控制科学与工程 学科 陈鸿龙 导师信息

作者:发布者:田甜发布时间:2018-02-11浏览次数:10075

点击查看原图陈鸿龙,副教授,博士生导师

自动化系(系副主任兼支部书记)

通信地址:青岛市黄岛区长江西路66号信息与控制工程学院,邮编:266580

联系电话:0532-86983472                 Fax:  0532-86981335

Email: chenhl@upc.edu.cnhonglongchen1984@gmail.com


教育背景

201511-201611月,美国亚利桑那州立大学,博士后

20092-20128月,香港理工大学电子计算学系,博士

20069-200812月,浙江大学控制系,硕士

20029-20067月,kaiyun体育登录网页入口(华东)自动化系,学士

工作背景

2018年7月至今,kaiyun体育登录网页入口(华东)自动化系,副教授,博士生导师

20151月至今,kaiyun体育登录网页入口(华东)自动化系,副教授,硕士生导师

20129-201412月,kaiyun体育登录网页入口(华东)自动化系,讲师

20147-8月,香港理工大学电子计算学系,高级研究助理

200712-20089月,香港理工大学电子计算学系,研究助理

学术兼职

IEEE会员,ACM会员,CCF高级会员,CCF网络与数据通信专委会委员,CCF物联网专委会通信委员,目前担任国际期刊IEEE ACCESSSCI二区,影响因子3.557)编委,担任Journal of Computer Networks and Communications客座编委担任IEEE Communications Magazine, IEEE Internet of Things Journal, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Vehicular Technology, IEEE Transactions on Systems, Man and  Cybernetics: Systems, IEEE Transactions on Industrial Informatics等二十多个SCI检索国际期刊审稿人。

研究方向

1. 物联网

2. 无线传感器网络

3. 移动自组织网络

4. 安全与隐私保护

5. RFID

6. UAV

公司产品

已毕业研究生:

2015届:杨玉斌*

2018届:马国蕾

2019届:丁鑫旺,付金楠,林凯,刘璐

在读研究生:

2017:王帅,秦雨婷,艾欣,刘东永,李宪敏

2018级:李哲,张栋,刘国桢,代天骄,王筑*

2019级:林凯(博士),黄杨,倪志琛,刘德强,梁丰

每年计划招收博士生1名,研究生3-4名,欢迎具有科研热情、学习能力强、数学和英语基础扎实的自动化和计算机等相关专业员工报考。

注:*协作指导

研究项目

  [1] 面向大规模RFID系统的标签安全监测关键技术研究,国家自然科学基金面上项目,2018.01-2021.12No. 6177255163万,主持

  [2] 大规模物联网关键技术研究,kaiyun体育登录网页入口(华东)自主创新科研计划项目优青培育项目,2018.01-2020.12No. 18CX07003A20万,主持

  [3] 基于帧时隙ALOHA的大规模RFID系统标签监测及其安全与隐私保护研究,山东省重点研发计划项目,2018.01-2019.12,No. 2018GGX101035,20万,主持

  [4] 大规模RFID系统的丢失标签检测与识别技术研究,山东省计算机网络重点实验室开放课题,2019.01-2020.12,No. SDKLCN-2018-06,2万,主持

  [5] 资源受限容迟网络的多层协议研究与设计,国家自然科学基金青年基金,2014.01-2016.12No. 6130902323万,主持,已结题

  [6] 针对虫洞攻击的无线传感器网络安全定位方法的研究,山东省自然科学基金青年基金,2013.10-2016.10No. ZR2013FQ0325万,主持,已结题

  [7] 物联网跨层信息安全与隐私保护研究,山东省重点研发计划项目,2015.07-2017.07No. 2015GGX10104520万,主持,已结题

  [8] 面向资源受限的移动自组织网络信息安全与隐私保护研究,青岛市科技计划项目,2015.09-2017.09No. 15-9-1-79-jch5万,主持,已结题

  [9] kaiyun体育登录网页入口(华东)青年骨干教师人才建设工程, 2014-20178万,主持,已结题

  [10] 基于非加密技术的资源受限物联网安全问题研究,kaiyun体育登录网页入口(华东)自主创新计划项目延续资助,2016.01-2017.126万,主持,已结题

