·
?姓名:陈鸿龙 | ?系属:自动化系 | |
?学位:博士 | ?职称/职务:教授/副院长 | |
?专业:控制科学与工程 | ?导师类别:硕士生导师、 博士生导师 | |
?电子邮箱:chenhl@upc.edu.cn | ||
?联系电话:0532-86983472 | ||
?通讯地址:山东省青岛市黄岛区长江西路66号工科E座1215室 | ||
?概况 | ||
◎研究方向 [1]智能物联网 [2]群智感知 [3]边缘计算与边缘智能 [4]人工智能安全 [5]安全与隐私保护
◎教育经历 2015年11月-2016年11月,美国亚利桑那州立大学,博士后 2009年2月-2012年8月,香港理工大学电子计算学系,博士 2006年9月-2008年12月,浙江大学控制系,硕士 2002年9月-2006年7月,中国石油大学(华东)自动化系,学士
◎工作经历 2021年1月至今,中国石油大学(华东)自动化系,教授,博士生导师 2018年7月-2020年12月,中国石油大学(华东)自动化系,副教授,博士生导师 2015年1月-2018年6月,中国石油大学(华东)自动化系,副教授,硕士生导师 2012年9月-2014年12月,中国石油大学(华东)自动化系,讲师 2014年7月-8月,香港理工大学电子计算学系,高级研究助理 2007年12月-2008年9月,香港理工大学电子计算学系,研究助理
◎学术兼职 IEEE高级会员,ACM会员,CCF高级会员,中国电子学会高级会员,CCF网络与数据通信专委会委员,CCF物联网专委会通信委员,中国电子学会物联网青年专技组通信委员,山东计算机学会网络空间安全专委会委员,担任SCI一区国际期刊IEEE TII客座编委,担任国家自然科学基金企业创新发展联合基金重点项目网评和会评专家,担任IEEE Communications Magazine, IEEE IoT-J, IEEE TDSC, IEEE TWC, IEEE TVT, IEEE TCYB, IEEE TII等三十多个SCI检索国际期刊审稿人。
◎主讲课程 本科生课程:《无线传感网络》、《过程控制仪表与装置》 研究生课程:《物联网导论》
◎指导研究生及博士后 已毕业研究生: 2015届:杨玉斌* 2018届:马国蕾 2019届:丁鑫旺,付金楠,林凯,刘璐 2020届:艾欣,王帅,秦雨婷,刘东永,李宪敏 2021届:李哲,张栋,刘国桢,代天骄,王筑* 2022届:黄杨,倪志琛,刘德强,梁丰 在读研究生: 2018级:迟雪键(本研班),李国欣(本研班) 2019级:林凯(博士),高宇栋(本研班),李响宇(本研班),代秋丽(本研班) 2020级:李隽健(博士),闫娜,薛焕昇,麻国琦,王晓萌,张安庆,马博仑,高碧溶,尹阳旭(本研班),姜皓宇(本研班),白富航(本研班) 2021级:李哲(博士),魏文涛,刘翔,尹建尧,张博见,范兴龙,高志敏 2022级:倪志琛(博士),刘玉萍,孙海洋,刘小龙,王文杰,李君伟,余继淼,邱敬涵
◎承担项目 [1]群智感知驱动的车联网安全计算,山东省自然科学基金优秀青年基金,2023.01-2025.12,No. ZR2022YQ61,50万,主持 [2]海洋石油生产系统过程监测技术研究,中国石油大学(华东)自主创新计划项目战略专项,2022.01-2024.12,No. 22CX01003A-9,100万,主持 [3]基于无线传感器网络的长输管道监测研究,国家自然科学基金中俄合作交流项目,2021.01-2022.12,No.62111530052,15万,主持 [4] 面向大规模RFID系统的标签安全监测关键技术研究,国家自然科学基金面上项目,2018.01-2021.12,No. 61772551,63万,主持,已结题 [5] 资源受限容迟网络的多层协议研究与设计,国家自然科学基金青年基金,2014.01-2016.12,No. 61309023,23万,主持,已结题 [6] 基于帧时隙ALOHA的大规模RFID系统标签监测及其安全与隐私保护研究,山东省重点研发计划项目,2018.01-2019.12,No. 2018GGX101035,20万,主持,已结题 [7] 物联网跨层信息安全与隐私保护研究,山东省重点研发计划项目,2015.07-2017.07,No. 2015GGX101045,20万,主持,已结题 [8] 针对虫洞攻击的无线传感器网络安全定位方法的研究,山东省自然科学基金青年基金,2013.10-2016.10,No. ZR2013FQ032,5万,主持,已结题 [9] 大规模RFID系统的丢失标签检测与识别技术研究,山东省计算机网络重点实验室开放课题,2019.01-2020.12,No. SDKLCN-2018-06,2万,主持,已结题 [10] 基于车载网的媒体报文信息分发机制,浙江省可视媒体智能处理技术研究重点实验室开放课题,2013.01-2013.12,No. 2012008,1万,主持,已结题 [11] 面向资源受限的移动自组织网络信息安全与隐私保护研究,青岛市科技计划项目,2015.09-2017.09,No. 15-9-1-79-jch,5万,主持,已结题 [12] 大规模物联网关键技术研究,中国石油大学(华东)自主创新科研计划项目优青培育项目,2018.01-2020.12,No. 18CX07003A,20万,主持,已结题 [13] 基于非加密技术的资源受限物联网安全问题研究,中国石油大学(华东)自主创新计划项目延续资助,2016.01-2017.12,6万,主持,已结题 [14] 资源受限的容迟网络系统理论研究,中国石油大学(华东)自主创新计划项目,2013.01-2014.12,No. 13CX02100A,8.8万,主持,已结题 [15] 中国石油大学(华东)青年骨干教师人才建设工程, 2014-2017,8万,主持,已结题 [16] 针对虫洞攻击的无线传感器网络安全定位技术,中国石油大学(华东)科研启动基金项目,2013.01-2015.12,3万,主持,已结题 [17] 面向自动化拔尖人才的基于物联网技术创新型综合实验课程教学模式的研究与探索,中国石油大学(华东)青年教改项目,2014.09-2016.09,0.5万,主持,已结题
◎荣誉称号 [1]山东省优青,2022年 [2]中国石油大学(华东)优秀教师,2019年 [3]黄岛区“智岛计划”紧缺人才,2014年 [4]中国石油大学(华东)青年骨干教师人才建设工程,2014年
