安徽师范大学计算机与信息学院院长,罗永龙

罗永龙,男,1972年生,安徽太湖人,博士,二级教授,博士生导师,安徽省学术和技术带头人,现任安徽师范大学计算机与信息学院院长,网络与信息安全安徽省重点实验室主任安徽省计算机学会常务理事,安徽省信息化专家咨询委员会委员。

中文名

罗永龙

国    籍

出生日期

1972年毕业院校

中国科学技术大学

职    业

教师

出生地

安徽太湖

罗永龙人物经历

编辑

语音

1994年本科毕业于安徽师范大学计算机系并留校任教,

2005年博士毕业于中国科学技术大学计算机系,获工学博士学位,随后在中国科学技术大学从事博士后研究,

2008年博士后出站,

2007年破格晋升教授职务,

2010年遴选为博士生导师,

2015年入选安徽省学术和技术带头人,

2017年入选安徽省专业技术二级岗位。[1]

罗永龙研究方向

编辑

语音

信息安全、空间数据处理[1]

罗永龙主讲课程

编辑

语音

本科生课程:数据结构、操作系统、程序设计等

研究生课程:算法设计与分析、信息安全进展等[1]

罗永龙获奖荣誉

编辑

语音

2006年获中国科学院院长奖

2008年安徽省杰出青年基金(原优秀青年基金)获得者

2011年安徽省第三届优秀硕士学位论文指导教师

2014年获教育部自然科学奖二等奖(排名3)

2015年获安徽省优秀教学成果奖二等奖(排名1)[1]

罗永龙科研项目

编辑

语音

[1]国家自然科学基金面上项目,61972439,基于多源轨迹的路网感知语义模型构建及个性化推荐方法研究,2020/01 -2023/12,主持

[2]国家自然科学基金面上项目,61672039,基于位置服务的地理社交网络模型构建及隐私保护方法研究,2017/01 -2020/12,主持

[3] 国家自然科学基金面上项目,61370050,面向隐私保护的空间数据处理方法与技术研究,2014/01- 2017/12,主持

[4] 国家自然科学基金青年基金项目,60703071,可信计算中基于隐私数据的信息共享技术研究,2008/01- 2010/12,主持

[5] 安徽省高校学科(专业)拔尖人才学术资助重点项目,gxbjZD2016011, 2016/01 -2018/12,主持

[6] 安徽省杰出青年基金(原优秀青年基金)项目,08040106806,安全计算及其应用,2008/01-2010/12,主持

[7] 中国科学院院长奖获得者科研启动基金项目,中科院人教(2006)272号文件,高效安全多方计算协议及其应用研究,2007/01-2009/12,主持

[8] 安徽省自然科学基金项目,070412043,安全多方计算基础协议及其应用研究,2007/01-2009/12,主持

[9] 中国博士后科学基金项目,20060390700,实用安全多方计算技术及其应用,2006/01-2008/12,主持[1]

罗永龙代表论文

编辑

语音

[1] Qingying Yu, Yonglong Luo*, Chuanming Chen, Shigang Chen. Trajectory similarity clustering based on multi-feature distance measurement[J]. Applied Intelligence, 2019, 49(6): 2315-2338. (SCI, CCF推荐期刊)

[2] Jie Cui, Mingjun Wang, Yonglong Luo, Hong Zhong. DDoS detection and defense mechanism based on cognitive-inspired computing in SDN[J]. Future Generation Computer Systems, 2019, 97: 275-283. (SCI, CCF推荐期刊)

[3] Chuanming Chen, Yonglong Luo*, Qingying Yu, Guiyin Hu. TPPG: Privacy-preserving Trajectory Data Publication Based on 3D-Grid Partition[J]. Intelligent Data Analysis, 2019, 23(3): 503-533. (SCI, CCF推荐期刊)

