楊雅輝

  • 職務:教授
  • 網絡軟件與系統安全系
  • 電話:+86-10-61273624
  • 傳真:+86-10-61273670
  • 郵箱: 該Email地址已收到反垃圾郵件插件保護。要顯示它您需要在瀏覽器中啟用JavaScript。

??????1999年7月獲中科院計算所計算機系統結構專業工學博士學位,分別于1990年、1987年獲吉林大學計算機系統結構專業工學碩士、工學學士學位,現任北京大學軟件與微電子學院教授,工程博士/碩士導師。主持和參與多項國家級、省部級和企業合作研究項目,出版或參與編寫著作/教材6部,發表學術論文50余篇,申請專利11項(其中7項已授權),登記軟件著作權6項。

  1. 《網絡規劃與設計》 研究生課程 北京大學精品課程 專業選修課
  2. 《計算機網絡及應用》 (二學位專業必修課)
  3. ?網絡空間安全導論(專業選修課)

?研究領域
  1. 云計算安全
  2. 大數據安全與隱私
  3. 網絡安全管理
  1. 大數據與云安全

  2. ?網絡與系統安全

  3. 軟件工程技術
  4. ?大數據技術

  1. 江蘇省工業和信息產業轉型升級專項資金項目“面向海量數據存儲系統的智能運維關鍵技術與產業化應用”,子課題負責人,2019—2020
  2. 國家高技術研究發展計劃(863計劃)項目“云安全的可信服務及其示范應用”,子課題負責人,2014-2017
  3. 國家自然科學基金重點項目“云存儲的隱私保護和安全保障機制”,“云存儲分布式文件系統安全”子課題負責人, 2013—2017
  4. 國家自然科學基金面上項目“構建高可信云操作系統的若干關鍵技術研究”,參與,2017-2020
  5. AWS合作研發項目“基于AWS的教育云課堂安全與隱私”,參與,2016-2017

  6. 深圳技術攻關項目“大數據平臺信息安全關鍵技術研發”,子課題負責人,2014-2016
  7. 國家自然科學基金面上項目“基于SOM神經網絡模型的網絡入侵檢測方法研究”,項目負責人,2011—2013
  8. IBM共享大學研究項目“Security Services of Private Storage Cloud”. 負責人之一,2009—2011
  9. 自籌項目“大數據存儲及服務平臺安全管理”,負責人,2013-2014
  10. 西門子研究院合作研究項目“RFID網絡規劃和自動配置方法研究”,負責人,2013-2015
  11. 西門子研究院合作研究項目“工業控制網絡安全管理平臺關鍵技術研究”,負責人,2008-2010
  12. 西門子研究院合作研究項目“面向負載均衡的數據分布組織的關鍵技術研究”,負責人,2007—2008
  13. 卡耐基梅隆大學Cylab-KISA研究項目“網絡安全管理”,項目組成員,2005—2007
  14. 科學院的創新項目“NSTLnet IPv6示范系統設計與實驗”,項目組成員,2002-2003
  15. 企業項目“電信綜合網管系統研究與開發”,負責人,2001-2002
  16. 國家自然科學基金面上項目“NSFCnet網絡性能與工程質量測評研究”, 項目組成員,1999-2000
  17. 企業合作研究項目“廣東視訊寬帶網安全管理系統的研究”,負責人,1999-2000
  18. 政府項目“國家防汛抗旱指揮網絡規劃與設計”,項目組成員,2000
  19. 企業項目“廣州寬帶城域網規劃與設計”,項目組成員,1999
  1. Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen,. PTAD: Provable and Traceable Assured Deletion in Cloud Storage. IEEE Symposium on Computers and communications(ISCC2019). Barcelona, Spain. June 2019.

  2. Hongzhang Yang, Yahui Yang, Yaofeng Tu, Ping Wang. uSendfile: A user-space sendfile verb based on flash and RDMA. IEEE 12th International conference on cloud computing(CLOUD2019). MILAN, ITALY. JULY, 2019: 465-469?

  3. ?Hongzhang Yang, Yahui Yang, Yaofeng Tu. S3R5: A snapshot storage system baaed on ROW with rapid rollback,recovery, and Read-write[C]. IEEE International conference on high performance computing and communication(HPCC2019). Zhangjiajie, China. Augest, 2019: 2111-2118

  4. Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu: Memory Cache Attacks on Alluxio Impede High Performance Computing. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 407-414, Melbourne, Australia, December 11-13, 2018

  5. Tong Hui, Yahui Yang*, Qingni Shen, Zhonghai Wu, "Towards real-time privacy preservation: A streaming location anonymous method based on distributed framework," The 17th IEEE International Conference on ?Communications (ICC 2018), May 20-24, 2018 Kansas City, US ?