◎科研奖励 [1]第十三届青岛市青年科技奖,2022年 [2]姜楠,李进,李淑琴,屠要峰,陈鸿龙,汤兆平,万涛,肖勇,面向多模态交互的智能家居云边端一体化关键技术及应用,中国人工智能学会吴文俊科学技术奖科技进步二等奖,2021年 ◎期刊论文 [1]. Zhe Li, Honglong Chen*, Zhichen Ni, Xiaogang Deng, Baodi Liu, Weifeng Liu. ARPCNN: Auxiliary Review Based Personalized Attentional CNN for Trustworthy Recommendation. Acepted to appear in IEEE Transactions on Industrial Informatics, 2022. (SCI一区,IF:10.215) [2]. Huansheng Xue, Honglong Chen*, Qiuli Dai, Kai Lin, Junjian Li, Zhe Li. CSCT: Charging Scheduling for Maximizing Coverage of Targets in WRSNs. Accepted to appear in IEEE Transactions on Computational Social Systems, 2022. (SCI) [3]. Zhichen Ni, Honglong Chen*, Zhe Li, Xiaomeng Wang, Na Yan, Weifeng Liu, Feng Xia. MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks. Accepted to appear in IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2022. (SCI三区,CCF B类) [4]. Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia. Edge Data Based Trailer Inception Probabilistic Matrix Factorization for Context-Aware Movie Recommendation. Accepted to appear in World Wide Web Journal, 2021. (SCI三区,CCF B类) [5].Zhu Wang, Honglong Chen*, Zhe Li, Kai Lin, Nan Jiang, Feng Xia. VRConvMF: Visual Recurrent Convolutional Matrix Factorization for Movie Recommendation. Accepted to appear in IEEE Transactions on Emerging Topics in Computational Intelligence, 2021. (SCI) [6].Yang Huang, Honglong Chen*, Guoqi Ma, Kai Lin, Zhichen Ni, Na Yan, Zhibo Wang. OPAT: Optimized Allocation of Time Dependent Tasks for Mobile Crowdsensing. Accepted to appear in IEEE Transactions on Industrial Informatics, 2021. (SCI一区,Top) [7]. Feng Liang, Honglong Chen*, Kai Lin, Junjian Li, Zhe Li, Huansheng Xue, Vladimir Shakhov, Hannan Bin Liaqat. Route Recommendation Based on Temporal-Spatial Metric. Accepted to appear in Computers and Electrical Engineering, 2021. (SCI三区) [8]. Honglong Chen, Xin Ai, Kai Lin, Na Yan, Nan Jiang, Zhibo Wang, Jiguo Yu. DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems. Accepted to appear in IEEE Transactions on Industrial Informatics, 2021. (SCI一区,Top) [9].Kai Lin, Honglong Chen*, Na Yan, Zhe Li, Junjian Li, and Nan Jiang. Fast and Reliable Missing Tag Detection for Multiple-Group RFID System. Accepted to appear in IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2021.3058950, 2021. (SCI一区,Top) [10].Leyi Shi, Xiaoyu Li, Zhenbo Gao, Pengfei Duan, Na Liu, Honglong Chen*. Worm Computing: A Blockchain-based Resource Sharing and Cybersecurity Framework. Accepted to appear in Journal of Network and Computer Applications, 2021. (SCI二区,Top) [11]. Zhe Li, Honglong Chen*, Kai Lin, Vladimir Shakhov, Leyi Shi, Jiguo Yu. From edge data to recommendation: A double attention-based deformable convolutional network. Accepted to appear in Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-020-01037-7, 2021. (SCI三区) [12]. Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, and Leyi Shi. Trust-aware Generative Adversarial Network with Recurrent Neural Network for Recommender. In International Journal of Intelligent Systems, 2021.(SCI一区, Top,IF:10.312) [13]. Xin Ai,Honglong Chen*, Kai Lin, Zhibo Wang and Jiguo Yu. Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. InIEEE Transactions on Information Forensics and Security, 2021.