删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

中国石油大学华东控制科学与技术学院导师教师师资介绍简介-陈鸿龙(副教授)

本站小编 Free考研考试/2020-11-25



?姓名:陈鸿龙
?系属:自动化系

?学位:博士
?职称:副教授
?专业:控制科学与工程
?导师类别:硕士生导师、 博士生导师
?电子邮箱:chenhl@upc.edu.cn
?联系电话:
?通讯地址:山东省青岛市黄岛区长江西路66号工科E座1215室
?概况
研究方向
[1]智能物联网
[2]边缘计算
[3]安全与隐私保护

教育经历
2015年11月-2016年11月,美国亚利桑那州立大学,博士后
2009年2月-2012年8月,香港理工大学电子计算学系,博士
2006年9月-2008年12月,浙江大学控制系,硕士
2002年9月-2006年7月,中国石油大学(华东)自动化系,学士

工作经历
2018年7月至今,中国石油大学(华东)自动化系,副教授,博士生导师
2015年1月至今,中国石油大学(华东)自动化系,副教授,硕士生导师
2012年9月-2014年12月,中国石油大学(华东)自动化系,讲师
2014年7月-8月,香港理工大学电子计算学系,高级研究助理
2007年12月-2008年9月,香港理工大学电子计算学系,研究助理

学术兼职
IEEE高级会员,ACM会员,CCF高级会员,中国电子学会高级会员,CCF网络与数据通信专委会委员,CCF物联网专委会通信委员,中国电子学会物联网青年专技组通信委员,山东计算机学会网络空间安全专委会委员,目前担任国际期刊IEEE ACCESS编委,担任Journal of Computer Networks and Communications客座编委,担任IEEE Communications Magazine, IEEE IoT-J, IEEE TDSC, IEEE TWC, IEEE TVT, IEEE TCYB, IEEE TII等三十多个SCI检索国际期刊审稿人。

主讲课程
本科生课程:《无线传感网络》、《过程控制仪表与装置》
研究生课程:《物联网导论》

指导研究生及博士后
已毕业研究生:
2015届:杨玉斌*
2018届:马国蕾
2019届:丁鑫旺,付金楠,林凯,刘璐
2020届:艾欣,王帅,秦雨婷,刘东永,李宪敏
在读研究生:
2018级:李哲,张栋,刘国桢,代天骄,王筑*
2019级:林凯(博士),黄杨,倪志琛,刘德强,梁丰
2020级:李隽健(博士),闫娜,薛焕昇,麻国琦,王晓萌,张安庆,马博仑,高碧溶

承担项目
[1]面向大规模RFID系统的标签安全监测关键技术研究,国家自然科学基金面上项目,2018.01-2021.12,No. **,63万,主持
[2]大规模物联网关键技术研究,中国石油大学(华东)自主创新科研计划项目优青培育项目,2018.01-2020.12,No. 18CX07003A,20万,主持
[3]基于帧时隙ALOHA的大规模RFID系统标签监测及其安全与隐私保护研究,山东省重点研发计划项目,2018.01-2019.12,No. 2018GGX101035,20万,已结题
[4]大规模RFID系统的丢失标签检测与识别技术研究,山东省计算机网络重点实验室开放课题,2019.01-2020.12,No. SDKLCN-2018-06,2万,主持
[5]资源受限容迟网络的多层协议研究与设计,国家自然科学基金青年基金,2014.01-2016.12,No. **,23万,主持,已结题
[6]针对虫洞攻击的无线传感器网络安全定位方法的研究,山东省自然科学基金青年基金,2013.10-2016.10,No. ZR2013FQ032,5万,主持,已结题
[7]物联网跨层信息安全与隐私保护研究,山东省重点研发计划项目,2015.07-2017.07,No. 2015GGX101045,20万,主持,已结题
[8]面向资源受限的移动自组织网络信息安全与隐私保护研究,青岛市科技计划项目,2015.09-2017.09,No. 15-9-1-79-jch,5万,主持,已结题
[9]中国石油大学(华东)青年骨干教师人才建设工程,2014-2017,8万,主持,已结题
[10]基于非加密技术的资源受限物联网安全问题研究,中国石油大学(华东)自主创新计划项目延续资助,2016.01-2017.12,6万,主持,已结题
[11]资源受限的容迟网络系统理论研究,中国石油大学(华东)自主创新计划项目,2013.01-2014.12,No. 13CX02100A,8.8万,主持,已结题
[12]基于车载网的媒体报文信息分发机制,浙江省可视媒体智能处理技术研究重点实验室开放课题,2013.01-2013.12,No. **,1万,主持,已结题
[13]针对虫洞攻击的无线传感器网络安全定位技术,中国石油大学(华东)科研启动基金项目,2013.01-2015.12,3万,主持,已结题
[14]面向自动化拔尖人才的基于物联网技术创新型综合实验课程教学模式的研究与探索,中国石油大学(华东)青年教改项目,2014.09-2016.09,0.5万,主持,已结题