[4] Liangmin Guo, Jiakun Liang, Yin Zhu, Yonglong Luo, Liping Sun, Xiaoyao Zheng, Collaborative filtering recommendation based on trust and emotion[J]. Journal of Intelligent Information Systems,2019, 53(1): 113-135. (SCI, CCF推荐期刊)

[5] Liping Sun, Shuting Bao, Shang Ci, Xiaoyao Zheng, Liangmin Guo, Yonglong Luo*. Differential Privacy-Preserving Density Peaks Clustering Based on Shared Near Neighbors Similarity[J]. IEEE Access, 2019, 7: 89427-89440. (SCI)

[6] Xiaoyao Zheng, Yonglong luo*, Liping Sun, Xintao Ding, Ji Zhang. A Novel Social Network Hybrid Recommender System Based on Hypergraph Topologic Structure[J]. World Wide Web, 2018, 21(4):985-1013. (SCI, CCF推荐期刊)

[7] Qingying Yu, Yonglong Luo*, Chuanming Chen, Xiaohan Wang. Trajectory outlier detection approach based on common slices sub-sequence[J], Applied Intelligence, 2018, 48(9):2661-2680. (SCI, CCF推荐期刊)

[8] Wang Xiaohan; Luo Yonglong*; Jiang Yefeng; Wu Wenli; Yu Qingying, Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection[J]. Intelligent Data Analysis , 2018, 22(6): 1415-1437. (SCI, CCF推荐期刊)

[9] Xiaoyao Zheng, Yonglong luo*, Liping Sun, Ji Zhang, Fulong Chen. A tourism destination recommender system using users’ sentiment and temporal dynamics, Journal of Intelligent Information Systems, 2018, 51(3):557-578. (SCI, CCF推荐期刊)

[10] Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang. An infrastructure framework for privacy protection of community medical internet of things[J]. World Wide Web,2018, 21(1):33-57. (SCI, CCF推荐期刊)

[11] Liangmin Guo, Guiyin Hu, Yan Dong, Yonglong Luo, Ying Zhu. A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints. IEEE Access 2018, 6: 4664-4676. (SCI)

[12] Taochun Wang, Xiaolin Qin, Youwei Ding, Liang Liu, Yonglong Luo. Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks. Wireless Personal Communications, 2018, 98(1): 665-684. (SCI)

[13] Ji Zhang, Leonard Tan, Xiaohui Tao, Xiaoyao Zheng, Yonglong Luo, Jerry Chun-Wei Lin. SLIND: Identifying Stable Links in Online Social Networks[C]// International Conference on Database Systems for Advanced Applications. Gold Coast, Australia, 2018:813-816. (EI, CCF推荐会议).

[14] Ji Zhang*, Lafta Raid Luaibi, Xiaohui Tao , Yan Li ,Fulong Chen, Yonglong Luo*, Xiaodong Zhu . Coupling a Fast Fourier Transformation with a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment[J]. IEEE Access. 2017, 5(1): 10674 - 10685. (SCI)

[15] Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong. A method for service evaluation based on fuzzy theory for cloud computing[J]. KSII Transactions on Internet and Information Systems, 2017, 11(4): 1820-1840. (SCI)

[16] Ji Zhang, Hongzhou Li, Xuemei Liu, Yonglong Luo*, Fulong Chen, Hua Wang. On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information[J]. IEEE Transactions on Dependable and Secure Computing, 2017, 14(5): 507-520. (SCI, CCF推荐期刊)

[17] Xintao Ding, Yonglong Luo, Qingying Yu, Qingde Li, Yongqiang Cheng, Robert Munnoch, Dongfei Xue, Guorong Cai. Indoor object recognition using pre-trained convolutional neural network. ICAC 2017: 1-6. (EI)

[18] Meixuan Li, Yu-e Sun, He Huang, Jing Yuan, Yang Du, Yu Bao, Yonglong Luo. Profit maximization resource allocation in cloud computing with performance guarantee. IPCCC 2017: 1-2. (EI, CCF推荐会议)

