE Transactions on Circuits and Systems for Video Technology, in press, 2023

[J46] Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li. VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder,IEEE Transactions on Dependable and Secure Computing, in press, 2023

[J45] Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen. Backdoor-Resistant Public Data Integrity Verification Scheme based on Smart ContractsIEEE Internet of Things Journal,vol. 10(16), pp. 14269-14284,2023

[J44] Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng. PPOLQ: Privacy-Preserving Optimal Location Query with Multiple-Condition Filter in Outsourced EnvironmentsIEEE Transactions on Services Computing, in press, 2023

[J43] Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia YangPriGenX: Privacy-preserving QueryIEEE Transactions on Dependable and Secure Computing, in press, 2023

[J42] Yaqing Song, Yuan Zhang, Chunxiang Xu, Shiyu Li, Anjia Yang, Nan Cheng, Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution against Irresponsible Service ProvidersIEEE Internet of Things Journal, vol. 10(17), pp. 15563-15580, 2023

[J41] Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu. pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2218-2233, 2023

[J40] Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin (Sherman) Shen. Multi-client Secure and Efficient DPF-based Keyword Search for Cloud Storage, IEEE Transactions on Dependable and Secure Computing, in press, 2023

[J39] Xiaohu Chen(研究生)Anjia Yang*, Jian Weng, Yao Tong, Cheng Huang, Tao Li, A Blockchain-based Copyright Protection Scheme with Proactive DefenseIEEE Transactions on Services Computing, vol. 16(4), pp. 2316-2329, 2023 

[J38] Zilin Liu(研究生)Anjia Yang*, Huang Zeng, Changkun Jiang, and Li Ma, A Generalized Blockchain-Based Government Data Sharing Protocol,Security and Communication Networks, in press, 2023/1/17

[J37] Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou, Scalable CCA-Secure Public-Key Authenticated Encryption with Keyword Search from Ideal Lattices in Cloud ComputingInformation Sciences, vol. 624, pp. 777-795, 2023

[J36] Lulu Han, Weiqi Luo, Anjia Yang, Yandong Zheng, Rongxing Lu, Junzuo Lai, Yudan Cheng, Fully Privacy-preserving Location Recommendation in Outsourced EnvironmentsAd Hoc Networks, vol. 141, pp. 1-12, 2023

[J35] Tao Li(研究生)Anjia Yang*, Jian Weng, Yao Tong, Qingfu Pei. Concurrent and Efficient IoT Data Trading Based on Probabilistic MicropaymentsWireless Networks, vol. 29, pp.607–622, 2023

[J34] 李涛(研究生)杨安家*翁健郭梓繁基于智能合约的工业互联网数据公开审计方案软件学报, 2023, 34(3): 1491-1511

(Tao Li (研究生), Anjia Yang*, Jian Weng, Zifan Guo. Public Auditing Scheme for Industrial Internet Data Based on Smart Contracts.Journal of Software, vol. 34(3), pp. 1491-1511(in Chinese), 2023) 

[J33] Xiaohu Chen(研究生), Anjia Yang*, Yao Tong, Jian Weng, Jiasi Weng, and Tao Li, A Multisignature-based Secure and OBU-Friendly Emergency Reporting Scheme in VANETIEEE Internet of Things Journal, vol. 9(22), pp. 23130-23141, 2022

[J32] Axin Wu, Anjia Yang*, Weiqi Luo* and Jinghang Wen, Enabling Traceable and Verifiable Multi-user Forward Secure Searchable Encryption in Hybrid CloudIEEE Transactions on Cloud Computing, vol. 11(2), pp. 1886-1898, 2023

[J31] Xizhao Luo, Feng Zhou, Chongben Tao, Anjia Yang, Peiyun Zhang and Yonghua Chen, Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNNIEEE Transactions on Intelligent Transportation Systems, vol. 23(11), pp. 20707-20720, 2022

[J30] Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang and Jianfeng Ma, Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study with Multi-party Computation, IEEE Transactions on Dependable and Secure Computing, vol. 20(2), pp. 1243-1257, 2023

[J29] Jingyi Zhang, Anjia Yang*, Qiao Hu, Gerhard P. Hancke and Zhe Liu, Revisiting Error-Correction in Pre-Commitment Distance-Bounding Protocols, IEEE Transactions on Industrial Informatics, vol. 18(10), pp. 7097-7106, 2022

[J28] Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert Deng, A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile CrowdsourcingKSII Transactions on Internet and Information Systems, vol. 15(8), pp. 2827-2848, 2021

[J27] Xiang Liu, Anjia Yang*, Cheng Huang, Yuxian Li, Tao Li, and Ming Li, Decentralized Anonymous Authentication with Fair Billing for Space-Ground Integrated NetworksIEEE Transactions on Vehicular Technology, vol. 70(8), pp. 7764-7777, 2021

