Li Lin

Name: Li Lin

Gender: Female

Degrees: Ph.D.

Title: Associate professor

E-mail : linli_2009@bjut.edu.cn



Current Professional Societies

1. Member of the Institute of Electrical and Electronics Engineers;

2. Member of Chinese Computer Society;

3. Member of the TPM-WG and TNC-WG in the International Trusted Computing Group (TCG)

Research Areas

1. Cloud computing and edge computing security;

2. Big data security and privacy protection;

3. Artificial intelligence security;

4. Blockchain application

Honors

1. First prize of Science and Technology Progress Award by Chinese Institute of Electronics in 2014;

2. First prize of Science and Technology Award, by Chinese Film and Television Technology Society in 2017;

3. Outstanding Young Lecturer of Beijing University of Technology;

4. Excellent Teacher of Beijing University of Technology

Publications

1. Li LIN, Danna ZHENG, Jiahao FENG, Yutong DU, Chen LI, A Lightweight Safety Authentication Method for BLE Wearable Devices, China Patent: 201710316866.7, the authorization proclamation date: 2020.04.08.

2. Li LIN, Tingting LIU, Shuang LI, Chathura M.Sarathchandra Magurawalage, Shanshan TU. PriGuarder: Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments. IEEE Access, Volume 6: 1882-1893, 2018.

3. Li LIN, Jian NI, Xinya MAO, Jianbiao ZHANG. Whether Android Applications Broadcast Your Private information: A Naive Bayesian-based Analysis Approach, Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 671-674, 2018.

4. Li LIN, Jian HU, Ni JIAN, A Privacy Policy Synthesis Method to Cloud Service Composition, China Patent: 201510331049.x, the authorization proclamation date: 2018.04.27.

5. Li LIN. Evolutionary mechanism of crowdsourcing quality under hierarchical organization management. Journal of Beijing university of technology, Natural Science, 43 (2): 237-243 2017.

6. Shanshan TU, Guojie LIU, Qiangqiang LIN, Li LIN, Zedong SUN. Security Framework based on Trusted Computing for Industrial Control Systems of CNC Machines. International Journal of Performability Engineering, 13(8):1336-1346,2017.

7. Li LIN, Tingting LIU, Jian HU. A Privacy Protection Method l based on Attribute Fuzzy Grouping of Trusted Third Party in Cloud Environment. China Patent ZL201410127536.X, the authorization proclamation date: 2017.02.22.

8. Li LIN, Tingting LIU, Jian HU. An Approach for Trusted Execution of Privacy Policy in Cloud Environment. China Patent 201410675991.3, the authorization proclamation date: 2017.12.08.

9. Li LIN, Jian HU, Jianbiao ZHANG. Packet: A Privacy-aware Access Control Approach based on Attribute Fuzzy Grouping in Cloud Environments. Frontiers of Computer Science, 10(6): 1142-1157,2016.

10. Li LIN, Jian HU, Xinya MAO, Jianbiao ZHANG. Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment. Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud2016), 2016, pp: 36-41.

11. Li LIN, Shuang LI, Bo LI, Jing ZHAN, Yong ZHAO. TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments. International Journal of Grid and High Performance Computing (IJGHPC) , 8(4):1-21,2016.

12. Li LIN, Tingting LIU, Jian HU, Jian NI. PQsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intelligence, 3(3): 202–214,2016.

13. Li LIN, Jian Ni, Jian HU, Jianbiao Zhang. RbacIP: A RBAC-based method for intercepting and processing malicious applications in android platform. M. Yung et al. (Eds.): INTRUST 2015, Revised Selected Papers, Lecture Notes in Computer Science, 9565: 214-225, 2016.

14. Li LIN, Tingting LIU, Jian HU, Jianbiao ZHANG. A Privacy-aware Cloud Service Selection Method toward Data Life-cycle. Proceedings of the 20th IEEE International Conference on Paralled and Distributed Systems, Page 752-759 Hsinchu, Taiwan, 2014.12.

15. Yong WANG, Juan FANG, Xingtian REN, Li LIN, Formal Verification of TCG Remote Proof Protocol based on Process Algebra, Computer Research and Development, 50 (2): 325-331.2013.

16. Bei GONG, Wei JIANG, Li LIN, Threshold Ring Signature Scheme Based on TPM, China Communications, 9 (1): 80-85,2012.

17. Li LIN, Jinpeng HUAI, Xianxian LI. APoCA: Attribute-based Access Control Policies Composition Algebra, Journal of Software, 20(2):403-414,2009.

18. Li LIN, Jinpeng HUAI. QGrid: an Adaptive Trust Aware Resource Management Framework, IEEE Systems Journal (ISJ), 3(1): 78-90,2009.

19. Jianxin LI, Jinpeng HUAI, Li LIN, Jie XU. A Negotiation-based Trust Establishment Service for CROWN Grid. International Journal of Autonomous and Adaptive Communications Systems, 2(4): 362-381,2009.

20. Jianxin LI, Jinpeng HUAI, Xianxian LI, Li LIN. DTM: A Dynamic Trust Management Model for Internet Computing Environments. Journal of Computers, 32(3):493-505,2009.

21. Li LIN, Jinpeng HUAI, Yanmin ZHU, Chunming HU, Xianxian LI. A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks. Proceedings of the 16th International Conference on Cooperative Information Systems (CoopIS2008), Monterrey, Mexico, 2008.

22. Li LIN, Yu ZHANG, Jinpeng HUAI. Sustaining Incentive in Grid Resource Allocation: A Reinforcement Learning Approach. Proceedings of the 7th IEEE International Symposium on Cluster Computing and the Grid (CCGrid07), Rio De Janeiro, Bazil, 2007.

23. Yu ZHANG, Li LIN, and Jinpeng HUAI. Balancing Trust and Incentive in Peer-to-Peer Collaborative System. International Journal of Network Security (IJSN), 5(1):73–81, 2007.

24.v Yu ZHANG, Li LIN, Jinpeng HUAI, Xianxian LI, Liang ZHONG. A Resource Allocation Mechanism Providing Trust and Incentive in Grid. Journal of Software, 17(11):2245-2254, 2006.

25. Yu ZHANG, Jinpeng HUAI, Yunhao LIU, Li LIN, Baijian YANG. A Framework to Provide Trust and Incentive in CROWN Grid for Dynamic Resource Management. Proceedings of the 15th International Conference on Computer Communications and Networks (ICCCN06), Arlington, Virginia, USA, 2006.

Personal Statement

Li Lin, Associate Professor and Master Student Suprvisor, is the Deputy Director of the Information Security Research Institute, School of Computer Science in the Faculty of Information Technology, Beijing University of Technology, China. She has been engaged in teaching for 11 years. She has undertaken research projects funded by National Natural Science Foundation of China and Beijing Natural Science Foundation etc. And she has been participating in various research projects supported by the National High-Tech Research and Development Program of China (863 Program), National Key Basic Research Program of China (973 Program) etc. She has published more than 20 papers in high-level academic journals and conferences at home and abroad, participated in the preparation of one Chinese national standard, applied for more than 20 Chinese national technology invention patents including 10 authorized ones and completed 2 software copyrights.