杨雅辉

  • 职务:教授
  • 网络软件与系统安全系
  • 电话:+86-10-61273624
  • 传真:+86-10-61273670
  • 邮箱:yhyang@ss.pku.edu.cn

      1999年7月获中科院计算所计算机系统结构专业工学博士学位,分别于1990年、1987年获吉林大学计算机系统结构专业工学硕士、工学学士学位,现任yL23411永利官网登录教授,工程博士/硕士导师。主持和参与多项国家级、省部级和企业合作研究项目,出版或参与编写著作/教材6部,发表学术论文60余篇,申请专利13项(其中8项已授权),登记软件著作权6项。

  1. 《网络规划与设计》 研究生课程 北京大学精品课程 专业选修课
  2. 《计算机网络及应用》 (二学位专业必修课)
  3.  网络空间安全导论(专业选修课)

 研究领域
  1. 云计算安全
  2. 大数据安全与隐私
  3. 网络安全管理
  1. 软件工程

  2.  网络安全

  3. 智能科技
  1. 江苏省工业和信息产业转型升级专项资金项目“面向海量数据存储系统的智能运维关键技术与产业化应用”,子课题负责人,2019—2020
  2. 国家高技术研究发展计划(863计划)项目“云安全的可信服务及其示范应用”,子课题负责人,2014-2017
  3. 国家自然科学基金重点项目“云存储的隐私保护和安全保障机制”,“云存储分布式文件系统安全”子课题负责人, 2013—2017
  4. 国家自然科学基金面上项目“构建高可信云操作系统的若干关键技术研究”,参与,2017-2020
  5. AWS合作研发项目“基于AWS的教育云课堂安全与隐私”,参与,2016-2017

  6. 深圳技术攻关项目“大数据平台信息安全关键技术研发”,子课题负责人,2014-2016
  7. 国家自然科学基金面上项目“基于SOM神经网络模型的网络入侵检测方法研究”,项目负责人,2011—2013
  8. IBM共享大学研究项目“Security Services of Private Storage Cloud”. 负责人之一,2009—2011
  9. 自筹项目“大数据存储及服务平台安全管理”,负责人,2013-2014
  10. 西门子研究院合作研究项目“RFID网络规划和自动配置方法研究”,负责人,2013-2015
  11. 西门子研究院合作研究项目“工业控制网络安全管理平台关键技术研究”,负责人,2008-2010
  12. 西门子研究院合作研究项目“面向负载均衡的数据分布组织的关键技术研究”,负责人,2007—2008
  13. 卡耐基梅隆大学Cylab-KISA研究项目“网络安全管理”,项目组成员,2005—2007
  14. 科学院的创新项目“NSTLnet IPv6示范系统设计与实验”,项目组成员,2002-2003
  15. 企业项目“电信综合网管系统研究与开发”,负责人,2001-2002
  16. 国家自然科学基金面上项目“NSFCnet网络性能与工程质量测评研究”, 项目组成员,1999-2000
  17. 企业合作研究项目“广东视讯宽带网安全管理系统的研究”,负责人,1999-2000
  18. 政府项目“国家防汛抗旱指挥网络规划与设计”,项目组成员,2000
  19. 企业项目“广州宽带城域网规划与设计”,项目组成员,1999
  1. Hongzhang Yang, Zongzhao Li, Huiyuan Qiang, Zhongliang Li, Yaofeng Tu, and Yahui Yang. ZTE-Predictor: Disk Failure Prediction System Based on LSTM[C].The 50th IEEE International Conference on Dependable Systems and Networks. València, Spain. June 29, 2020.

  2.  Hongzhang Yang, Yahui Yang, Zhengguang Chen, Zongzhao Li. ADF2T: an Active Disk Failure Forecasting and Tolerance Software[C]. The 31st IEEE International Symposium on Software Reliability Engineering. Coimbra, Portugal. Oct 12 - 15, 2020.  