  [11] 资源受限的容迟网络系统理论研究,kaiyun体育登录网页入口(华东)自主创新计划项目,2013.01-2014.12No. 13CX02100A8.8万,主持,已结题

  [12] 基于车载网的媒体报文信息分发机制,浙江省可视媒体智能处理技术研究重点实验室开放课题,2013.01-2013.12No. 20120081万,主持,已结题

  [13] 针对虫洞攻击的无线传感器网络安全定位技术,kaiyun体育登录网页入口(华东)科研启动基金项目,2013.01-2015.123万,主持,已结题

  [14] 面向自动化拔尖人才的基于物联网技术创新型综合实验课程教学模式的研究与探索,kaiyun体育登录网页入口(华东)青年教改项目,2014.09-2016.090.5万,主持,已结题

学术成果与获奖

本人长期从事无线传感器网络、容迟网络和移动自组织网络等方向的研究,获得多项国家级及省部级的项目资助,目前已授权国家发明专利9项,已发表论文50余篇,包括无线网络领域国际权威期刊IEEE Internet of Things Journal, IEEE Transactions on Mobile Computing, IEEE Transactions on Vehicular Technology, IEEE Transactions on Emerging Topics in Computing等和国际权威会议IEEE INFOCOM, IEEE ICPP, ACM Sensys等,于2014年入选kaiyun体育登录网页入口(华东)青年骨干教师人才建设工程和黄岛区“智岛计划”紧缺人才。已发表论文和申请专利如下:

Journal Papers

[1].Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi and Lianhai Wang.Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. In IEEE Access, 2019. (SCI二区)

[2].Leyi Shi, Yang Li, Tianxu Liu, Jia Liu, Baoying Shan, and Honglong Chen*, Dynamic Distributed Honeypot Based on Blockchain. In IEEE Access, 2019. (SCI二区)

[3].Xuxin Zhang, Honglong Chen*, Kai Lin, Zhibo Wang, Jiguo Yu, and Leyi Shi. RMTS: A Robust Clock Synchronization Scheme for Wireless Sensor Networks. In Journal of Network and Computer Applications, 2019. (SCI二区, Top)

[4].Honglong Chen, Wei Lou, Zhibo Wang, and Feng Xia. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. In IEEE Transactions on Emerging Topics in Computingvol. 6, no. 5, pp. 553-565, 2018. (SCI二区)

[5].Honglong Chen, Lu Liu, Rongjie Che, Kai Lin, Xin Ai, and Yanjun Li. On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems. In IEEE Access, 2018, vol. 6, pp.57095-57104(SCI二区)

[6].Kai Lin, Honglong Chen*, Tianjiao Dai, Denghui Liu, Lu Liu, and Leyi Shi.Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags. In IEEE Access, 2018, vol. 6, pp.54435-54446(SCI二区)

[7].Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, and Jiguo Yu. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9947-9958, Oct. 2018. (SCI二区)

[8].Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, and Leyi Shi. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. In IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2915-2926, Aug. 2018. (SCI一区, Top)

[9].Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu. Probabilistic Detection of Missing Tags for Anonymous Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technologyvol. 66, pp. 11295-11305, Dec. 2017(SCI二区)

[10].Honglong Chen, Guoliang Xue, and Zhibo Wang. Efficient and Reliable Missing Tags Identification for Large-Scale RFID Systems with Unknown Tags. In IEEE Internet of Things Journal, vol. 4, pp.736-748, 2017. (SCI一区, Top)

[11].Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, and Xiangyuan Jiang. Efficient 3-Dimensional Localization for RFID Systems Using Jumping Probe. In Elsevier Pervasive and Mobile Computing, vol. 41, pp. 300-318, Oct. 2017. (SCI三区)

[12].Honglong Chen, Wei Lou, Zhibo Wang, and Qian Wang. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. In IEEE Transactions on Vehicular Technology,vol. 65, pp.6377-6388, 2016. (SCI二区)

[13].Honglong Chen, and Wei Lou. Contact Expectation Based Routing for Delay Tolerant Networks. In Elsevier Ad Hoc Networks, vol. 36, pp.244-257, 2016. (SCI三区)

