删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

西安电子科技大学网络与信息安全学院导师教师师资介绍简介-蒋忠元

本站小编 Free考研考试/2021-07-10


基本信息
姓名:蒋忠元博士、副教授
硕导或博导:博导
博士学科:网络空间安全
硕士学科:网络空间安全 
工作单位:网络与信息安全学院
研究方向:复杂网络与网络安全,隐私保护,大数据安全,网络功能虚拟化等

联系方式
通信地址:西安市太白南路2号
邮政编码:710071
电子邮箱:zyjiang(at)xidian.edu.cn
办公电话:
办公地点:北校区主楼4区316


个人简介
蒋忠元,男,博士,副教授,汉族,1988年4月出生,陕西榆林靖边人。主要个人经历如下:
2005年9月至2009年7月,北京交通大学计算机与信息技术学院计算机科学与技术专业学习,获工学学士学位。
2009年9月至2013年9月,北京交通大学信息科学研究所攻读博士学位,专业为信号与信息处理。
2013年10月至2014年6月,西北农林科技大学信息工程学院,讲师。
2014年7月至当年12月,西安电子科技大学计算机学院,讲师。
2015年1月起,西安电子科技大学网络与信息安全学院,讲师。
2015年10月至2016年10月,微软亚洲研究院,访问****,合作导师:郑宇
2017年7月-至今,西安电子科技大学网络与信息安全学院 副教授、硕导。
2018年8月至2019年8月,美国伊利诺伊大学芝加哥分校(UIC),访问****,合作导师:Philip S. Yu, 访问实验室 UIC BDSC.
2021年6月起,受聘网络空间安全学科博士生导师。
目前主持国家自然基金青年科学基金项目一项,陕西省自然科学基础研究计划项目一项,基本科研业务费项目多项,详细查看项目列表。截止目前已发表SCI检索论文四十余篇,详细见论文列表。为IEEE Communications Letters等刊物的审稿人。

主要研究方向
1. 大数据安全
*隐私保护
*信任管理
2.复杂网络视角下的网络安全研究
*网络级联效应产生机制与防范
*网络鲁棒性
*复杂网络的可控性、能观性及其控制理论

3. 复杂网络传输动力学研究
*复杂网络路由机制
*复杂网络结构与资源分配

4. Network functions virtualization (NFV), 网络功能虚拟化
*可靠性
5. Urban Computing, 城市计算
*交通流级联效应




基本信息
姓名:蒋忠元博士、副教授
硕导或博导:博导
博士学科:网络空间安全
硕士学科:网络空间安全 
工作单位:网络与信息安全学院
研究方向:复杂网络与网络安全,隐私保护,大数据安全,网络功能虚拟化等

联系方式
通信地址:西安市太白南路2号
邮政编码:710071
电子邮箱:zyjiang(at)xidian.edu.cn
办公电话:
办公地点:北校区主楼4区316


个人简介
蒋忠元,男,博士,副教授,汉族,1988年4月出生,陕西榆林靖边人。主要个人经历如下:
2005年9月至2009年7月,北京交通大学计算机与信息技术学院计算机科学与技术专业学习,获工学学士学位。
2009年9月至2013年9月,北京交通大学信息科学研究所攻读博士学位,专业为信号与信息处理。
2013年10月至2014年6月,西北农林科技大学信息工程学院,讲师。
2014年7月至当年12月,西安电子科技大学计算机学院,讲师。
2015年1月起,西安电子科技大学网络与信息安全学院,讲师。
2015年10月至2016年10月,微软亚洲研究院,访问****,合作导师:郑宇
2017年7月-至今,西安电子科技大学网络与信息安全学院 副教授、硕导。
2018年8月至2019年8月,美国伊利诺伊大学芝加哥分校(UIC),访问****,合作导师:Philip S. Yu, 访问实验室 UIC BDSC.
2021年6月起,受聘网络空间安全学科博士生导师。
目前主持国家自然基金青年科学基金项目一项,陕西省自然科学基础研究计划项目一项,基本科研业务费项目多项,详细查看项目列表。截止目前已发表SCI检索论文四十余篇,详细见论文列表。为IEEE Communications Letters等刊物的审稿人。