  6. ?Wenjun Qian, Qingni Shen*, Yizhe Yang, Yahui Yang, Zhonghai Wu. Statically Defend Network Consumption against Acker Failure Vulnerability in Storm[C], the 19th International Conference on Information and Communications Security (ICICS 2017), December 6-8, 2017, Beijing, China.
  7. Ziyao Zhu, Qingni Shen*, Yahui Yang, Zhonghai Wu. MCS: Memory Constraint Strategy for Unified Memory Manager in Spark[C], The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 15-17 December 2017, Shenzhen, China
  8. Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu*. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, 9th EAI International Conference on Digital Forensics & Cyber Crime(ICDF2C2017),October 9-11 2017, Prague, Czech Republic, pp: 221-227.
  9. Yazhen Tian, Qingni Shen*, Ziyao Zhu, Yahui Yang, Zhonghai Wu. Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming, IEEE Symposium on Computers and Communications(ISCC 2018), 25-28 June 2018 – Natal, Brazil.
  10. Shengjun Zhang, Hang Zhou,?Yahui?Yang*,?Zhonghai?Wu.?A Joint Bloom Filter and Cross-encoding for Data Verification and Recovery in Cloud,?The 22nd IEEE Symposium on Computers and Communications?(ISCC 2017), July 3-6,?2017, Crete,?Greece.

  11. ?Limin?Li,?Yahui?Yang*,?Zhonghai?Wu. IEEE: FMR-PDP: Flexible Multiple-Replica Provable Data Possession in Cloud Storage, The 22nd IEEE Symposium on Computers and Communications (ISCC 2017), July 3-6, 2017, Heraklion, Crete, Greece.

  12. ?Yang Luo, Tian Puyang, Xiaoning Suny, Qingni Shen, Yahui Yang, Anbang Ruanz, Zhonghai Wu. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs. The 24th IEEE International conference on web Services(ICWS 2017), June 25-30, 2017, Hawaii, US.?

  13. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS’15). Springer LNCY: 312-31.

  14. ?Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015). Springer LNCS: 429-435

  15. Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). Roman, Italy.?

  16. Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). Roman, Italy. Accepted.

  17. Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai, POSTER: Ciphertext- policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts. Proceedings of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15). Springer International Publishing.?