[14].Honglong Chen, Wei Lou, and Zhi Wang. On Providing Wormhole Attack Resistant Localization Using Conflicting Sets.In Wiley Wireless Communications and Mobile Computing, vol. 15, pp.1865-1881, 2015.(SCI四区)

[15].Honglong Chen, and Wei Lou. On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing, vol. 16, pp.36-50, 2015.(SCI三区)

[16].Honglong Chen, Wei Lou, Junfeng Wu, Zhibo Wang, Zhi Wang, and Aihua Xia. Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor NetworksIn Elsevier Pervasive and Mobile Computing. vol. 16, pp. 22-35, Jan. 2015(SCI三区)

[17].Honglong Chen, and Wei Lou. GAR: Group Aware Cooperative Routing Protocol for Resource-Constraint Opportunistic Networks. In Elsevier Computer Communications, vol. 48, pp.20-29, 2014. (SCI三区)

[18].Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, and Yanjun Li. Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. In International Journal of Distributed Sensor Networks. 2014. (SCI四区)

[19].Honglong Chen, Wei Lou, Xice Sun, and Zhi Wang. A secure localization approach against wormhole attacks using distance consistency. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 627039, 11 pages, 2010. doi:10.1155/2010/627039. (SCI四区)

[20].Honglong Chen, Wei Lou, and Zhi Wang. A Novel Secure Localization Approach in Wireless Sensor Networks. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 981280, 12 pages, 2010. doi:10.1155/2010/981280.(SCI四区)

[21].陈鸿龙,王志波,王智,许江铭,李燕君,刘丽萍针对虫洞攻击的无线传感器网络安全定位方法通信学报. 2015. (EI)

[22].陈鸿龙李鸿斌,王智基于TDoA测距的传感器网络安全定位研究通信学报, 2008. (EI)

[23].陈鸿龙,李宪敏,代天骄,孙良. 基于RFID反向散射的标签定位实验平台. 实验技术与管理,2019.(核心期刊教改论文)

[24].陈鸿龙涂玲孙良邓晓刚基于无线传感器网络的抽油机监控实验系统实验技术与管理, 2014. 心期刊教改论文)

[25].陈鸿龙杨玉斌田力丹马国蕾李晓辉基于物联网的抽油机群远程监控实验平台实验技术与管理, 2016. (核心期刊教改论文)

[26].Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang, Yanjun Li, and Honglong Chen. When Mobile Crowdsensing Meets Privacy. Accepted to appear in IEEE Communications Magazine, 2019. (SCI一区, Top)

[27].Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei, Honglong Chen, and Xiaoguang Niu. Task Bundling Based Incentive for Location-dependent Mobile Crowdsourcing. In IEEE Communications Magazine, 2019, 57(2), pp. 54-59. (SCI一区, Top)

[28].Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajia Shao, Qian Wang, Libing Wu, Honglong Chen, and Hairong Qi. Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server. Accepted to appear in IEEE Transactions on Mobile Computing, 2018. (SCI二区,CCF A)

[29].Chuanwen Luo, Jiguo Yu, Deying Li, Honglong Chen, Yi Hong, Lina NiA Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks. In Computer Networks, 2018, 146, pp.104-114 (SCI三区, CCF B)

[30].Noor Ullah, Xiangjie Kong, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia. A Social Utility-Based DisseminationScheme for Emergency WarningMessages in Vehicular SocialNetworks. In The Computer Journal, 2018, 61 (7), pp.971-986(SCI四区,CCF B)

[31].Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman, Honglong Chen, Lina Ni. CRPD: a novel clustering routing protocol for dynamic wireless sensor networks. In Personal and Ubiquitous Computing, 2018, 22 (3), pp.545-559(SCI 三区)

[32].Yanjun Li, Kaikai Chi, Honglong Chen, Zhibo Wang, Yihua Zhu.Narrowband Internet of Things Systems with Opportunistic D2D Communication. In IEEE Internet of Things Journal, 2018, 5 (3), pp.1474-1484.(SCI一区, Top)

[33].Behrouz Jedari, Feng Xia, Honglong Chen, Sajal K. Das, Amr Tolba, Zafer AL-Makhadmeh. A Social-based Watchdog System to Detect Selfish Nodes in Opportunistic Mobile Networks. In Elsevier Future Generation Computer Systems, 2018. (SCI二区)