主要研究方向
1. 大数据安全
*隐私保护
*信任管理
2.复杂网络视角下的网络安全研究
*网络级联效应产生机制与防范
*网络鲁棒性
*复杂网络的可控性、能观性及其控制理论

3. 复杂网络传输动力学研究
*复杂网络路由机制
*复杂网络结构与资源分配

4. Network functions virtualization (NFV), 网络功能虚拟化
*可靠性
5. Urban Computing, 城市计算
*交通流级联效应




科学研究
目前研究团队承担的科研项目:
[7]复杂电子信息系统软硬件耦合故障级联传播可靠性研究,中电集团第二十研究所,2020.7-2020.12,项目负责人。
[6]用户行为异常检测,华为技术有限公司,2020.5-2020.12,项目负责人。
[5]基于SDN的天基网络快速重路由技术研究,中电集团第五十所研究所,2020.4-2022.4,项目负责人。
[4]复杂通信网络传输容量与级联效应安全防护综合研究, 国家自然科学基金青年科学基金项目, 2016.1-2018.12, 21万(直接经费), 负责人.
[3]复杂通信网络传输容量与级联效应安全防护综合研究, 2015.9-2016.9, 西安电子科技大学基本业务费(国家基金配套), 1.05万, 负责人.
[2]复杂网络视角下的网络容量与级联安全综合研究, 2015.1-2016.12, 西安电子科技大学基本业务费, 6万, 负责人.
[1]复杂网络级联效应分析与防护, 2014.10-2015.9, 西安电子科技大学基本科研业务费, 3万, 负责人;





