删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

中南财经政法大学信息与安全工程学院导师教师师资介绍简介-熊平

本站小编 Free考研考试/2021-07-24

姓名:熊平
籍贯:湖北荆州
系:计算机科学与技术系
民族:汉
E-mail:pingxiong@zuel.edu.cn


社会兼职:湖北省网络空间安全学会理事
研究方向:数据挖掘、机器学习、隐私保护
讲授课程:信息安全概论、机器学习基础与实践、密码学






个人简历:中南财经政法大学信息与安全工程学院教授、博士生导师,IEEE会员,CCF会员,湖北省网络空间安全学会理事。从事信息安全、隐私保护、数据挖掘与机器学习等领域的教学与研究工作。近年来一直专注于差分隐私理论及应用方面的研究,解决在大数据背景下网络空间的用户隐私保护问题,在《计算机学报》、《计算机研究与发展》、FGCS、KAIS、EIS、IEEE Transactions等国内外学术期刊发表学术论文40余篇,主要涉及社交网络、推荐系统以及位置服务应用中的隐私保护问题。
学术成果:
1.Xiong P, Liang L, Zhu Y, Zhu T. Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning. Paper presented at: The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA)2021.
2.Xiong P, Li G, Ren W, Zhu T. LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing.Journal of Ambient Intelligence and Humanized Computing.2021/05/07 2021.
3.Zhang T, Zhu T, Xiong P, Huo H, Tari Z, Zhou W. Correlated Differential Privacy: Feature Selection in Machine Learning.IEEE Transactions on Industrial Informatics.2020;16(3):2115-2124.
4.Yang Yang, Ping Xiong, Qing Huang, Chen F. Secure and efficient outsourcing computation on large-scale linear regressions.Information Sciences.2020;522:134-147.
5.Tianqing Zhu , Ping Xiong, Gang Li, Wanlei Zhou, Philip S Yu. Differentially private model publishing in cyber physical systems.Future Generation Computer Systems.2020/07/01/ 2020;108:1297-1306.
6.Ping Xiong, Lefeng Zhang, Tianqing Zhu, Gang Li, Wanlei Zhou. Private collaborative filtering under untrusted recommender server.Future Generation Computer Systems.2020;109:511-520.
7.Zhang L, Xiong P, Ren W, Zhu T. A differentially private method for crowdsourcing data submission.Concurrency and Computation: Practice and Experience.2019;31(19):e5100.
8.Xiong P, Zhu D, Zhang L, Ren W, Zhu T. Optimizing rewards allocation for privacy-preserving spatial crowdsourcing.Computer Communications.2019/10/15/ 2019;146:85-94.
9.Zhu T, Yang M, Xiong P, Xiong Y, Zhou W. An iteration-based differentially private social network data release.Computer systems science and engineering.2018;33(2):61-69.
10.Zhu T, Li G, Xiong P, Zhou W. Answering differentially private queries for continual datasets release.Future Generation Computer Systems.2018/10/01/ 2018;87:816-827.
11.Zhang L, Xiong P, Zhu T. A Differentially Private Method for Crowdsourcing Data Submission2018; Cham.
12.Zhu T, Xiong P, Li G, Zhou W, Yu PS. Differentially private query learning: From data publishing to model publishing. Paper presented at: 2017 IEEE International Conference on Big Data (Big Data); 11-14 Dec. 2017, 2017.
13.Xiong P, Zhang L, Zhu T. Reward-based spatial crowdsourcing with differential privacy preservation.Enterprise Information Systems.2017;11(10):1500-1517.
14.Zhu T, Li G, Zhou W, Xiong P, Yuan C. Privacy-preserving topic model for tagging recommender systems.Knowledge and Information Systems.2016;46(1):33-58.
15.Xiong P, Zhu T, Niu W, Li G. A differentially private algorithm for location data release.Knowledge and Information Systems.2016;47(3):647-669.
16.Xiong P, Zhang L, Zhu T. Semantic analysis in location privacy preserving.Concurrency and Computation: Practice and Experience.2016;28(6):1884-1899.
17.Zhu T, Xiong P, Li G, Zhou W. Correlated differential privacy: hiding information in non-IID data set.Information Forensics and Security, IEEE Transactions on.2015;10(2):229-242.
18.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Privacy preserving data release for tagging recommender systems. Paper presented at: Web Intelligence2015.
