罗永龙

发布人:李妍
发布日期:2018-01-04
浏览次数:885

联系方式

 

 

电话: 05535910645

E-mail: ylluo@ustc.edu.cn

 

主要研究方向

 

信息安全、空间数据处理

 

个人简介

 

罗永龙,男,1972年生,安徽太湖人,博士后,二级教授,博士生导师,安徽省学术和技术带头人。现任网络与信息安全安徽省重点实验室主任,安徽师范大学数学计算机科学学院副院长。安徽省计算机学会常务理事,安徽省信息化专家咨询委员会委员。

1994年本科毕业于安徽师范大学计算机系并留校任教,2005年博士毕业于中国科学技术大学计算机系,获工学博士学位,随后在中国科学技术大学从事博士后研究,2008年博士后出站。2007年破格晋升教授职务,2010年遴选为博士生导师,2015年入选安徽省学术和技术带头人,2017年入选安徽省专业技术二级岗位。

 

主要讲授课程

 

本科生课程:数据结构、操作系统、程序设计等

硕士生课程:算法设计与分析、信息安全进展等

 

获奖和荣誉

(1)2006年获中国科学院院长奖

(2)2008年安徽省杰出青年基金(原优秀青年基金)获得者

(3)2011年安徽省第三届优秀硕士学位论文指导教师

(4)2014年获教育部自然科学奖二等奖(排名3

(5)2015年获安徽省优秀教学成果奖二等奖(排名1


主持的部分课题 

[1]国家自然科学基金面上项目,61672039,基于位置服务的地理社交网络模型构建及隐私保护方法研究,2017/01 -2020/1264万元,主持人

[2]国家自然科学基金面上项目,61370050,面向隐私保护的空间数据处理方法与技术研究,2014/01- 2017/1273万元,主持人

[3]国家自然科学基金青年基金项目,60703071,可信计算中基于隐私数据的信息共享技术研究,2008/01- 2010/1220万元,主持人

[4]安徽省高校学科(专业)拔尖人才学术资助重点项目,gxbjZD2016011, 2016/01 -2018/1210万元,主持人

[5]安徽省杰出青年基金(原优秀青年基金)项目,08040106806,安全计算及其应用,2008/01-2010/1215万元,主持人

[6]中国科学院院长奖获得者科研启动基金项目,中科院人教(2006272 号文件,高效安全多方计算协议及其应用研究,2007/01-2009/1210 万元,主持人

[7]安徽省自然科学基金项目,070412043,安全多方计算基础协议及其应用研究,2007/01-2009/125万元,主持人

[8]中国博士后科学基金项目,20060390700,实用安全多方计算技术及其应用,2006/01-2008/123万元,主持人

 

主要论著

代表性论文如下:

[1]Ji Zhang, Hongzhou Li,Xuemei Liu, Yonglong Luo*, Fulong Chen, Hua Wang.On efficient and robust anonymization for privacy protection on massive streaming categorical information[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(5): 507-520 (SCI)

[2]Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong. A method for service evaluation based on fuzzy theory for cloud computing[J]. KSII Transactions on Internet and Information Systems, 2017, 11(4): 1820-1840. (SCI)

[3]Liping Sun, Jun Liu, Xiaoyao Zheng, Yonglong Luo*. An Efficient and Adaptive Method for Overlapping Community Detection in Real-World Networks. Chinese Journal of Electronics, 2017. (Accepted)

[4]Xiaohan Wang, Yonglong Luo*, Yefeng Jiang, Wenli Wu, Qingying Yu. Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection[J]. Intelligent Data Analysis, 2017. (Accepted)

[5]Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang. An infrastructure framework for privacy protection of community medical internet of things[J]. World Wide Web, 2017, 1-25, DOI:10.1007/s11280-017-0455-z. (SCI)

[6]Xiaoyao Zheng, Yonglong luo*, Liping Sun, Xintao Ding, Ji Zhang. A Novel Social Network Hybrid Recommender System Based on Hypergraph Topologic Structure[J]. World Wide Web, 2017, 1-29, DOI: 10.1007/s11280-017-0494-5. (SCI)

[7]Guiyin Hu, Yonglong Luo*, Xintao Ding, Liangmin Guo, Biao Jie, Xiaoyao Zheng, Guorong Cai. Alignment of Grid Points[J]. Optik - International Journal for Light and Electron Optics. 2017, 131(2): 279-286.(SCI)

[8]JiZhang*, Lafta Raid Luaibi, XiaohuiTao ,YanLi ,FulongChen , YonglongLuo*, XiaodongZhu . Coupling a Fast Fourier Transformation with a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment[J]. IEEE Access. 2017, 5(1): 10674 - 10685. (SCI)

[9]Xintao Ding, Yonglong Luo*, Yunyun Yi, Biao Jie, Taochun Wang, Weixin Bian. Orthogonal design for scale invariant feature transform optimization [J]. Journal of Electronic Imaging, 2016, 25(5): 053030-1 – 053030-12 (SCI)

[10]Qingying Yu,Yonglong Luo*,Chuanming Chen,Weixin Bian. Neighborhood relevant outlier detectionapproach based on information entropy[J],Intelligent Data Analysis,2016,20(6):1247-1265.(SCI)

[11]Xiaoyao Zheng,Yonglong Luo*,Zhiyun Xu,Qingying Yu, Lin Lu.Tourism Destination Recommender System for the Cold Start Problem[J].KSII Transactions on Internet and Information Systems,2016,10(7):3192-3212.(SCI)