  3.  Hongzhang Yang, Yahui Yang, Yaofeng Tu, etc. uSendfile: A User-space Sendfile Verb based on RDMA and Flash[C]. The 2019 IEEE International Conference on Cloud Computing (IEEE CLOUD 2019), Milan, Italy, 2019: 465-469 

  4. Hongzhang Yang, Yahui Yang, Yaofeng Tu. S3R5: A Snapshot Storage System based on ROW with Rapid Rollback, Recovery and Read-write[C]. The 21th IEEE International Conference on High Performance and Communications (IEEE HPCC 2019), Zhangjiajie, China, 2019: 2111-2118  
  5. Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen,. PTAD: Provable and Traceable Assured Deletion in Cloud Storage. IEEE Symposium on Computers and communications(ISCC2019). Barcelona, Spain. June 2019.

  6. Hongzhang Yang, Yahui Yang, Yaofeng Tu, Ping Wang. uSendfile: A user-space sendfile verb based on flash and RDMA. IEEE 12th International conference on cloud computing(CLOUD2019). MILAN, ITALY. JULY, 2019: 465-469 

  7.  Hongzhang Yang, Yahui Yang, Yaofeng Tu. S3R5: A snapshot storage system baaed on ROW with rapid rollback,recovery, and Read-write[C]. IEEE International conference on high performance computing and communication(HPCC2019). Zhangjiajie, China. Augest, 2019: 2111-2118

  8. Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu: Memory Cache Attacks on Alluxio Impede High Performance Computing. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 407-414, Melbourne, Australia, December 11-13, 2018

  9. Tong Hui, Yahui Yang*, Qingni Shen, Zhonghai Wu, "Towards real-time privacy preservation: A streaming location anonymous method based on distributed framework," The 17th IEEE International Conference on  Communications (ICC 2018), May 20-24, 2018 Kansas City, US  

  10.  Wenjun Qian, Qingni Shen*, Yizhe Yang, Yahui Yang, Zhonghai Wu. Statically Defend Network Consumption against Acker Failure Vulnerability in Storm[C], the 19th International Conference on Information and Communications Security (ICICS 2017), December 6-8, 2017, Beijing, China.
  11. Ziyao Zhu, Qingni Shen*, Yahui Yang, Zhonghai Wu. MCS: Memory Constraint Strategy for Unified Memory Manager in Spark[C], The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 15-17 December 2017, Shenzhen, China
  12. Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu*. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, 9th EAI International Conference on Digital Forensics & Cyber Crime(ICDF2C2017),October 9-11 2017, Prague, Czech Republic, pp: 221-227.
  13. Yazhen Tian, Qingni Shen*, Ziyao Zhu, Yahui Yang, Zhonghai Wu. Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming, IEEE Symposium on Computers and Communications(ISCC 2018), 25-28 June 2018 – Natal, Brazil.
  14. Shengjun Zhang, Hang Zhou, Yahui Yang*, Zhonghai Wu. A Joint Bloom Filter and Cross-encoding for Data Verification and Recovery in Cloud, The 22nd IEEE Symposium on Computers and Communications (ISCC 2017), July 3-6, 2017, Crete, Greece.

  15.  Limin Li, Yahui Yang*, Zhonghai Wu. IEEE: FMR-PDP: Flexible Multiple-Replica Provable Data Possession in Cloud Storage, The 22nd IEEE Symposium on Computers and Communications (ISCC 2017), July 3-6, 2017, Heraklion, Crete, Greece.

  16.  Yang Luo, Tian Puyang, Xiaoning Suny, Qingni Shen, Yahui Yang, Anbang Ruanz, Zhonghai Wu. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs. The 24th IEEE International conference on web Services(ICWS 2017), June 25-30, 2017, Hawaii, US. 

  17. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS’15). Springer LNCY: 312-31.

  18.  Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015). Springer LNCS: 429-435

  19. Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). Roman, Italy. 

  20. Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). Roman, Italy. Accepted.