[34].Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen, Qian Wang. Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks. InElsevier Ad Hoc Networks, 2017.(SCI三区)

[35].Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, Qian Wang. Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks. In Computer Networks, 2017. (SCI三区, CCF B)

[36].Baogui Huang, Jiguo Yu, Xiuzhen Cheng, Honglong Chen, Hang Liu. SINR based shortest link scheduling with oblivious power control in wireless networks. In Journal of Network and Computer Applications, 2017. (SCI二区, Top)

[37].Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li, Hongbin Li and Jie Shen. HierTrack: An Energy Efficient Cluster-based Target Tracking System for Wireless Sensor Networks. In Journal of Zhejiang University - Science C, 2013.(SCI四区)

[38].Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma and Honglong Chen. HCTT: A Hybrid Cluster-based Target Tracking Protocol for Wireless Sensor Networks. In International Journal of Distributed Sensor Networks. 2013.(SCI四区)

[39].Yu Chen, Weiwei Wang, Honglong Chen, Xiangcui Kong, and Jingjing Chen. Parameter Characteristics of Gauss-Markov Mobility Model in Mobile Wireless Sensor Networks. Accepted to appear in Ad Hoc and Sensor Wireless Networks. 2015. (SCI四区)

[40].Leyi Shi, Yuwen Cui, Han Xu, Honglong Chen, Deli Liu. Mimicry honeypot: an evolutionary decoy system. Accepted to appear in International Journal of High Performance Computing and Networking. 2017. (EI)

[41].石乐义崔玉文付文静陈鸿龙一种分簇无线传感网轻量级匿名认证及密钥协商方案北京邮电大学学报. 2018. EI

[42].李燕君胡绍利迟凯凯陈鸿龙面向家庭健康监护的传感网中继节点部署方法仪器仪表学报. 2015. (EI)

[43].石乐义贾聪宫剑刘昕陈鸿龙基于共享秘密的伪随机散列函数RFID双向认证协议电子与信息学报. 2015. (EI)

[44].曹玉苹邓晓刚田学民陈鸿龙数据驱动的抽油机井实时故障诊断实验平台实验技术与管理. 2015. (核心期刊教改论文)  

Conference Papers

[1].Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang, Honglong Chen and Qian Wang. Pay On-demand: Dynamic Incentive and Task Selection for Location-dependent Mobile Crowdsensing Systems, in Proceedings of IEEE ICDCS, 2018. (CCF B)

[2].Zhibo Wang, Yongquan Zhang, Honglong Chen, Zhetao Li, Feng Xia. Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks, in Proceedings of IEEE INFOCOM,pp.1304-1312, 2018. (CCF A)

[3].Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, and Zhi Wang. Fault Tolerant Barrier Coverage for Wireless Sensor Networks, in Proceedings of IEEE INFOCOM, 2014.  (Acceptance ratio: 320/1645=19.4%) (CCF A)

[4].Honglong Chen and Wei Lou. Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs, in Proceedings ofIEEE ICCCN, 2013. (CCF C)

[5].Honglong Chen and Wei Lou, Group Aware Cooperative Routing for Opportunistic Networks under Resource Constraints, in Proceedings of IEEE GLOBECOM, 2012. (CCF C)

[6].Honglong Chen and Wei Lou, On Using Contact Expectation for Routing in Delay Tolerant Networks, in Proceedings of the 40th IEEE International Conference on Parallel Processing (IEEE ICPP), Taiwan, September, 2011. (Acceptance ratio: 81/363=22.3%) (CCF B)

[7].Honglong Chen, Wei Lou and Zhi Wang, Secure Localization Against Wormhole Attacks Using Conflicting Sets, in Proceedings of the 29th IEEE International Performance Computing and Communications Conference (IEEE IPCCC), Albuquerque, USA, December 2010. (Acceptance ratio: 36/127=28.3%) (CCF C)

[8].Honglong Chen and Wei Lou, From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks, in Proceedings of the 29th IEEE International Performance Computing and Communications Conference (IEEE IPCCC), Albuquerque, USA, December 2010. (Acceptance ratio: 36/127=28.3%)  (CCF C)

[9].Honglong Chen, Wei Lou and Zhi Wang, Consistency-Based Secure Localization Against Wormhole Attacks in Wireless Sensor Networks, in Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA), Boston, USA, Aug., 2009.

