删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

南京信息工程大学大气与环境实验教学中心导师教师师资介绍简介-尹春勇

本站小编 Free考研考试/2021-03-28


其他栏目




尹春勇教授 同专业博导同专业硕导

性别: 男
职务: 教授,博士生导师,硕士生导师,副主任
办公地点: 南京信息工程大学
联系方式: 电话:**QQ:

查看更多



个人简介Personal Profile

学习与工作经历:社会兼职:指导计算机硕士研究生、博士研究生30余名,其中国内研究生18名,留学硕士生14名,指导的研究生获得校长奖学金、研究生优秀奖学金和三好研究生荣誉等称号。
Neural Networks、IEEE Internet of Things Journal、Multimedia Tools and Applications等国际1区2区顶级SCI期刊审稿人
计算机应用研究等国内期刊审稿人
IEEE ICCNT等国际会议审稿人
NCM等会议分会主席
江苏省网络监控中心成员
贵州省人工智能学会会员
IBM的Q1Lab信息安全研究项目组成员
中英云网络安全研究所所长
育英二外校务委员会副主任
网络公司技术总监
区工信局副局长
虚拟仿真中心副主任

研究领域:Dr. Chunyong Yin is currently a Professor and Dean with the Nanjing University of Information Science & Technology, China. He received his Bachelor (SDUT, China, 1998), Master (GZU, China, 2005), PhD (GZU, 2008) and was Post-doctoral associate (University of New Brunswick, 2010).He has authored or coauthored more than twenty journal and conference papers. His current research interests include privacy preserving and network security etc.

尹春勇,男,博士,现为南京信息工程大学计算机与软件学院教授、博导、硕导、虚拟仿真中心副主任,原网络工程系主任,中英云网络安全研究所所长,江苏省网络监控中心成员,贵州省人工智能学会会员,IBM的Q1Lab信息安全研究项目组成员。担任国家重点研发计划网络空间安全重点专项评审专家、国家重点研发计划“战略性国际科技创新合作”重点专项评审专家、国家自然科学基金评审专家,《Neural Networks》《IEEE Internet of Things Journal》等国际1区2区顶级SCI期刊审稿人,计算机应用研究等国内期刊审稿人,IEEE ICCNT等国际会议审稿人,NCM等会议分会主席。1998年以来先后获得计算机应用专业硕士学位和网络及信息安全专业博士学位,并在加拿大新不伦瑞克大学信息安全研究中心从事博士后研究员工作。作为项目组主持人和项目组主要成员,主持和参与了国家自然科学基金面上项目、山东省自然科学基金、贵州省自然科学基金、军参部子项目、与英国伦敦大学、新不伦瑞克大学的国际合作基金等多项科研项目。在国内外核心期刊上发表论文100余篇(其中,SCI/EI收录80篇)。获得市第八届青年科技奖、市第九届自然科学优秀学术成果二等奖等多项奖励。获得发明专利授权3项,软件著作权18项。


研究领域与方向
1. 计算机网络与信息安全
2. 云计算
3. 大数据安全
4. 数据挖掘
5. 文本内容安全
博士生招生方向:网络空间安全; 大数据挖掘及隐私保护; 人工智能及新型计算
硕士生招生方向:网络与信息安全; 机器学习; 大数据安全; 隐私保护

科研成果:主持项目:
面向高速数据流的新型异常入侵检测技术研究,国家自然科学基金面上项目
面向大规模新型P2P 僵尸网络的检测研究,国家自然科学基金面上项目
高速数据流异常检测系统,国际合作项目
基于云计算的智能数据安全存储系统,国际合作项目
僵尸网络的检测、分析、可视化,国际合作项目
一种新型入侵检测模型的设计与实现,省教育厅项目
自动气象信息服务系统,江苏省气象探测与信息处理中心基金项目
基于密态数据库的安全研究,南京信息工程大学科研项目
基于秘密同态的实数的整数化表示理论与算法,校基金项目
一种新型自动防御系统的研究.校重点项目
网络入侵检测系统的设计.校青年项目
主研项目:
软件可靠性与安全性综合评估方法研究,国家自然科学基金项目
网络漏洞挖掘与分析研究.军参部子项目
提高高校数据安全的实验技术研究.校青年项目
城市交通地理信息系统的设计与实现.校重点项目