  21. Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai, POSTER: Ciphertext- policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts. Proceedings of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15). Springer International Publishing. 

  22. Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu: User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System. COMPSAC Workshops 2015: 104-109
  23. Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenmin Lao, Dandan Wang, Min Long. SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012), Fukuoka, Japan, March 26-29, 2012
  24. Yahui Yang, Dianbo Jiang , Min Xia, Using Improved GHSOM for Intrusion Detection, Journal of Information Assurance and Security, Volume 5, Issue 3, 2010:232-239
  25. Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing. A Way of Key Management in Cloud Storage Based on Trusted Computing. In Proceedings of the 8th IFIP International Conference on Network and Parallel Computing (IFIP NPC2011), pp: 135-145, Changsha, China. 2011.10
  26. Qingni Shen, Xin Yang, Xi Yu, Yahui Yang, Zhonghai Wu. Towards Data Isolation and Collaboration in Storage Cloud. The 2011 IEEE Asia-Pacific Services Computing Conference (APSCC2011), pp: 139-146. December 12-15, 2011, Jeju, Korea.
  27. Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. SecDM: Securing Data Migration between Cloud Storage Systems. In Proceedings of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011), pp: 636-641. December 12-14, Sydney, Australia
  28. Zhen Li, Yahui Yang, Wei Liang, Guangcheng Tan, Probabilistic Fading Counting:An efficient identification method for finding heavy hitters. The 2010 International Conference on Computer Application and System Modeling(ICCASM 2010), October 22-24.
  29. Zhen Li, Yahui Yang, An Adaptive Method for identifying Heavy Hitters Combining Sampling and Data Streaming Counting, 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE 2010). August 20-22, 2010.
  30. Yahui Yang, Xiao Han, Min Xia, An improved ART 2-A Model for Mixed Numeric and Categorical Data, International Conference on Information Engineering and Computer Science(ICIECS2009), 19-20 December, 2009: 86-89
  31. Yahui Yang, Yunfei Chen, Min Xia, An Automated Mechanism of Security Test on Network Protocols, The Fifth International Conference on Information Assurance and Security (IAS-2009), August 18-20, 2009:503-506.
