1.代表性论文 [1] Zhang Qikun, Wang Xianmin, Yuan Junling, Liu Lu, Wang Ruifang, Huang Hong, Li Yuanzhang. A hierarchical group key agreement protocol using orientable attributes for cloud computing[J]. Information Sciences, 2019, 480:55-69. (top 期刊) [2] Qikun Zhang, Yong Gan, Lu Liu, Xianmin Wang, Xiangyang Luo, Yuanzhang Li. An authenticated asymmetric group key agreement based on attribute encryption[J]. Journal of Network and Computer Applications, 2018, 123(24):1-10. (top 期刊) [3] Zhang Qikun, Li Yongjiao, Wang Ruifang, Liu Lu, Tan Yu-an, Hu Jingjing. Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things[J]. International Journal of Intelligent Systems, 2020, 36(1):94-111. (top 期刊) [4] Qikun Zhang, Yongjiao Li, Zhigang Li, Junling Yuan, Yong Gan, Xiangyang Luo. Access control based on ciphertext attribute authentication and threshold policy for the internet of things[J]. Sensors, 2019, 19(5237):1-21. [5] Qikun Zhang, Yongjiao Li, Ruifang Wang, Jianyong Li, Yong Gan, Yanhua Zhang, Xiao Yu. Blockchain-based asymmetric group key agreement protocol for internet of vehicles[J]. Computers & Electrical Engineering, 2020, 86:106713. [6] Zhang Qikun, Li Yongjiao, Zheng Chuanyang, Zhu Liang, Yuan Junling, Hu Sikang. A permission-combination scalable access control model for Internet of things[J]. Transactions on Emerging Telecommunications Technologies, 2020, 8:e4060. [7] Zhang Qikun, Zhao Kunyuan, Kuang Xiaohui*, Li Yongjiao, Zheng Yuanpan, Yuan Junling, Wang Ruifang. Multidomain security authentication for the Internet of things[J]. Concurrency and Computation-Practice & Experience, 2020, 4: e5777. [8] Qikun Zhang, Bingli Wang, Xiaosong Zhang, Junling Yuan, Ruifang Wang. Blockchain-based dynamic group key agreement protocol for ad hoc network[J].Chinese Journal of Electronics, 2020, 29(3):447-454. [9] Zhang Qikun, Gan Yong, Zhang Quanxin*, Wang Ruifang, Tan Yu-An. A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application[J]. IEEE Access, 2018, 6:24064-24074. [10] Zhang Qikun, Li Yongjiao, Zhang Quanxin*, Yuan Junling, Wang Ruifang, Gan Yong, Tan Yu'an. A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks[J]. Chinese Journal of Electronics, 2019, 28(2):280-287. [11] Zhang Qikun, Li Yongjiao, Gan Yong, Zheng Chuanyang, Luo Xiangyang, Zheng Jun. Group key agreement protocol based on privacy protection and attribute authentication[J]. IEEE Access, 2019, 7:87085-87096. [12] Qikun Zhang, Liang Zhu, Yongjiao Li, Zhaorui Ma, Junling Yuan, Jun Zheng, Shan Ai. A group key agreement protocol for intelligent internet of things system [J]. International Journal of Intelligent Systems, 2021, 