罗永龙

发布人:王正东
发布日期:2018-03-05
浏览次数:3801

联系方式:

电话: 05535910645

E-mail: ylluo@ustc.edu.cn

主要研究方向:

信息安全、空间数据处理


个人简介:

罗永龙,男,1972年生,安徽太湖人,博士,二级教授,博士生导师,安徽省学术和技术带头人。现任安徽师范大学计算机与信息学院院长,网络与信息安全安徽省重点实验室主任。安徽省计算机学会常务理事,安徽省信息化专家咨询委员会委员。

1994年本科毕业于安徽师范大学计算机系并留校任教,2005年博士毕业于中国科学技术大学计算机系,获工学博士学位,随后在中国科学技术大学从事博士后研究,2008年博士后出站。2007年破格晋升教授职务,2010年遴选为博士生导师,2015年入选安徽省学术和技术带头人,2017年入选安徽省专业技术二级岗位。

主要讲授课程:

本科生课程:数据结构、操作系统、程序设计等

研究生课程:算法设计与分析、信息安全进展等

 

获奖和荣誉:

2006年获中国科学院院长奖

2008年安徽省杰出青年基金(原优秀青年基金)获得者

2011年安徽省第三届优秀硕士学位论文指导教师

2014年获教育部自然科学奖二等奖(排名3

2015年获安徽省优秀教学成果奖二等奖(排名1

主持的部分课题:

[1]  国家自然科学基金面上项目,61672039,基于位置服务的地理社交网络模型构建及隐私保护方法研究,2017/01 -2020/1264万元,主持

[2]  国家自然科学基金面上项目,61370050,面向隐私保护的空间数据处理方法与技术研究,2014/01- 2017/1273万元,主持

[3]  国家自然科学基金青年基金项目,60703071,可信计算中基于隐私数据的信息共享技术研究,2008/01- 2010/1220万元,主持

[4]  安徽省高校学科(专业)拔尖人才学术资助重点项目,gxbjZD2016011, 2016/01 -2018/1210万元,主持

[5]  安徽省杰出青年基金(原优秀青年基金)项目,08040106806,安全计算及其应用,2008/01-2010/1215万元,主持

[6]  中国科学院院长奖获得者科研启动基金项目,中科院人教(2006272 号文件,高效安全多方计算协议及其应用研究,2007/01-2009/1210 万元,主持

[7]  安徽省自然科学基金项目,070412043,安全多方计算基础协议及其应用研究,2007/01-2009/125万元,主持

[8]  中国博士后科学基金项目,20060390700,实用安全多方计算技术及其应用,2006/01-2008/123万元,主持

主要论著

代表性论文如下:[DBLP]

[1]  Xiaoyao Zheng, Yonglong luo*, Liping Sun, Xintao Ding, Ji Zhang. A Novel Social Network Hybrid Recommender System Based on Hypergraph Topologic Structure[J]. World Wide Web, 2018, 21(4):985-1013.(SCI, CCF推荐期刊)

[2]  Qingying Yu, Yonglong Luo*, Chuanming Chen, Xiaohan Wang. Trajectory outlier detection approach based on common slices sub-sequence[J], Applied Intelligence, 2018, 48(9):2661-2680.(SCI, CCF推荐期刊)

[3]  Chuanming Chen, Yonglong Luo*, Qingying Yu, Guiyin Hu. TPPG: Privacy-preserving Trajectory Data Publication Based on 3D-Grid Partition[J]. Intelligent Data Analysis, 2018, Accepted. (SCI, CCF推荐期刊)

[4]  Wang Xiaohan; Luo Yonglong*; Jiang Yefeng; Wu Wenli; Yu Qingying, Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection, Intelligent Data Analysis , 2018. Accepted.(SCI, CCF推荐期刊)

[5]  Xiaoyao Zheng, Yonglong luo*, Liping Sun, Ji Zhang, Fulong Chen. A tourism destination recommender system using users’ sentiment and temporal dynamics, Journal of Intelligent Information Systems, 2018, 1-22, DOI: 10.1007/s10844-018-0496-5.(SCI, CCF推荐期刊)

[6]  Liangmin Guo, Jiakun Liang, Yin Zhu, Yonglong Luo, Liping Sun, Xiaoyao Zheng, Collaborative filtering recommendation based on trust and emotion, Journal of Intelligent Information Systems, 2018, 1-23, doi:10.1007/s10844-018-0517-4. (SCI, CCF推荐期刊)

[7]  Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang. An infrastructure framework for privacy protection of community medical internet of things[J]. World Wide Web,2018,21(1):33-57. (SCI, CCF推荐期刊)

[8]  Liangmin Guo, Guiyin Hu, Yan Dong, Yonglong Luo, Ying Zhu. A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints. IEEE Access 2018, 6: 4664-4676. (SCI)

[9]  Taochun Wang, Xiaolin Qin, Youwei Ding, Liang Liu, Yonglong Luo. Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks. Wireless Personal Communications, 2018, 98(1): 665-684. (SCI)

[10] Ji Zhang, Leonard Tan, Xiaohui Tao, Xiaoyao Zheng, Yonglong Luo, Jerry Chun-Wei Lin. SLIND: Identifying Stable Links in Online Social Networks[C]// International Conference on Database Systems for Advanced Applications. Gold Coast, Australia, 2018:813-816. (EI, CCF推荐会议).