19.Zhang L, Lu X, Xiong P, Zhu T. A Differentially Private Method for Reward-Based Spatial Crowdsourcing.Applications and Techniques in Information Security: Springer; 2015:153-164.
20.Yang F, Zheng Y, Xiong P. An Overview of Ad Hoc Network Security.Applications and Techniques in Information Security: Springer; 2015:129-137.
21.熊平,朱天清,王晓峰.差分隐私保护及其应用.计算机学报.2014;37(1):101.
22.熊平,朱天清,金大卫.一种面向决策树构建的差分隐私保护算法.计算机应用研究.2014;31(10):3108-3112.
23.熊平,朱天清,顾霄.基于信息增益比例约束的数据匿名方法及其评估机制.计算机应用研究.2014;31(3):819-824.
24.熊平,顾霄.基于属性权重最优化的k-means聚类算法.微电子学与计算机.2014;31(4):40-43.
25.Zhu T, Ren Y, Zhou W, Rong J, Xiong P. An effective privacy preserving algorithm for neighborhood-based collaborative filtering.Future Generation Computer Systems.2014;36:142-155.
26.Zhu T, Li G, Zhou W, Xiong P, Yuan C. Deferentially private tagging recommendation based on topic model.Advances in knowledge discovery and data mining: Springer; 2014:557-568.
27.Zhang L, Xiong P, Zhu T. Location Privacy Preserving for Semantic-Aware Applications.Applications and Techniques in Information Security: Springer; 2014:135-146.
28.Xiong P, Zhu T, Pan L, Niu W, Li G. Privacy Preserving in Location Data Release: A Differential Privacy Approach.PRICAI 2014: Trends in Artificial Intelligence: Springer; 2014:183-195.
29.Xiong P, Wang X, Niu W, Zhu T, Li G. Android malware detection with contrasting permission patterns.Communications, China.2014;11(8):1-14.
30.Zhu T, Xiong P, Xiang Y, Zhou W. An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. Paper presented at: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on2013.
31.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Differential privacy for neighborhood-based collaborative filtering.Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara, Ontario, Canada: ACM; 2013:752-759.
32.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Privacy Preserving for Tagging Recommender Systems.Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01: IEEE Computer Society; 2013:81-88.
33.熊平.信息安全原理及应用:清华大学出版社; 2012.
34.熊平.基于杂度削减的连续属性离散化方法.统计与决策.2012(5):35-37.
35.平熊,朱天清.基于杂度增益与层次聚类的数据匿名方法.计算机研究与发展.2012;49(7):1545-1552.
36.Xiong P, Zhu T. An anonymization method based on tradeoff between utility and privacy for data publishing. Paper presented at: Management of e-Commerce and e-Government (ICMeCG), 2012 International Conference on2012.
37.熊平.数据挖掘算法与Clementine实践:清华大学出版社; 2011.
38.钱学锋,熊平.中国出口增长的二元边际及其因素决定:经验研究.经济研究.2010;1:65-79.
39.钱学锋,熊平.李嘉图比较优势,特惠贸易安排与产业集聚.经济学(季刊).2009;3:002.
40.熊平.基于正常轮廓更新的自适应异常检测方法.武汉大学学报:信息科学版.2007;32(9):842-845.
41.朱天清,熊平.模糊关联规则挖掘及其算法研究.武汉工业学院学报.2005;24(1):24-28.
42.熊平,朱天清,黄天戍.模糊关联规则挖掘算法及其在异常检测中的应用.武汉大学学报:信息科学版.2005;30(9):841-845.
43.Zhu T-Q, Xiong P. Optimization of membership functions in anomaly detection based on fuzzy data mining. Paper presented at: Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on2005.
44.朱天清,王先培,熊平. IDS中的模糊关联规则挖掘与响应.计算机工程与应用.2004;40(15):148-150.
45.Huang T, Xiong P, Zhu T. Data mining model and algorithm in IDS. Paper presented at: Asia-Pacific Optical and Wireless Communications2004.
46.王先培,朱天清,熊平.基于MAS的电力系统脆弱性评估与控制.电力系统及其自动化学报.2003;15(3):20-22.
47.王先培,张爱菊,熊平,张俊.新一代数据加密标准——AES.计算机工程.2003;29(3):69-70.
48.Xiong P, Huang T-s, Yi K, Zhu T-q. Design of communication port between DCS and computers of RTU. Paper presented at: Machine Learning and Cybernetics, 2003 International Conference on2003.
49.熊平,王先培,张爱菊.网络入侵检测方法.中国数据通信.2002;4(2):35-38.
50.熊平,王先培. P2DR模型基于时间的量化分析.信息技术.2002(7):27-28.
51.王先培,熊平,李文武.防火墙和入侵检测系统在电力企业信息网络中的应用.电力系统自动化.2002;26(5):60-63.








相关话题/工程学院 信息