学术论文
详细信息请查看我的Google学术。
2021
[58] Zhongyuan Jiang*, Tang Xiaoke, Yong Zeng, Jianfeng Ma,Adversarial link deception against the link prediction in complex networks,Physica A: Statistical Mechanics and its Applications, 2021, 577: 126074.
[57] Lijun Fan, Zhongyuan Jiang*, Qiang Wang,Robustness Evaluation for Real Traffic Network fromComplex Network Perspective,International Journal of Modern Physics C, 2021, to appear.
[56] Xianyu Chen, Zhongyuan Jiang*, Hui Li, Jianfeng Ma, Philip S. Yu.Community Hiding by Link Perturbation in Social Networks,IEEE Transactions on Computational Social Systems, 2021, 8(3): 704-715. DOI: 10.1109/TCSS.2021.**, 2021.
[55] Zisheng Yu, Zhongyuan Jiang*, Jianfeng Ma, Yu Zheng.Safeness-based Community Penetration,IEEE Transactions on Circuits and Systems II: Express Briefs, 2021, 68(7):2690-2694. DOI: 10.1109/TCSII.2021.**, 2021.
[54]Dongyan Zhao, Jing Li, Zhongyuan Jiang*,Effects of link perturbation on network modularity for community detections in complex network systems,MODERN PHYSICS LETTERS B , 35(‏ 13): **, 出版年: ‏ MAY 10 2021.
2020
[53] 蒋忠元, 陈贤宇, 马建峰, 社交网络中社团隐私保护研究综述, 网络与信息安全学报, 2020, 已录用.
[52] Peilei Xue, Zhongyuan Jiang*,Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN,IEEE GLOBECOM 2020, December 7 - 11, in Taipei, Taiwan. Accepted.
[51] Sijie Ruan, Zi Xiong, Cheng Long, Yiheng Chen, Jie Bao, Tianfu He, Ruiyuan Li, Shengnan Wu, Zhongyuan Jiang, Yu Zheng, Doing in One Go: Delivery Time Inference Based on Couriers’ Trajectories, KDD'20.
[50] Jiang ZY, Li J, Ma JF, Yu Philip S, Similarity-based and Sybil Attack Defended Community Detection for Social Networks, IEEE Transactions on Circuits and Systems--II: Express Briefs, 2020, accepted.
[49]李晶,蒋忠元,马建峰. 逆链路预测方法研究综述. 信息安全学报,2020,录用.
[48]Ruiyuan Li, Jie Bao, Huajun He, Sijie Ruan, Tianfu He, Liang Hong, Zhongyuan Jiang,Yu Zheng.Discovering Real-time Reachable Area using Trajectory Connections. (DASFAA 2020).
[47] Z. Jiang, L. Sun, P. S. Yu, H. Li, J. Ma, Y. Shen, "Target Privacy Preserving for Social Networks", IEEE ICDE 2020.
[46] Jiang ZY, Chen XY, Dong BW, Zhang JS, Gong JB, Yan H, Zhang ZH, Ma JF, Yu PS.Trajectory-based Community Detection.IEEE Transactions on Circuits and Systems--II: Express Briefs, 2020, 67(6): 1139-1143.
2019
[45] Z. Jiang, J. Ma and P. S. Yu, "Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 1381-1388.
[44] Z Liu, J Weng, J Ma, J Guo, B Feng, Z Jiang, K Wei, TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs,IEEE Internet of Things Journal, 2019, online.DOI:10.1109/JIOT.2019.**.
[43] Z. Jiang, X. Chen, J. Ma, Y. Zhang and J. Gu, "Traffic Dynamics Evaluation for the Future NFV Deployment," in IEEE Transactions on Circuits and Systems II: Express Briefs. (early access), 2019.
[42]Hui Li, Mengting Xu, Sourav S Bhowmick, Changsheng Sun, Zhongyuan Jiang, Jiangtao Cui. DISCO: Influence Maximization Meets Network Embedding and Deep Learning. arXiv preprint arXiv:1906.07378, 2019.
[41] Jiang ZY, Wang Q, Liu ZQ, Ma JF.Vehicle demand evolution analysis from the complex network perspective,Physica A: Statistical Mechanics and its Applications, Volume 532,15 October 2019, 121889.
[40]Jiang, Zhong-Yuan, Yong Zeng, Zhi-Hong Liu, and Jian-Feng Ma. "Identifying critical nodes’ group in complex networks."Physica A: Statistical Mechanics and its Applications514 (2019): 121-132.
2018
