登录  山东大学  English 
h2UZHCZIyfzeLtZbsb9Blne3sBWgDlAc5YgQ6i3BrZ4t7vUDox29NG994fXR
刘猛

副教授 同专业硕导

性别:男

毕业院校:哈尔滨工业大学

学历:博士研究生毕业

学位:工学博士学位

在职信息:在职

所在单位:低空科学与工程学院

入职时间:2004-07-16

所属院系: 低空科学与工程学院

学科:计算机应用技术

电子邮箱:

手机版

访问量:

最后更新时间:..

当前位置 : 中文主页 >> 科学研究

    深度学习、大数据处理、天文图像处理

    1. Zhang R, Liu M*, Yi Z, Yuan H, Yang Z, Bu Y, et al. Deblending overlapping galaxies in DECaLS using Transformer-Based algorithm: a method combining multiple bands and data types. Publications of the Astronomical Society of Australia [Internet]. 2024 Mar 19;1–20. Available from: http://dx.doi.org/10.1017/pasa.2024.16 (SCI JCR1区 IF:6.3)全文链接(Full paper link)

    2. Yuan H, Liu M*, Yang Z, et al. Red Giants Search Method Based on Convolutional Neural Networks[J]. The Astronomical Journal, 2023, 166(6): 244. (SCI JCR1区 IF:5.3)

    3. Yang Z, Liu M*, Yuan H, et al. Star Photometry for DECam Legacy Survey and Sloan Digital Sky Survey Images Based on Convolutional Neural Networks[J]. The Astronomical Journal, 2023, 166(5): 210. (SCI JCR1区 IF:5.3)

    4. Meng Liu, Hongsheng Hu, Haolong Xiang, Chi Yang, Lingjuan Lyu, Xuyun Zhang. Clustering-based efficient privacy-preserving face recognition scheme without compromising accuracy[J]. ACM Transactions on Sensor Networks (TOSN), 2021, 17(3): 1-27.(SCI JCR3区 IF:2.253,CCF B类)

    5. Meng Liu, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang. Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control[J]. Future Generation Computer Systems, 2020, 109:457-468. (SCI JCR1区 IF:6.128,CCF C类)

    6. Hongsheng Hu, Gillian Dobbie, Zoran Salcic, Meng Liu, Jianbing Zhang, Xuyun Zhang. A Locality Sensitive Hashing Based Approach for Federated Recommender System[C]// 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). ACM, 2020. (EI)

    7. Liu M, Luo Y, Yang C, et al. Method and Application of Homomorphic Subtraction of the Paillier Cryptosystem in Secure Multi-party Computational Geometry[M]//Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications. Springer, Cham, 2019: 569-581.(EI)

    8. Meng Liu, Yun Luo, Priyadarsi Nanda, Shui Yu, Jianbing Zhang. Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme[J]. Computational Intelligence, 2019(5).(SCI JCR4区 IF:0.776,CCF C类)

    9. Meng Liu, Xuyun Zhang, Chi Yang, Qiang He, Jianbing Zhang. Curve fitting based efficient parameter selection for robust provable data possession[J]. Journal of Parallel & Distributed Computing, 2018, 120(OCT.):62-76.(SCI JCR2区 IF:1.815,CCF B类)

    10. Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, Jianxin Li. Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. TrustCom/BigDataSE 2018: 990-995.(EI,CCF C类)

    11. Meng Liu, Xuan Wang*, Chi Yang, Zoe Lin Jiang, Ye Li.An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing. International Journal of Distributed Sensor Networks 13(1) (2017).(SCI JCR3区 IF:1.239)

    12. Meng Liu, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren. Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. TrustCom/BigDataSE/ICESS 2017: 502-509.(EI,CCF C类)

    13. Liu M , Wang X . Safeness Discussions on TRBAC and GTRBAC Model and an Improved Temporal Role-Based Access Control Model[J]. International Journal of Security & Its Applications, 2015, 9(8):23-34.(EI)

    14. Liu M, Liu B, Liu J, et al. A novel solution based on NAT traversal for high-speed accessing the campus network from the public network[J]. Research Journal of Applied Sciences, Engineering and Technology, 2014, 7(2): 221-226.