[11] JiZhang*, Lafta Raid Luaibi, XiaohuiTao ,YanLi ,FulongChen, YonglongLuo*, XiaodongZhu . Coupling a Fast Fourier Transformation with a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment[J]. IEEE Access. 2017, 5(1): 10674 - 10685. (SCI)

[12] Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong. A method for service evaluation based on fuzzy theory for cloud computing[J]. KSII Transactions on Internet and Information Systems, 2017, 11(4): 1820-1840. (SCI)

[13] Ji Zhang,Hongzhou Li,Xuemei Liu,Yonglong Luo*,Fulong Chen, Hua Wang.On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(5): 507-520.(SCI, CCF推荐期刊)

[14] Xintao Ding, Yonglong Luo, Qingying Yu, Qingde Li, Yongqiang Cheng, Robert Munnoch, Dongfei Xue, Guorong Cai. Indoor object recognition using pre-trained convolutional neural network. ICAC 2017: 1-6. (EI)

[15] Meixuan Li, Yu-e Sun, He Huang, Jing Yuan, Yang Du, Yu Bao, Yonglong Luo. Profit maximization resource allocation in cloud computing with performance guarantee. IPCCC 2017: 1-2. (EI, CCF推荐会议)

[16] Raid Lafta, Ji Zhang, Xiaohui Tao, Yan Li, Wessam Abbas, Yonglong Luo, Fulong Chen, Vincent S. Tseng. A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset. PAKDD (1) 2017: 654-670. (EI, CCF推荐会议)

[17] Taochun Wang, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding. An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs. TrustCom/BigDataSE/ICESS 2017: 433-440.(EI, CCF推荐会议)

[18] Liping Sun, Jun Liu, Xiaoyao Zheng, Yonglong Luo*. An Efficient and Adaptive Method for Overlapping Community Detection in Real-World Networks. Chinese Journal of Electronics, 2017. (Accepted, SCI)

[19] Guiyin Hu, Yonglong Luo*, Xintao Ding, Liangmin Guo, Biao Jie, Xiaoyao Zheng, Guorong Cai. Alignment of Grid Points[J]. Optik - International Journal for Light and Electron Optics. 2017, 131(2): 279-286.(SCI)

[20] Qingying Yu,Yonglong Luo*,Chuanming Chen,Xintao Ding.Outlier-eliminated k-means Clustering Algorithm based on Differential Privacy Preservation[J]. AppliedIntelligence,2016,45(4):1179-1191.(SCI, CCF推荐期刊)

[21] Qingying Yu,Yonglong Luo*,Chuanming Chen,Weixin Bian. Neighborhood relevant outlier detectionapproach based on information entropy[J],Intelligent Data Analysis,2016,20(6):1247-1265.(SCI, CCF荐期刊)

[22] Xiaoyao Zheng,Yonglong Luo*,Zhiyun Xu,Qingying Yu, Lin Lu.Tourism Destination Recommender System for the Cold Start Problem[J]. KSII Transactions on Internet and Information Systems,2016,10(7):3192-3212.(SCI)

[23] Raid Lafta, Ji Zhang, Xiaohui Tao, Yan Li, Vincent S. Tseng, Yonglong Luo, Fulong Chen. An intelligent recommender system based on predictive analysis in telehealthcare environment. Web Intelligence, 2016,14(4): 325-336.(SCI, CCF推荐期刊)

[24] Hongzhou Li, Ji Zhang, Yonglong Luo, Fulong Chen, Liang Chang. GO-PEAS: A Scalable Yet Accurate Grid-Based Outlier Detection Method Using Novel Pruning Searching Techniques. ACALCI 2016: 125-133. (EI)

[25] Xintao Ding, Yonglong Luo*, Yunyun Yi, Biao Jie, Taochun Wang, Weixin Bian. Orthogonal design for scale invariant feature transform optimization [J]. Journal of Electronic Imaging, 2016, 25(5): 053030-1 – 053030-12 (SCI)

[26] Xiaoyao Zheng,Yonglong luo*,Liping Sun,Fulong Chen.A New Recommender System Using Context Clustering Based on Matrix Factorization Techniques[J]. Chinese Journal of Electronics,2016,25(2):334-340.(SCI)

[27] JiZhang,HongzhouLi,QigangGao,HaiWang,Yonglong Luo*. Detecting anomalies from big network traffic data using an adaptive detection approach[J].Information Sciences,2015,318:91-110.(SCI, CCF推荐期刊)

[28] Liping Sun,Yonglong Luo*,Xiaoyao Zheng,Jun lv.Gravitational inspired spectral clustering with constraint[J].Chinese Journal of Electronics,2015,24(3):487-491.(SCI)

[29] LipingSun,YonglongLuo*,XintaoDing, JiZhang.A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications[J].Computational Intelligence and Neuroscience,2014,11 pages.(SCI)

