Location >> People >> Professor
Jianhua Li
Jianhua Li , Professor
SEIEE Buildings 1-217
Shanghai JiaoTong University
800 Dongchuan Road, Shanghai 200240, China
Tel: +86 21 34204532
Email:  lijh888@sjtu.edu.cn

Jianhua Li received his B.S., M.S. and Ph.D. degree respectively in 1986, 1991 and 1998 from Shanghai Jiao Tong University, Shanghai, China, all in information and communication engineering. Since 1991, he has been a faculty member in Shanghai Jiao Tong Univ. At present, he is a professor at the Dept. of EE in Shanghai Jiao Tong Univ., the Dean of the School of Information Security Engineering in Shanghai Jiao Tong Univ., the Director of National Engineering Laboratory of Information Content Analysis Technology and the Director of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security.

His research interests include Information security and Computer communication networks. Dr. Li has published over 200 academic papers, and has over 60 awarded patents. He is the authors of more than 10 books on information security. In addition, he won more than 10 research prizes and honorary titles including the Prize of Chinese National Science and Technology Progress, the Prize of Shanghai Science and Technology Progress, the New Century National Hundred-Thousand-Ten Thousand Talent, Asia-Pacific Information Security Leadership Achievements Awards, etc..

  1. The 2st Prize of Chinese National Science and Technology Progress, 2005
  2. The 1st Prize of Science and Technology Progress of Chinese Education Ministry, 2009
  3. The 1st Prize of Shanghai Science and Technology Progress, 2013
  4. The 1st Prize of Shanghai Science and Technology Progress, 2003
  5. The 1st Prize of Shanghai Science and Technology Progress, 2004
  6. The 2st Prize of Shanghai Science and Technology Progress, 2004
  7. The New Century National Hundred-Thousand-Ten Thousand Talent, 2004
  8. The Eleventh Shanghai Science and Technology Elite, 2009
  9. Shanghai Outstanding Academic Leader, 2008
  10. Asia-Pacific Information Security Leadership Achievements Awards( ISLA Programme),2007
Research Areas
  1. Information security
  2. Computer communication networks
Selected Publications
  1. Li Jianhua, Li Xiang, Li Shenghong, Liu Gongshen, Information Content Security Management and Application, Chinese Machine Industry Press,2010.
  2. Li Xiangxue, Qiu Weidong, Zheng Dong, Chen Kefei and Li Jianhua, Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, vol.57, no.2, pp.793-800.
  3. Li Xiangxue, Zheng Qingji, Qian Haifeng, Zheng Dong and Li Jianhua, Toward Optimizing Cauchy Matrix for Cauchy Reed-Solomon Code, IEEE COMMUNICATIONS LETTERS, 2009, Vol.13, No.8, PP.603-605.
  4. Wang Yingjie, Li Jianhua, Security Improvement on a timestamp-based Password Authentication Scheme, IEEE Transactions on Consumer Electronics, 2004, Vol.50, No.2, pp.580-582.
  5. Lian Bin, Chen Gongliang, Ma Maode, Li Jianhua,Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, vol.10, no.3,pp.543-557.
  6. Zhao Xudong, Wang Shilin, Li Shenghong, Li Jianhua, Passive Image-Splicing Detection by a 2-D Noncausal Markov Model, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2015, vol. 25, no.2, pp.185-199
  7. Guo Longhua, Wu Jun, Xia Zhengmin,Li Jianhua, Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks,  IEEE SENSORS JOURNAL, 2015, Vol.15, No.5.
  8. Tian Yun, Chen Gongliang, Li Jianhua, A New Ultralightweight RFID Authentication Protocol with Permutation, IEEE COMMUNICATIONS LETTERS, 2012, vol.16,no.5, pp.702-705.
  9. Wang Kai, Pan Li, Li Jianhua, Peer-to-peer Based Fast File Dissemination in UMTS,IEICE Transactions on Communications,2008, Vol.E91-B, No.12, pp.3860-3871.
  10. Sun Donglai, Liu Yang, Li Jianhua, Collaborative Opportunistic Scheduling in Heterogeneous Networks: A Distributed Approach, MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, DOI: 10.1155/2014/414689.
  11. Li Xiangxue, Zheng Dong, Chen Kefei, Li Jianhua, Democratic group signatures with collective traceability, Elsevier Computers and Electrical Engineering, 2009, Vol.35, No.5, pp.664-672.
  12. Ge Hao, Jiang Wen, Li Shenghong, Li Jianhua, A novel estimator based learning automata algorithm, APPLIED INTELLIGENCE, 2015, Vol.42, No.2, pp. 262-275.
  13. Shi Yijuan, Li Jianhua, Identity-based deniable authentication protocol,ELECTRONICSLETTERS , 2005, Vol.41, No.5, pp.241-242.
  14. Zhang Shaojun, Li Jianhua, Chen Xiuzhen, Fan Lei, Building network attack graph for alert causal correlation, Computers & Security, 2008, Vol.27, No.5-6, pp.188-196.
  1. Theory of remote cooperation system


Copyright: 2013 Department of Electronic Engineering Shanghai Jiao Tong University       Technical support: Shanghai EChao