[12]Xiaoyao Zheng,Yonglong luo*,Liping Sun,Fulong Chen.A New Recommender System Using Context Clustering Based on Matrix Factorization Techniques[J]. Chinese Journal of Electronics,2016,25(2):334-340.(SCI)

[13]Qingying Yu,Yonglong Luo*,Chuanming Chen,Xintao Ding.Outlier-eliminated k-means Clustering Algorithm based on Differential Privacy Preservation[J]. AppliedIntelligence,2016,45(4):1179-1191. (SCI)

[14]JiZhang,HongzhouLi,QigangGao,HaiWang,Yonglong Luo*. Detecting anomalies from big network traffic data using an adaptive detection approach[J].Information Sciences,2015,318:91-110.(SCI)

[15]Liping Sun,Yonglong Luo*,Xiaoyao Zheng,Jun lv.Gravitational inspired spectral clustering with constraint[J].Chinese Journal of Electronics,2015,24(3):487-491.(SCI)

[16]WeixinBian,YonglongLuo,DeqinXu, QingyingYu. Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables[J]. Pattern Recognition,2014, 47(10): 3304-3313.(SCI)

[17]XintaoDing,YonglongLuo*, LipingSun, FulongChen.Color balloon snakes for face segmentation[J].Optik-International Journal for Light and Electron Optics,2014,125(11): 2538-2542.(SCI)

[18]XintaoDing,LipingSun, YonglongLuo*.Shell histogram equalization of color images[J].Optik-International Journal for Light and Electron Optics, 2014,125(13): 350-3354.(SCI)

[19]XintaoDing,KunWang,BiaoJie,YonglongLuo,ZhenhuaHu, JieTian.Probability method for Cerenkov luminescence tomography based on conformance error minimization[J].Biomedical Optics Express, 2014,5(7):2091-2112.(SCI)

[20]LipingSun,YonglongLuo*,XintaoDing, JiZhang.A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications[J].Computational Intelligence and Neuroscience,2014,11 pages.(SCI)

[21]ChuanxinZhao,YonglongLuo,FulongChen,JiZhang, RuchuanWang.Energy Effective Congestion Control for Multicast with Network Coding in Wireless Ad Hoc Network[J]. MathematicalProblems in Engineering,2014,12 pages.(SCI)

[22]JiZhang,XuemeiLiu, YonglongLuo*.An efficient and robust privacy protection technique for]massive streaming choice-based information[C].Proceedings of the 22nd ACM internationalconference on Conference on information & knowledge management(CIKM). ACM,2013,1169-1172.(EI)

[23]YonglongLuo,LiushengHuang,WeiYang, WeijiangXu. An Efficient Protocol for PrivateComparison Problem[J].Chinese Journal of Electronics,2009,18(2): 205-209.(SCI)

[24]WeiYang,LiushengHuang,QiyanWang,YonglongLuo.Quantum Bit Commitment Based onQubit Oblivious Transfer[J].Chinese Journal of Electronics,2009,18(3): 422-426.(SCI)

[25]YifeiYao,LiushengHuang,YonglongLuo.Privacy-preserving matrix rank computation and its]applications[J].Chinese Journal of Electronics,2008,17(3): 481-486.(SCI)

[26]YonglongLuo,LiushengHuang, HongZhong.Secure Two-Party Point-Circle Inclusion Problem[J].Journal of Computer Science and Technology,2007,22(1): 88-91.(SCI)

[27]罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报, 2007,30(2): 248-]254.(EI)

[28]罗永龙,黄刘生,荆巍巍,徐维江,陈国良.一个保护私有信息的多边形相交判定协议[J].电子学报, 2007,35(4) : 685-691.(EI)

[29]杨威,黄刘生,罗永龙,陈国良无条件安全的量子茫然传送[J]. 电子学报,2007,35(8): 1543-1547.(EI)

[30]YonglongLuo,LiushengHuang,HongZhong, GuoliangChen.A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon[J].Chinese Journal of Electronics,2006,15(4): 578-582.(SCI)

[31]YonglongLuo,LiushengHuang,GuoliangChen, HongShen. Privacy-Preserving DistanceMeasurement and Its Applications[J]. Chinese Journal of Electronics,2006,15(2): 237-241.(SCI)

[32]仲红,黄刘生,罗永龙基于安全多方求和的多候选人电子选举方案[J].计算机研究与发展, 2006, 43(8): 1405-1410.(EI)

[33]罗永龙,黄刘生,徐维江,荆巍巍.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3): 410-416.(EI)

[34]罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护隐私的布尔关联规则挖掘算法[J].电子学报, 2005,33(5): 900-903.(EI)


    授权发明专利(第一完成人):

    [1]罗永龙乔云峰刘飞,丁新涛陈付龙一种基于模糊控制的信任评估系统构建方法,发明专利, ZL201410235751.1

    [2]罗永龙乔云峰刘莹,刘飞,孙丽萍一种基于模糊过滤的信任评估方法发明专利, ZL201410235773.8

    [3]罗永龙刘飞马苑,陈付龙郭良敏左开中.一种动态信任模型构建系统,发明专利, ZL201310130319.1

    [4]罗永龙刘飞,马苑,左开中陈付龙郭良敏孙丽萍一种基于隐私保护的信任评估系统及其构建方法发明专利, ZL201310469909.7

    [5]罗永龙陈蔡霞一种基于点积协议的协议安全性量化方法及系统发明专利, ZL201010194265.1