学校主页 / English / 设为首页 / 加入收藏

讲师

当前位置: 首页    师资队伍    网络工程系    讲师    正文

沈晓鹰

发布时间:2024-09-24来源: 作者:

     

 

个人简历

沈晓鹰,女,汉族,中共党员,甘肃武威人,西安理工大学计算机科学与工程学院讲师。研究方向是公钥密码学、隐私保护、联邦学习。先后在Information Science,IEEE Internet of Things Journal,Journal of Network and Computer Applications,Computers & Mathematics with Applications等国内外重要期刊上发表学术论文10主持国家自然科学基金青年基金1项,校级项目3项、浙江省密码技术重点实验室开放课题1项,参与国家重点研发计划项目3项,国家自然科学基金面上项目2项,国防科技173计划项目1项,国防科技创新特区项目1项。


联系方式

电子邮箱:105670@xaut.edu.cn

联系地址:西安市碑林区金花南路5号西安理工大学666信箱

电话:13718898588      QQ1576204681          邮编:710048

 

研究方向

 公钥密码学,隐私保护,联邦学习


研究成果

[1] Xiaoying Shen, Xue Luo, Feng yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao. Verifiable privacy-preserving federated learning under multiple encrypted keys [J]. IEEE Internet of Things Journal, 11(2), 2024: 3430-3445.

[2]Shen Xiaoying, Wang Baocang, Wang Licheng, Duan Pu, Zhang Benyu. Group public key encryption supporting equality test without bilinear pairings [J]. Information sciences, 605, 2022: 202-224.

[3]Xiaoying Shen, Qiaozhen Ma. Existence of random attractors for weakly dissipative plate equations with memory and additive white noise. Computers & Mathematics with Applications, 2017, 73(10): 2258-2271. 

[4]Xiaoying Shen, Xue Luo, Feng yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao. Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption [J]. Journal of system architecture, 144, 2023: 102983.

[5]Shen Xiaoying, Wang Licheng, Zhu Huijun, et al. A multivariate public key encryption scheme with equality test [J]. IEEE Access, 2020, 8: 75463-75472.

[6]Xiaoying Shen, Zhen Wang, Baocang Wang, Licheng Wang, Qingqi Pei. A privacy-preserving ride-matching scheme without a trusted third-party server [J]. IEEE Systems Journal, 17(4), 2023: 6413-6424.

[7]Xiaoying Shen, Hang Jiang, Yange Chen, Baocang Wang, Le Gao. PLDP-FL: federated learning with personalized local differential privacy [J].Entropy, 25(3), 2023: 485.

[8]Shen Xiaoying, Wang Licheng, Pei Qingqi, Yuan Liu, Miaomiao Li. Location privacy-preserving in online taxi-hailing services [J]. Peer-to-peer Networking and Applications, 2021, 14(1): 69-81.

[9]Xiaoying Shen, Qiaozhen Ma. The existence of random attractors for plate equations with memory and additive white noise. The Korean Journal of Mathematics, 2016.

[10]Kaixin Peng, Xiaoying Shen*,  Le Gao*, Baocang Wang, Yichao Lu. Communication-efficient and privacy-preserving verifiable aggregation for federated learning. Entropy, 2023, 25(8): 1125.

[11]Liu Yuan, Wang Licheng, Shen Xiaoying, Lixiang Li. New constructions of identity-based dual receiver encryption from lattices [J]. Entropy, 2020, 22(6): 599.

[12]Liu Yuan, Wang Licheng, Shen Xiaoying, Lixiang Li, Dezhi An. Space-efficient key-policy attribute-based encryption from lattices and two-dimensional attributes [J]. Security and Communication Networks, 2020, 2020(2345369): 1-11.

[13]王慧, 王励成, 柏雪, 刘清华, 沈晓鹰. 区块链隐私保护和扩容关键技术研究. 西安电子科技大学学报, 2020, 47(5): 12.  

[14] Wang Licheng, Shen Xiaoying, Li Jing, Jun Shao, Yixian Yang. Cryptographic primitives in blockchains [J]. Journal of Network and Computer Applications, 2019, 127: 43-58.  

[15] Liu Zhanqiang, Wang Licheng, Wang Xianmin, Shen Xiaoying, et al. Secure remote sensing image registration based on compressed sensing in cloud setting [J]. IEEE Access, 2019, 7: 36516-36526.