張志勇先后畢業(yè)于河南師范大學(xué)計(jì)算機(jī)系計(jì)算機(jī)科學(xué)專業(yè)、大連理工大學(xué)計(jì)算機(jī)系計(jì)算機(jī)軟件與理論專業(yè)和西安電子科技大學(xué)計(jì)算機(jī)學(xué)院計(jì)算機(jī)系統(tǒng)結(jié)構(gòu)專業(yè),博士研究生學(xué)歷、工學(xué)博士學(xué)位。2010-2013年,在西安交通大學(xué)管理學(xué)院管理科學(xué)與工程專業(yè)(信息管理與信息系統(tǒng)方向)做博士后交叉科學(xué)研究,探索社交媒體網(wǎng)絡(luò)下的數(shù)字內(nèi)容安全和管理。2015-2016年,在美國(guó)愛(ài)荷華州立大學(xué)計(jì)算機(jī)科學(xué)系(ISU CS)做訪問(wèn)學(xué)者教授期間,加入IEEE CS前主席Carl K. Chang教授(IEEE Computer Society Chair, IEEE Life Fellow)軟件工程實(shí)驗(yàn)室(ISU SEL),從事情境分析(Situation Analytics)和以人為中心的社會(huì)計(jì)算與社會(huì)智能(Human-Centric Social Computing & Social Intelligence)研究,以及多媒體社交網(wǎng)絡(luò)原型系統(tǒng)(CyVOD)開(kāi)發(fā)。
張志勇主持承擔(dān)國(guó)家自然科學(xué)基金4項(xiàng),國(guó)家重點(diǎn)研發(fā)計(jì)劃子課題1項(xiàng),以及教育部重點(diǎn)項(xiàng)目、河南省中原千人計(jì)劃、河南省科技創(chuàng)新杰出人才和杰出青年基金、中國(guó)博士后科學(xué)基金、河南省高?萍紕(chuàng)新人才和創(chuàng)新團(tuán)隊(duì)支持計(jì)劃、河南省重點(diǎn)科技攻關(guān)、國(guó)防軍工和企業(yè)委托研發(fā)項(xiàng)目等20余項(xiàng)。在國(guó)內(nèi)外知名學(xué)術(shù)期刊《計(jì)算機(jī)學(xué)報(bào)》,《中國(guó)科學(xué)·信息科學(xué)(英文版)》,《IEEE Transactions on Big Data》,以及IEEE CCNC等具有重要影響的國(guó)際學(xué)術(shù)會(huì)議上,發(fā)表研究和綜述性學(xué)術(shù)論文等140余篇,其中ESI高被引論文2篇,被SCI、EI檢索逾100篇。在科學(xué)出版社、國(guó)防工業(yè)出版社、Elsevier出版《Security, Trust and Risk in Digital Rights Management Ecosystem》、《社交媒體網(wǎng)絡(luò)安全理論與技術(shù)》、《數(shù)字版權(quán)管理與安全技術(shù)》、《網(wǎng)絡(luò)安全政策指南》、《Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications》等學(xué)術(shù)專著4部、編著2部和譯著1部。作為核心起草人/主要起草人制定完成IEC國(guó)際標(biāo)準(zhǔn)《Smart Television - Part 1: Conceptual Model for Smart Television》(IEC TR 63122-1 ED1),以及國(guó)家標(biāo)準(zhǔn)化管理委員會(huì)立項(xiàng)、全國(guó)音頻、視頻及多媒體系統(tǒng)與設(shè)備標(biāo)準(zhǔn)化技術(shù)委員會(huì)(SAC/TC242)和全國(guó)信息技術(shù)標(biāo)準(zhǔn)化技術(shù)委員會(huì)(SAC/TC28)歸口的《信息技術(shù) 數(shù)字版權(quán)管理 術(shù)語(yǔ)》(GB/T 30247-2013),全國(guó)信息安全標(biāo)準(zhǔn)化技術(shù)委員會(huì)(SAC/TC260)歸口的《信息安全技術(shù) 云計(jì)算服務(wù)安全能力評(píng)估方法》(GB/T 34942-2017)、《信息安全技術(shù) 物聯(lián)網(wǎng)數(shù)據(jù)傳輸安全技術(shù)要求》(GB/T 37025-2018)、《信息安全技術(shù) 時(shí)間戳策略和時(shí)間戳業(yè)務(wù)操作規(guī)則》(GB/T 36631-2018 )等國(guó)家標(biāo)準(zhǔn)4部,國(guó)家電子行業(yè)標(biāo)準(zhǔn)3部。關(guān)鍵技術(shù)成果獲授權(quán)國(guó)家發(fā)明專利12件。融合新一代信息技術(shù)和科技服務(wù)業(yè)應(yīng)用,創(chuàng)辦了國(guó)內(nèi)一款互聯(lián)網(wǎng)+科技成果轉(zhuǎn)化服務(wù)專業(yè)平臺(tái)——曬科網(wǎng),包括桌面網(wǎng)站、Android/iOS移動(dòng)客戶端(曬我的,CyVOD),以及適用于PC、移動(dòng)智能終端等消費(fèi)電子產(chǎn)品的“多媒體音視頻數(shù)字版權(quán)保護(hù)系統(tǒng)VOD DRM Player”和“移動(dòng)多媒體數(shù)字版權(quán)保護(hù)播放器軟件 VOD MDRM”等,擁有31件計(jì)算機(jī)軟件著作權(quán)。以第一完成人獲得河南省科技進(jìn)步二等獎(jiǎng)3項(xiàng),以及河南省工業(yè)和信息化廳科技成果一等獎(jiǎng)、河南省教育廳科技成果一等獎(jiǎng)、河南省自然科學(xué)優(yōu)秀學(xué)術(shù)著作/學(xué)術(shù)論文一等獎(jiǎng)等6項(xiàng),以及中國(guó)密碼學(xué)會(huì)密碼學(xué)類(lèi)教育教學(xué)改革一等獎(jiǎng)等。所指導(dǎo)研究生多次獲國(guó)家研究生獎(jiǎng)學(xué)金和河南省優(yōu)秀碩士學(xué)位論文。
2015.04-2016.04 愛(ài)荷華州立大學(xué)計(jì)算機(jī)科學(xué)系(Department of Computer Science, Iowa State University)軟件工程實(shí)驗(yàn)室(Software Engineering Laboratory)訪問(wèn)學(xué)者教授
1.Editorial Board Member of Multimedia Tools and Applications (2015-, Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721)
2.Editorial Board Member of Neural Network World (2015-, Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335)
3.Editorial Board Member of Journal on Big Data (2018-, Springer, ISSN: 2196-1115)
4.Editorial Board Member of EURASIP Journal on Information Security (2016-, Springer, ISSN: 1687-417X)
5.International Advisory Board Member of International Journal of Cloud Applications and Computing (2017-, IGI Global, 2156-1834, EISSN: 2156-1826)
6.Associate Editor of Human-centric Computing and Information Sciences (2016-, Springer, ISSN: 2192-1962)
7.Associate Editor of Social Network Analysis and Mining (2013-2017, Springer, ISSN-Print: 1869-5450, ISSN-Online: 1869-5469)