(CCF A, SCI一区,Top) [14].Honglong Chen, Yuting Qin, Kai Lin, Yingxin Luan, Zhibo Wang, Jiguo Yu, Yanjun Li. PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks. InAd Hoc Networks, vol.107, no.1, 2020.(SCI二区) [15]. Kai Lin,Honglong Chen*,Xin Ai, Vladimir Shakhov, Lina Ni, Jiguo Yu, Yanjun Li.EUMD: Efficient slot utilization based missing tag detection with unknown tags. InJournal of Network and Computer Applications, vol.160, no.15, 2020.(SCI二区,Top) [16].Xuxin Zhang,Honglong Chen*, Kai Lin, Zhibo Wang, Jiguo Yu, and Leyi Shi. RMTS: A Robust Clock Synchronization Scheme for Wireless Sensor Networks. InJournal of Network and Computer Applications,vol.135, no.1, pp.1-10,2019. (SCI二区, Top) [17].Honglong Chen, Wei Lou, Zhibo Wang, and Feng Xia. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. InIEEE Transactions on Emerging Topics in Computing,vol. 6, no. 5, pp. 553-565,2018.(SCI二区) [18].Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, and Jiguo Yu. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. InIEEE Transactions on Vehicular Technology,vol. 67, no. 10, pp. 9947-9958, Oct. 2018. (SCI二区) [19].Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, and Leyi Shi. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. In IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2915-2926, Aug. 2018. (SCI一区, Top) [20].Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu. Probabilistic Detection of Missing Tags for Anonymous Multi-Category RFID Systems. InIEEE Transactions on Vehicular Technology,vol. 66, pp. 11295-11305, Dec. 2017.(SCI二区) [21].Honglong Chen, Guoliang Xue, and Zhibo Wang. Efficient and Reliable Missing Tags Identification for Large-Scale RFID Systems with Unknown Tags. InIEEE Internet of Things Journal, vol. 4, pp.736-748, 2017.(SCI一区, Top) [22].Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, and Xiangyuan Jiang. Efficient 3-Dimensional Localization for RFID Systems Using Jumping Probe. InElsevier Pervasive and Mobile Computing, vol. 41, pp. 300-318, Oct. 2017.(SCI三区) [23].Honglong Chen, Wei Lou, Zhibo Wang, and Qian Wang. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. InIEEE Transactions on Vehicular Technology,vol. 65, pp.6377-6388, 2016.(SCI二区) [24].Honglong Chen, and Wei Lou. Contact Expectation Based Routing for Delay Tolerant Networks. InElsevier Ad Hoc Networks, vol. 36, pp.244-257, 2016.(SCI三区) [25].Honglong Chen, Wei Lou, and Zhi Wang. On Providing Wormhole Attack Resistant Localization Using Conflicting Sets. InWiley Wireless Communications and Mobile Computing, vol. 15, pp.1865-1881, 2015.(SCI四区) [26].Honglong Chen, and Wei Lou. On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks. InElsevier Pervasive and Mobile Computing, vol. 16, pp.36-50, 2015.(SCI三区) [27].Honglong Chen, Wei Lou, Junfeng Wu, Zhibo Wang, Zhi Wang, and Aihua Xia.Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. InElsevier Pervasive and Mobile Computing. vol. 16, pp. 22-35, Jan. 2015.(SCI三区) [28].Honglong Chen, and Wei Lou. GAR: Group Aware Cooperative Routing Protocol for Resource-Constraint Opportunistic Networks. InElsevier Computer Communications, vol. 48, pp.20-29, 2014.