[19] Raid Lafta, Ji Zhang, Xiaohui Tao, Yan Li, Wessam Abbas, Yonglong Luo, Fulong Chen, Vincent S. Tseng. A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset. PAKDD (1) 2017: 654-670. (EI, CCF推荐会议)

[20] Taochun Wang, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding. An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs. TrustCom/BigDataSE/ICESS 2017: 433-440. (EI, CCF推荐会议)

[21] Liping Sun, Jun Liu, Xiaoyao Zheng, Yonglong Luo*. An Efficient and Adaptive Method for Overlapping Community Detection in Real-World Networks. Chinese Journal of Electronics, 2017. (Accepted, SCI)

[22] Guiyin Hu, Yonglong Luo*, Xintao Ding, Liangmin Guo, Biao Jie, Xiaoyao Zheng, Guorong Cai. Alignment of Grid Points[J]. Optik - International Journal for Light and Electron Optics. 2017, 131(2): 279-286. (SCI)

[23] Qingying Yu, Yonglong Luo*, Chuanming Chen, Xintao Ding. Outlier-eliminated k-means Clustering Algorithm based on Differential Privacy Preservation[J]. Applied Intelligence, 2016, 45(4): 1179-1191. (SCI, CCF推荐期刊)

[24] Qingying Yu, Yonglong Luo*, Chuanming Chen, Weixin Bian. Neighborhood relevant outlier detection approach based on information entropy[J], Intelligent Data Analysis, 2016, 20(6): 1247-1265. (SCI, CCF推荐期刊)

[25] Xiaoyao Zheng, Yonglong Luo*, Zhiyun Xu, Qingying Yu, Lin Lu. Tourism Destination Recommender System for the Cold Start Problem[J]. KSII Transactions on Internet and Information Systems, 2016, 10(7): 3192-3212.(SCI)

[26] Raid Lafta, Ji Zhang, Xiaohui Tao, Yan Li, Vincent S. Tseng, Yonglong Luo, Fulong Chen. An intelligent recommender system based on predictive analysis in telehealthcare environment. Web Intelligence, 2016,14(4): 325-336.(SCI, CCF推荐期刊)

[27] Hongzhou Li, Ji Zhang, Yonglong Luo, Fulong Chen, Liang Chang. GO-PEAS: A Scalable Yet Accurate Grid-Based Outlier Detection Method Using Novel Pruning Searching Techniques. ACALCI 2016: 125-133. (EI)

[28] Xintao Ding, Yonglong Luo*, Yunyun Yi, Biao Jie, Taochun Wang, Weixin Bian. Orthogonal design for scale invariant feature transform optimization [J]. Journal of Electronic Imaging, 2016, 25(5): 053030-1 – 053030-12 (SCI)

[29] Xiaoyao Zheng, Yonglong luo*, Liping Sun, Fulong Chen. A New Recommender System Using Context Clustering Based on Matrix Factorization Techniques[J]. Chinese Journal of Electronics, 2016, 25(2): 334-340.(SCI)

[30] Ji Zhang, Hongzhou Li, Qigang Gao, Hai Wang, Yonglong Luo*. Detecting anomalies from big network traffic data using an adaptive detection approach[J]. Information Sciences, 2015, 318: 91-110. (SCI, CCF推荐期刊)

[31] Liping Sun, Yonglong Luo*, Xiaoyao Zheng, Jun lv. Gravitational inspired spectral clustering with constraint[J]. Chinese Journal of Electronics,2015,24(3):487-491.(SCI)

[32] Liping Sun, Yonglong Luo*, Xintao Ding, Ji Zhang. A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications[J]. Computational Intelligence and Neuroscience, 2014, 11 pages.(SCI)

[33] Weixin Bian, Yonglong Luo, DeqinXu, Qingying Yu. Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables[J]. Pattern Recognition, 2014, 47(10): 3304-3313. (SCI, CCF推荐期刊)