[J26] Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, and Anjia YangDAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference AttacksIEEE Transactions on Dependable and Secure Computing,vol. 19(5), pp.3183-3199, 2022

[J25] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, and Konstantinos Markantonakis, Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision PatternsIEEE Internet of Things Journal, vol. 8(14), pp. 11607-11620, 2021 

[J24] Anjia Yang, Jian Weng, Kan Yang, Cheng Huang and Xuemin (Sherman) Shen, Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular NetworksIEEE Transactions on Intelligent Transportation Systems,vol. 23(2), pp. 1284-1298, 2022(ESI高被引论文)

[J23] Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou and Duncan S. Wong, Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud StorageIEEE Transactions on Cloud Computing, vol. 9(1), pp. 212-225, 2021 (ESI高被引论文)

[J22] Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen and Xiaodong Lin, Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing based Smart GridIEEE Transactions on Smart Grid, vol. 11(1), pp. 247-257, 2020

[J21] Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu and Xiaodong Lin, Towards Blockchain-based Fair and Anonymous Ad Dissemination in Vehicular NetworksIEEE Transactions on Vehicular Technology, vol. 68(11), pp. 11248-11259, 2019

[J20] Wenjie Yang, Jian Weng, Xinyi Huang, and Anjia YangA provably secure certificateless proxy signature scheme against malicious-but-passive KGC attacksThe Computer Journal, vol. 63(8), pp. 1139–1147, 2020

[J19] Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang and Robert H. Deng, Looking Back! Using Early Versions of Android Apps as Attack VectorsIEEE Transactions on Dependable and Secure Computing, vol. 18(2), pp. 652-666, 2021

[J18] Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin and Xuemin (Sherman) Shen, DeQoS Attack: Degrading Quality of Service in VANETs and its MitigationIEEE Transactions on Vehicular Technology, vol. 68(5), pp. 4834-4845, 2019

[J17] Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Liu Jia-Nan, Yang Xiang, Robert Deng. CrowdBC: A blockchain-based decentralized framework for crowdsourcingIEEE Transactions on Parallel and Distributed Systems, vol. 30(6), pp. 1251-1266, 2019 (ESI高被引论文)

[J16] Qiao Hu, Yuanzhen Liu, Anjia Yang* and Gerhard Hancke, Preventing Overshadowing Attacks in Self-Jamming Audio ChannelsIEEE Transactions on Dependable and Secure Computing, vol. 18(1), pp. 45-57, 2021

[J15] Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li and Xiaodong Lin, Enabling Efficient, Secure and Privacy-preserving Mobile Cloud StorageIEEE Transactions on Dependable and Secure Computing, vol. 19(3), pp. 1518-1531, 2022

[J14] Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang, Notes on a provably-secure certificate-based encryption against malicious CA attacksInformation Sciences, vol. 463-464, pp. 86-91, 2018

[J13] Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani, OTP-IoT: An ownership transfer protocol for the Internet of Things,Journal of Information Security and Applications, vol. 43, pp. 73-82, 2018

[J12] Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang and Hailiang Li, REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided NetworksIEEE NETWORK, vol. 32(5), pp. 118-123, 2018

[J11] Anjia Yang, Yunhui Zhuang, Jian Weng*, Gerhard Hancke, Duncan S. Wong and Guomin Yang, Exploring Relationship between Indistinguishability-based and Unpredictability-Based RFID Privacy Models, Future Generation Computer Systems, vol. 82, pp. 315-326, 2018

[J10] Elena Pagnin, Anjia Yang*(通讯作者), Qiao Hu, Gerhard Hancke, Aikaterina Mitrokotsa, HB+DB: Distance Bounding Meets Human Based AuthenticationFuture Generation Computer Systems, vol. 80, pp. 627-639, 2018

[J9] Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, and Anjia YangFully distributed certificateless threshold signature without random oraclesSCIENCE CHINA Information Sciences, Vol. 61, pp. 098101:1–098101:3, 2018

[J8] Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong. Two-hop Distance-Bounding Protocols: Keep your Friends CloseIEEE Transactions on Mobile Computing, vol. 17(7), pp. 1723-1736, 2018

[J7] Yunhui Zhuang, Anjia Yang*(通讯作者), Gerhard P. Hancke, Duncan S. Wong, Guomin Yang. Energy-Efficient Distance-Bounding with Residual Charge ComputationIEEE Transactions on Emerging Topics in Computing, vol. 8(2), pp. 365-376, 2020

[J6] Wenjie Yang, Jian Weng, Weiqi Luo, Anjia YangStrongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGCSecurity and Communication Networks, to appear

[J5] Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen. Security analysis of some diffusion mechanisms used in chaotic ciphersInternational Journal of Bifurcation and Chaos, vol 27(10), pp. 1750155-1:13, 2017