[39]曾勇, 周灵杰, 蒋忠元, 刘志宏, & 马建峰. (2018). Security analysis of weighted network anonymity based on singular value decomposition%基于奇异值分解的含权网络匿名化的安全性分析.通信学报,039(005), 23-33.
[38] Susu Yang, Hui Li, and Zhongyuan Jiang, “Targeted Influential Nodes Selection in Location-Aware Social Networks,”Complexity, vol. 2018, Article ID **, 10 pages, 2018.https://doi.org/10.1155/2018/**.
[37]Wang, X., Chen, F*., Zhang, T., Qin, N., & Jiang, Z. Y*. (2018). A new routing strategy limited by heterogeneous link bandwidth. Modern Physics Letters B, 32(24), **.
[36]Jiang, Z. Y., Liu, Z. Q., He, X., & Ma, J. F. . Cascade phenomenon against subsequent failures in complex networks. Physica A: Statistical Mechanics and its Applications, 2018,499: 472–480.
2017:
[35] Liang Y X, Jiang Z Y, Zheng Y, Inferring traffic cascading patterns, ACM SIGSPATIAL 2017, accepted. (full paper, 录用率18%, 学生第一作者)
[34] Liu Z, Ma J F, Jiang Z Y, Miao Y B, FCT: a fully-distributed context-aware trust model for location based service recommendation, Science China Information Sciences 60:082102, 2017. DOI: https://doi.org/10.1007/s11432-015-9029-y
[33] Jiang Z Y*, Ma J F, Effects of packet retransmission with finite packet lifetime on traffic capacity in scale-free networks, Int. J. Mod. Phys. C 28, ** (2017). DOI:http://dx.doi.org/10.1142/S0129**8.
[32]Jiang Z Y*, Ma J F, Deployment of check-in nodes in complex networks,Scientific Reports, 2017, 7: 40428.
[31]Jiang Z Y*, Ma J F, An efficient local cascade defense method in complex networks, International Journal of Modern Physics C, 2017, 28: **.
[30]Jiang Z Y*, Ma J F, Check-in based routing strategy in scale-free networks, Physica A-Statistical Mechanics and Its Applications, 2017, 468: 205~211.
[29] Mengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, and Jianfeng Ma. "Centrality Based Privacy Preserving for Weighted Social Networks." In 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 574-577. IEEE, 2017.
[28] Longfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, and Jianfeng Ma. "A Survey of Network Reconstruction on Social Network." In 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 297-301. IEEE, 2017.
[27] Lingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, and JianFeng Ma. "Multi-hop Based Centrality of a Path in Complex Network." In 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 292-296. IEEE, 2017.
2016:
[26]Jiang Z Y*, Ma J F, Shen Y L, Zeng Y. Effects of link-orientation methods on robustness against cascading failures in complex networks. Physica A, 457 1-7, 2016.
[25] Liu Z Q, Ma J F,Jiang Z Y, et al. LSOT: A Lightweight Self-Organized Trust Model in VANETs,2016, 2016: **.
[24] Liu Z Q, Ma J F,Jiang Z Y, et al.A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment,KSII Transactions on Internet and Information Systems, 10(2) 914-934, 2016.
[23] Liu Z Q, Ma J F,Jiang Z Y, et al.Integrating Reputation and Local Trust for Trustworthy Service Recommendation in Service-oriented Social Networks, PLoS ONE, 2016, 11(3): e**.
[22] He X, Niu K, He Z, Lin J, Zhang H,Jiang Z Y,Efficient packet navigation method on scale-free networks with finite and diversiform node delivery capacity, Int. J. Mod. Phys. C, 2016, 27: **. DOI: 10.1142/S0129**4.
2015:
[21] Liu J,Jiang Z Y, Kato N, Akashi O, and Takahara A, Reliability Evaluation for NFV Deployment of Future Mobile Broadband Networks,IEEE Wireless Communications, 2016, 23(3): 90-96..