荣誉称号
[1]中国石油大学(华东)青年骨干教师人才建设工程,2014年
[2]黄岛区“智岛计划”紧缺人才,2014年
[3]中国石油大学(华东)优秀教师,2019年

论文
[1].Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, and Leyi Shi. Trust-aware Generative Adversarial Network with Recurrent Neural Network for Recommender. Accepted to appear in International Journal of Intelligent Systems, 2020. (SCI一区, IF:10.032)
[2].Xin Ai, Honglong Chen*, Kai Lin, Zhibo Wang and Jiguo Yu. Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. In IEEE Transactions on Information Forensics and Security, 2021. (CCF A, SCI一区, TOP)
[3].Honglong Chen, Yuting Qin, Kai Lin, Yingxin Luan, Zhibo Wang, Jiguo Yu, Yanjun Li. PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks. In Ad Hoc Networks, vol.107,no.1, 2020.(SCI二区)
[4]. Kai Lin,Honglong Chen*,Xin Ai, Vladimir Shakhov, Lina Ni, Jiguo Yu, Yanjun Li.EUMD: Efficient slot utilization based missing tag detection with unknown tags. In Journal of Network and Computer Applications, vol.160, no.15, 2020.(SCI二区,Top)
[5].Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi and Lianhai Wang. Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. InIEEE Access, vol.7, pp.66347-66357,2019.(SCI二区)
[6].Leyi Shi, Yang Li, Tianxu Liu, Jia Liu, Baoying Shan, andHonglong Chen*. Dynamic Distributed Honeypot Based on Blockchain. InIEEE Access, vol.7, pp.72234-72246,2019.(SCI二区)
[7].Xuxin Zhang,Honglong Chen*, Kai Lin, Zhibo Wang, Jiguo Yu, and Leyi Shi. RMTS: A Robust Clock Synchronization Scheme for Wireless Sensor Networks. In Journal of Network and Computer Applications,vol.135, no.1, pp.1-10,2019.(SCI二区, Top)
[8].Honglong Chen, Wei Lou, Zhibo Wang, and Feng Xia. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. In IEEE Transactions on Emerging Topics in Computing,vol. 6, no. 5, pp. 553-565,2018.(SCI二区)
[9].Honglong Chen, Lu Liu, Rongjie Che, Kai Lin, Xin Ai, and Yanjun Li. On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems. In IEEE Access, 2018, vol. 6, pp.57095-57104.(SCI二区)
[10].Kai Lin,Honglong Chen*, Tianjiao Dai, Denghui Liu, Lu Liu, and Leyi Shi.Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags. InIEEE Access, 2018, vol. 6, pp.54435-54446.(SCI二区)
[11].Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, and Jiguo Yu. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology,vol. 67, no. 10, pp. 9947-9958, Oct. 2018.(SCI二区)
[12].Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, and Leyi Shi. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. InIEEE Internet of Things Journal, vol. 5, no. 4, pp. 2915-2926, Aug. 2018.(SCI一区, Top)
[13].Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu. Probabilistic Detection of Missing Tags for Anonymous Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology,vol. 66, pp. 11295-11305, Dec. 2017.(SCI二区)
[14].Honglong Chen, Guoliang Xue, and Zhibo Wang. Efficient and Reliable Missing Tags Identification for Large-Scale RFID Systems with Unknown Tags. In IEEE Internet of Things Journal, vol. 4, pp.736-748, 2017.(SCI一区, Top)
[15].Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, and Xiangyuan Jiang. Efficient 3-Dimensional Localization for RFID Systems Using Jumping Probe. In Elsevier Pervasive and Mobile Computing, vol. 41, pp. 300-318, Oct. 2017.(SCI三区)