主要论文:
Selected Journal Publications:

1. C. Yin, S. Zhang, J. Wang and N. N. Xiong (2020). Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series. IEEE Transactions on Systems, Man, and Cybernetics: Systems, doi: 10.1109/TSMC.2020.**.(SCI 1区TOP期刊)
2. Yin, C., Ding, S., & Wang, J. (2019). Mobile marketing recommendation method based on user location feedback. Human-centric Computing and Information Sciences, 9(1), 14.(SCI)
3. Yin, C., Wang, H., Yin, X., Sun, R., & Wang, J. (2019). Improved deep packet inspection in data stream detection. The Journal of Supercomputing, 75(8), 4295-4308.(SCI,CCF C类)
4. Yin, C., Shi, L., Sun, R., & Wang, J. (2019). Improved collaborative filtering recommendation algorithm based on differential privacy protection. The Journal of Supercomputing, 1-14.(SCI,CCF C类)
5. Yin, C., Ju, X., Yin, Z., & Wang, J. (2019). Location recommendation privacy protection method based on location sensitivity division. EURASIP Journal on Wireless Communications and Networking, 2019(1), 266.(SCI)
6. Yin, C., Zhou, B., Yin, Z., & Wang, J. (2019). Local privacy protection classification based on human-centric computing. Human-centric Computing and Information Sciences, 9(1), 33. (SCI)
7. Yin, C., Xi, J., Sun, R., & Wang, J. (2018). Location Privacy Protection based on Differential Privacy Strategy for Big Data in Industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 14(8), 3628-3636.(SCI 1区TOP期刊,高被引论文)
8. Yin, C., Xia, L., Zhang, S., Sun, R., & Wang, J. (2018). Improved clustering algorithm based on high-speed network data stream. Soft Computing, 22(13), 4185-4195.(SCI,CCF C类)
9. Yin, C., Wang, J., & Park, J. H. (2017). An improved recommendation algorithm for big data cloud service based on the trust in sociology. Neurocomputing, 256, 49-55.(SCI 2区TOP期刊,CCF C类)
10. Yin, C., Zhang, S., Xi, J., & Wang, J. (2017). An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation: Practice and Experience, 29(7), e3902.(SCI,CCF C类)
11. Yin, C., & Zhang, S. (2017). Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimedia Tools and Applications, 76(16), 16911-16927.(SCI,CCF C类)
12. Yin, C., & Xi, J. (2017). Maximum entropy model for mobile text classification in cloud computing using improved information gain algorithm. Multimedia Tools and Applications, 76(16), 16875-16891.(SCI,CCF C类)
13. Yin, C., Xi, J., & Sun, R. (2017). Location Privacy Protection Based on Improved-Value Method in Augmented Reality on Mobile Devices. Mobile Information Systems, 2017.(SCI)
14. Yin, C., Zhang, S., & Kim, K. J. (2017). Mobile Anomaly Detection Based on Improved Self-Organizing Maps. Mobile Information Systems, 2017.(SCI)
15. Yin, C., Zhang, S., Yin, Z., & Wang, J. (2017). Anomaly detection model based on data stream clustering. Cluster Computing, 1-10.(SCI)
16. Yin, C., Feng, L., & Ma, L. (2016). An improved Hoeffding-ID data-stream classification algorithm. The Journal of Supercomputing, 72(7), 2670-2681. (SCI,CCF C类)
17. Yin, C., Ma, L., & Feng, L. (2017). Towards accurate intrusion detection based on improved clonal selection algorithm. Multimedia Tools and Applications, 76(19), 19397-19410.(SCI,CCF C类)
18. Yin, C., Ma, L., & Feng, L. (2016). A feature selection method for improved clonal algorithm towards intrusion detection. International Journal of Pattern Recognition and Artificial Intelligence, 30(05), **.(SCI,CCF C类)
19. Yin, C., Feng, L., Ma, L., Kim, J. U., & Wang, J. (2016). An effective feature selection and data-stream classification model HDP. Journal of Internet Technology, 17(4), 695-702.(SCI)
20. Yin, C., Awlla, A. H., Yin, Z., & Wang, J. (2015). Botnet detection based on genetic neural network. International Journal of Security and Its Applications, 9(11), 97-104.
21. Yin, C., Zou, M., Iko, D., & Wang, J. (2013). Botnet detection based on correlation of malicious behaviors. International Journal of Hybrid Information Technology, 6(6), 291-300.
22. Yin, C., Yang, L., & Wang, J. (2013). Botnet detection based on degree distributions of node using data mining scheme. International Journal of Future Generation Communication and Networking, 6(6), 81-90.
23. Yin, C. (2014). Towards accurate node-based detection of P2P botnets. The Scientific World Journal, 2014..
24. Yin, C., Feng, L., Ma, L., Yin, Z., & Wang, J. (2015). A feature selection algorithm based on Hoeffding inequality and mutual information. Int J Signal Process Image Process Pattern Recognit, 8(11), 433-444.
25. Yin, C., Zhang, H., Xiang, J., Yin, Z., & Wang, J. (2015). A Mobile Recommendation Algorithm Based on Statistical Analysis of User Data. International Journal of Hybrid Information Technology, 8(12), 355-366.
26. Yin, C., Xiang, J., Zhang, H., Yin, Z., & Wang, J. (2015). Short text classification algorithm based on semi-supervised learning and SVM. International Journal of Multimedia and Ubiquitous Engineering, 10(12), 195-206.
27. Yin, C., Ma, L., Feng, L., Yin, Z., & Wang, J. (2015). A Feature Selection Algorithm towards Efficient Intrusion Detection. International journal of multimedia and ubiquitous engineering, 10(11), 253-264.
28. Yin, C., Zhang, S., Yin, Z., & Wang, J. (2015). An algorithm of clustering by density peaks using in anomaly detection. Int J Secur Appl, 9(12), 115-128.



