罗永龙

发布人:王正东
发布日期:2018-03-05
浏览次数:2924

联系方式

 

电话: 05535910645

E-mail: ylluo@ustc.edu.cn

 

主要研究方向

 

信息安全、空间数据处理

 

个人简介

 

罗永龙,男,1972年生,安徽太湖人,博士,二级教授,博士生导师,安徽省学术和技术带头人。现任安徽师范大学计算机与信息学院院长,网络与信息安全安徽省重点实验室主任。安徽省计算机学会常务理事,安徽省信息化专家咨询委员会委员。

1994年本科毕业于安徽师范大学计算机系并留校任教,2005年博士毕业于中国科学技术大学计算机系,获工学博士学位,随后在中国科学技术大学从事博士后研究,2008年博士后出站。2007年破格晋升教授职务,2010年遴选为博士生导师,2015年入选安徽省学术和技术带头人,2017年入选安徽省专业技术二级岗位。

 

主要讲授课程

 

本科生课程:数据结构、操作系统、程序设计等

硕士生课程:算法设计与分析、信息安全进展等

 

获奖和荣誉

(1) 2006年获中国科学院院长奖

(2) 2008年安徽省杰出青年基金(原优秀青年基金)获得者

(3) 2011年安徽省第三届优秀硕士学位论文指导教师

(4) 2014年获教育部自然科学奖二等奖(排名3

(5) 2015年获安徽省优秀教学成果奖二等奖(排名1


主持的部分课题 

[1] 国家自然科学基金面上项目,61672039,基于位置服务的地理社交网络模型构建及隐私保护方法研究,2017/01 -2020/1264万元,主持人

[2] 国家自然科学基金面上项目,61370050,面向隐私保护的空间数据处理方法与技术研究,2014/01- 2017/1273万元,主持人

[3] 国家自然科学基金青年基金项目,60703071,可信计算中基于隐私数据的信息共享技术研究,2008/01- 2010/1220万元,主持人

[4] 安徽省高校学科(专业)拔尖人才学术资助重点项目,gxbjZD2016011, 2016/01 -2018/1210万元,主持人

[5] 安徽省杰出青年基金(原优秀青年基金)项目,08040106806,安全计算及其应用,2008/01-2010/1215万元,主持人

[6] 中国科学院院长奖获得者科研启动基金项目,中科院人教(2006272 号文件,高效安全多方计算协议及其应用研究,2007/01-2009/1210 万元,主持人

[7] 安徽省自然科学基金项目,070412043,安全多方计算基础协议及其应用研究,2007/01-2009/125万元,主持人

[8] 中国博士后科学基金项目,20060390700,实用安全多方计算技术及其应用,2006/01-2008/123万元,主持人

 

主要论著

代表性论文如下:[DBLP]

[1]  Ji Zhang, Hongzhou Li,Xuemei Liu, Yonglong Luo*, Fulong Chen, Hua Wang.On efficient and robust anonymization for privacy protection on massive streaming categorical information[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(5): 507-520 (SCI)

[2]  Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong. A method for service evaluation based on fuzzy theory for cloud computing[J]. KSII Transactions on Internet and Information Systems, 2017, 11(4): 1820-1840. (SCI)

[3]  Liping Sun, Jun Liu, Xiaoyao Zheng, Yonglong Luo*. An Efficient and Adaptive Method for Overlapping Community Detection in Real-World Networks. Chinese Journal of Electronics, 2017. (Accepted)

[4]  Xiaohan Wang, Yonglong Luo*, Yefeng Jiang, Wenli Wu, Qingying Yu. Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection[J]. Intelligent Data Analysis, 2017. (Accepted)

[5]  Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang. An infrastructure framework for privacy protection of community medical internet of things[J]. World Wide Web, 2017, 1-25, DOI:10.1007/s11280-017-0455-z. (SCI)

[6]  Xiaoyao Zheng, Yonglong luo*, Liping Sun, Xintao Ding, Ji Zhang. A Novel Social Network Hybrid Recommender System Based on Hypergraph Topologic Structure[J]. World Wide Web, 2017, 1-29, DOI: 10.1007/s11280-017-0494-5. (SCI)

[7]  Guiyin Hu, Yonglong Luo*, Xintao Ding, Liangmin Guo, Biao Jie, Xiaoyao Zheng, Guorong Cai. Alignment of Grid Points[J]. Optik - International Journal for Light and Electron Optics. 2017, 131(2): 279-286.(SCI)

[8]  JiZhang*, Lafta Raid Luaibi, XiaohuiTao ,YanLi ,FulongChen , YonglongLuo*, XiaodongZhu . Coupling a Fast Fourier Transformation with a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment[J]. IEEE Access. 2017, 5(1): 10674 - 10685. (SCI)

[9]   Xintao Ding, Yonglong Luo*, Yunyun Yi, Biao Jie, Taochun Wang, Weixin Bian. Orthogonal design for scale invariant feature transform optimization [J]. Journal of Electronic Imaging, 2016, 25(5): 053030-1 – 053030-12 (SCI)

[10] Qingying Yu,Yonglong Luo*,Chuanming Chen,Weixin Bian. Neighborhood relevant outlier detectionapproach based on information entropy[J],Intelligent Data Analysis,2016,20(6):1247-1265.(SCI)

[11] Xiaoyao Zheng,Yonglong Luo*,Zhiyun Xu,Qingying Yu, Lin Lu.Tourism Destination Recommender System for the Cold Start Problem[J].KSII Transactions on Internet and Information Systems,2016,10(7):3192-3212.(SCI)