    15. Liu M, Wang X. Influences of ip fragment on ethernet over udp tunnel vpn and the solution[J]. Journal of Computational Information Systems, 2014, 10(6): 2397-2404.(EI)

    16. Liu M, Wang X. Modeling and analysis of smer constraints violation in irbac 2000 model based on colored petri nets[J]. International Journal of Security and Its Applications, 2014, 8(1): 19-32.(EI)

    17. Meng Liu, Xuan Wang. Alternative representation of periodic constraint on role enabling in TRBAC and GTRBAC[J]. Journal of Computational Information Systems, 2013, 9(24): 9909-9918.(EI)

    18. 刘猛, 王轩等. 基于Petri网的IRBAC 2000域间动态转换SMER约束违反检测[J]. 计算机研究与发展, 2012(09):1991-1998. (Liu M , Wang X , Huang H , et al. A Detection Model Based on Petri Nets of SMER Constraints Violation in Dynamic Role Translation[J]. Journal of Computer Research & Development, 2012, 49(9):1991-1998.)(EI,国内一级学报,CCF2019版 A类)

    19. 刘猛, 王轩. GTRBAC模型的安全性分析及其改进[J]. 计算机应用与软件, 2012(10):300-303.(CCF2019版 C类)

    20. Liu M, LIU B, LIU J, et al. A Virtual Private Network Solution for Dual-export Campus Network[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2012, 9(16): 4953-4960.(EI)

    21. Liu M, LIU B, LIU J I E. DEADLOCK DETECTION AND AVOIDANCE OF TASK SCHEDULING WITH MULTI-RESOURCE SHARING[J]. ICIC express letters. an international journal of research and surveys. Part B, Applications:, 2012, 3(4): 743-749.(EI)

    22. Liu M, Wang X, Zhao H. Research on illegal information flow in role-based access control model based on petri net[J]. ICIC Express Letters, 2012, 6(1): 139-144.(EI)

    23. Liu M , Qiao L , Shao G , et al. A research on the dual-export scheme of campus network and its NAT traversal[C]// International Symposium on Information Technologies & Applications in Education. (EI)

    1. 基于多级服务器客户端模式的数据文件收发方法和装置,ZL 201610045764.1

    2. 一种易于穿越防火墙的OBD数据远程入库通信方法,ZL201911135625.8

    3. 一种人脸识别方法及装置,ZL202110394958.3

    4. 一种具有隐私保护的K-means聚类方法及系统。

    1. 横向,高效人脸识别系统设计,进行,主持

    2. 威海市科技局,共建项目高效人脸识别系统设计,进行,主持

    3. 山东大学(威海),专利申请辅助系统的研究开发,3万元,2015,已结题,主持

    4. 中华人民共和国科学技术部, 国家重点研发计划子课题, 2021YFC3320105, 人工智能伪造音视频治理试点试验, 2022-01 至 2024-12, 83万元, 进行,参与

    5. 山东省科技厅,自然科学基金面上项目,ZR2015AM015,分布计算环境下“膝”区原初宇宙线成分分辨算法研究,2015.07至2017.12,12万元,已结题,参与

    6. 科技部,国家863计划项目,2015AA016008,云计算环境用户数据隐私保护关键技术,2015.01至2017.12,263万元,已结题,参与

    7. 国家自然科学基金委员会,青年基金项目,61305130,高动态四足机器人步态规划和优化与稳定运动控制方法研究,2014.01至2016.12,23万元,已结题,参与

    8. 横向,威海佳和保险公估平台,2013,已结题,主持

    9. 国家自然科学基金委员会,青年基金项目,61100191,基于虚拟骨干网的无线多跳网络关键技术研究,2012.01至2014.12,25万元,已结题,参与

    10. 国家自然科学基金委员会,面上项目,11071271,多域交互环境下RBAC安全策略形式化设计,2010.01至2013.12,32万元,已结题,参与

    刘猛(5/8),2012年深圳市科技进步奖二等奖, 深圳市科学技术奖励委员会, 科技进步二等奖。

版权所有   ©山东大学 地址:中国山东省济南市山大南路27号 邮编:250100 
查号台:(86)-0531-88395114
值班电话:(86)-0531-88364731 建设维护:山东大学信息化工作办公室