Selected Conference Publications:
1. ChunyongYin , Jun Xiang, Hui Zhang, Jin Wang, A New Classification Method for ShortText Based on SLAS and CART, CCITSA2015, 2015.12.10-2015.12.12.
2.ChunyongYin , Sun Zhang, Jin Wang, An Improved K-Means Using in Anomaly Detection, CCITSA2015,2015.12.10-2015.12.12.
3.ChunyongYin, Ardalan Husin, Jin Wang, An Improved Transmission Control Protocol Effecton Router Performance, CCITSA2015, 2015.12.10-2015.12.12.
4.ChunyongYin , Jinwen Xi, Jin Wang, The Research of Text Classification Technology Basedon Improved Maximum Entropy Model, CCITSA2015, 2015.12.10-2015.12.12.
5.ChunyongYin , Sun Zhang, Jin Wang, Zhichao Yin, Anomaly detection based on clusteringby density peaks using, COMCOMS2015, 2015.10.22-2015.10.24.
6.ChunyongYin , Ardalan Husin Awlla, Jin Wang, Zhichao Yin, A Novel framework towardsBotnet Detection, COMCOMS2015, 2015.10.22-2015.10.24.
7.ChunyongYin , Lu Feng, Luyu Ma, Jin Wang, Zhichao Yin, Jeong-Uk Kim, A FeatureSelection Algorithm of Dynamic Data-Stream Based on Hoeffding Inequality, AITS2015,2015.8.21-2015.8.23.
8.ChunyongYin; Luyu Ma; Lu Feng; Jin Wang; Zhichao , A Hybrid Feature Selection Algorithm,AITS2015, 2015.8.21-2015.8.23.
9.ChunyongYin; Hui Zhang; Jun Xiang; Jin Wang; Zhichao Yin , A New Mobile RecommendationAlgorithm Based on Statistical Theory, AITS2015, 2015.8.21-2015.8.23.
10.ChunyongYin; Jun Xiang; Hui Zhang; Jin Wang; Zhichao Yin , A New SVM Method for ShortText Classification Based on Semi-Supervised Learning, AITS2015, 2015.8.21-2015.8.23.
11.ChunyongYin, P2P Botnet Detection Based on Association between Common Network Behaviorsand Host Behaviors, 2011 International Conference on Multimedia Technology,ICMT2011,2011.7.26-2011.7.28.
12.ChunyongYin, Study on Data Field Content Security Based on OA, ETP/IITA World Congressin Applied Computing, Computer Science, and Computer, 2010.4.17-2010.4.18.
13.ChunyongYin, Study on Protection Method Based on Document, the International Conferenceon System Science and Simulation in Engineering, 2010.9.1-2011.9.3.
14.ChunyongYin, A Specific Implementation Based on Document Security Model, theInternational Conference on Optics, Photonics and Energy Engineering, 2010.5.10-2010.5.12.
15.ChunyongYin, An Improved Method of C Learning Based on Individuation, the InternationalConference on Telecommunication and Information, 2010.6.22-2010.6.23.
16.ChunyongYin, Study on Document Content Security, the International Conference onOptics, Photonics and Energy Engineering, 2010.5.10-2010.5.12.
17.ChunyongYin, A Model of Information Security Based on Office Automation, 5thInternational Joint Conference on INC, IMS and IDC, 2009.8.25-2009.8.27.
18.ChunyongYin, A Model of Information Security Based on Office Automation, 5thInternational Joint Conference on INC, IMS and IDC, 2009.8.25-2009.8.27.
19.ChunyongYin, The Design of Secure Document Management, 2009 ETP/IITA World Congress inApplied Computing, Computer Science, and Computer Engineering, 2009.8.8-2009.8.9.
20.ChunyongYin, A Method of Automatic Key Generation Based on Handwriting, 10th ACISInternational Conference on Software Engineering, Artificial Intelligences,Networking and Parallel, 2009.5.27-2009.5.29.
21.ChunyongYin, A Modified Query Algorithm for Private Data Security Facing E-commerce, 2009Pacific-Asia Conference on Circuits, Communications and System, 2009.5.16-2009.5.17.