8.Leading Guest Editor, Special Issue on Advanced Soft Computing Methodologies and Applications in Social Media Big Data Analytics, Journal on Big Data (2018-, Springer, ISSN: 2196-1115)
9.Leading Guest Editor, Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks, Journal of Computational Science (Elsevier, ISSN: 1877-7503)
10.Leading Guest Editor, Special Issue on Crowd Computing for Social Media Ecosystem, Applied Soft Computing (Elsevier, ISSN: 1568-4946)
11.Leading Guest Editor, Special Issue on Security, Trust and Risk in Multimedia Social Networks, Computer Journal (Oxford, ISSN-Print: 0010-4620, ISSN-Online: 1460-2067)
12.Leading Guest Editor, Special Issue on Challenges for Multimedia Content Security in Social Networks , EURASIP Journal on Information Security (Springer, ISSN: 1687-417X)
13.Co-Guest Editor, Special Issue on Recent research in Computational Intelligence paradigms into Security and Privacy for Online Social Networks (OSNs), Future Generation Computer Systems (Elsevier, ISSN: 0167-739X)
14.Co-Guest Editor, Special Issue on Swarm and Evolutionary Computational Approaches: Recent Advances in Networking and Internet of Things (IoT), International Journal of Networking and Virtual Organisations (ISSN Online: 1741-5225, ISSN Print: 1470-9503)
國(guó)內(nèi)外學(xué)術(shù)技術(shù)組織任職:
1.Founding Chair of IEEE MMTC Digital Rights Management for Multimedia (IEEE MMTC DRMIG, 2018-)
在國(guó)內(nèi)外知名學(xué)術(shù)期刊《計(jì)算機(jī)學(xué)報(bào)》,《中國(guó)科學(xué)·信息科學(xué)(英文版)》,《IEEE Transactions on Big Data》,以及IEEE CCNC等具有重要影響的國(guó)際學(xué)術(shù)會(huì)議上,發(fā)表研究和綜述性學(xué)術(shù)論文等120余篇,其中ESI高被引論文2篇,被SCI、EI檢索逾80篇。在科學(xué)出版社、國(guó)防工業(yè)出版社、Elsevier出版《Security, Trust and Risk in Digital Rights Management Ecosystem》、《社交媒體網(wǎng)絡(luò)安全理論與技術(shù)》、《數(shù)字版權(quán)管理與安全技術(shù)》、《網(wǎng)絡(luò)安全政策指南》、《Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications》等學(xué)術(shù)專著4部、編著2部和譯著1部。關(guān)鍵技術(shù)成果獲授權(quán)國(guó)家發(fā)明專利12件。融合新一代信息技術(shù)和科技服務(wù)業(yè)應(yīng)用,創(chuàng)辦了國(guó)內(nèi)一款互聯(lián)網(wǎng)+科技成果轉(zhuǎn)化服務(wù)專業(yè)平臺(tái)——曬科網(wǎng),包括桌面網(wǎng)站、Android/iOS移動(dòng)客戶端(曬我的,CyVOD),以及適用于PC、移動(dòng)智能終端等消費(fèi)電子產(chǎn)品的“多媒體音視頻數(shù)字版權(quán)保護(hù)系統(tǒng)VOD DRM Player”和“移動(dòng)多媒體數(shù)字版權(quán)保護(hù)播放器軟件 VOD MDRM”等,擁有31件計(jì)算機(jī)軟件著作權(quán)。以第一完成人獲得河南省科技進(jìn)步二等獎(jiǎng)3項(xiàng),以及河南省工業(yè)和信息化廳科技成果一等獎(jiǎng)、河南省教育廳科技成果一等獎(jiǎng)、河南省自然科學(xué)優(yōu)秀學(xué)術(shù)著作/學(xué)術(shù)論文一等獎(jiǎng)等6項(xiàng),以及中國(guó)密碼學(xué)會(huì)密碼學(xué)類(lèi)教育教學(xué)改革一等獎(jiǎng)等。所指導(dǎo)研究生多次獲國(guó)家研究生獎(jiǎng)學(xué)金和河南省優(yōu)秀碩士學(xué)位論文。
先后在科學(xué)出版社、國(guó)防工業(yè)出版社、Elsevier出版《Security, Trust and Risk in Digital Rights Management Ecosystem》、《社交媒體網(wǎng)絡(luò)安全理論與技術(shù)》、《數(shù)字版權(quán)管理與安全技術(shù)》、《網(wǎng)絡(luò)安全政策指南》、《Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications》等出版學(xué)術(shù)專著4部、編著2部和譯著1部。在電子工業(yè)出版社、武漢大學(xué)出版社,出版教材2部。
中、英文學(xué)術(shù)專著、編著、譯著:
1、Arun Kumar Sangaiah, Michael Sheng, Zhiyong Zhang. Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Elsevier, 2017. (ISBN: 9780128133149)
5、Zhiyong Zhang. Security, Trust and Risk in Digital Rights Management Ecosystem [M]. Beijing: Science Press(科學(xué)出版社),2012. (ISBN 978-7-03-034335-2)
6、Zhiyong Zhang. Risk Assessment and Management [M]. USA: Academy Publish, 2012. (ISBN 978-0-9835850-0-8)
以第一作者或通訊作者在國(guó)內(nèi)外知名學(xué)術(shù)期刊《計(jì)算機(jī)學(xué)報(bào)》,《中國(guó)科學(xué)·信息科學(xué)(英文版)》,《IEEE Transactions on Big Data》,以及IEEE CCNC等具有重要影響的國(guó)際學(xué)術(shù)會(huì)議上,發(fā)表研究和綜述性學(xué)術(shù)論文等140余篇,其中ESI高被引論文2篇,被SCI、EI檢索逾100篇。
141、Lanfang Zhang, Zhiyong Zhang(張志勇)*, Ting Zhao, Brij B. Gupta. A Novel Access Control Model for Online Social Networks and Its Visual Verification [J]. International Journal of Cloud Applications and Computing (IGI Global), 2021,11(2).