[20]Jiang Z Y*, Ma J F, Jing X,Enhancing traffic capacity of scale-free networks by employing hybrid routing strategy, Physica A, 2015, 422: 181-186. (SCI, cited times: 13)
[19] Zhang H*, Jiang Z Y,Exploring highly-efficient routing strategy on scale-free networks with limited and diverse node capacity, Mod. Phys. Lett. B, 2015, in press. (SCI)
[18] He X*, Niu K, He Z, Lin J, Jiang Z Y*,Efficient packet transportation on complex networks with nonuniform node capacity distribution,Int. J. Mod. Phys. C 2015, 26: **.(SCI)
[17] Zhang S, Liang M G*,Jiang Z Yet al.,Improved efficient static weighted routing strategy on two-la[ant]yer complex networks,Int. J. Mod. Phys. C 2015, 26: **.(SCI)
2014年度:
[16]Jiang Z Y*,An incremental optimal routing strategy for scale-free networks[J]. Int. J. Mod. Phys. C, 2014, 25: **.(SCI, Impact factor:1.125)
[15]Jiang Z Y,Liang M G*.Effects of efficient edge rewiring strategies on network transport efficiency[J]. Physica A, 2014,394(1):379-385.(SCI, Impact factor:1.722, cited times:3)
[14] Zhang S, Liang M G*,Jiang Z Yet al.,Effective strategy of adding links for improving network transport efficiency on complex networks,Int. J. Mod. Phys. C 25, ** (2014) .(SCI, cited times:1)
2013年度:
[13]Jiang Z Y, Liang M G*, Wu J J.Dynamic source routing strategy for two-level flow on scale-free networks[J]. PLOS ONE, 2013, 8(12): e82162.(SCI, Impact factor:3.53, cited times:1)
[12]Jiang Z Y, Liang M G*, Li Q, Guo D C.Optimal dynamic bandwidth allocation for complex networks[J]. Physica A, 2013, 392(5): 1256-1262.(SCI, Impact factor:1.722, cited times:5)
[11]Jiang Z Y, Liang M G*.Incremental routing strategy on scale-free networks[J]. Physica A, 2013, 392(8): 1894-1901.(SCI, Impact factor:1.722, WoS cited times:10)
[10]Jiang Z Y, Liang M G*, Zhang S, Zhou W X, Jin H Q.Enhancing traffic capacity of two-la[ant]yer scale-free networks[J]. Int. J. Mod. Phys. C, 2013, 24(7): **.(SCI, cited times: 3)
[9]Jiang Z Y, Liang M G*, Guo D C.Improving network transport efficiency by edge rewiring[J]. Mod. Phys. Lett. B, 2013, 27(8):**.(SCI)
[8] Zhang S, Liang M G*,Jiang Z Yet al.,Queue resource reallocation strategy for traffic systems in scale-free network[J],Int. J. Mod. Phys. C 24, ** (2013) .(SCI)
2012年度:
[7]Jiang Z Y, Liang M G*, Huang J L, Li Q.An efficient weighted routing strategy for scale-free networks[J]. Mod. Phys. Lett. B,2012, 26: **.(SCI)
[6]Jiang Z Y, Liang M G*.Improved Efficient Routing Strategy on Scale-free Networks[J]. Int. J. Mod. Phys. C, 2012, 23: **.(SCI, WoS cited times:10)
[5]Jiang Z Y, Liang M G*, et al.An Efficient Bandwidth Allocation Strategy for Scale-free Networks[J]. Int. J. Mod. Phys. C, 2012, 23: **.(SCI, WoS cited times:8)
[4]Jiang Z Y, Liang M G*, Improving the Network Load Balance by Adding an Edge,Advanced Materials Research, 2012,433-440: 5147. (ISTP, cited tims: 1)
2011年度:
[3]Jiang Z Y, Liang M G*, Guo D C.Enhancing Network Performance by Edge Addition[J]. Int. J. Mod. Phys. C, 2011, 22: 1211-1226.(SCI, WoS cited times:14)
[2]Jiang Z Y, Liang M G*,A Network Connection Protection Mechanism Based on Random Node Identification[C], 2011 IEEE ICCT.
[1] Guo D C, Liang M G*, Li D D,Jiang Z Y,Effect of random edge failure on the average path length[J],J. Phys. A: Math. Theor., 2011,44: 415002.(SCI, cited times:1)