(SCI三区) [29].Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, and Yanjun Li.Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. InInternational Journal of Distributed Sensor Networks. 2014.(SCI四区) [30].Honglong Chen, Wei Lou, Xice Sun, and Zhi Wang. A secure localization approach against wormhole attacks using distance consistency. InEURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 627039, 11 pages, 2010. doi:10.1155/2010/627039.(SCI四区) [31].Honglong Chen, Wei Lou, and Zhi Wang. A Novel Secure Localization Approach in Wireless Sensor Networks. InEURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 981280, 12 pages, 2010. doi:10.1155/2010/981280.(SCI四区) [32].张栋,陈鸿龙*. 融合文本信息的轻量级图卷积网络推荐模型. 北京邮电大学学报, 2021. (EI) [33].刘国桢, 陈鸿龙. 基于卷积和记忆单元的图协同过滤推荐系统. 北京邮电大学学报, 2021. (EI) [34].王晓萌, 陈鸿龙, 张安庆, 李隽健, 石乐义. 基于深度学习的对抗样本生成技术研究综述. 广州大学学报(自然科学版), 2020 [35].陈鸿龙,王志波,王智,许江铭,李燕君,刘丽萍.针对虫洞攻击的无线传感器网络安全定位方法.通信学报. 2015. (EI) [36].陈鸿龙,李鸿斌,王智.基于TDoA测距的传感器网络安全定位研究.通信学报, 2008. (EI) [37].陈鸿龙,刘东永,倪志琛,孙良,刘宝.基于YOLO的四旋翼无人机人脸识别实验平台.实验技术与管理,2020.(核心期刊教改论文) [38].陈鸿龙,林凯,李哲,代天骄,孙良.基于NB-IoT的抽油机远程监控系统设计.实验室研究与探索,2020.(核心期刊教改论文) [39].陈鸿龙,李宪敏,代天骄,孙良.基于RFID反向散射的标签定位实验平台.实验技术与管理,2019.(核心期刊教改论文) [40].陈鸿龙,杨玉斌,田力丹,马国蕾,李晓辉.基于物联网的抽油机群远程监控实验平台.实验技术与管理, 2016.(核心期刊教改论文) [41].陈鸿龙,涂玲,孙良,邓晓刚.基于无线传感器网络的抽油机监控实验系统.实验技术与管理, 2014.(核心期刊教改论文) [42]. Shuo Yu, Feng Xia, Chen Zhang, Haoran Wei, Kathleen Keogh, Honglong Chen. Familiarity-Based Collaborative Team Recognition in Academic Social Networks. Accepted to appear in IEEE Transactions on Computational Social Systems, 2022. (SCI) [43]. Nan Jiang, Fuxian Duan, Honglong Chen, Wei Huang, Ximeng Liu. MAFI: GNN-based Multiple Aggregators and Feature Interactions Network for Fraud Detection over Heterogeneous Graph. Accepted to appear in IEEE Transactions on Big Data, 2022. (SCI) [44]. Kan Yu, Biwei Yan, Jiguo Yu, Honglong Chen, Anming Dong. Methods of improving Secrecy Transmission Capacity in wireless random networks. In Ad Hoc Networks, 2021. (SCI二区) [45]. Nan Jiang, Debin Huang, Jing Chen, Jie Wen, Heng Zhang, Honglong Chen. Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV. Accepted to appear in ACM Transactions on Internet Technology, 2021. (SCI四区,CCF B类) [46].Nan Jiang, Jing Chen, Rigui Zhou, Changxing Wu,Honglong Chen, Jiaqi Zheng, Tao Wan. PAN: Pipeline Assisted Neural Networks Model for Data-to-Text Generation in Social Internet of Things. In Information Sciences, 2020. (SCI一区,CCF B类,Top) [47]. Jiahui Hu, Zhibo Wang, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang,Honglong Chen, Dejun Yang. Towards Demand-driven Dynamic Incentive for Mobile Crowdsensing Systems. In IEEE Transactions on Wireless Communications, 2020. (SCI一区,CCF B类, Top) [48]. Jiguo Yu, Kan Yu, Dongxiao Yu, Xiuzhen Cheng, Weifeng Lv, Honglong Chen, Wei Cheng. Efficient Link Scheduling in Wireless Networks under Rayleigh-fading and Multiuser Interference. InIEEE Transactions on Wireless Communications, 2020. (SCI一区,CCF B类, Top) [49]. Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang, Yanjun Li, Honglong Chen. When Mobile Crowdsensing Meets Privacy. In IEEE Communications Magazine, 2019.(SCI一区, Top) [50]. Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei,Honglong Chen, and Xiaoguang Niu. Task Bundling Based Incentive for Location-dependent Mobile Crowdsourcing. InIEEE Communications Magazine, 2019, 57(2), pp. 54-59.(SCI一区, Top) [51]. Behrouz Jedari, Feng Xia,Honglong Chen, Sajal K. Das, Amr Tolba, Zafer AL-Makhadmeh. A Social-based Watchdog System to Detect Selfish Nodes in Opportunistic Mobile Networks. InElsevier Future Generation Computer Systems, 2019.(SCI二区) [52]. Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajia Shao, Qian Wang, Libing Wu,Honglong Chen, and Hairong Qi. Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server. InIEEE Transactions on Mobile Computing, 2019. (SCI二区,CCF A类,ESI高被引) [53]. Chuanwen Luo, Jiguo Yu, Deying Li,Honglong Chen, Yi Hong, Lina Ni.A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks. InComputer Networks, 2018, 146, pp.104-114(SCI三区, CCF B类) [54]. Noor Ullah, Xiangjie Kong, Liangtian Wan,Honglong Chen, Zhibo Wang, Feng Xia.A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. InThe Computer Journal, 2018, 61 (7), pp.971-986.(SCI四区,CCF B类) [55]. Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman,Honglong Chen, Lina Ni.CRPD: a novel clustering routing protocol for dynamic wireless sensor networks. InPersonal and Ubiquitous Computing, 2018, 22 (3), pp.545-559.(SCI三区) [56]. Yanjun Li, Kaikai Chi,Honglong Chen, Zhibo Wang, Yihua Zhu.Narrowband Internet of Things Systems with Opportunistic D2D Communication. InIEEE Internet of Things Journal, 2018, 5 (3), pp.1474-1484.(SCI一区, Top) [57]. Zhibo Wang, Qing Cao, Hairong Qi,Honglong Chen, Qian Wang. Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks. InElsevier Ad Hoc Networks, 2017.(SCI三区, ESI高被引) [58]. Zhibo Wang,Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, Qian Wang.Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks. InComputer Networks, 2017. (SCI三区, CCF B类,ESI高被引) [59]. Baogui Huang, Jiguo Yu, Xiuzhen Cheng,Honglong Chen, Hang Liu.SINR based shortest link scheduling with oblivious power control in wireless networks. InJournal of Network and Computer Applications,2017. (SCI二区, Top) [60]. Zhibo Wang, Zhi Wang,Honglong Chen, Jianfeng Li, Hongbin Li and Jie Shen. HierTrack: An Energy Efficient Cluster-based Target Tracking System for Wireless Sensor Networks. InJournal of Zhejiang University - Science C, 2013.(SCI四区) [61]. Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma andHonglong Chen. HCTT: A Hybrid Cluster-based Target Tracking Protocol for Wireless Sensor Networks. InInternational Journal of Distributed Sensor Networks. 2013.(SCI四区) [62]. Yu Chen, Weiwei Wang,Honglong Chen, Xiangcui Kong, and Jingjing Chen. Parameter Characteristics of Gauss-Markov Mobility Model in Mobile Wireless Sensor Networks. Accepted to appear in Ad Hoc and Sensor Wireless Networks. 