139、Zhiyong Zhang(張志勇)*, Junchang Jing, Xiaoxue Wang, et al. A Crowdsourcing Method for Online Social Networks Security Assessment [J]. Human-centric Computing and Information Sciences, 2020, 10(23): 1-19. (SCI 000538552900001, EI 20202408805288)
138、Yuxiang Li, Zhiyong Zhang(張志勇), Danmei Niu, Junchang Jin. ParaCA:A Speculative Parallel Crawling Approach on Apache Spark [C]. The Proceedings of 2020 International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP2020), New York, US. Oct, 2020.
137、Yuxiang Li, Zhiyong Zhang(張志勇), Bin Liu. An Adaptive Thread Partitioning Approach in Speculative Multithreading [C]. The Proceedings of 2020 International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP2020), New York, US. Oct, 2020.
135、Zhiyong Zhang(張志勇)*, Ranran Sun, Xiaoxue Wang, et al. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks [J]. IEEE Transactions on Big Data, 2019, 5(4): 520-528. (EI 20200308043740)
134、Jian Wang, Kuoyuan Qiao, Zhiyong Zhang(張志勇). An Improvement for Combination Rule in Evidence Theory [J]. Future Generation Computer Systems, 2019, 91: 1-9. (SCI 000451790900001, EI 20183705794717)
133、Cheng Li, Zhiyong Zhang(張志勇)*, Guoxin Chang. Multimedia Social Network Authorization Scheme of Comparison-based Encryption [J]. International Journal of Network Security, 2019, 21(1): 137-144. (EI 20190306396578)
132、Peining Shi, Zhiyong Zhang(張志勇)*, Kim-Kwang Raymond Choo. Detecting Malicious Social Bots Based on Clickstream Sequences [J]. IEEE Access, 2019, 7(1): 28855-28862. (SCI 000462957000001, EI 20191706836075)
131、Zhiyong Zhang(張志勇)*, Ranran Sun, Kim-Kwang Raymond Choo, et al. A Novel Situation-Analytics Based Recommendation Algorithm for Multimedia Social Networks [J]. IEEE Access, 2019, (7): 117749-117760. (SCI 000484313600003)
130、Yuxiang Li, Zhiyong Zhang(張志勇)*, Lili Zhang, et al. ProCTA: program characteristic‑based thread partition approach [J]. The Journal of Supercomputing, 2019, 75:7366–7390. (SCI 000496336200014, EI 20192907190633)
129、Zhengfen Jin, Zhongping Wan, Zhiyong Zhang(張志勇). Strictly contractive Peaceman–Rachford splitting method to recover the corrupted low rank matrix [J]. Journal of Inequalities and Applications (2019) 2019:147.
128、Yuxiang Li, Zhiyong Zhang(張志勇), Danmei Niu, et al. TPAoPI:A Thread Partitioning Approach Based on Procedure Importance in Speculative Multithreading [C]. The Proceedings of 2019 IEEE 21st International Conference on High Performance Computing and Communications (HPCC2019), Zhangjiajie, China, July. 2019. (EI 20194307563655)
127、Danmei Niu, Yuxiang Li, Zhiyong Zhang(張志勇), et al. A Service Composition Mechanism Based on Mobile Edge Computing for IoT [C]. The Proceedings of 2019 International Conference on Information Science and Control Engineering (ICISCE 2019), Shanghai, China, December, 2019.
2018
126、Zhiyong Zhang(張志勇)*, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah, et al. Crowd Computing for Social Media Ecosystems [J]. Applied Soft Computing, 2018, 66: 492-494. (SCI 000430162100036, EI 20180904850508)
125、Zhiyong Zhang(張志勇)*, Brij B. Gupta. Social Media Security and Trustworthiness: Overview and New Direction [J]. Future Generation Computer Systems, 2018, 86: 914-925. (SCI 000437555800079, EI 20165103145490)
124、Zhiyong Zhang(張志勇)*, Jing Wen, Xiaoxue Wang, Changwei Zhao. A Novel Crowd Evaluation Method for Security and Trustworthiness of Online Social Networks Platforms Based on Signaling Theory [J]. Journal of Computational Science, 2018, 26: 468-477.(SCI 000438001600046, EI 20172203719496)
123、Zhiyong Zhang(張志勇)*, Kim-Kwang Raymond Choo, Brij B. Gupta, et al. The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks [J]. Journal of Computational Science, 2018, 26: 453-455. (SCI 000438001600044, EI 20181605014667)
122、Zhiyong Zhang(張志勇)*, Cheng Li, Brij B. Gupta, et al. Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes [J]. IEEE Access, 2018, 6(1): 38273-38284. (SCI 000440342700001, EI 20182905554496)
121、Tu Ziran, Zeng Xiangyong, Zhang Zhiyong(張志勇). More permutation polynomials with differential uniformity six. Science China Information Science (中國(guó)科學(xué)F輯), 2018, 61(3), 038104:1-038104:3. DOI: 10.1007/s11432-017-9118-5. (Online, SCI)
120、Brij B. Gupta, A.K. Sangaiah, Nadia Nedjah, Shingo Yamaguchi, Zhiyong Zhang(張志勇). Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs) [J]. Future Generation Computer Systems, 2018, 86: 851–854. (SCI 000437555800073, EI 20182505321805)
119、Brij B. Gupta, Shingo Yamaguchi, Zhiyong Zhang(張志勇), Kostas E. Psannis. Security and Privacy of Multimedia Big Data in the Critical Infrastructure [J]. Multimedia Tools and Applications, 2018, 77(9): 10995-10995. (SCI 000431889900036, EI 20182505344912)
118、Jian Wang, Kuoyuan Qiao, Zhiyong Zhang(張志勇). Trust evaluation based on evidence theory in online social networks [J]. International Journal of Distributed Sensor Networks, 2018, 14(10): 1-10. (SCI 000447216700001, EI 20184406008115) [PDF]
117、Cheng Li, Zhiyong Zhang(張志勇)*, Lanfang Zhang. A novel authorization scheme for multimedia social networks under cloud storage method by using MA-CP-ABE [J]. International Journal of Cloud Applications and Computing (IGI Global), 2018, 8(3): 32-47.