37(1):699-722. (top 期刊) [13] Qikun Zhang, Liang Zhu, Ruifang Wang, Jianyong Li, Junling Yuan, Tiancai Liang*, Jun Zheng*. Group key agreement protocol among terminals of the intelligent information system for mobile edge computing [J]. International Journal of Intelligent Systems, 2022, 37(1): 699-722. (top 期刊) [14] Qikun Zhang, Liang Zhu, Kunyuan Zhao, Yimeng Wu, Baohua Jin, Jianyong Li, Yinghui Meng, Sikang Hu. Dynamic permission access controlmodel based on privacy protection[J]. Telecommunication Systems, 2022, 81:191–205. [15] Qikun Zhang, Yuzhi Zhang, Yanling Shao, Mengqi Liu, Jianyong Li, Junling Yuan, Ruifang Wang. Boosting Adversarial Attacks with Nadam Optimizer[J]. Electronics 2023, 12, 1464. [16] Qikun Zhang, Mengqi Liu, Ping Li, et.al. Multidomain Secure Communication and Intelligent Traffic Detection Model in VANETs[J]. International Journal of Intelligent Systems, 2025, ID 2539516. [17] Qikun Zhang, Jinbo Feng, Ruifang Wang, et.al. An Access Control Model Against Attribute Guessing Attacks for Data Sharing in Cloud Computing Environment[J]. Concurrency and Computation-Practice & Experience, 2025, http://dx.doi.org/10.1002/cpe.70140. [18] Qikun Zhang, Mengyang Yu, Ruifang Wang, et.al. A sparse and invisible targeted backdoor attack in federated learning[J]. Journal of King Saud University Computer and Information Sciences, 2025, 37:134. (二区) [19] 张启坤, 甘勇, 王锐芳, 郑家民, 谭毓安. 簇间非对称群组密钥协商协议[J]. 计算机研究与发展, 2018, 52(12):2651-2663. [20] 张启坤, 朱亮, 韩桂锋,刘梦琪, 金保华, 李元章. 边云协同场景中基于动态属性权限的群组密钥协商协议[J]. 电子学报.2024, 52(6):1912-1924.
2.自然科学获奖 1)2023年,边云协同应用场景中安全数据共享技术及其应用,排名第1. 2)2016年,云计算中多域联盟认证与多域间群组密钥协商,河南省科技进步三等奖,排名第1. 3) 2020年,基于数据安全和全程可控的智能电子政务系统开发及应用,河南省科技进步三等奖,排名第2. 4) 2020年,据中心光网络中频谱资源分配技术及应用,河南省科技进步三等奖,排名第3. 5)2014年,开放环境下应对规划关键技术研究与应用,河南省科技进步三等奖,排名第3. 6)2017年,基于动态重载的标签所有权安全转换机制,河南省科技进步三等奖,排名第4. 7)2025年,云端协同……关键技术与应用,中国地理信息产业协会地理信息科技进步二等奖,排名第6. 3.教学成果奖 2024年,军地校企融合,区域协同联动,网络空间安全人才培养探索与实践,河南省高等教育教学成果奖,特等奖. 4.专利 1)张启坤等. METHOD AND SYSTEM FOR DYNAMIC AUTHORITY ACCESS CONTROL BASED ON PRIVACY PROTECTION, 授权号:UL102395,欧盟 2) 张启坤等,移动云计算下多域间非对称群组密钥协商协议的方法,授权号:ZL201610068982.2,中国 3) 张启坤等,移动非平衡网络中可认证非对称群组秘钥协商方法,授权号:ZL201410056207,中国 4) 张启坤等,一种弹性非对称群组密钥协商方法,授权号:ZL201610536303.4,中国 5) 张启坤等,线传感器网络中可跨簇非对称群组密钥协商方法,授权号:ZL201710350236.1,中国 6) 张启坤等,基于权限信息交换的非对称群组密钥协商方法,授权号:ZL201811390621.X,中国 7) 张启坤等,基于区块链的对称群组密钥协商方法,授权号:ZL201910291921.0,中国 8) 张启坤等,一种基于区块链的非对称群组密钥协商方法,授权号:ZL201910543168.X,中国 9) 张启坤等,基于隐私保护和属性认证的群组密钥协商方法, 授权号:ZL201910543168.X,中国 10)张启坤等,种基于隐私保护的动态权限访问控制方法, 授权号:ZL201910543168.X,中国 5.专著 1)Research on Group Key Agreement,吉林大学出版社,2019,独著 2)《安全数据共享关键技术研究》,吉林大学出版社,2021,合著 3)《数据与通信安全关键技术研究》,吉林大学出版社,2025,合著 |