[J4] Anjia Yang*, Xiao Tan, Joonsang Baek, Duncan S. Wong, A New ADS-B Authentication Framework based on Efficient Hierarchical Identity-Based Signature with Batch VerificationIEEE Transactions on Services Computing, vol. 10(2), pp. 165-175, 2017

[J3] Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard Hancke, Practical Limitation of Co-Operative RFID Jamming Methods in Environments without Accurate Signal SynchronizationComputer Networks, vol. 105, pp.224-236, 2016

[J2] Anjia Yang*, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia, A New Unpredictability-Based RFID Forward Privacy Model and a Provably Secure ConstructionSecure and Communication Networks, 2015, 8(16):2836-2849

[J1] Kaitai Liang, Man Ho Au, Joseph K Liu, Willy Susilo, Duncan S Wong, Guomin Yang, Yong Yu, Anjia YangA secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharingFuture Generation Computer Systems, vol.52, pp.95-108, 2014



会议论文


[C13] Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng. Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead, the 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2023), Guangzhou, December 4-8, 2023

[C12] Cheng Huang, Anjia Yang, Dongxiao Liu, Rongxing Lu, Sherman Shen. Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth, IEEE/CIC International Conference on Communications in China (ICCC), 10-12 August, Dalian, China, 2023 (EI, best paper award)

[C11] Yuan Chen(研究生)Anjia Yang*, Zilin Liu, Qingfu Pei, Li Ma, A Crosschain-based Fair Exchange of Products for Poverty Alleviation19th International Computer Conference on Wavelet Active Media Technology and Information Processing, Chengdu, China, 2022EI

[C10] Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, and Shun Hu, Fusion: Efficient and Secure Inference Resilient to Malicious ServersNetwork and Distributed System Security Symposium (NDSS 2023), San Diego, CA, USA, 2023

[C9] Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu, Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWEThe 26st European Symposium on Research in Computer Security (ESORICS 2021), LNCS 12973, pp. 147-168, Darmstadt, Germany, 2021

[C8] Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen, Efficient and Fully Secure Lattice-based IBE with Equality TestProceedings of the 23th International Conference on Information and Communications Security (ICICS 2021), LNCS 12919, pp. 301–318, Chongqing, China, 2021

[C7] Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen, Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors16th International Conference on Information Security and Cryptology (Inscrypt 2020), LNCS 12612, pp. 202-220, Guangzhou, China, 2020

[C6] Jingyi Zhang, Anjia Yang, Qiao Hu and Gerhard P. Hancke, Security Implications of Implementing Multistate Distance-Bounding ProtocolsACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19), in conjunction with ACM CCS'19

[C5] Jia Xu*, Anjia Yang*, Jianying Zhou, Duncan S. Wong, Lightweight Delegatable Proofs of Storage21st European Symposium on Research in Computer Security (ESORICS 2016), 324-343, Heraklion, Greece, 2016

[C4] Elena Pagnin, Anjia Yang, Gerhard Hancke, Katerina Mitrokotsa, Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015), 3:1-3:6, New York, USA, 2015

[C3] Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie, A Highly Efficient RFID Distance Bounding Protocol Without Real-time PRF EvaluationProceedings of the 7th International Conference on Network and System Security (NSS 2013), 451-464 Madrid, Spain, 2013

[C2] Anjia Yang*Yunhui ZhuangDuncan S. WongGuomin YangA New Unpredictability-Based RFID Privacy ModelProceedings of the 7th International Conference on Network and System Security (NSS 2013), 479-492, Madrid, Spain, 2013

[C1] Anjia Yang*, Yunhui Zhuang, Duncan S. Wong, An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag PrivacyProceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), 285-292, Hong Kong, 2012


主要著作

[B1] Anjia Yang, Gerhard P. Hancke. RFID and Contactless TechnologySmart Cards, Tokens, Security and Applications, Springer International Publishing, ISBN 978-3-319-50500-8, pp. 351-385, 2017


承担课题

数据安全与隐私保护下的机器学习技术,国家重点研发计划,子课题负责人,2021-2025

基于区块链的数据安全共享关键技术研究,国家自然科学基金面上项目,项目负责人,2021-2024

非可信环境下大数据安全融合关键技术,广东省重点领域研发计划,课题负责人,2020-2023

面向政务数据跨部门协同的区块链技术研究与应用,广东省重点领域研发计划,课题负责人,2020-2023

RFID距离边界协议安全与隐私机制的研究,国家自然科学基金青年基金,项目负责人,2018-2020

RFID距离边界协议关键问题的研究,中国博士后科学基金面上项目,项目负责人,2017-2019

基于众包的群体感知隐私保护研究,国家自然科学基金面上项目,第三参与人,2018-2021

基于Service Chain的数据中心网络资源调度问题研究,国家自然科学基金面上项目,第四参与人,2018-2021

人工智能自适应在线教育方法研究与应用,国家自然科学基金面上项目,第三参与人,2019-2022

车载自组网中信任建模关键问题研究,国家自然科学基金青年基金,第二参与人,2019-2021


发明专利

[1].Anjia Yang, Xiaohu Chen, Jian Weng, Tao Li, Jiasi Weng, Jia-Nan Liu. Method for constructing emergency reporting system of vehicle networking based on multi-signatures, 美国专利,US18/150345,申请日期:202315日,授权日期:2023811