主要专利:

文档数据安全管理系统ZL7.6
基于节点僵尸网络检测系统ZL0.1
自动气象信息服务系统.3
安全移动在线视频监控系统0.7
僵尸网络检测系统2012SR072502
数据包捕获实验数据采集系统2015SR039711
安全移动在线视频监控系统2015SR071378
毕业设计管理系统2015SR056177
校园网物品交易平台系统2016SR028182
智能文档分类系统2016SR028184
在线游戏论坛系统2016SR028455
基于聚类的通用数据处理系统2016SR028325

荣誉:市第八届青年科技奖
市第九届自然科学优秀学术成果二等奖
校教学优秀奖

其他学术成就:My Ph.D. and M.S. students
1.Sun Zhang
Hereceived his bachelor degree in computer science and technology from NanjingUniversity of Information Science and Technology, China. Now he is studying forhis master’s degree in there. His current research interests are in networksecurity and intrusion detection.
Selected Journal Publications:
[1]ChunyongYin, Sun Zhang. Parallel implementing improved k-means using mapreduceprogramming mode for mobile networks. Multimedia Tools and Applications, DOI:10.1007_s11042-016-3638-1.
[2]ChunyongYin, Sun Zhang, et al. An improved anonymity model for big data security basedon clustering algorithm. Concurrency and Computation-Practice & Experience,DOI: 10.1002/cpe.3902.
[3]ChunyongYin, Sun Zhang, et al. An algorithm of clustering by density peaks using inanomaly detection. International Journal of Security and Its Applications, Vol.9, No. 12 pp.115-128DOI: 10.1002/cpe.3902.
Selected Conference Publications
[1]ChunyongYin, Sun Zhang, et al. Anomaly detection based on clustering by density peaksusing. COMCOMS2015, October 22-24, 2015, Hanoi,Vietnam.
[2]ChunyongYin, Sun Zhang, et al. An Improved K-Means Using in Anomaly Detection.CCITSA2015, December 10-12, 2015, ILan, Taiwan.
2.Jinwen Xi
Hereceived his bachelor degree in computer science and technology from HuaiyinInstitute of Technology, China. Now he is studying for his master’s degree incomputer science and technology from Nanjing University of Information Scienceand Technology, China. His current research interests are informationprocessing, data mining and feature extraction algorithm.
Selected Journal Publications:
[1]ChunyongYin, Jinwen Xi. Maximum entropy model for mobile text classification in cloudcomputing using improved information gain algorithm. Multimedia Tools andApplications, DOI: 10.1007/s11042-016-3545-5.
[2]ChunyongYin, Sun Zhang, Jinwen Xi, et al. An improved anonymity model for big datasecurity based on clustering algorithm. Concurrency and Computation-Practice& Experience, DOI: 10.1002/cpe.3902.
Selected Conference Publications
[1]ChunyongYin, Jinwen Xi, Jin Wang. The Research of Text Classification Technology Basedon Improved Maximum Entropy Model. CCITSA2015
3. Darious
Personal Information:
FullName: Darius Iko
Nationality:Indonesia

