1996 Bachelor of Electrical Engineering, Northwestern Polytechnical University
200 1 Master of Power Electronics and Transmission Engineering, Northwestern Polytechnical University
Doctor of Pattern Recognition and Intelligent System Engineering, Northwestern Polytechnical University, 2008
Best track record
65438+July 0996–20065438+0 June 65438+February Assistant Professor of Northwestern Polytechnical University.
June 2002 +2002 10-March 2008 Lecturer at Northwestern Polytechnical University
April 2008-Associate Professor of Northwestern Polytechnical University.
20 1 1 year 1 1 month -20 12 years1/month visiting scholar at the University of Victoria, Canada.
Scientific research direction
Network protocol design and optimization, embedded system network, network information security
Academic part-time job
Member of Computer Application Professional Committee of Shaanxi Automation Society
project
* Research on UAV networking technology of Aisheng Innovation Fund (under study)
* Research on Ad Hoc Network Technology of Vehicle-mounted Radio Station of Northern Information Control Group Project (under study)
Physical verification system of vehicle-mounted mobile self-organizing network for North Information Control Group project.
Research on remote network control technology, horizontal subject
Hardware optimization of IPSec protocol encryption algorithm, Northwestern Polytechnical University Youth Science and Technology Innovation Fund
* Encryption chip application technology, national defense basic research project (technical director)
Intelligent network control system based on expert system for scientific and technological innovation project of Ministry of Public Security (technical director)
* Development of encryption chips, national defense basic research project (technical director)
Research on * platform based on ASIC security chip, national defense basic research project (technical director)
Main thesis
[1] A New MAC Protocol Combining Competition and Distribution [J]. Computer Engineering and Application, 20 12
[2] Design and implementation of the pipeline structure of Skein algorithm [J]. Computer Science, 2012,01
OLSR protocol based on cross-layer fast neighbor sensing [J]. Journal of Sensing Technology, 2012,01
[4] An asynchronous MAC broadcasting mechanism for wireless sensor networks [J]. Journal of Sensing Technology, 201/,05
[5] Design and Implementation of Hardware Encryption for Mobile Hard Disk [J]. Computer Engineering and Application, 20 10/0,22
[6] Design and implementation of FTL algorithm based on logarithmic mixed mapping [J]. Computer Measurement and Control, 2009,07
[7] Design and Implementation of Encrypted Solid State Disk with Integrated Hardware Encryption [J]. Computer Measurement and Control, 2009,05
IP Core Design of Embedded ATA Host Controller [J]. Computer Measurement and Control, 2009,01
Research on instruction set extension of accelerating Montgomery multiplication over finite field GF(2m) [J]. Computer Application Research, 2009,01
[10] An improved high-security key recovery mechanism [J]. Computer Measurement and Control, 2008, 1 1
A Secure Recoverable Key Management Mechanism Based on Database Encryption [J]. Computer Measurement and Control, 2008, 10
[12] CRC parallel algorithm based on hard disk encryption card and its simulation [J]. Computer simulation, 2008,08
[13] Research on Extension of Cryptographic Instruction Set [J]. Computer Application Research, June 2008
[14] Improved fingerprint adaptive threshold segmentation algorithm [J]. Computer application research, June 2008.
patent
[1] A method and device for encrypting data in ata storage equipment with USB interface, invention patent, authorization,
[2] An encryption device for data in ata storage equipment with USB interface, utility model, authorization,