[16].Honglong Chen, Wei Lou, Zhibo Wang, and Qian Wang. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. In IEEE Transactions on Vehicular Technology,vol. 65, pp.6377-6388, 2016.(SCI二区)
[17].Honglong Chen, and Wei Lou. Contact Expectation Based Routing for Delay Tolerant Networks. In Elsevier Ad Hoc Networks, vol. 36, pp.244-257, 2016.(SCI三区)
[18].Honglong Chen, Wei Lou, and Zhi Wang. On Providing Wormhole Attack Resistant Localization Using Conflicting Sets. In WileyWireless Communications and Mobile Computing, vol. 15, pp.1865-1881, 2015.(SCI四区)
[19].Honglong Chen, and Wei Lou. On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing, vol. 16, pp.36-50, 2015.(SCI三区)
[20].Honglong Chen, Wei Lou, Junfeng Wu, Zhibo Wang, Zhi Wang, and Aihua Xia.Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing. vol. 16, pp. 22-35, Jan. 2015.(SCI三区)
[21].Honglong Chen, and Wei Lou. GAR: Group Aware Cooperative Routing Protocol for Resource-Constraint Opportunistic Networks. In Elsevier Computer Communications, vol. 48, pp.20-29, 2014.(SCI三区)
[22].Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, and Yanjun Li.Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. In International Journal of Distributed Sensor Networks. 2014.(SCI四区)
[23].Honglong Chen, Wei Lou, Xice Sun, and Zhi Wang. A secure localization approach against wormhole attacks using distance consistency. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 627039, 11 pages, 2010. doi:10.1155/2010/627039.(SCI四区)
[24].Honglong Chen, Wei Lou, and Zhi Wang. A Novel Secure Localization Approach in Wireless Sensor Networks. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 981280, 12 pages, 2010. doi:10.1155/2010/981280.(SCI四区)
[25].陈鸿龙,王志波,王智,许江铭,李燕君,刘丽萍.针对虫洞攻击的无线传感器网络安全定位方法.通信学报. 2015. (EI)
[26].陈鸿龙,李鸿斌,王智.基于TDoA测距的传感器网络安全定位研究.通信学报, 2008. (EI)
[27].陈鸿龙,刘东永,倪志琛,孙良,刘宝.基于YOLO的四旋翼无人机人脸识别实验平台.实验技术与管理,2020.(核心期刊教改论文)
[28].陈鸿龙,林凯,李哲,代天骄,孙良.基于NB-IoT的抽油机远程监控系统设计.实验室研究与探索,2020.(核心期刊教改论文)
[29].陈鸿龙,李宪敏,代天骄,孙良.基于RFID反向散射的标签定位实验平台.实验技术与管理,2019.(核心期刊教改论文)
[30].陈鸿龙,杨玉斌,田力丹,马国蕾,李晓辉.基于物联网的抽油机群远程监控实验平台.实验技术与管理, 2016.(核心期刊教改论文)
[31].陈鸿龙,涂玲,孙良,邓晓刚.基于无线传感器网络的抽油机监控实验系统.实验技术与管理, 2014.(核心期刊教改论文)
[32].Nan Jiang, Jing Chen, Rigui Zhou, Changxing Wu,Honglong Chen, Jiaqi Zheng, Tao Wan. PAN: Pipeline Assisted Neural Networks Model for Data-to-Text Generation in Social Internet of Things. In Information Sciences, 2020. (SCI二区,CCF B类,Top)
[33]. Jiahui Hu, Zhibo Wang, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang,Honglong Chen, Dejun Yang. Towards Demand-driven Dynamic Incentive for Mobile Crowdsensing Systems. In IEEE Transactions on Wireless Communications, 2020. (SCI一区,CCF B, Top)
[34]. Jiguo Yu, Kan Yu, Dongxiao Yu, Xiuzhen Cheng, Weifeng Lv, Honglong Chen, Wei Cheng. Efficient Link Scheduling in Wireless Networks under Rayleigh-fading and Multiuser Interference. In IEEE Transactions on Wireless Communications, 2020. (SCI一区,CCF B, Top)
[35]. ZhiboWang,XiaoyiPang,JiahuiHu,WenxinLiu,QianWang,YanjunLi,HonglongChen.WhenMobileCrowdsensingMeetsPrivacy. InIEEE Communications Magazine, 2019.(SCI一区, Top)