Education Background:
September2005 - March 2009 : Bachelor of Computer Science at Bina Nusantara University,Jakarta, Indonesia (GPA 3.61 out of 4.00Scale)
February2011 - June 2011 : Mandarin Chinese Language at Nanjing University ofInformation Science and Technology, Nanjing, China
September2011 - Present : Master of Computer Application Technology at NanjingUniversity of Information Science and Technology, Nanjing, China
Academic Special Certification:
Achievementas Outstanding Student at Bina Nusantara University in 2007
Academic Experience:
February2008 - May 2008 : Internship as ASP.NET Web Developer at Applied TechnologyLaboratories (ATL) at Bina Nusantara University, Jakarta, Indonesia
Designand develop a KPI (Key Performance Indicator) - based Performance AssessmentSystem that is used by an organization to evaluate its success or the successof a particular activity in which it is engaged.
Professional Experience:
August2006 & August 2007 : Internship as Hardware Technical Support at PT. IntiSanho Utama Teknologi, Medan, Indonesia
Dealwith customer complaining computer hardware, operating system, and computersoftware issue, as well as installation request.
August2008 - December 2008 : PHP Web Developer at PT. Pacific Tractor Indonesia
Designand develop an Online Product Ordering System that provide convenient orderingsystem for customers and easy ordering management system for PT. PacificTractor Indonesia
April2009 - January 2010 : C# .NET Web Developer at PT. Adicipta Inovasi Teknologi,Jakarta, Indonesia
Responsibility:
April2009 : As a .NET Trainee learning various technical skill in C# language, .NETenvironment and MSSQL technologies related to the framework.
May2009 - February 2010 : Car Rental Web-based Application Development for clientcompany PT. Tunas Rental, Jakarta, Indonesia
Involvein development of Customer Billing module that can automatically generate billsthat contain the detailed amount to be paid by the customer.
Involvein development of Treasury module that can record the payment and generateestimated amortization of loans from bank.
Involvein development of End-of-Period Processing Application that can conduct overalldata processing during the off-work hour.
Involvein development of Agreement Contract process (Agreement Live)
Involvein SIT and UAT test, and User Manual documentation.
March2010 – August 2010 : Involve in data migration from the database of theprevious application into the Oracle-based database of new developed motorcyclefinancing application at PT. Bussan Auto Finance, Jakarta, Indonesia
September2010 – January 2011 : Involve in designing and developing a new framework forthe foundation of the upcoming projects:
Involvein providing Technical Development Training for Junior Programmer & AdInsCenter of Excellence (ACE) Trainee
DevelopClient Usage Application Licensing that strictly establishes the usage limit ofthe Application for the client company.
DevelopReporting Engine that can queuing report request asynchronously from the usersin order to prevent several huge-data reports processing that can causeoverload to server.
Involvein development of Batch Engine that will conduct distributed data processingand automatic/manual processing that can improve throughput of data processing.
Involvein development of Workflow Engine based on Workflow Foundation 4 that can modelhuman or system flow, and perform state-oriented integration with theApplication according to designed flow.
DevelopNotification Engine that can process a template and an input, and send theresult to single/multiple recipient via E-Mail, Mobile SMS, or the Applicationnotification bar.
4.Bondzie Nanabanyin
Name:Bondzie Nanabanyin
Nationality:Ghanaian
EducationalDetails
NanjingUniversity of Info Sci and Tech2011-Present Master’sDegree
Instituteof Advance Computer Education (GHANA)2008 Higher Diploma (MIS)
Instituteof Advance Computer Education (GHANA)2005 Diploma (MIS)
EducationalExperience
2005-Diploma ProjectWebsite for online Ticket reservation
2008-Higher Diploma ProjectNetwork threats.
2005 Programmingessentials with visual basic

