登录  山东大学  English 
刘猛

副教授 同专业硕导

性别:男

毕业院校:哈尔滨工业大学

学历:博士研究生毕业

学位:工学博士学位

在职信息:在职

所在单位:机电与信息工程学院

入职时间:2004-07-16

学科:计算机应用技术

联系方式:mengliu.wh@gmail.com

电子邮箱:liumeng@sdu.edu.cn

学术荣誉:

手机版

访问量:

最后更新时间:..

  1. Zhang R, Liu M*, Yi Z, Yuan H, Yang Z, Bu Y, et al. Deblending overlapping galaxies in DECaLS using Transformer-Based algorithm: a method combining multiple bands and data types. Publications of the Astronomical Society of Australia [Internet]. 2024 Mar 19;1–20. Available from: http://dx.doi.org/10.1017/pasa.2024.16 (SCI JCR1区 IF:6.3)

  2. Yuan H, Liu M*, Yang Z, et al. Red Giants Search Method Based on Convolutional Neural Networks[J]. The Astronomical Journal, 2023, 166(6): 244. (SCI JCR1区 IF:5.3)

  3. Yang Z, Liu M*, Yuan H, et al. Star Photometry for DECam Legacy Survey and Sloan Digital Sky Survey Images Based on Convolutional Neural Networks[J]. The Astronomical Journal, 2023, 166(5): 210. (SCI JCR1区 IF:5.3)

  4. Meng Liu, Hongsheng Hu, Haolong Xiang, Chi Yang, Lingjuan Lyu, Xuyun Zhang. Clustering-based efficient privacy-preserving face recognition scheme without compromising accuracy[J]. ACM Transactions on Sensor Networks (TOSN), 2021, 17(3): 1-27.(SCI JCR3区 IF:2.253,CCF B类)

  5. Meng Liu, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang. Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control[J]. Future Generation Computer Systems, 2020, 109:457-468. (SCI JCR1区 IF:6.128,CCF C类)

  6. Hongsheng Hu, Gillian Dobbie, Zoran Salcic, Meng Liu, Jianbing Zhang, Xuyun Zhang. A Locality Sensitive Hashing Based Approach for Federated Recommender System[C]// 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). ACM, 2020. (EI)

  7. Liu M, Luo Y, Yang C, et al. Method and Application of Homomorphic Subtraction of the Paillier Cryptosystem in Secure Multi-party Computational Geometry[M]//Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. Springer, Cham, 2019: 569-581.(EI)

  8. Meng Liu, Yun Luo, Priyadarsi Nanda, Shui Yu, Jianbing Zhang. Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme[J]. Computational Intelligence, 2019(5).(SCI JCR4区 IF:0.776,CCF C类)

  9. Meng Liu, Xuyun Zhang, Chi Yang, Qiang He, Jianbing Zhang. Curve fitting based efficient parameter selection for robust provable data possession[J]. Journal of Parallel & Distributed Computing, 2018, 120(OCT.):62-76.(SCI JCR2区 IF:1.815,CCF B类)

  10. Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, Jianxin Li. Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. TrustCom/BigDataSE 2018: 990-995.(EI,CCF C类)

  11. Meng Liu, Xuan Wang*, Chi Yang, Zoe Lin Jiang, Ye Li.An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing. International Journal of Distributed Sensor Networks 13(1) (2017).(SCI JCR3区 IF:1.239)

  12. Meng Liu, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren. Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. TrustCom/BigDataSE/ICESS 2017: 502-509.(EI,CCF C类)

  13. Liu M , Wang X . Safeness Discussions on TRBAC and GTRBAC Model and an Improved Temporal Role-Based Access Control Model[J]. International Journal of Security & Its Applications, 2015, 9(8):23-34.(EI)

  14. Liu M, Liu B, Liu J, et al. A novel solution based on NAT traversal for high-speed accessing the campus network from the public network[J]. Research Journal of Applied Sciences, Engineering and Technology, 2014, 7(2): 221-226.

  15. Liu M, Wang X. Influences of ip fragment on ethernet over udp tunnel vpn and the solution[J]. Journal of Computational Information Systems, 2014, 10(6): 2397-2404.(EI)

  16. Liu M, Wang X. Modeling and analysis of smer constraints violation in irbac 2000 model based on colored petri nets[J]. International Journal of Security and Its Applications, 2014, 8(1): 19-32.(EI)

  17. Meng Liu, Xuan Wang. Alternative representation of periodic constraint on role enabling in TRBAC and GTRBAC[J]. Journal of Computational Information Systems, 2013, 9(24): 9909-9918.(EI)

  18. 刘猛, 王轩等. 基于Petri网的IRBAC 2000域间动态转换SMER约束违反检测[J]. 计算机研究与发展, 2012(09):1991-1998. (Liu M , Wang X , Huang H , et al. A Detection Model Based on Petri Nets of SMER Constraints Violation in Dynamic Role Translation[J]. Journal of Computer Research & Development, 2012, 49(9):1991-1998.)(EI,国内一级学报,CCF2019版 A类)

  19. 刘猛, 王轩. GTRBAC模型的安全性分析及其改进[J]. 计算机应用与软件, 2012(10):300-303.(CCF2019版 C类)

  20. Liu M, LIU B, LIU J, et al. A Virtual Private Network Solution for Dual-export Campus Network[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2012, 9(16): 4953-4960.(EI)

  21. Liu M, LIU B, LIU J I E. DEADLOCK DETECTION AND AVOIDANCE OF TASK SCHEDULING WITH MULTI-RESOURCE SHARING[J]. ICIC express letters. an international journal of research and surveys. Part B, Applications:, 2012, 3(4): 743-749.(EI)

  22. Liu M, Wang X, Zhao H. Research on illegal information flow in role-based access control model based on petri net[J]. ICIC Express Letters, 2012, 6(1): 139-144.(EI)

  23. Liu M , Qiao L , Shao G , et al. A research on the dual-export scheme of campus network and its NAT traversal[C]// International Symposium on Information Technologies & Applications in Education. (EI)

版权所有   ©山东大学 地址:中国山东省济南市山大南路27号 邮编:250100 
查号台:(86)-0531-88395114
值班电话:(86)-0531-88364731 建设维护:山东大学信息化工作办公室