[36]. Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei,Honglong Chen, and Xiaoguang Niu. Task Bundling Based Incentive for Location-dependent Mobile Crowdsourcing. In IEEE Communications Magazine, 2019, 57(2), pp. 54-59.(SCI一区, Top)
[37]. Behrouz Jedari, Feng Xia,Honglong Chen, Sajal K. Das, Amr Tolba, Zafer AL-Makhadmeh. A Social-based Watchdog System to Detect Selfish Nodes in Opportunistic Mobile Networks. In Elsevier Future Generation Computer Systems, 2019.(SCI二区)
[38]. Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajia Shao, Qian Wang, Libing Wu,Honglong Chen, and Hairong Qi. Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server. In IEEE Transactions on Mobile Computing, 2019.(SCI二区,CCF A类,ESI高被引)
[39]. Chuanwen Luo, Jiguo Yu, Deying Li,Honglong Chen, Yi Hong, Lina Ni.A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks. In Computer Networks, 2018, 146, pp.104-114(SCI三区, CCF B)
[40]. Noor Ullah, Xiangjie Kong, Liangtian Wan,Honglong Chen, Zhibo Wang, Feng Xia.A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. In The Computer Journal, 2018, 61 (7), pp.971-986.(SCI四区,CCF B)
[41]. Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman,Honglong Chen, Lina Ni.CRPD: a novel clustering routing protocol for dynamic wireless sensor networks. In Personal and Ubiquitous Computing, 2018, 22 (3), pp.545-559.(SCI三区)
[42]. Yanjun Li, Kaikai Chi,Honglong Chen, Zhibo Wang, Yihua Zhu.Narrowband Internet of Things Systems with Opportunistic D2D Communication. In IEEE Internet of Things Journal, 2018, 5 (3), pp.1474-1484.(SCI一区, Top)
[43]. Zhibo Wang, Qing Cao, Hairong Qi,Honglong Chen, Qian Wang. Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks. In Elsevier Ad Hoc Networks, 2017.(SCI三区, ESI高被引)
[44]. Zhibo Wang,Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, Qian Wang.Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks. In Computer Networks, 2017.(SCI三区, CCF B类,ESI高被引)
[45]. Baogui Huang, Jiguo Yu, Xiuzhen Cheng,Honglong Chen, Hang Liu.SINR based shortest link scheduling with oblivious power control in wireless networks. In Journal of Network and Computer Applications,2017.(SCI二区, Top)
[46]. Zhibo Wang, Zhi Wang,Honglong Chen, Jianfeng Li, Hongbin Li and Jie Shen. HierTrack: An Energy Efficient Cluster-based Target Tracking System for Wireless Sensor Networks. In Journal of Zhejiang University - Science C, 2013.(SCI四区)
[47]. Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma andHonglong Chen. HCTT: A Hybrid Cluster-based Target Tracking Protocol for Wireless Sensor Networks. In International Journal of Distributed Sensor Networks. 2013.(SCI四区)
[48]. Yu Chen, Weiwei Wang,Honglong Chen, Xiangcui Kong, and Jingjing Chen. Parameter Characteristics of Gauss-Markov Mobility Model in Mobile Wireless Sensor Networks. Accepted to appear in Ad Hoc and Sensor Wireless Networks. 2015.(SCI四区)
[49]. Leyi Shi, Yuwen Cui, Han Xu,Honglong Chen, Deli Liu. Mimicry honeypot: an evolutionary decoy system. Accepted to appear in International Journal of High Performance Computing and Networking. 2017.(EI)
[50].石乐义,崔玉文,付文静,陈鸿龙.一种分簇无线传感网轻量级匿名认证及密钥协商方案.北京邮电大学学报. 2018.(EI)
[51].李燕君,胡绍利,迟凯凯,陈鸿龙.面向家庭健康监护的传感网中继节点部署方法.仪器仪表学报. 2015. (EI)
[52].石乐义,贾聪,宫剑,刘昕,陈鸿龙.基于共享秘密的伪随机散列函数RFID双向认证协议.电子与信息学报. 2015. (EI)
[53].曹玉苹,邓晓刚,田学民,陈鸿龙.数据驱动的抽油机井实时故障诊断实验平台.实验技术与管理. 2015.(核心期刊教改论文)