116、Yuxiang Li, Zhiyong Zhang(張志勇)*. Parallel Computing: Review and Perspective [C]. The Proceedings of 2018 International Conference on Information Science and Control Engineering (ICISCE 2018), Zhengzhou, China, July, 2018. (EI 20190906564180)
115、Yuxiang Li, Zhiyong Zhang(張志勇)*, Lili Zhang, et al. Thread Level Speculation: Review and Perspectives [C]. The Proceedings of 2018 International Conference on Information Science and Control Engineering (ICISCE 2018), Zhengzhou, China, July, 2018. (EI 20190906563939)
114、Lili Zhang, Danmei Niu, Yuxiang Li, Zhiyong Zhang(張志勇). A Survey on Privacy Preserving Association Rule Mining [C]. The Proceedings of 2018 International Conference on Information Science and Control Engineering (ICISCE 2018), Zhengzhou, China, July, 2018. (EI 20190906564121)
110、Zhang Zhiyong(張志勇)*, Sun Ranran, Wang Xiaoxue, et al. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks [J]. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2657623. (Online)
108、Zhang Zhiyong(張志勇)*, Wen Jing, Wang Xiaoxue, Zhao Changwei. A Novel Crowd Evaluation Method for Security and Trustworthiness of Online Social Networks Platforms Based on Signaling Theory [J]. Journal of Computational Science, 2017, DOI: 10.1016/j.jocs.2017.05.018. (Online, SCI)
107、Zhang Zhiyong(張志勇)*, Han Linqian, Li Cheng, et al. A Novel Attribute-Based Access Control Model for Multimedia Social Networks [J]. Neural Network World, 2016, (6): 543-557. (SCI 000399394400001)
106、Li Lin, Fan Kefeng, Zhang Zhiyong(張志勇), et al. Community Detection Algorithm Based on Local Expansion K-Means [J]. Neural Network World, 2016, 26(6): 589-605. (SCI 000392283000005)
105、Gupta B B, Yamaguchi Shingo, Zhang Zhiyong(張志勇), Psannis Kostas E. Security and Privacy of Multimedia Big Data in the Critical Infrastructure [J]. Multimedia Tools and Applications, 2017.
104、Li Cheng, Zhang Zhiyong(張志勇)*, Gupta B. Brij, et al. A novel authorization scheme for multimedia social networks method by using multi-authority ciphertext-policy attribute-based encryption [J]. Journal of Information Privacy and Security (Taylor & Francis), 2017. (Accepted)
102、Wang Jian, Qiao Kuoyuan, Zhang, Zhang Zhiyong(張志勇), et al. A new conflict management method in dempster-shafer theory [J]. International Journal of Distributed Sensor Networks, 2017, 13(3). (SCI, EI 20171803628070)
99、Zhang Zhiyong(張志勇)*, Gupta B. B. Social Media Security and Trustworthiness: Overview and New Direction [J]. Future Generation Computer Systems, 2016, http://dx.doi.org/10.1016/j.future.2016.10.007. (Online, SCI)
98、Feng Weining, Zhang Zhiyong(張志勇)*, Wang Jian, Han Linqian. A Novel Authorization Delegation for Multimedia Social Networks by using Proxy Re-encryption [J]. Multimedia Tools and Applications (Springer), 2016, 75(21): 13995-14014. DOI: 10.1007/s11042-015-2929-2. (First Online 07 September 2015 , SCI 000386776800052, EI 20153701254312)
97、Zhang Zhiyong(張志勇)*, Yang Lijun, Li Hanman, et al. A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks [J]. International Journal of Network Security, 2016, 18(1): 43-51. (EI 20154701564374)
96、Zhang Zhiyong(張志勇)*, Sun Ranran, Zhao Changwei, et al. CyVOD: A Novel Multimedia Social Network Scheme [J]. Multimedia Tools and Applications, 2017, 76(18): 18513–18529. DOI 10.1007/s11042-016-4162-z (Online, SCI EI 20164803071103)
95、Zhang Zhiyong(張志勇)*, Kim-Kwang Raymond Choo. Multimedia Social Network Security and Applications [J]. Multimedia Tools and Applications, 2017, 76(3): 3163-3168. DOI 10.1007/s11042-016-4081-z (SCI 000396051200001, EI 20165003108429)
94、Du Junyi, Zhang Zhiyong(張志勇), Analysis on the digging of social network based on user search behavior, International Journal of Smart Home, 2016, 10(5): 297-304. (EI 20162602535286)
90、Zhang Zhiyong(張志勇)*, Wang Zhen, Niu Danmei. A Novel Approach to Rights Sharing-Enabling Digital Rights Management for Mobile Multimedia [J]. Multimedia Tools and Applications (Springer), 2015, 74 (16): 6255-6271. DOI: 10.1007/s11042-014-2135-7. (SCI 000359864700009, EI 20143600007178)
89、Zhang Zhiyong(張志勇)*, Wang Kanliang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks [J]. Computer Journal, 2015, 58 (4): 668-678. DOI:10.1093/comjnl/bxu035 (SCI 000359137500011, EI 20151500736707)
88、Zhang Zhiyong(張志勇)*. Security, Trust and Risk in Multimedia Social Networks [J]. Computer Journal, 2015, 58 (4): 515-517. DOI:10.1093/comjnl/bxu151 (SCI 000359137500001, EI 20151500736718).
87、Zhang Zhiyong(張志勇)*. The Challenge of Multimedia Social Networks and Security [J]. Recent Advances in Electrical & Electronic Engineering, 2015, 8(2): 72-73. (EI 20153901314334).
86、Chang Yanan, Zhang Zhiyong(張志勇)*, Wang Jian. A Security Protocol for Trusted Access to Cloud Environment [J]. Recent Advances in Electrical & Electronic Engineering, 2015, 8(2): 135-144. (EI 20162902597361).
85、Sun Shuhuan, Zhao Changwei, Zhang Zhiyong(張志勇). A Matrix Factorization based Trust Factors Model [C]. In: Proceedings of 2015 IEEE International Conference on Information and Automation, Lijiang, China, August, 2015.