[12] Xiaoyao Zheng,Yonglong luo*,Liping Sun,Fulong Chen.A New Recommender System Using Context Clustering Based on Matrix Factorization Techniques[J]. Chinese Journal of Electronics,2016,25(2):334-340.(SCI)

[13] Qingying Yu,Yonglong Luo*,Chuanming Chen,Xintao Ding.Outlier-eliminated k-means Clustering Algorithm based on Differential Privacy Preservation[J]. AppliedIntelligence,2016,45(4):1179-1191. (SCI)

[14] JiZhang,HongzhouLi,QigangGao,HaiWang,Yonglong Luo*. Detecting anomalies from big network traffic data using an adaptive detection approach[J].Information Sciences,2015,318:91-110.(SCI)

[15] Liping Sun,Yonglong Luo*,Xiaoyao Zheng,Jun lv.Gravitational inspired spectral clustering with constraint[J].Chinese Journal of Electronics,2015,24(3):487-491.(SCI)

[16] WeixinBian,YonglongLuo,DeqinXu, QingyingYu. Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables[J]. Pattern Recognition,2014, 47(10): 3304-3313.(SCI)

[17] XintaoDing,YonglongLuo*, LipingSun, FulongChen.Color balloon snakes for face segmentation[J].Optik-International Journal for Light and Electron Optics,2014,125(11): 2538-2542.(SCI)

[18] XintaoDing,LipingSun, YonglongLuo*.Shell histogram equalization of color images[J].Optik-International Journal for Light and Electron Optics, 2014,125(13): 350-3354.(SCI)

[19] XintaoDing,KunWang,BiaoJie,YonglongLuo,ZhenhuaHu, JieTian.Probability method for Cerenkov luminescence tomography based on conformance error minimization[J].Biomedical Optics Express, 2014,5(7):2091-2112.(SCI)

[20] LipingSun,YonglongLuo*,XintaoDing, JiZhang.A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications[J].Computational Intelligence and Neuroscience,2014,11 pages.(SCI)

[21] ChuanxinZhao,YonglongLuo,FulongChen,JiZhang, RuchuanWang.Energy Effective Congestion Control for Multicast with Network Coding in Wireless Ad Hoc Network[J]. MathematicalProblems in Engineering,2014,12 pages.(SCI)

[22] JiZhang,XuemeiLiu, YonglongLuo*.An efficient and robust privacy protection technique for]massive streaming choice-based information[C].Proceedings of the 22nd ACM internationalconference on Conference on information & knowledge management(CIKM). ACM,2013,1169-1172.(EI)

[23] YonglongLuo,LiushengHuang,WeiYang, WeijiangXu. An Efficient Protocol for PrivateComparison Problem[J].Chinese Journal of Electronics,2009,18(2): 205-209.(SCI)

[24] WeiYang,LiushengHuang,QiyanWang,YonglongLuo.Quantum Bit Commitment Based onQubit Oblivious Transfer[J].Chinese Journal of Electronics,2009,18(3): 422-426.(SCI)

[25] YifeiYao,LiushengHuang,YonglongLuo.Privacy-preserving matrix rank computation and its]applications[J].Chinese Journal of Electronics,2008,17(3): 481-486.(SCI)

[26] YonglongLuo,LiushengHuang, HongZhong.Secure Two-Party Point-Circle Inclusion Problem[J].Journal of Computer Science and Technology,2007,22(1): 88-91.(SCI)

[27] 罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报, 2007,30(2): 248-]254.(EI)

[28] 罗永龙,黄刘生,荆巍巍,徐维江,陈国良.一个保护私有信息的多边形相交判定协议[J].电子学报, 2007,35(4) : 685-691.(EI)

[29] 杨威,黄刘生,罗永龙,陈国良. 无条件安全的量子茫然传送[J]. 电子学报,2007,35(8): 1543-1547.(EI)

[30] YonglongLuo,LiushengHuang,HongZhong, GuoliangChen.A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon[J].Chinese Journal of Electronics,2006,15(4): 578-582.(SCI)

[31] YonglongLuo,LiushengHuang,GuoliangChen, HongShen. Privacy-Preserving DistanceMeasurement and Its Applications[J]. Chinese Journal of Electronics,2006,15(2): 237-241.(SCI)

[32] 仲红,黄刘生,罗永龙. 基于安全多方求和的多候选人电子选举方案[J].计算机研究与发展, 2006, 43(8): 1405-1410.(EI)

[33] 罗永龙,黄刘生,徐维江,荆巍巍.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3): 410-416.(EI)

[34] 罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护隐私的布尔关联规则挖掘算法[J].电子学报, 2005,33(5): 900-903.(EI)


    授权发明专利(第一完成人):

    [1] 罗永龙, 乔云峰, 刘飞,丁新涛, 陈付龙. 一种基于模糊控制的信任评估系统构建方法,发明专利, ZL201410235751.1

    [2] 罗永龙, 乔云峰, 刘莹,刘飞,孙丽萍. 一种基于模糊过滤的信任评估方法, 发明专利, ZL201410235773.8

    [3] 罗永龙, 刘飞, 马苑,陈付龙, 郭良敏, 左开中.一种动态信任模型构建系统,发明专利, ZL201310130319.1

    [4] 罗永龙, 刘飞,马苑,左开中, 陈付龙, 郭良敏, 孙丽萍. 一种基于隐私保护的信任评估系统及其构建方法, 发明专利, ZL201310469909.7

    [5] 罗永龙, 陈蔡霞. 一种基于点积协议的协议安全性量化方法及系统, 发明专利, ZL201010194265.1