  18. Chang Guo,?Qingni Shen,?Yahui Yang,?Zhonghai Wu:?User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System.?COMPSAC Workshops?2015:?104-109
  19. Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenmin Lao, Dandan Wang, Min Long. SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012), Fukuoka, Japan, March 26-29, 2012
  20. Yahui Yang, Dianbo Jiang , Min Xia, Using Improved GHSOM for Intrusion Detection, Journal of Information Assurance and Security, Volume 5, Issue 3, 2010:232-239
  21. Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing. A Way of Key Management in Cloud Storage Based on Trusted Computing. In Proceedings of the 8th IFIP International Conference on Network and Parallel Computing (IFIP NPC2011), pp: 135-145, Changsha, China. 2011.10
  22. Qingni Shen, Xin Yang, Xi Yu, Yahui Yang, Zhonghai Wu. Towards Data Isolation and Collaboration in Storage Cloud. The 2011 IEEE Asia-Pacific Services Computing Conference (APSCC2011), pp: 139-146. December 12-15, 2011, Jeju, Korea.
  23. Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. SecDM: Securing Data Migration between Cloud Storage Systems. In Proceedings of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011), pp: 636-641. December 12-14, Sydney, Australia
  24. Zhen Li, Yahui Yang, Wei Liang, Guangcheng Tan, Probabilistic Fading Counting:An efficient identification method for finding heavy hitters. The 2010 International Conference on Computer Application and System Modeling(ICCASM 2010), October 22-24.
  25. Zhen Li, Yahui Yang, An Adaptive Method for identifying Heavy Hitters Combining Sampling and Data Streaming Counting, 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE 2010). August 20-22, 2010.
  26. Yahui Yang, Xiao Han, Min Xia, An improved ART 2-A Model for Mixed Numeric and Categorical Data, International Conference on Information Engineering and Computer Science(ICIECS2009), 19-20 December, 2009: 86-89
  27. Yahui Yang, Yunfei Chen, Min Xia, An Automated Mechanism of Security Test on Network Protocols, The Fifth International Conference on Information Assurance and Security (IAS-2009), August 18-20, 2009:503-506.
  28. Dianbo Jiang, Yahui Yang, Min Xia, Research on Intrusion Detection Based on an Improved SOM Neural Network, The Fifth International Conference on Information Assurance and Security (IAS-2009), 2009:400-403
  29. Yahui Yang, Chunfang Huang, Zhijing Qin, A Network Misuse Detection Mechanism Based on Traffic log, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 526-529.
  30. Yahui Yang,Yujie Wu,Min Xia,Zhijing Qin, A RFID Network Planning Method based on Genetic Algorithm, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 534-537.
  31. Yahui Yang,Yujie Wu,Zhjing Qin, A RFID Network Planning Method based on Genetic Algorithm, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 534-537.
  32. Ke Xu, Yahui Yang, Tao Chen,Improving BitTorrent Network’s Performance via Deploying Helpers,The 2008 International Conference On Embedded and Ubiquitous Computing(EUC 2008),December 17-20,2008: 507-512.
  33. Yahui Yang, Wenjian Miao, Qingni Shen, Optimization of BT Downloading Algorithm for Video Broadcast, International Symposium on Computer Network and Multimedia Technology(CNMT2009), 18-20 December, 2009:169-172.
  34. Keming Du, Yahui Yang, Policy-Based Time Slot Assignment Algorithm in a MANET, International Conference on Anti-counterfeiting, Security, and Identification in Communication(ICASID 2009), August 20-22, 2009.
  35. Chen Shen, Bin Wang, Yahui Yang, Exploiting Text Content in Image Search by Semi-supervised Learning Techniques. 2009 IEEE International Conference on Systems, Man, and Cybernetics. October 11-14, 2009. Hyatt Regency Riverwalk, San Antonio, Texas, USA.
  36. Chen Shen, Jun Jiao, Yahui Yang , Bin Wang, Multi-Instance Multi-Label Learning For Automatic Tag Recommendation. 2009 IEEE International Conference on Systems, Man, and Cybernetics. October 11-14, 2009. Hyatt Regency Riverwalk, San Antonio, Texas, USA.
  37. 楊雅輝, 黃海珍, 沈晴霓, 吳中海,張英:基于增量式GHSOM神經網絡模型的入侵檢測研究.計算機學報,2014,37(05):1216-1224.
  38. 楊雅輝, 杜克明: 全網異常流量簇的檢測與確定機制,計算機研究與發展,2009,46(11):1847-1853.
  39. 楊雅輝, 鈕振瑛: 徐恪: P2P流媒體系統服務器部署的優化設計, 計算機研究與發展,2010.7: 1219-1224.
  40. 楊雅輝: 網絡流量異常檢測及分析的研究,計算機科學, 2008,35(5):108-112.
  41. 楊雅輝:IP網絡性能指標體系的研究,通信學報,2002,23(11): 1-7.
  42. 楊雅輝,姜電波, 沈晴霓,夏敏:基于改進的GHSOM的入侵檢測研究,通信學報,2011,32(1):121-126.
  43. 李臻 ,楊雅輝, 謝高崗,覃光成:一種基于數據流計數技術的概率衰落大業務流識別方法,計算機研究與發展,2011, 48(6)
  44. 劉白璐,楊雅輝,沈晴霓,張英:網絡入侵早期檢測方法研究與實現,計算機工程,2013, 39(7): 1-6.
  45. 肖三,楊雅輝,沈晴霓:基于微簇的在線網絡異常檢測方法,計算機工程與應用, 2013,49 (06):90-94.
  46. 沈晴霓, 楊雅輝,禹熹,張力哲,陳鐘. 一種面向多租戶云存儲平臺的訪問控制策略.小型微型計算機系統, 2011,32(11): 2223-2229? (中國計算機大會CNCC 2011錄用的優秀論文)
  47. 沈晴霓、張力哲、吳中海、楊雅輝. 一種基于動態域劃分的MapReduce安全冗余調度策略, 通信學報. 2014,35(1):34-46.
  48. 劉白璐,楊雅輝,沈晴霓,楊雅輝:一種基于遺傳算法的入侵早期特征選擇方法. 小型微型計算機系統,已錄用,中國互聯網學術會議ICoC 2013
  49. 張英, 楊雅輝, 田浩然, 張威, 董晶晶:基于遺傳算法的網絡資源配置優化,計算機科學, 2012, 05期, pp 36-39.
  50. 靖紅芳,王斌,楊雅輝: 基于類別分布的特征選擇框架,計算機研究與發展,2009,46(9):1586-1593.
  51. 夏敏,吳中海,楊雅輝: 基于雙緩沖區的發送速率控制方法,計算機工程,2010,36(5):119-121
  52. 苗文健, 楊雅輝: 面向視頻播放的BT協議下載算法的改進, 計算機工程與應用,2010,46(18):68-70.
  53. 李臻,楊雅輝,張廣興: 大業務流測量采樣算法研究綜述,計算機應用研究,2011,28(1).
  54. 楊雅輝,王行剛:一種面向對象的被管網絡資源的管理、維護模型,計算機學報,1999.8.
  55. 楊雅輝,王行剛:一種面向對象的自主網絡管理模型, 通信學報,1999,4.
  56. 楊雅輝,王行剛:基于分布式對象技術的層次化網絡管理結構,計算機工程與應用,2000,4.
  57. 楊雅輝,王行剛:OSI-TMN-INTERNET—三種標準化網絡管理的比較研究,數據通信,2000,6.
  58. 楊雅輝: 機器學習在Web智能代理中的應用, 清華大學學報,1998,7增刊.
  1. 楊雅輝,姜電波,夏敏,沈晴霓等。一種基于生長型分級自組織映射神經網絡的入侵檢測方法。國家知識產權局。專利授權號: ZL 201010228750.6.
  2. 楊雅輝,沈晴霓,張力哲,禹熹,吳尉瀧等。適用于存儲云間數據安全遷移的方法與系統。國家知識產權局。專利授權號ZL 201110101646.5
  3. 楊雅輝,陽時來,沈晴霓,黃海珍。一種基于半監督神經網絡模型的網絡入侵檢測方法。國家知識產權局。專利授權號ZL 201210074813.6
  4. 楊雅輝,黃海珍,沈晴霓,吳中海?;谠隽渴紾HSOM神經網絡模型的入侵檢測方法。國家知識產權局。專利申請號CN 201210206778.9
  5. 沈晴霓,楊雅輝,勞振明,禹熹,吳尉瀧等,適用于存儲云內數據安全遷移的方法。國家知識產權局。專利授權號ZL 201110144862.8
  6. 楊雅輝,李曉晨,沈晴霓,吳中海,方躍堅。一種面向用戶的云存儲數據完整性保護方法。專利授權號ZN 201410350589.8
  7. 楊雅輝,高天辰,沈晴霓,吳中海。一種面向云服務的UCON多義務訪問控制方法及系統。國家知識產權局。專利授權號ZL 201410066781.4