会议
[1].Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, Leyi Shi. TagRec: Trust-aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems, in Proceedings of 3rdInternational Conference on Machine Learning for Cyber Security, 2020.(BestPaperAward,1outof158papers)
[2].Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang,Honglong Chenand Qian Wang. Pay On-demand: Dynamic Incentive and Task Selection for Location-dependent Mobile Crowdsensing Systems, in Proceedings ofIEEE ICDCS, 2018.(CCF B)
[3].Zhibo Wang, Yongquan Zhang,Honglong Chen, Zhetao Li, Feng Xia. Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks, in Proceedings ofIEEE INFOCOM, 2018, pp.1304-1312. (CCF A)
[4].Zhibo Wang,Honglong Chen, Qing Cao, Hairong Qi, and Zhi Wang.Fault Tolerant Barrier Coverage for Wireless Sensor Networks, in Proceedings ofIEEE INFOCOM, 2014.(Acceptance ratio: 320/1645=19.4%)(CCF A)
[5].Honglong Chenand Wei Lou. Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs, in Proceedings ofIEEE ICCCN, 2013. (CCF C)
[6].Honglong Chenand Wei Lou, Group Aware Cooperative Routing for Opportunistic Networks under Resource Constraints, in Proceedings of IEEE GLOBECOM, 2012. (CCF C)
[7].Honglong Chenand Wei Lou, On Using Contact Expectation for Routing in Delay Tolerant Networks,in Proceedings ofthe 40thIEEE International Conference on Parallel Processing (IEEE ICPP), Taiwan, September, 2011. (Acceptance ratio: 81/363=22.3%)(CCF B)
[8].Honglong Chen, Wei Lou and Zhi Wang, Secure Localization Against Wormhole Attacks Using Conflicting Sets, in Proceedings of the 29thIEEE International Performance Computing and Communications Conference (IEEE IPCCC), Albuquerque, USA, December 2010. (Acceptance ratio: 36/127=28.3%)(CCF C)
[9].Honglong Chenand Wei Lou, From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks, in Proceedings of the 29thIEEE International Performance Computing and Communications Conference (IEEE IPCCC), Albuquerque, USA, December 2010. (Acceptance ratio: 36/127=28.3%) (CCF C)
[10].Honglong Chen, Wei Lou and Zhi Wang, Consistency-Based Secure Localization Against Wormhole Attacks in Wireless Sensor Networks, in Proceedings of theInternational Conference on Wireless Algorithms, Systems and Applications(WASA), Boston, USA, Aug., 2009.
[11].Honglong Chen, Wei Lou andZhi Wang, Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks, in Proceedings of the6thInternational Conference on Ubiquitous Intelligence and Computing(UIC),Brisbane, Australia, July 7-9, 2009. (CCF C)
[12].Honglong Chen, Wei Lou, Junchao Ma andZhi Wang,TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks, in Proceedings of the Second International Conference on Sensor Technologies and Applications(IEEE SENSORCOMM):661-666, Cap Esterel, France, August 25-31, 2008.
[13].Lianfang Cai, Xuemin Tian, andHonglong Chen.Nonlinear Process Fault Diagnosis Using Kernel ICA and Improved FDA, in Proceedings of the11th IFAC International Workshop on Adaptation and Learning in Control and Signal Processing, 2013.
[14].Weiming Shao, Xuemin Tian, andHonglong Chen.Adaptive Anti-Over-Fitting Soft Sensing Method Based on Local Learning, in Proceedings of the 10th IFAC International Symposium on Dynamics and Control of Process Systems, 2013.
[15].Zhibo Wang, Zhi Wang,Honglong Chen, Jianfeng Li and Hongbin Li. Demo Abstract: An Energy-efficient Target Tracking System for Wireless Sensor Networks, in Proceedings ofACM Sensys, 2011.
[16].Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma andHonglong Chen, A Novel Mobility Management Scheme for Target Tracking in Cluster-based Sensor Networks, in Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS), 2010.
[17].Junfeng Wu,Honglong Chen, Wei Lou, Zhibo Wang and Zhi Wang, Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, in Proceedings of IEEE International Conference on Networking, Architecture, and Storage (IEEE NAS), 2010.
[18].Xice Sun, Zhi Wang,Honglong Chenand Wei Lou, A Probabilistic Model for lifetime measurement in privacy-aware sensor networks, in Proceedings of IEEE International Conference on Wireless Communications and Signal Processing (IEEE WCSP), 2009.