2015.(SCI四区) [63]. Leyi Shi, Yuwen Cui, Han Xu,Honglong Chen, Deli Liu. Mimicry honeypot: an evolutionary decoy system. Accepted to appear in International Journal of High Performance Computing and Networking. 2017.(EI) [64].石乐义,崔玉文,付文静,陈鸿龙.一种分簇无线传感网轻量级匿名认证及密钥协商方案.北京邮电大学学报. 2018.(EI) [65].李燕君,胡绍利,迟凯凯,陈鸿龙.面向家庭健康监护的传感网中继节点部署方法.仪器仪表学报. 2015. (EI) [66].石乐义,贾聪,宫剑,刘昕,陈鸿龙.基于共享秘密的伪随机散列函数RFID双向认证协议.电子与信息学报. 2015. (EI) [67].曹玉苹,邓晓刚,田学民,陈鸿龙.数据驱动的抽油机井实时故障诊断实验平台.实验技术与管理. 2015.(核心期刊教改论文)
◎会议论文 [1].Zhe Li, Honglong Chen*, Kai Lin, Vladimir Shakhov, Leyi Shi, Jiguo Yu. Double Attention-based Deformable Convolutional Network for Recommendation. In Proceedings of IEEE/CICInternational Conference on Communications in China, 2020. [2].Honglong Chen,Shuai Wang, Nan Jiang, Zhe Li, Na Yan, Leyi Shi. TagRec: Trust-aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems, in Proceedings of 3rd International Conference on Machine Learning for Cyber Security, 2020.(Best Paper Award, 1 out of 158 papers) [3].Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang,Honglong Chen and Qian Wang. Pay On-demand: Dynamic Incentive and Task Selection for Location-dependent Mobile Crowdsensing Systems, in Proceedings of IEEE ICDCS, 2018.(CCF B类) [4].Zhibo Wang, Yongquan Zhang,Honglong Chen, Zhetao Li, Feng Xia. Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks, in Proceedings of IEEE INFOCOM, 2018, pp.1304-1312. (CCF A类) [5].Zhibo Wang,Honglong Chen, Qing Cao, Hairong Qi, and Zhi Wang.Fault Tolerant Barrier Coverage for Wireless Sensor Networks, in Proceedings of IEEE INFOCOM, 2014. (Acceptance ratio: 320/1645=19.4%) (CCF A类) [6].Honglong Chen and Wei Lou. Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs, in Proceedings of IEEE ICCCN, 2013. (CCF C类) [7].Honglong Chen and Wei Lou, Group Aware Cooperative Routing for Opportunistic Networks under Resource Constraints, in Proceedings ofIEEE GLOBECOM, 2012. (CCF C类) [8].Honglong Chen and Wei Lou, On Using Contact Expectation for Routing in Delay Tolerant Networks,in Proceedings of the 40th IEEE International Conference on Parallel Processing (IEEE ICPP), Taiwan, September, 2011. (Acceptance ratio: 81/363=22.3%)(CCF B类) [9].Honglong Chen, Wei Lou and Zhi Wang, Secure Localization Against Wormhole Attacks Using Conflicting Sets, in Proceedings of the 29thIEEE International Performance Computing and Communications Conference (IEEEIPCCC), Albuquerque, USA, December 2010. (Acceptance ratio: 36/127=28.3%)(CCF C类) [10].Honglong Chen and Wei Lou, From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks, in Proceedings of the 29thIEEE International Performance Computing and Communications Conference (IEEEIPCCC), Albuquerque, USA, December 2010. (Acceptance ratio: 36/127=28.3%) (CCF C类) [11].Honglong Chen, Wei Lou and Zhi Wang, Consistency-Based Secure Localization Against Wormhole Attacks in Wireless Sensor Networks, in Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA), Boston, USA, Aug., 2009. [12].Honglong Chen, Wei Lou and Zhi