81、Wang Jian, Zhang Zhiyong(張志勇)*, Xiang Fei, et al. Trusted License Distribution System Based on IPSEC VPN for Mobile DRM [J]. Open Electrical and Electronic Engineering Journal, 2014, 8(1): 34-41. (EI 20152801023852)
77、Zhang Zhiyong(張志勇)*, Wang Kanliang. A Trust Model for Multimedia Social Networks [J]. Social Networks Analysis and Mining (Springer), 2013, 3(4):969-979. DOI: 10.1007/s13278-012-0078-4.
76、Zhao Changwei*, Zhang Zhiyong(張志勇)*, Li Hanman, et al. A Social Network Information Propagation Model Considering Different Types of Social Relationships [C]. Springer Advances in Intelligent System and Computing, pp.275-282, 2013. DOI: 10.1007/978-3-319-01796-9_29. (EI 20151600756807).
75、Wang Zhen, Zhang Zhiyong(張志勇)*, Chang Yanan, et al. An Approach to Mobile Multimedia Digital Rights Management based on Android [C]. Springer Advances in Intelligent System and Computing, pp.239-246, 2013. DOI: 10.1007/978-3-319-01796-9_25. (EI 20151600756803)
74、Huang Tao, Zhang Zhiyong(張志勇)*, Chen Qingli, et al. A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing [J]. International Journal of Digital Content Technology & Its Applications, Vol.7, No.4, pp.795-802, 2013.
67、Zhang Zhiyong(張志勇)*. Frontier and Methodologies on Digital Rights Management for Multimedia Social Networks [J]. International Journal of Digital Content Technology & Its Applications, Vol.6, No.9, pp.245-249, 2012. (EI 20122415113619)
66、Zhang Zhiyong(張志勇)*, Maheswaran Muthucumaru. Multimedia Contents Security in Social Networks Applications (Editorial). Journal of Multimedia, 2012, 7(4): 1-2.
65、Yang Lijun, Zhang Zhiyong(張志勇)*, Pu Jiexin. Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks [J]. International Journal of Digital Content Technology & Its Applications, Vol.6, No.22, pp. 640-647, 2012. (EI 20125215835371)
64、Yang Lijun, Zhang Zhiyong(張志勇)*, et al. Advance on Trust Model and Evaluation Method in Social Networks [C]. In: Proc. of The Sixth International Conference on Genetic and Evolutionary Computing, Kitakyushu, Japan, 2012. (EI 20131016077249, ISTP 000319285800003)
63、Wang Jian*, Zhang Zhiyong(張志勇)*, Xiang Fei, et al. A Trusted Authentication Protocol based on SDIO Smart Card for DRM [J]. International Journal of Digital Content Technology & Its Applications, Vol.6, No.23, pp.222-233. (EI 20130215886141)
62、Xiang Fei, Zhang Lei, Zhang Zhiyong(張志勇), et al. True Random Bit Generator Based on Cell Phone Recording and Chaotic Encryption [C]. In: Proc. of IEEE International Conference on Automation and Logistics, 2012. (EI 20124415628728)
58、Zhang Zhiyong(張志勇)*, Pei Qingqi, Yang Lin, Ma Jianfeng. Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for DRM in Contents Sharing Scenario [J]. Intelligent Automation and Soft Computing, Vol. 17, No.2, pp.191-203, 2011. (SCI 000288881400007)
57、Zhang Zhiyong(張志勇)*. Digital Rights Management Ecosystem and its Usage Controls: A Survey [J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.3, pp.255-272, 2011. (EI 20112214020460)
56、Zhang Zhiyong(張志勇)*, Tao Huang, Danmei Niu, Lili Zhang. Usage Control Model for Digital Rights Management in Digital Home Networks [J]. Journal of Multimedia, Vol.6, No.4, pp.376-383, 2011. (EI 20113414261239)
55、Zhang Zhiyong(張志勇)*. Digital Rights Management Ecosystem: Open Issues and Challenges [J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.290-296, 2011. (EI 20114814568290)
54、Niu Danmei, Zhang Zhiyong(張志勇), Wang Shaofeng, et al. A Novel Approach to Digital Contents Sharing for Digital Home Network [J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.324-333, 2011. (EI 20114814568294)
53、Zhang Lili, Zhang Zhiyong(張志勇), Niu Danmei, et al. A Novel DRM Security Scheme and its Prototype System Implementation[J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.334-342, 2011. (EI 20114814568295)
52、Tang Guoliang, Liu Zhongyong, Zhang Zhiyong(張志勇), et al. Blind watermarking algorithm based on wavelet-transform and fractal self-similarity[J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.402-410, 2011. (EI 20114814568302)
47、Zhang Zhiyong(張志勇)*, Lian Shiguo, Pei Qingqi, Pu Jiexin. Fuzzy Risk Assessments on Security Policies for Digital Rights Management [J]. Neural Network World, Vol. 20, No.3, pp.265-284, 2010. (SCI 000280426100002, EI 20103213125917)
46、Zhang Zhiyong(張志勇)*. Security, Trust and Risk in Digital Rights Management Ecosystem [C]. In: Proc. of 2010 International Conference on High Performance Computing & Simulation, Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection, Caen, France, Jun, 2010. (EI 20103913258649)
45、Zhang Zhiyong(張志勇)*, Liu Xinliang, Pu Jiexin. Utility-Analytic Approach and Swarm Simulations of Security Policies in Digital Rights Management [J]. Journal of Multimedia, Vol.5, No.5, pp.417-426, 2010. (EI 20104613391495)
44、Zhang Zhiyong(張志勇)*, Huang Tao, Wu Qingtao, Pu Jiexin. A CSCW-Enabling Integrated Access Control Model and its Application [J]. Advanced Materials Research, Vol.108-111, pp.426-435, 2010. (EI 20102713054574, ISTP 000282765400074)
43、Niu Danmei, Zhang Zhiyong(張志勇), Zhang Lili. A DRM System for Home Network Based on RBAC and License Chain [C]. In: Proc. of The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen ,China, Dec, 2010. (EI 20111113753217)
42、Zhang Lili*, Zhang Zhiyong(張志勇)*, Sen Sen, et al. A DRM System Based on PKI [C]. In: Proc. of The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen ,China, Dec, 2010. (EI 20111113753219)
41、Ye Chuanqi, Xinliang Liu, Zhang Zhiyong(張志勇), et al. Multi-Spectral and Panchromatic Image Fusion Based on Region Correlation Coefficient in Nonsubsampled Contourlet Transform Domain [C]. In: Proc. of The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen ,China, Dec, 2010. (EI 20111113753216)
38、Zhang Zhiyong(張志勇)*, Pei Qingqi, Yang Lin, Ma Jianfeng. Security and Trust in Digital Rights Management: A Survey [J]. International Journal of Network Security, 2009, 9(3): 247-263. (EI 20131316154339) [PDF] [Cite1] Zoltán Hornák, István Nyilas, Dániel Petró, et al, “uTRUSTit – Usable Trust in the Internet of Things,” Technical Report, SEARCH-LAB Ltd, Dec, 2010.