[2].Anjia Yang, Zifan Guo, Jian Weng, Yao Tong, Fuqing Pei, Changkun Jiang. Lightweight duplicates-removing cryptograph integrity audit method and system,南非专利,ZA202300638,申请日期:2023-01-16,授权日期:2023-03-29

[3].Jian Weng, Ming Li, Jiasi Weng, Yue Zhang, Anjia Yang, Weiqi Luo, Method and system for secure blockchain-based vehicular digital forensics,美国专利,US11223487B2,授权日期:2022111

[4].翁健李明张悦陈墩金杨安家罗伟其基于区块链与代理重加密的可信基因检测及数据共享方法,ZL201711062477.2, 授权日期:202058日,已转化,17万元

[5].杨安家;李涛;翁健;刘家男;陈小虎;李明;温靖航,一种基于区块链与概率支付的流媒体平台实现方法,ZL202110752401.2,申请日期:202172日,授权日期:202347

[6].杨安家;陈小虎;翁健;李涛;翁嘉思;刘家男,一种基于多重签名的车联网紧急事件汇报系统构建方法,ZL202210290875.4,申请日期:2022323日,授权日期:20221011

[7].杨安家;陈小虎;翁健;童瑶;李涛;李明;江常坤,一种基于双认证阻止签名和区块链的版权保护方法,CN202211603862.4,申请日期:20221213

[8].杨安家;郭梓繁;翁健;童瑶;裴清福;江常坤,一种轻量级可去重的密文完整性审计方法及系统,CN202211569337.5,申请日期:2022128

[9].杨安家;刘子琳;翁健;童瑶;李涛;裴清福,一种基于区块链与支付通道网络的数据交易平台实现方法,CN202310858396.2,申请日期:20230712

[10].孟家乐杨安家李勇标王琨刘晓冬李明,基于区块链与自然语言处理的众包数据库构建方法及装置,CN202010786272.4202087

[11].翁健;刘家男;温靖航;李明;杨安家;谭武征;一种高效抗远程服务攻击的外包数据访问方法,ZL202110075675.2,申请日期:2021120号,授权日期:20221014


讲授课程

本科生课程

《数据结构》

《数据结构实验》

《安全通论》

《网络空间安全与风险管理》


研究生课程

《现代密码学》

社会职务

国内外学术期刊任职

1.Security and Communication Networks, 学术编委,2021/3-至今

2.Symmetry,专题 “The Study of Network Security and Symmetry”,客座编委, 2022/3/28-2023/2/28

3.Security and Communication Networks, 专题“Security Threats and Defenses for Connected Vehicles”,客座编委,2021/2/5-2021/6/11

4.ICC 2021, session chair

5.18th Annual International Conference on Privacy, Security, and Trust (PST 2021), session chair

6.中国密码学会2023年密码芯片学术会议(Crypto IC 2023)组织委员会委员


国内外学术会议任职

担任ICC 2023IEEE Globecom 2017-2023, IEEE TrustCom 2019-2022, UbiSec 2021, PST 20212023, IEEE Blockchain 2018-2022, WISTP 2017-2019, RFIDSec 201620余个国际学术会议的程序委员会委员。


担任国内外学术会议/期刊审稿人

长期担任IEEE TDSC/TIFS/TMC/TSC/TITS/TCC/TII/TIE/TVT/TETC/TBD/TCCN/IOTJ/Communication LettersACM Transactions on Embedded Computing SystemsDesigns,Codes and CryptographyComputers & SecurityComputer NetworksFuture Generation Computer SystemsJournal of Computer SecuritySecurity and Communication Networks、软件学报等国内外学术期刊,以及TrustCom 2020-2021, GlobeCom 2017-2020, ICC 2019-2020, IEEE Blockchain Conference 2018-2020, ICCC 2018, ICA3PP 2017, Inscrypt 2017, CCNIS 2017, RFIDSec 2016, ACNS 2014, ACISP 2014, SecureComm 2014, IEEE CloudCom 2014, ICICS 2014等国内外学术会议的审稿人。


社会职务

1.全国大学生信息安全竞赛专家委员会委员

2.广东省基础与应用基础研究基金项目评审专家

3.国家自然科学基金面上项目、地区科学基金项目评审专家

4.广东省数字政府资源池专家

5.中国自动化学会工业物联网技术与应用专委会