  32. Dianbo Jiang, Yahui Yang, Min Xia, Research on Intrusion Detection Based on an Improved SOM Neural Network, The Fifth International Conference on Information Assurance and Security (IAS-2009), 2009:400-403
  33. Yahui Yang, Chunfang Huang, Zhijing Qin, A Network Misuse Detection Mechanism Based on Traffic log, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 526-529.
  34. Yahui Yang,Yujie Wu,Min Xia,Zhijing Qin, A RFID Network Planning Method based on Genetic Algorithm, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 534-537.
  35. Yahui Yang,Yujie Wu,Zhjing Qin, A RFID Network Planning Method based on Genetic Algorithm, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 534-537.
  36. Ke Xu, Yahui Yang, Tao Chen,Improving BitTorrent Network’s Performance via Deploying Helpers,The 2008 International Conference On Embedded and Ubiquitous Computing(EUC 2008),December 17-20,2008: 507-512.
  37. Yahui Yang, Wenjian Miao, Qingni Shen, Optimization of BT Downloading Algorithm for Video Broadcast, International Symposium on Computer Network and Multimedia Technology(CNMT2009), 18-20 December, 2009:169-172.
  38. Keming Du, Yahui Yang, Policy-Based Time Slot Assignment Algorithm in a MANET, International Conference on Anti-counterfeiting, Security, and Identification in Communication(ICASID 2009), August 20-22, 2009.
  39. Chen Shen, Bin Wang, Yahui Yang, Exploiting Text Content in Image Search by Semi-supervised Learning Techniques. 2009 IEEE International Conference on Systems, Man, and Cybernetics. October 11-14, 2009. Hyatt Regency Riverwalk, San Antonio, Texas, USA.
  40. Chen Shen, Jun Jiao, Yahui Yang , Bin Wang, Multi-Instance Multi-Label Learning For Automatic Tag Recommendation. 2009 IEEE International Conference on Systems, Man, and Cybernetics. October 11-14, 2009. Hyatt Regency Riverwalk, San Antonio, Texas, USA.
  41. 杨洪章, 杨雅辉, 屠要峰, 孙广宇, 吴中海. 基于“采集—预测—迁移—反馈”机制的主动容错技术[J]. 计算机研究与发展, 2020, 57(2): 306-317. 
  42. 杨洪章,杨雅辉,孙广宇. 北京大学学报(自然科学版). 已录用. 
  43. 杨雅辉, 黄海珍, 沈晴霓, 吴中海,张英:基于增量式GHSOM神经网络模型的入侵检测研究.计算机学报,2014,37(05):1216-1224.
  44. 杨雅辉, 杜克明: 全网异常流量簇的检测与确定机制,计算机研究与发展,2009,46(11):1847-1853.
  45. 杨雅辉, 钮振瑛: 徐恪: P2P流媒体系统服务器部署的优化设计, 计算机研究与发展,2010.7: 1219-1224.
  46. 杨雅辉: 网络流量异常检测及分析的研究,计算机科学, 2008,35(5):108-112.
  47. 杨雅辉:IP网络性能指标体系的研究,通信学报,2002,23(11): 1-7.
  48. 杨雅辉,姜电波, 沈晴霓,夏敏:基于改进的GHSOM的入侵检测研究,通信学报,2011,32(1):121-126.
  49. 李臻 ,杨雅辉, 谢高岗,覃光成:一种基于数据流计数技术的概率衰落大业务流识别方法,计算机研究与发展,2011, 48(6)
  50. 刘白璐,杨雅辉,沈晴霓,张英:网络入侵早期检测方法研究与实现,计算机工程,2013, 39(7): 1-6.