37、Zhiyong Zhang(張志勇)*, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefang Fan. Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM [C]. In: Proc. of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference, Jan 10-13, Las Vegas, Nevada, U.S. (EI 20091512027309, ISTP 000268009200279)
[Cite1] B. Ali and M. Maheswaran, “Using Social Factors in Digital Rights Management,” Proc. of 4th USENIX Workshop on Hot Topics on Security, August 2009, Montreal, Canada.
[Cite2] B. Ali and M. Maheswaran, “Aligning the Incentives for Social Media Distribution,” Technical Report, School of Computer Science, Jan, 2010.
[Cite3] P. A. Jamkhedkar, G. L. Heileman, C. C. Lamb, “An interoperable usage management framework,” Proc. of 10th Annual ACM Workshop on Digital Rights Management, pp.73-87, 2010.
[Cite4] Pramod Jamkhedkar, " P 2011.< USA, Mexico, New Albuquerque, of University The Dissertation, PhD Management,? Usage for Framework A>
36、Zhang Zhiyong(張志勇)*, Pei Qingqi, Yang Lin, Ma Jianfeng. Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of Security Policies [J] Chinese Journal of Electronics(電子學(xué)報(bào)英文版), 2009, 18(3): 519-524. (SCI 000268110500027, EI 20093612286410)
[Cite1] QIU Qin, TANG Zhi1, LI Fenghua, et al. A Personal DRM Scheme Based on Social Trust, Chinese Journal of Electronics, 2012, 21(4):719-724.
[Cite2] HUANG Qin-long, MA Zhao-feng, YANG Yi-xian, et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing, The Journal of China Universities of Posts and Telecommunications, 2013, 20(6): 88–95.
33、Ph.D.Dissertation (in English).Security Policies Analyses and Adoptions in Digital Rights Management [D] (CNKI全文公開(kāi)). 西安電子科技大學(xué)博士論文,2009,9. [中文詳細(xì)摘要PDF] [Extended Abstract in English
31、Zhang Zhiyong(張志勇)*, Pu Jiexin, Wu qingtao, Zhang Lili, Niu Danmei. Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies [C]. In: Proc. of 2009 International Conference on Computer and Communications Security, IEEE Computer Society, Hong Kong, pp.55-59, Dec, 2009. (EI 20101512832855, ISTP 000276142900015)
28、Zhiyong Zhang(張志勇)*,Qingqi Pei,Jianfeng Ma,Lin Yang, Kefang Fan. A Fine-grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement [C]. International Conference on Computational Intelligence and Security,Dec.13-17,2008 Suzhou SIP,China. (EI 090911923791, ISTP 000268099900205).
27、Zhiyong Zhang(張志勇)*, Qingqi Pei, Jianfeng Ma, Lin Yang. A Benefits-Centric Multi-Participant Trust Architecture for DRM-Enabling Digital Contents Value Chain Ecosystem [C]. 2008 International Seminar on Business and Information Management, Wuhan, China, Dec 19, 2008. (EI 20094312395422,ISTP 000269752000051)
26、Zhiyong Zhang(張志勇)*, Qingqi Pei, Lin Yang. Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model [C].2008 International Conference on MultiMedia and Information Technology, Three Gorges, China, Dec 30-31, 2008. (EI 20094112369076, ISTP 000269971400081)
22、Zhang Zhiyong (張志勇)*, Yang Lin , Pei Qingqi, Ma Jianfeng . Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology [C].2007 IFIP International Conference on Network and Parallel Computing, in Conjunction with IFIP International Workshop on Network and System Security, Dalian,China, Sep, 2007. (EI 083111412681, ISTP 000251390000042)
[Cite1] A. Lazouski, F. Martinelli, P. Mori, “A Survey of Usage Control in Computer Security”, The National Research Council, Institute of Informatics and Telematics (IIT) Technical Report-12, pp.1-21, Italy, 2008.
[Cite2] A. Lazouski, F. Martinelli, P. Mori, “Usage Control in Computer Security: A Survey ”, Computer Science Review, 4(2010): 81-99.
[Cite3] Yongming Jin, Jinqiang Ren, Zhong Chen, et al, “An Improved Scheme for Delegation Based on Usage Control ”, Proc. of 2008 Second International Conference on Future Generation Communication and Networking, pp.74-78.
[Cite4] Salim, Farzad and Reid, Jason F. and Dawson, Edward, An administrative model for UCON. In: Proceedings of he 8th Australasian Information Security Conference (AISC 2010), 18-21 January 2010, Brisbane, Queensland, Australia.
[Cite5] Patricia Ghann, Changda Wang and Conghua Zhou, "Usage control: a solution to access control in a distributed- network-connected environment," In: Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp.264-269, Paris, France.
[Cite6] Xiaoliang Hu, Sylvia L. Osborn, "A New Approach for Delegation in Usage Control," In: Proceedings of the third ACM conference on Data and application security and privacy, pp.269-276 , February 18–20, 2013, San Antonio, Texas, USA.
[Cite7] Farzad Salim, "Approaches to Access Control Under Uncertainty," Ph.D Dissertation, Queensland Univ. of Technology, Australia, 2012.
[Cite8] Patricia Ghann*, Changda Wang and Conghua Zhou, “Usage control: a solution to access control in a distributed- network-connected environment,” Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering, Paris, France.
[Cite9] Abdulgader Z. Almutairi, Context-Aware and Adaptive Usage Control Model, PhD Dissertation, De Montfort University, United Kingdom, 2012, Sep.
[Cite10] Lorena González Manzano, Ana I. González Tablas and José M. de Fuentes, SoNeUCONADM: the administrative model for SoNeUCONABC usage control model, Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 209-214.
[Cite11] Lorena González Manzano, "A user-managed access control model and mechanisms for Web Based Social Networks. Enhancing expressive power, co-ownership management, interoperability and authorized data exposures", Ph.D Dissertation, UNIVERSITY CARLOS III OF MADRID, Jun, 2014.