[30] WeixinBian,YonglongLuo,DeqinXu, QingyingYu. Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables[J]. Pattern Recognition,2014, 47(10): 3304-3313.(SCI, CCF推荐期刊)

[31] XintaoDing,YonglongLuo*, LipingSun, FulongChen.Color balloon snakes for face segmentation[J].Optik-International Journal for Light and Electron Optics,2014, 125(11): 2538-2542.(SCI)

[32] XintaoDing,LipingSun,YonglongLuo*.Shell histogram equalization of color images[J].Optik-International Journal for Light and Electron Optics, 2014,125(13): 350-3354.(SCI)

[33] XintaoDing,KunWang,BiaoJie,YonglongLuo,ZhenhuaHu, JieTian.Probability method for Cerenkov luminescence tomography based on conformance error minimization[J].Biomedical Optics Express, 2014, 5(7): 2091-2112.(SCI)

[34] ChuanxinZhao,YonglongLuo,FulongChen,JiZhang, RuchuanWang.Energy Effective Congestion Control for Multicast with Network Coding in Wireless Ad Hoc Network[J]. MathematicalProblems in Engineering,2014,12 pages.(SCI)

[35] JiZhang,XuemeiLiu,YonglongLuo*.An efficient and robust privacy protection technique for]massive streaming choice-based information[C].Proceedings of the 22nd ACM internationalconference on Conference on information & knowledge management(CIKM). ACM,2013,1169-1172.(EI, CCF推荐会议)

[36] YonglongLuo,LiushengHuang,WeiYang, WeijiangXu. An Efficient Protocol for PrivateComparison Problem[J].Chinese Journal of Electronics,2009,18(2): 205-209.(SCI)

[37] YonglongLuo,LiushengHuang, HongZhong.Secure Two-Party Point-Circle Inclusion Problem[J].Journal of Computer Science and Technology,2007,22(1): 88-91.(SCI, CCF推荐期刊)

[38] 罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报, 2007,30(2): 248-]254.(EI)

[39] 罗永龙,黄刘生,荆巍巍,徐维江,陈国良.一个保护私有信息的多边形相交判定协议[J].电子学报, 2007,35(4) : 685-691.(EI)

[40] YonglongLuo,LiushengHuang,HongZhong, GuoliangChen.A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon[J].Chinese Journal of Electronics,2006,15(4): 578-582.(SCI)

[41] YonglongLuo,LiushengHuang,GuoliangChen, HongShen. Privacy-Preserving DistanceMeasurement and Its Applications[J]. Chinese Journal of Electronics,2006,15(2): 237-241.(SCI)

[42] 罗永龙,黄刘生,徐维江,荆巍巍.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3): 410-416.(EI)

[43] 罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护隐私的布尔关联规则挖掘算法[J].电子学报, 2005,33(5): 900-903.(EI)

 

授权发明专利:

[1]  罗永龙, 乔云峰, 刘飞, 丁新涛, 陈付龙. 一种基于模糊控制的信任评估系统构建方法,发明专利, ZL201410235751.1

[2]  罗永龙, 乔云峰, 刘莹, 刘飞, 孙丽萍. 一种基于模糊过滤的信任评估方法, 发明专利, ZL201410235773.8

[3]  罗永龙, 刘飞, 马苑, 陈付龙, 郭良敏, 左开中. 一种动态信任模型构建系统,发明专利, ZL201310130319.1

[4]  罗永龙, 刘飞, 马苑, 左开中, 陈付龙, 郭良敏, 孙丽萍. 一种基于隐私保护的信任评估系统及其构建方法, 发明专利, ZL201310469909.7

[5]  罗永龙, 陈蔡霞. 一种基于点积协议的协议安全性量化方法及系统, 发明专利, ZL201010194265.1

[6]  孙丽萍, 徐致云,唐永祥,罗永龙. 一种旅游路径规划方法, 发明专利, ZL201510098619.5

[7]  郑孝遥,鲍煜,罗永龙,丁新涛,孙丽萍,胡桂银,俞庆英. 基于移动通信的信任推荐模型的构建方法及其构建系统, 发明专利, ZL201510297784.3

[8]  陈付龙,叶和平,杨洁,朱君茹,齐学梅,罗永龙, 赵传信,郑孝遥,孙丽萍. 社区医疗物联网隐私保护方法, 发明专利, ZL201510290226.4

[9]  接标,左开中,王涛春,丁新涛,胡桂银,罗永龙. 一种基于Laplacian算子的特征选择方法, 发明专利, ZL201410713386.0

[10] 王涛春, 罗永龙, 郭良敏, 左开中, 陈付龙. 一种隐私保护的两层传感器网络范围查询系统及方法, 发明专利, ZL201310737605.4

[11] 郭良敏, 罗永龙, 王涛春, 陈付龙, 左开中, 孙丽萍. 一种能耗约束的虚拟机博弈重放置方法, 发明专利, ZL201310710108.5

[12] 左开中,胡鹏,罗永龙,郭良敏,陈付龙,王涛春. 隐私保护的两层传感网Skyline查询系统及方法, 发明专利, ZL201310731280.9