Wang, Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks, in Proceedings of the6th International Conference on Ubiquitous Intelligence and Computing (UIC), Brisbane, Australia, July 7-9, 2009. (CCF C类) [13].Honglong Chen, Wei Lou, Junchao Ma and Zhi Wang, TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks, in Proceedings of the Second International Conference on Sensor Technologies and Applications(IEEESENSORCOMM):661-666, Cap Esterel, France, August 25-31, 2008. [14].Lianfang Cai, Xuemin Tian, and Honglong Chen.Nonlinear Process Fault Diagnosis Using Kernel ICA and Improved FDA, in Proceedings of the11th IFAC International Workshop on Adaptation and Learning in Control and Signal Processing, 2013. [15].Weiming Shao, Xuemin Tian, and Honglong Chen.Adaptive Anti-Over-Fitting Soft Sensing Method Based on Local Learning, in Proceedings of the 10th IFAC International Symposium on Dynamics and Control of Process Systems, 2013. [16].Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li and Hongbin Li. Demo Abstract: An Energy-efficient Target Tracking System for Wireless Sensor Networks, in Proceedings of ACMSensys, 2011. [17].Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma and Honglong Chen, A Novel Mobility Management Scheme for Target Tracking in Cluster-based Sensor Networks, in Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS), 2010. [18].Junfeng Wu,Honglong Chen, Wei Lou, Zhibo Wang and Zhi Wang, Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, in Proceedings of IEEE International Conference on Networking, Architecture, and Storage (IEEE NAS), 2010. [19].Xice Sun, Zhi Wang,Honglong Chen and Wei Lou, A Probabilistic Model for lifetime measurement in privacy-aware sensor networks, in Proceedings of IEEE International Conference on Wireless Communications and Signal Processing (IEEE WCSP), 2009.
◎专利 [1].陈鸿龙,代天骄,艾欣,林凯,刘璐,王志波,石乐义.基于SSZE的大规模分组RFID系统的丢失标签冰山查询方法. 授权, 2021.(专利号:ZL2018111396814) [2].陈鸿龙, 林凯, 艾欣, 王志波, 石乐义. 基于HZE的大规模分组RFID系统的丢失标签冰山查询方法. 授权,2021.(专利号:ZL2018111407306) [3].陈鸿龙,刘璐,林凯,付金楠,丁鑫旺,王志波,石乐义. 匿名射频识别系统分阶段丢失关键标签识别方法. 授权,2020. (专利号:ZL2017109919655) [4].艾欣,陈鸿龙,林凯,代天骄,王志波,石乐义.基于SHZE的大规模分组RFID系统的丢失标签冰山查询方法.授权,2019.(专利号:ZL2018111396829) [5].杨黎鹏,车荣杰,梅刚,张千昌,孙延波,戴群,关晓龙,陈鸿龙,代天骄.基于SZE的大规模分组RFID系统的丢失标签冰山查询方法.授权,2019.(专利号:ZL2018111396636) [6].陈鸿龙,马国蕾,丁鑫旺,林凯,刘璐,石乐义. 匿名分组RFID系统的丢失标签检测方法. 授权,2018.(专利号:ZL2016109093848) [7].陈鸿龙,付金楠,丁鑫旺,刘璐,林凯,王志波,石乐义. 匿名射频识别系统基于向量的丢失关键标签的识别方法.授权,2018.(专利号:ZL2017109913150) [8].陈鸿龙,林凯,刘璐,付金楠,丁鑫旺,石乐义. 含有未知标签的射频识别系统的丢失标签识别方法. 授权,2018.(专利号:2017103117839) [9].陈鸿龙,杨黎鹏,车荣杰,丁鑫旺,付金楠,林凯,刘璐,石乐义. 匿名多组射频识别系统的丢失标签非确定性并行检测方法. 授权,2018. (专利号:ZL2017102965559) [10].陈鸿龙, 王志波, 王智. 一种无线网络中移动信标节点检测及定位虫洞攻击的方法. 授权, 2017.(专利号:ZL201410030021.8) [11].陈鸿龙, 马国蕾, 李晓辉, 田力丹. 一种基于跳跃式查询的被动式三维射频识别定位方法. 授权, 2016,(专利号:ZL201510319895.X) [12].陈鸿龙, 田力丹, 王志波, 马国蕾, 连雪. 一种容迟网络中基于期望会面节点数的路由方法. 授权, 2016, (专利号:ZL201510560533X). [13].陈鸿龙, 王志波, 王智. 一种移动自组织网络中能量有效的异步邻节点发现方法. 授权, 2014. (专利号:ZL201310628248.8) [14].王智, 王志波, 孙喜策, 李安, 陈鸿龙. 一种基于混合簇的无线传感器网络移动目标跟踪方法. 授权, 2013. (专利号:ZL200910155053.X) | ||