17、Zhang Zhiyong(張志勇)*. Role Based Access Control Model and Object-Oriented Modeling [C], The Proceedings of the China Association for Science and Technology, Vol.2, 2006.
16、Zhang Zhiyong(張志勇)*, Pu Jiexin, Zhang Shaozhong. Dynamic Capability Delegation Model for MAS, Architecture and Protocols in CSCW Environment [C]. The 10th International Conference on CSCW in Design, Nanjing, China, May.3-5, 2006.(EI 073210756595, ISTP BFD79)
15、Zhang Zhiyong(張志勇)*, Pu Jiexin. Collaboration Access Control Model for MAS Based on Role and Agent Cooperative Scenarios [C]. IEEE International Conference on Mechatronics and Automation, Luoyang, China, Jun 25-28, 2006.(EI 071710567371, ISTP BFE23)
9、Zhang Zhiyong(張志勇)*, Pu Jiexin. Delegation Model for CSCW Based on RBAC Policy and Visual Modeling [C]. In: Proceedings of The 11th Joint International Computer Conference, World Scientific Press Company, Chongqing, China, Nov, 2005.(EI 20142817916561, ISTP Print-Style BDF35)
6、Zhang Zhiyong(張志勇)*, Pu Jiexin. Permission-Role Based Delegation Model and Object-Oriented Modeling [C]. In: Proceedings of China National Open Distributed and Parallel Computing Symposium 2004, Beijing, China, pp.52-55, 2004.
張志勇教授擔(dān)任International Journal of Cloud Applications and Computing(IGI Global)國(guó)際咨詢委員會(huì)(Int'l Advisory Board)成員。作為主席、共同主席和國(guó)際程序委員會(huì)委員,發(fā)起并組織多個(gè)IEEE、ACM國(guó)際學(xué)術(shù)會(huì)議的DRM專題研討會(huì)(Workshops/Invited Sessions),并擔(dān)任IEEE CS旗艦會(huì)議IEEE COMPSAC 2016、IEEE COMPSAC 2017論文集出版(共同)主席。2009年12月獲得Computational Intelligence & Security大會(huì)頒發(fā)的杰出組織工作獎(jiǎng) (Outstanding Organization Award on Workshop/Invited Session)!
1.Congress Review Panel Member, 2018 IEEE World Congress on Services, San Francisco, CA, US. (SERVICES 2018)
2.Publication Co-Chair, 2017 IEEE Conference on Computers, Software and Applications, Politecnico di Torino, Turin, Italy, 2017. (COMPSAC 2017)
3.Publication Co-Chair, 2016 IEEE Conference on Computers, Software and Applications, Atlanta, Georgia, USA, 2016. (COMPSAC 2016)
4.Co-Chair, 2016 International Conference on Intelligent Cloud Computing, Wuhan, China, 2016. (ICC 2016)
5.Technical Co-Sponsor, 4th International Conference on Advanced Computing, Networking, and Informatics, Rourkela, India, 2016. (ICACNI 2016)
6.TPC Member, The International Conference on High Performance Computing & Simulation (2010 France, 2011 Turkey, 2014 Italy, 2015The Netherlands, 2016 Austria)
7.TPC Member, International Conference on Future Computational Technologies and Applications (2013 Spain, 2014 Italy, 2015 France, 2016 Italy)
8.TPC Member, International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 2016. (ICACCI 2016)
9.Chair, Invited Session on Multimedia Social Networks and Soft Computing (ICGEC-2013-IS03), Seventh International Conference on Genetic and Evolutionary Computing (ICGEC-2013), Prague, Czech Republic, 2013. (ICGEC2013, Czech Republic), (ICGEC-2013-IS03)
10.Chair, Invited Session on Multimedia and Cloud Computing Security (ICGEC-2012-IS01), Sixth International Conference on Genetic and Evolutionary Computing (ICGEC-2012), Kitakyushu, Japan, 2012. (ICGEC2012, Japan), (ICGEC-2012-IS01)
11.Chair, Special Session on Digital Home Networks & Multimedia Contents Protection (DHN-MM 2011), 2011International Conference on High Performance Computing & Simulation, Istanbul, Turkey, 2010. (HPCS2011, Turkey), (DHN-MM2011)
12.Chair, Invited Session on Digital Rights Management (ICGEC-2011-IS01), Fifth International Conference on Genetic and Evolutionary Computing (ICGEC-2011), Taiwan, 2011. (ICGEC2011, Taiwan), (ICGEC-2011-IS01)
13.Chair, Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection (TUN-MM 2010), 2010 International Conference on High Performance Computing & Simulation, Caen, France, 2010. (HPCS2010, France), (TUN-MM2010)
14.Chair, Invited Session on Security and Trust in Ubiquitous Networks (ICGEC-2010-IS06), Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), Shenzhen, China, 2010. (ICGEC2010, China), (ICGEC2010-IS06)
15.Chair, Invited Session on Digital Rights Management (IAS-2009-IS15), The Fifth International Conference on Information Assurance and Security, Xi'an, China, 2009. (IAS2009, China), (IAS-2009-IS15)
16.Chair, International Workshop on Digital Rights Management & Contents Protection (CIS-Workshop2009), conjunction with 2009 International Conference on Computational Intelligence & Security, Beijing, China, 2009. (CIS2009, China), (CIS-Workshop2009)
國(guó)際程序委員會(huì)委員(TPC):
1. TPC Member for International Conference on Multimedia Information Networking Security, Wuhan, China, 2009. (MINES 2009, Wuhan)
2. TPC Member for 2010 International Conference on High Performance Computing & Simulation, Caen, France, 2010. (HPCS 2010, France)
3. TPC Member for 2010 International Conference on Multimedia Communications, Hong Kong, 2010. (MediaCom 2010, HongKong)
4. TPC Member for The First International Symposium on Ubiquitous & Trusted Computing, Busan, Korea, 2010. (UTC 2010, Korea)
5. TPC Member for 2010 International Conference on Wireless and Optical Communications, Shenzhen, China, 2010. (ICWOC 2010, Shenzhen)
6. TPC Member for Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), Shenzhen, China, 2010. (ICGEC 2010, Shenzhen)
7. Reviewing & Organizing Services for a series of International Conferences on Information Security & Communication Networks sponsored by IEEE/ACM/IFIP, ICNC-FSKD’06, ICAL’07, CIS’08, CCNC’09, MINES’09, CIS’09, KESE'09, ASIA'09.