  51. 肖三,杨雅辉,沈晴霓:基于微簇的在线网络异常检测方法,计算机工程与应用, 2013,49 (06):90-94.
  52. 沈晴霓, 杨雅辉,禹熹,张力哲,陈钟. 一种面向多租户云存储平台的访问控制策略.小型微型计算机系统, 2011,32(11): 2223-2229  (中国计算机大会CNCC 2011录用的优秀论文)
  53. 沈晴霓、张力哲、吴中海、杨雅辉. 一种基于动态域划分的MapReduce安全冗余调度策略, 通信学报. 2014,35(1):34-46.
  54. 刘白璐,杨雅辉,沈晴霓,杨雅辉:一种基于遗传算法的入侵早期特征选择方法. 小型微型计算机系统,已录用,中国互联网学术会议ICoC 2013
  55. 张英, 杨雅辉, 田浩然, 张威, 董晶晶:基于遗传算法的网络资源配置优化,计算机科学, 2012, 05期, pp 36-39.
  56. 靖红芳,王斌,杨雅辉: 基于类别分布的特征选择框架,计算机研究与发展,2009,46(9):1586-1593.
  57. 夏敏,吴中海,杨雅辉: 基于双缓冲区的发送速率控制方法,计算机工程,2010,36(5):119-121
  58. 苗文健, 杨雅辉: 面向视频播放的BT协议下载算法的改进, 计算机工程与应用,2010,46(18):68-70.
  59. 李臻,杨雅辉,张广兴: 大业务流测量采样算法研究综述,计算机应用研究,2011,28(1).
  60. 杨雅辉,王行刚:一种面向对象的被管网络资源的管理、维护模型,计算机学报,1999.8.
  61. 杨雅辉,王行刚:一种面向对象的自主网络管理模型, 通信学报,1999,4.
  62. 杨雅辉,王行刚:基于分布式对象技术的层次化网络管理结构,计算机工程与应用,2000,4.
  63. 杨雅辉,王行刚:OSI-TMN-INTERNET—三种标准化网络管理的比较研究,数据通信,2000,6.
  64. 杨雅辉: 机器学习在Web智能代理中的应用, 清华大学学报,1998,7增刊.
  1. 杨雅辉杨洪章。一种面向纠删码的主动数据修复方法及系统。专利授权号 ZL201811300732.7
  2. 杨雅辉,沈晴霓,张力哲,禹熹,吴尉泷等。适用于存储云间数据安全迁移的方法与系统。国家知识产权局。专利授权号ZL 201110101646.5
  3. 杨雅辉,阳时来,沈晴霓,黄海珍。一种基于半监督神经网络模型的网络入侵检测方法。国家知识产权局。专利授权号ZL 201210074813.6
  4. 杨雅辉,黄海珍,沈晴霓,吴中海。基于增量式GHSOM神经网络模型的入侵检测方法。国家知识产权局。专利申请号CN 201210206778.9
  5. 沈晴霓,杨雅辉,劳振明,禹熹,吴尉泷等,适用于存储云内数据安全迁移的方法。国家知识产权局。专利授权号ZL 201110144862.8
  6. 沈晴霓,杨雅辉,禹熹,张力哲,吴尉泷等,适用于存储云内的数据隔离方法。国家知识产权局。专利授权号ZL 201110144862.8
  7. 杨雅辉,高天辰,沈晴霓,吴中海。一种面向云服务的UCON多义务访问控制方法及系统。国家知识产权局。专利授权号ZL 201410066781.4
  8. 杨雅辉,李晓晨,沈晴霓,吴中海,方跃坚。一种面向用户的云存储数据完整性保护方法。专利授权号ZN 201410350589.8
  9. 杨雅辉,张何灿,刘高原,刘宇浩。一种协商式的移动应用隐私数据共享协议签署方法. 专利申请号CN202010548056.6 
  10. 杨洪章,杨雅辉。一种面向硬盘故障预测的特征选择方法。专利申请号 CN202010020945.5
  11. 杨雅辉,张胜军,吴中海。一种基于步隆过滤器和交叉编码的数据完整性保护方法。专利申请号CN201710472920.7
  12. 杨雅辉,李立敏,吴中海。一种云存储环境下的多备份数据持有性证明方法。专利申请号CN201710472918.X
  13.  杨雅辉,张何灿,张梦宇,吴中海。一种面向纠删码的主动数据修复方法及系统. 专利申请号CN201811300732.7
    参与申请如下软件著作权:
  1. 登记号2020SRlO75823,2020.9.10,北京大学,智能数据保护软件V1.0。
  2. 登记号2017SR586039,2017.10, 北京大学,北大软微云课堂系统V1.0。
  3. 登记号 2016SR207598,2016.5.10, 北京大学,云存储数据完整性验证与恢复软件。
  4. 登记号2011SR052487,2011.3.20, 北京大学,云存储客户端数据安全服务软件
  5. 登记号2011SR054439,2011.3.20, 北京大学,云存储数据安全访问服务软件
  6. 登记号2011SR052173,2011.3.20, 北京大学,云存储数据安全内迁服务软件
  7. 登记号2011SR054810,2011.3.20, 北京大学,云存储数据安全外迁服务软件
  1. 杨雅辉主编,《网络规划与设计》,高等教育出版社,2008年6月
  2. 杨雅辉,王斌、李小东、党治林,《电子商务网站设计原理》,财经出版社,2001年10月
  3. 杨雅辉参与编写《yL23411永利官网登录课程体系》一书,高等教育出版社,2011年6月
  4. 张锐昕主编,杨雅辉参编,《电子政府与电子政务》. 中国人民大学出版社,2010年8月。 (普通高等教育“十一五”国家级规划教材. 国家级精品课程教材)
  5. 张锐昕主编,杨雅辉参编,《电子政府概论》,中国人民大学出版社,2004年5月(获吉林省普通高校优秀教材三等奖)
  6. 张锐昕主编,杨雅辉参编, 《公务员电子政务培训教程》,清华大学出版社,2004年10月