科研团队
目前在马建峰教授的“网络与系统安全(陕西省)重点实验室”从事教学与研究。





课程教学
目前本人承担的教学任务:
本科课程:
(1)2015.3-2015.6《物联网技术》公选课 每周四晚7:00-8:30, 南校区B306
(2)《计算机通信与网络》或《计算机网络》课程
(3)《网络管理》
(4)《下一代互联网》
(5)《网络科学导论》
研究生课程:
(1)《计算机网络安全》、《网络安全》、《操作系统安全》
(2)《复杂网络原理与应用》




招生要求
~~~~~~~~~~~~~~~~~~~~~~~~~~
关于研究生招生的信息:
2021年6月起,在网络空间安全学科招收博士研究生。
2017年起招收硕士生,专业有:
(1)网络空间安全/信息安全 (学术型硕士)
(2)电子信息(专业型硕士)
欢迎报考,请有意报考(或保研)学生发送简历(包括基本信息,主干课程,参加过的竞赛、活动,实践实习,参与或主持过的科创项目,自我评价等)至邮箱(zyjiang@xidian.edu.cn)!
~~~~~~~~~~~~~~~~~~~~~~~~~~




研究生
在读研究生:
2021级:崔吉鹏(已保研),冯雪阳(已保研),刘正道(已保研)
2020级:王森,赵晓庆,郭芸志(广研院),陈聪(广研院),陈南烨(郑宇指导)
2019级:李晶(保研), 樊粒君,薛沛雷,俞自生(郑宇指导)
2018级:陈茜,王强,陈贤宇




Profile
Name: Zhong-Yuan Jiang
Title: Associate Professor, Ph. D
Department:School of Cyber Engineering


Contact Information
Address: Xi'an
Email: zyjiang@xidian.edu.cn
Tel:


Introduction
Dr. Zhong-Yuan Jiang received both B.S. and Ph.D. degrees from Beijing Jiaotong University in 2009 and 2013 respectively.He is currently on the faculty board of School of Computer Science and Technology, Xidian University. View the detailed reseach. He hosts many projects including NSFC, andFundamental Research Funds for the Central Universities.