3.第十一屆聯(lián)合國(guó)際計(jì)算機(jī)會(huì)議(The 11th Joint International Computer Conference 2005 Chongqing, JICC2005),Nov.10-12,2005,中國(guó)重慶。
4.IEEE 第十屆計(jì)算機(jī)支持協(xié)同工作設(shè)計(jì)國(guó)際學(xué)術(shù)會(huì)議(The 10th International Conference on Computer Supported Cooperative Work in Design, CSCWD2006),May.03-05,2006,中國(guó)南京。
5.IEEE 國(guó)際機(jī)電與自動(dòng)化學(xué)術(shù)會(huì)議(IEEE International Conference on Mechatronics and Automation,ICMA2006),Jun.25-28,2006,中國(guó)洛陽(yáng)。
6.第一屆亞太地區(qū)可信基礎(chǔ)架構(gòu)技術(shù)研討會(huì)(夏令營(yíng))(1st Asia-Pacific Summer School on Trusted Infrastructure Technologies, APTISS2007),Aug.20-24,2007,中國(guó)珠海。
7.IFIP 國(guó)際網(wǎng)絡(luò)與并行計(jì)算會(huì)議(IFIP International Conference on Network and Parallel Computing, NPC2007),Sep.18-21,2007,中國(guó)大連。
“在數(shù)字版權(quán)管理(英文為Digital Rights Management,簡(jiǎn)稱DRM)支持的數(shù)字內(nèi)容產(chǎn)業(yè)價(jià)值鏈中必然涉及到重要的一方——終端用戶,并且他們和內(nèi)容(服務(wù))提供商之間由于各自的利益并不存在完全的信任,致使安全技術(shù)成為構(gòu)建多方信任的基礎(chǔ)。”張志勇關(guān)注的目光定格在數(shù)字內(nèi)容產(chǎn)業(yè)發(fā)展的前沿問(wèn)題上。
2009年1月,在美國(guó)拉斯維加斯召開(kāi)的DRM領(lǐng)域具有重要影響的國(guó)際學(xué)術(shù)會(huì)議IEEE CCNC上,張志勇發(fā)表了關(guān)于DRM安全策略合作與非合作博弈論選取方法的論文,被加拿大麥吉爾大學(xué)Advanced Networking Research Lab所關(guān)注并積極引用,隨后美國(guó)新墨西哥大學(xué)G. L. Heileman教授也在DRM領(lǐng)域頂級(jí)會(huì)議ACM DRM2010中引用了該成果。2009年11月,張志勇發(fā)表在International Journal of Network Security中的DRM安全與信任綜述性論文“Security and Trust of Digital Rights Management: A Survey”,指出了以安全為基礎(chǔ)的DRM多方信任是當(dāng)前開(kāi)放問(wèn)題之一,并提出了以安全-效用(Security-Utility)為中心的DRM多方信任框架(Multi-Party Trust in DRM Ecosystem)。針對(duì)這一開(kāi)放問(wèn)題,通過(guò)建立DRM安全策略組合的效用理論,以及動(dòng)態(tài)混合博弈選取方法,使得DRM Ecosystem各方能夠最優(yōu)地選取和部署安全策略。此外,針對(duì)數(shù)字內(nèi)容分享與傳播中的安全風(fēng)險(xiǎn)問(wèn)題,張志勇博士提出了RCU(Risk-Controlled Utility)方法,并采用軟計(jì)算理論,對(duì)DRM安全策略風(fēng)險(xiǎn)評(píng)估進(jìn)行了深入研究,研究成果主要發(fā)表在國(guó)際著名期刊“Neural Network World”和“Intelligent Automation and Soft Computing”。2010年,張志勇?tīng)款^的“數(shù)字版權(quán)管理中數(shù)字權(quán)利傳播的小世界網(wǎng)絡(luò)建模及風(fēng)險(xiǎn)控制”研究項(xiàng)目,再次獲得國(guó)家自然科學(xué)基金資助。
針對(duì)DRM使用控制等關(guān)鍵共性技術(shù)研究,他積極申請(qǐng)并負(fù)責(zé)完成河南省重點(diǎn)科技攻關(guān)項(xiàng)目“數(shù)字內(nèi)容可信授權(quán)使用控制系統(tǒng)研究”,在數(shù)字權(quán)利分享與轉(zhuǎn)移技術(shù)領(lǐng)域,提出了DRM使用控制轉(zhuǎn)授權(quán)(Delegation)模型、細(xì)粒度權(quán)利轉(zhuǎn)移安全機(jī)制,以及可信分發(fā)與安全執(zhí)行等理念。他帶領(lǐng)團(tuán)隊(duì)潛心研制的“DRM Player音視頻數(shù)字內(nèi)容安全使用控制系統(tǒng)”等通過(guò)河南省軟件評(píng)測(cè)中心檢測(cè),并完成計(jì)算機(jī)軟件著作權(quán)登記,其主要理論成果發(fā)表在Int'l J. of Digital Content Technology and Its Applications,Journal of Multimedia, 以及IEEE、ACM和IFIP主辦的多個(gè)國(guó)際學(xué)術(shù)會(huì)議上。曾獲河南省工業(yè)和信息化科技成果一等獎(jiǎng)等。
由于在數(shù)字版權(quán)管理領(lǐng)域的卓越貢獻(xiàn),今年3月26日國(guó)際電氣與電子工程師協(xié)會(huì)(IEEE)在美國(guó)西雅圖召開(kāi)的新一輪IEEE Admission & Advancement評(píng)審會(huì)議上,正式批準(zhǔn)張志勇晉升為IEEE Senior Member。而此前,他已經(jīng)是IEEE Systems, Man, Cybermetics Society國(guó)際軟計(jì)算技術(shù)委員會(huì)(TC on Soft Computing)委員,國(guó)際期刊Int'l J. of Digital Contents Technology and its Applications數(shù)字版權(quán)管理與內(nèi)容安全專題主編(TEiC),中國(guó)人工智能學(xué)會(huì)第一屆智能數(shù)字內(nèi)容安全專業(yè)委員會(huì)委員等,曾作為主席/聯(lián)合主席發(fā)起并組織了多個(gè)國(guó)際學(xué)術(shù)會(huì)議DRM專題研討會(huì)(Workshop/Invited Session),并擔(dān)任多個(gè)國(guó)際學(xué)術(shù)會(huì)議程序委員會(huì)委員。