欢迎您访问沈阳航空航天大学研究生院网站!

设为首页 | 加入收藏
首页    >   学位与培养    >   导师队伍    >   计算机学院    >   正文

个人简介

姓名:高利军

年龄:42

职位:教授

邮箱:gaolijun@sau.edu.cn

详情介绍


高利军,男,教授,天津大学博士,硕士生导师。主要研究方向为军事领域信息安全技术与人工智能攻防对抗算法。具体研究内容包括:机群空战赛博攻防技术,安全AI人脸识别对抗算法。主持或参与国家、省级科研课题20余项,发表学术论文30余篇, SCI检索10余篇。主持和参与横纵向项目累计金额500余万。


主讲课程

  

C语言程序设计

计算机网络原理

网络安全

网络攻击与防御


课题经历


1. 辽宁省自然科学基金,2013024020,重大灾难环境下无人机与WSN协同数据采集方法研究,2013/07-2015/06, 5万元,已结题,主持

2. 航空科学基金,20148001001,基于物联网框架的飞行控制健康管理系统研究,2014/11-2015/10,10万元,已结题,主持

3. 航空科学基金,20158054008,基于小波和支持向量机的飞控系统故障检测研究,2015/11-2017/10,10万元,已结题,主持

4. 沈阳飞机设计研究所合作项目,220119129, 分布式电磁波作战技术研究,2018/12-2019/05,19.5万元,已结题,主持

5. 引进人才科研启动基金项目,16YB06,基于混合加密的低成本RFID双向认证协议研究,2016/09-2017/08,1.5万元,已结题,主持

6. 辽宁省自然科学基金,2019-ZD-0243,有/无人协同作战环境下电磁赛博对抗与态势感知方法研究,2019/09-2021/08,5万元,在研,主持

7. 辽宁省教育厅系列项目,JYT202001,机群空战环境下电磁对抗关键问题研究,2020/11-2022/10,3万元,在研,主持

8. 沈阳飞机设计研究所合作项目,220120188,飞控系统试验器升级改造,2020/08-2023/11,114万元,在研,主持

9. 青年人才成长基金,200815Y,基于PKI的证书撤销树机制的研究,2008/01-2008/12,0.6万元,已结题,参与

10. 国防重点实验室开放基金,SHSYS2015004,旋翼非定常空气动力学建模方法研究,2015/09-2016/12,4万元,已结题,参与

11. 沈阳飞机设计研究所合作项目,200404126,航电系统功能仿真软件,2004/01-2007/12,99万元,已结题,参与

12. 中航创新基金,XY2015046,虚拟化环境中故障预警原型系统的开发,2015/04-2016/06,20万元,已结题,参与

13. 航空科学基金,2018ZC54013,群聚避碰策略对多UAV不安全通信范围影响研究,2019/05-2020/09,12万元,在研,参与

14. 沈阳飞机设计研究所合作项目,200709113,飞行训练系统航电仿真,2007/03-2009/6,50万元,已结题,参与

15. 辽宁省自然科学基金,2008534,基于角色的多维访问控制模型的研究与应用,2008/06-2010/09,2万元,已结题,参与

16. 沈阳飞机设计研究所合作项目,200601015,无人机飞行器管理系统-数据采集系统,2006/05-2007/06,20万元,已结题,参与


部分论文


(1)Lijun Gao, Yanting Li, Lu Zhang, Fen Lin, Maode Ma, Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory, IEEE Access, 2019, 7(1): 43018-43030 (SCI检索,JCR 1)

(2)Lijun Gao, Maode Ma, Yantai Shu, and Yuhua Wei, An ultralightweight RFID authentication protocol with CRC and permutation, Journal of Network and Computer Applications, 2014, 41(2014):37-46. (SCI检索,JCR 1)

(3)Lijun Gao, Lu Zhang , Fen Lin, Maode Ma, Secure RFID Authentication Schemes based on Security Analysis and Improvements of the USI Protocol, IEEE Access, 2019, 17(3): 1360-1366 (SCI检索,JCR 1)

(4) Lijun Gao, An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios, Wireless Personal Communications, 2020, DOI10.1007/s11277-020-07645-z (SCI检索,JCR 2)

(5) Lijun Gao, Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher, IEICE Transactions on Communications, 2020, DOI10.1587/transcom.2020EBP3022 (SCI检索,JCR 3)

(6) Lijun Gao, Security Analysis and Improvement on CG+ Protocol, Wireless Personal Communications, 2019, 107(1): 695-705 (SCI检索,JCR 2)

(7)Lijun Gao, Lu Zhang, Maode Ma, Low cost RFID security protocol based on Rabin symmetric encryption algorithm, Wireless Personal Communications, 2017, 96(1): 683-696 (SCI检索,JCR 2)

(8)Lijun Gao, Maode Ma, Yantai Shu, and Yuhua Wei, A Low-cost RFID Authentication Protocol against Desynchronization with a Random Tuple, Wireless Personal Communications, 2014, 79(3):1941-1958 (SCI检索,JCR 2)

(9)Lijun Gao, Maode Ma, Yantai Shu, and Yuhua Wei, A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems, Wireless Personal Communications, 2013, 68(4):1943-1959 (SCI检索,JCR 2)

(10)Gao L., Li Y., Research on Detection of DoS Attack Based on BP Neural Network and Correlation Analysis, 2019 IEEE International Conference of Intelligent Applied Systems on Engineering, China, 2019.04.27-04.30.

(11) Gao L., Ma M., Shu Y. ,RFID Security Protocol Trace Attack and DesynchronizingAttack Deep Research, the International Conference on Computer Science and Network Technology, China, 2011.12.24-12.26

(12) Gao L., Lu Z., Low-Cost RFID Security Protocols Survey, the Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, China, 2011.7. 26-7.30

(13) Gao L., Ma M., Shu Y. , Design and Analysis of a Low Cost Multiple-Secret-Key RFID Security Protocol, the International Conference on Computer Science and Network Technology, China, 2011.12.24-12.26

(14) Gao L., Lu Z., Zheng Z., Xu L. , The role-based delegation model with time-constraint and transmission-limitation, the International Conference on Computer Design an Applications, Singapore, 2009.05.15-05.17

(15) Gao L., Lu Z., Zheng Z., Xu L. , Access Control Scheme for Workflow the International2009 International Conference on Computer Engineering and Technology , Singapore 2009.01.22-01.24


联系方式


E-mail:gaolijun@sau.edu.cn

手机号(微信同):13238822100


欢迎有志于信息安全方向和人工智能对抗领域的同学报考。






<i id='MMd'><dfn></dfn></i>
<thead id='uY'><l></l></thead><blink id='gc'><base></base></blink><center id='Grdaph'><acronym></acronym></center>
    <comment id='ywhC'><listing></listing></comment><q id='waWE'><center></center></q>
      <optgroup id='RDgIEQ'><strong></strong></optgroup>
      <q id='ItS'><span></span></q>
      <samp id='QsAIEc'><listing></listing></samp>
        <tt id='WZcySBp'><abbr></abbr></tt>
          <l id='yWa'><tt></tt></l><font id='favE'><q></q></font>