Research Interests
1Security or Safety of Complex Networks
*Control or Defense Mechanisms on Cascading Failures
*Robustness of Complex Networks
*Controllability and Observability of Complex networks

2. Traffic Dynamic of Complex Networks
*Routing Methods for Complex Networks
*Network Structures and Resource Allocations
3. Network Functions Virtualization (NFV)
*Reliability
4. Urban Computing (Cooperate with Dr. Yu Zheng in MSRA)
*Traffic cascade phenomenon





Research
Projects:
[4]The Intergrated study of network capacity and cascade defense for complex communication networks, 2016.1-2018.12, NSFC, host.
[3]The Intergrated study of network capacity and cascade defense for complex communication networks, 2015.9-2016.9, theFundamental Research Funds for the Central Universities.
[2]Integrated study of traffic capacity and cascade safety from complex network perspective, 2015.1-2016.12, theFundamental Research Funds for the Central Universities.
[1]The analysis and defense of cascade on complex networks, 2014.10-2015.9,theFundamental Research Funds for the Central Universities;





Papers
About detailed information please view My Google Scholar.
Papers:
2021
[58] Zhongyuan Jiang*, Tang Xiaoke, Yong Zeng, Jianfeng Ma,Adversarial link deception against the link prediction in complex networks,Physica A: Statistical Mechanics and its Applications, 2021, 577: 126074.
[57] Lijun Fan, Zhongyuan Jiang*, Qiang Wang,Robustness Evaluation for Real Traffic Network fromComplex Network Perspective,International Journal of Modern Physics C, 2021, to appear.
[56] Xianyu Chen, Zhongyuan Jiang*, Hui Li, Jianfeng Ma, Philip S. Yu.Community Hiding by Link Perturbation in Social Networks,IEEE Transactions on Computational Social Systems, 2021, 8(3): 704-715. DOI: 10.1109/TCSS.2021.**, 2021.
[55] Zisheng Yu, Zhongyuan Jiang*, Jianfeng Ma, Yu Zheng.Safeness-based Community Penetration,IEEE Transactions on Circuits and Systems II: Express Briefs, 2021, 68(7):2690-2694. DOI: 10.1109/TCSII.2021.**, 2021.
[54]Dongyan Zhao, Jing Li, Zhongyuan Jiang*,Effects of link perturbation on network modularity for community detections in complex network systems,MODERN PHYSICS LETTERS B , 35(‏ 13): **, 出版年: ‏ MAY 10 2021.
2020
[53] 蒋忠元, 陈贤宇, 马建峰, 社交网络中社团隐私保护研究综述, 网络与信息安全学报, 2020, 已录用.
[52] Peilei Xue, Zhongyuan Jiang*,Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN,IEEE GLOBECOM 2020, December 7 - 11, in Taipei, Taiwan. Accepted.
[51] Sijie Ruan, Zi Xiong, Cheng Long, Yiheng Chen, Jie Bao, Tianfu He, Ruiyuan Li, Shengnan Wu, Zhongyuan Jiang, Yu Zheng, Doing in One Go: Delivery Time Inference Based on Couriers’ Trajectories, KDD'20.
[50] Jiang ZY, Li J, Ma JF, Yu Philip S, Similarity-based and Sybil Attack Defended Community Detection for Social Networks, IEEE Transactions on Circuits and Systems--II: Express Briefs, 2020, accepted.
[49]李晶,蒋忠元,马建峰. 逆链路预测方法研究综述. 信息安全学报,2020,录用.
[48]Ruiyuan Li, Jie Bao, Huajun He, Sijie Ruan, Tianfu He, Liang Hong, Zhongyuan Jiang,Yu Zheng.Discovering Real-time Reachable Area using Trajectory Connections. (DASFAA 2020).
[47] Z. Jiang, L. Sun, P. S. Yu, H. Li, J. Ma, Y. Shen, "Target Privacy Preserving for Social Networks", IEEE ICDE 2020.
[46] Jiang ZY, Chen XY, Dong BW, Zhang JS, Gong JB, Yan H, Zhang ZH, Ma JF, Yu PS.Trajectory-based Community Detection.IEEE Transactions on Circuits and Systems--II: Express Briefs, 2020, 67(6): 1139-1143.
2019
[45] Z. Jiang, J. Ma and P. S. Yu, "Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 1381-1388.
[44] Z Liu, J Weng, J Ma, J Guo, B Feng, Z Jiang, K Wei, TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs,IEEE Internet of Things Journal, 2019, online.DOI:10.1109/JIOT.2019.**.
[43] Z. Jiang, X. Chen, J. Ma, Y. Zhang and J. Gu, "Traffic Dynamics Evaluation for the Future NFV Deployment," in IEEE Transactions on Circuits and Systems II: Express Briefs. (early access), 2019.
[42]Hui Li, Mengting Xu, Sourav S Bhowmick, Changsheng Sun, Zhongyuan Jiang, Jiangtao Cui. DISCO: Influence Maximization Meets Network Embedding and Deep Learning. arXiv preprint arXiv:1906.07378, 2019.
[41] Jiang ZY, Wang Q, Liu ZQ, Ma JF.Vehicle demand evolution analysis from the complex network perspective,Physica A: Statistical Mechanics and its Applications, Volume 532,15 October 2019, 121889.
[40]Jiang, Zhong-Yuan, Yong Zeng, Zhi-Hong Liu, and Jian-Feng Ma. "Identifying critical nodes’ group in complex networks."Physica A: Statistical Mechanics and its Applications514 (2019): 121-132.
2018
[39]曾勇, 周灵杰, 蒋忠元, 刘志宏, & 马建峰. (2018). Security analysis of weighted network anonymity based on singular value decomposition%基于奇异值分解的含权网络匿名化的安全性分析.通信学报,039(005), 23-33.
[38] Susu Yang, Hui Li, and Zhongyuan Jiang, “Targeted Influential Nodes Selection in Location-Aware Social Networks,”Complexity, vol. 2018, Article ID **, 10 pages, 2018.https://doi.org/10.1155/2018/**.