5. Melvyn
Name: Melvyn
Problem Solving
Possess swift analytical capabilities and diagnostic skills.Made use of extensive knowledge gained to meet tight deadlines under pressure.
Computer Skills:Java,VB 6.0,C,Php and javascript,Python,SQL,SAP BW


6.Happiness

7.Ardala

8.Shadidy

9.Stacey



10. 邹勉
2008年到2012年 南京信息工程大学,计算机与软件学院,本科\学士
2012年至今 南京信息工程大学,计算机与软件学院,研究生\硕士
Nongombe
姓名:Nongombe
2013年至今 南京信息工程大学,网络安全,研究生\硕士

11. 杨磊
2011年至今 南京信息工程大学,计算机与软件学院,研究生\硕士

12. 马卢玉
教育经历:
2009到2013 南京信息工程大学,计算机与软件学院,本科\学士
2013年至今 南京信息工程大学,计算机与软件学院,研究生\硕士
Nanjing University of Information Science and Technology
1. OBJECTIVE
Can be more in-depth study of a subject that interests and in the field.
2. RESEARCH INTERESTS
Networksecurity and intrusion detection
Cloud computing
3. EDUCATION


13.冯璐
教育经历:
2009年到2013年南京信息工程大学,数学与统计学院,本科\学士
2013年至今南京信息工程大学,计算机与软件学院,研究生\硕士
1. OBJECTIVE
To make researches on Network Security and apply on the Cloud Computing Security
2. RESEARCH INTERESTS
Network Security and Cloud Computing
Data Analysis
3. EDUCATION
?Master of Engineering, a postgraduate degree in Software Engineering, Nanjing University of Information Science and Technology, Nanjing,China,2013.
Thesis:
?Bachelor of Science, Information and Computing Science, Nanjing University of Information Science and Technology, Nanjing, China, 2013
Thesis: Apply the idea of matrix eigenvalues on solution the partial differential equations
4. RESEARCH EXPERIENCE
5. SOFTWARE SKILLS
?Operating Systems:Windows XP/7/8
?Computer Languages:
?Proficiency in C
?Familiar with JAVA
?Tools: Familiar with Eclipse .

14.Jun Xiang


15.Hui Zhang


16.Natania


17.Tomas

18. Franck


19. 夏莲


20.石岭峰


21.王泓毅


22.鞠晓康


23.丁施磊


24.朱宇航


25. Rahman


26. Oscar

27. Miao He


28. Biao Zhou


29. Ange


30. Rana


31. 张帼杰


32. 李波

?


教育经历
工作经历
社会兼职


暂无内容
暂无内容
暂无内容


研究方向
联系方式


网络空间安全; 大数据挖掘及隐私保护; 人工智能及新型计算
网络与信息安全;机器学习;大数据安全;隐私保护

邮编:
传真:
通讯/办公地址:
办公室电话:
移动电话:
邮箱:


团队成员Research Group

网络空间安全团队
团队介绍:欢迎优秀的本科生、硕士生、博士生加入!QQ:电话:**



陈政



爨昊琪



周立文



屈锐



李荧



陈双双



章荪



张帼杰



李波



何苗



周彪



王泓毅



鞠晓康




相关话题/环境 大气