[10].Honglong Chen, Wei Lou and Zhi Wang, Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks, in Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing (UIC), Brisbane, Australia, July 7-9, 2009. (CCF C)

[11].Honglong Chen, Wei Lou, Junchao Ma and Zhi Wang, TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks, in Proceedings of the Second International Conference on Sensor Technologies and Applications (IEEE SENSORCOMM):661-666, Cap Esterel, France, August 25-31, 2008.

[12].Lianfang Cai, Xuemin Tian, and Honglong ChenNonlinear Process Fault Diagnosis Using Kernel ICA and Improved FDA, in Proceedings of the 11th IFAC International Workshop on Adaptation and Learning in Control and Signal Processing, 2013.

[13].Weiming Shao, Xuemin Tian, and Honglong ChenAdaptive Anti-Over-Fitting Soft Sensing Method Based on Local Learning, in Proceedings of the 10th IFAC International Symposium on Dynamics and Control of Process Systems, 2013.

[14].Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li and Hongbin Li. Demo Abstract: An Energy-efficient Target Tracking System for Wireless Sensor Networks, in Proceedings of ACM Sensys, 2011.

[15].Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma and Honglong Chen, A Novel Mobility Management Scheme for Target Tracking in Cluster-based Sensor Networks, in Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS), 2010.

[16].Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang and Zhi Wang, Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, in Proceedings of IEEE International Conference on Networking, Architecture, and Storage (IEEE NAS), 2010.

[17].Xice Sun, Zhi Wang, Honglong Chen and Wei Lou, A Probabilistic Model for lifetime measurement in privacy-aware sensor networks, in Proceedings of IEEE International Conference on Wireless Communications and Signal Processing (IEEE WCSP), 2009.

国家发明专利

[1].艾欣,陈鸿龙,林凯,代天骄,王志波,石乐义. 基于SHZE的大规模分组RFID系统的丢失标签冰山查询方法. 授权,2019. (专利号:ZL2018111396829

[2].杨黎鹏,车荣杰,梅刚,张千昌,孙延波,戴群,关晓龙,陈鸿龙,代天骄.基于SZE的大规模分组RFID系统的丢失标签冰山查询方法.授权,2019.(专利号:ZL2018111396636)

[3].陈鸿龙,马国蕾,丁鑫旺,林凯,刘璐,石乐义匿名分组RFID系统的丢失标签检测方法授权,2018.(专利号:ZL2016109093848

[4].陈鸿龙,付金楠,丁鑫旺,刘璐,林凯,王志波,石乐义匿名射频识别系统基于向量的丢失关键标签的识别方法.授权,2018.(专利号:ZL2017109913150

[5].陈鸿龙,林凯,刘璐,付金楠,丁鑫旺,石乐义含有未知标签的射频识别系统的丢失标签识别方法授权,2018.(专利号:2017103117839

[6].陈鸿龙,杨黎鹏,车荣杰,丁鑫旺,付金楠,林凯,刘璐,石乐义匿名多组射频识别系统的丢失标签非确定性并行检测方法授权,2018. (专利号:ZL2017102965559

[7].陈鸿龙王志波王智一种无线网络中移动信标节点检测及定位虫洞攻击的方法授权, 2017.(专利号:ZL201410030021.8)

[8].陈鸿龙马国蕾李晓辉田力丹一种基于跳跃式查询的被动式三维射频识别定位方法授权, 2016,(专利号:ZL201510319895.X

[9].陈鸿龙田力丹王志波马国蕾连雪一种容迟网络中基于期望会面节点数的路由方法授权, 2016, (专利号:ZL201510560533X).

[10].陈鸿龙王志波王智一种移动自组织网络中能量有效的异步邻节点发现方法授权, 2014. (专利号:ZL201310628248.8)

[11].王智王志波孙喜策李安陈鸿龙一种基于混合簇的无线传感器网络移动目标跟踪方法授权, 2013. (专利号:ZL200910155053.X)

其他

实验教学平台