  8. 楊雅輝,張勝軍,吳中海。一種基于步隆過濾器和交叉編碼的數據完整性保護方法。專利申請號CN201710472920.7

  9. 楊雅輝,李立敏,吳中海。一種云存儲環境下的多備份數據持有性證明方法。專利申請號CN201710472918.X

  10. 楊雅輝,李曉晨,沈晴霓,吳中海,方躍堅。一種面向用戶的云存儲數據完整性保護方法。專利申請號CN 201410350589.8
  11. 楊雅輝,楊洪章。一種面向糾刪碼的主動數據修復方法及系統。專利申請號 CN201811300732.7

  12. ?楊雅輝,張何燦,張夢宇,吳中海。一種面向糾刪碼的主動數據修復方法及系統. 專利申請號CN201811300732.7

    參與申請如下軟件著作權:
  1. 登記號2017SR586039,2017.10, 北京大學,北大軟微云課堂系統V1.0。
  2. 登記號 2016SR207598,2016.5.10,?北京大學,云存儲數據完整性驗證與恢復軟件。
  3. 登記號2011SR052487,2011.3.20, 北京大學,云存儲客戶端數據安全服務軟件
  4. 登記號2011SR054439,2011.3.20, 北京大學,云存儲數據安全訪問服務軟件
  5. 登記號2011SR052173,2011.3.20, 北京大學,云存儲數據安全內遷服務軟件
  6. 登記號2011SR054810,2011.3.20, 北京大學,云存儲數據安全外遷服務軟件
  1. 楊雅輝主編,《網絡規劃與設計》,高等教育出版社,2008年6月
  2. 楊雅輝,王斌、李小東、黨治林,《電子商務網站設計原理》,財經出版社,2001年10月
  3. 楊雅輝參與編寫《北京大學軟件與微電子學院課程體系》一書,高等教育出版社,2011年6月
  4. 張銳昕主編,楊雅輝參編,《電子政府與電子政務》. 中國人民大學出版社,2010年8月。 (普通高等教育“十一五”國家級規劃教材. 國家級精品課程教材)
  5. 張銳昕主編,楊雅輝參編,《電子政府概論》,中國人民大學出版社,2004年5月(獲吉林省普通高校優秀教材三等獎)
  6. 張銳昕主編,楊雅輝參編, 《公務員電子政務培訓教程》,清華大學出版社,2004年10月