[34] Xintao Ding, Yonglong Luo*, Liping Sun, Fulong Chen. Color balloon snakes for face segmentation[J].Optik-International Journal for Light and Electron Optics, 2014, 125(11): 2538-2542.(SCI)

[35] Xintao Ding, Liping Sun, Yonglong Luo*.Shell histogram equalization of color images[J]. Optik-International Journal for Light and Electron Optics, 2014,125(13): 350-3354.(SCI)

[36] Xintao Ding, KunWang, Biao Jie, Yonglong Luo, ZhenhuaHu, Jie Tian. Probability method for Cerenkov luminescence tomography based on conformance error minimization[J]. Biomedical Optics Express, 2014, 5(7): 2091-2112.(SCI)

[37] Chuanxin Zhao, Yonglong Luo, Fulong Chen, Ji Zhang, Ruchuan Wang. Energy Effective Congestion Control for Multicast with Network Coding in Wireless Ad Hoc Network[J]. Mathematical Problems in Engineering, 2014, 12 pages.(SCI)

[38] Ji Zhang, Xuemei Liu, Yonglong Luo*. An efficient and robust privacy protection technique for]massive streaming choice-based information[C]. Proceedings of the 22nd ACM international conference on Conference on information & knowledge management(CIKM). ACM, 2013, 1169-1172. (EI, CCF推荐会议)

[39]Yonglong Luo, Liusheng Huang, Wei Yang, Weijiang Xu. An Efficient Protocol for Private Comparison Problem[J]. Chinese Journal of Electronics,2009, 18(2): 205-209.(SCI)

[40]Yonglong Luo, Liusheng Huang, Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem[J]. Journal of Computer Science and Technology,2007,22(1): 88-91. (SCI, CCF推荐期刊)

[41]罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报, 2007, 30(2): 248-]254.(EI)

[42]罗永龙,黄刘生,荆巍巍,徐维江,陈国良.一个保护私有信息的多边形相交判定协议[J].电子学报, 2007, 35(4) : 685-691.(EI)

[43]Yonglong Luo, Liusheng Huang, Hong Zhong, Guoliang Chen. A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon[J]. Chinese Journal of Electronics,2006,15(4): 578-582.(SCI)

[44]Yonglong Luo, Liusheng Huang, Guoliang Chen, Hong Shen. Privacy-Preserving Distance Measurement and Its Applications[J]. Chinese Journal of Electronics,2006,15(2): 237-241.(SCI)

[45]罗永龙,黄刘生,徐维江,荆巍巍.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3): 410-416.(EI)

[47]罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护隐私的布尔关联规则挖掘算法[J].电子学报, 2005,33(5): 900-903.(EI)[1]

罗永龙发明专利

编辑

语音

[1] 罗永龙, 乔云峰, 刘飞, 丁新涛, 陈付龙. 一种基于模糊控制的信任评估系统构建方法,发明专利, ZL201410235751.1

[2] 罗永龙, 乔云峰, 刘莹, 刘飞, 孙丽萍. 一种基于模糊过滤的信任评估方法, 发明专利, ZL201410235773.8

[3] 罗永龙, 刘飞, 马苑, 陈付龙, 郭良敏, 左开中. 一种动态信任模型构建系统,发明专利, ZL201310130319.1

[4] 罗永龙, 刘飞, 马苑, 左开中, 陈付龙, 郭良敏, 孙丽萍. 一种基于隐私保护的信任评估系统及其构建方法, 发明专利, ZL201310469909.7

[5] 罗永龙, 陈蔡霞. 一种基于点积协议的协议安全性量化方法及系统, 发明专利, ZL201010194265.1[1]

百度百科内容由网友共同编辑,如您发现自己的词条内容不准确或不完善,欢迎使用本人词条编辑服务(免费)参与修正。立即前往>>

词条图册

更多图册

参考资料

1.

罗永龙个人主页

.安徽师范大学计算机与信息学院[引用日期2018-09-07]

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值