专利
[1].艾欣,陈鸿龙,林凯,代天骄,王志波,石乐义.基于SHZE的大规模分组RFID系统的丢失标签冰山查询方法.授权,2019.(专利号:ZL20**)
[2].杨黎鹏,车荣杰,梅刚,张千昌,孙延波,戴群,关晓龙,陈鸿龙,代天骄.基于SZE的大规模分组RFID系统的丢失标签冰山查询方法.授权,2019.(专利号:ZL20**)
[3].陈鸿龙,马国蕾,丁鑫旺,林凯,刘璐,石乐义.匿名分组RFID系统的丢失标签检测方法.授权,2018.(专利号:ZL20**)
[4].陈鸿龙,付金楠,丁鑫旺,刘璐,林凯,王志波,石乐义.匿名射频识别系统基于向量的丢失关键标签的识别方法.授权,2018.(专利号:ZL20**)
[5].陈鸿龙,林凯,刘璐,付金楠,丁鑫旺,石乐义.含有未知标签的射频识别系统的丢失标签识别方法.授权,2018.(专利号:20**)
[6].陈鸿龙,杨黎鹏,车荣杰,丁鑫旺,付金楠,林凯,刘璐,石乐义.匿名多组射频识别系统的丢失标签非确定性并行检测方法.授权,2018.(专利号:ZL20**)
[7].陈鸿龙,王志波,王智.一种无线网络中移动信标节点检测及定位虫洞攻击的方法.授权, 2017.(专利号:ZL1.8)
[8].陈鸿龙,马国蕾,李晓辉,田力丹.一种基于跳跃式查询的被动式三维射频识别定位方法.授权, 2016,(专利号:ZL5.X)
[9].陈鸿龙,田力丹,王志波,马国蕾,连雪.一种容迟网络中基于期望会面节点数的路由方法.授权, 2016, (专利号:ZL3X).
[10].陈鸿龙,王志波,王智.一种移动自组织网络中能量有效的异步邻节点发现方法.授权, 2014. (专利号:ZL8.8)
[11].王智,王志波,孙喜策,李安,陈鸿龙.一种基于混合簇的无线传感器网络移动目标跟踪方法.授权, 2013. (专利号:ZL3.X)








相关话题/中国石油大学 控制