[37]Wang, X., Chen, F*., Zhang, T., Qin, N., & Jiang, Z. Y*. (2018). A new routing strategy limited by heterogeneous link bandwidth. Modern Physics Letters B, 32(24), **.
[36]Jiang, Z. Y., Liu, Z. Q., He, X., & Ma, J. F. . Cascade phenomenon against subsequent failures in complex networks. Physica A: Statistical Mechanics and its Applications, 2018,499: 472–480.
2017:
[35] Liang Y X, Jiang Z Y, Zheng Y, Inferring traffic cascading patterns, ACM SIGSPATIAL 2017, accepted. (full paper, 录用率18%, 学生第一作者)
[34] Liu Z, Ma J F, Jiang Z Y, Miao Y B, FCT: a fully-distributed context-aware trust model for location based service recommendation, Science China Information Sciences 60:082102, 2017. DOI: https://doi.org/10.1007/s11432-015-9029-y
[33] Jiang Z Y*, Ma J F, Effects of packet retransmission with finite packet lifetime on traffic capacity in scale-free networks, Int. J. Mod. Phys. C 28, ** (2017). DOI:http://dx.doi.org/10.1142/S0129**8.
[32]Jiang Z Y*, Ma J F, Deployment of check-in nodes in complex networks,Scientific Reports, 2017, 7: 40428.
[31]Jiang Z Y*, Ma J F, An efficient local cascade defense method in complex networks, International Journal of Modern Physics C, 2017, 28: **.
[30]Jiang Z Y*, Ma J F, Check-in based routing strategy in scale-free networks, Physica A-Statistical Mechanics and Its Applications, 2017, 468: 205~211.
[29] Mengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, and Jianfeng Ma. "Centrality Based Privacy Preserving for Weighted Social Networks." In 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 574-577. IEEE, 2017.
[28] Longfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, and Jianfeng Ma. "A Survey of Network Reconstruction on Social Network." In 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 297-301. IEEE, 2017.
[27] Lingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, and JianFeng Ma. "Multi-hop Based Centrality of a Path in Complex Network." In 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 292-296. IEEE, 2017.
2016:
[26]Jiang Z Y*, Ma J F, Shen Y L, Zeng Y. Effects of link-orientation methods on robustness against cascading failures in complex networks. Physica A, 457 1-7, 2016.
[25] Liu Z Q, Ma J F,Jiang Z Y, et al. LSOT: A Lightweight Self-Organized Trust Model in VANETs,2016, 2016: **.
[24] Liu Z Q, Ma J F,Jiang Z Y, et al.A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment,KSII Transactions on Internet and Information Systems, 10(2) 914-934, 2016.
[23] Liu Z Q, Ma J F,Jiang Z Y, et al.Integrating Reputation and Local Trust for Trustworthy Service Recommendation in Service-oriented Social Networks, PLoS ONE, 2016, 11(3): e**.
[22] He X, Niu K, He Z, Lin J, Zhang H,Jiang Z Y,Efficient packet navigation method on scale-free networks with finite and diversiform node delivery capacity, Int. J. Mod. Phys. C, 2016, 27: **. DOI: 10.1142/S0129**4.
2015:
[21] Liu J,Jiang Z Y, Kato N, Akashi O, and Takahara A, Reliability Evaluation for NFV Deployment of Future Mobile Broadband Networks,IEEE Wireless Communications, 2016, 23(3): 90-96..
[20]Jiang Z Y*, Ma J F, Jing X,Enhancing traffic capacity of scale-free networks by employing hybrid routing strategy, Physica A, 2015, 422: 181-186. (SCI, cited times: 13)
[19] Zhang H*,Jiang Z Y,Exploring highly-efficient routing strategy on scale-free networks with limited and diverse node capacity, Mod. Phys. Lett. B, 2015, in press. (SCI)
[18] He X*, Niu K, He Z, Lin J,Jiang Z Y*,Efficient packet transportation on complex networks with nonuniform node capacity distribution,Int. J. Mod. Phys. C 2015, 26: **.(SCI)
[17] Zhang S, Liang M G*,Jiang Z Yet al.,Improved efficient static weighted routing strategy on two-la[ant]yer complex networks,Int. J. Mod. Phys. C 2015, 26: **.(SCI)
2014:
[16]Jiang Z Y*,An incremental optimal routing strategy for scale-free networks[J]. Int. J. Mod. Phys. C, 2014, 25: **.(SCI, Impact factor:1.125)
[15]Jiang Z Y,Liang M G*.Effects of efficient edge rewiring strategies on network transport efficiency[J]. Physica A, 2014,394(1):379-385.(SCI, Impact factor:1.722, cited times:3)
[14] Zhang S, Liang M G*,Jiang Z Yet al.,Effective strategy of adding links for improving network transport efficiency on complex networks,Int. J. Mod. Phys. C 25, ** (2014) .(SCI, cited times:1)
2013:
[13]Jiang Z Y, Liang M G*, Wu J J.Dynamic source routing strategy for two-level flow on scale-free networks[J]. PLOS ONE, 2013, 8(12): e82162.(SCI, Impact factor:3.53, cited times:1)
[12]Jiang Z Y, Liang M G*, Li Q, Guo D C.Optimal dynamic bandwidth allocation for complex networks[J]. Physica A, 2013, 392(5): 1256-1262.(SCI, Impact factor:1.722, cited times:5)
[11]Jiang Z Y, Liang M G*.Incremental routing strategy on scale-free networks[J]. Physica A, 2013, 392(8): 1894-1901.(SCI, Impact factor:1.722, WoS cited times:10)
[10]Jiang Z Y, Liang M G*, Zhang S, Zhou W X, Jin H Q.Enhancing traffic capacity of two-la[ant]yer scale-free networks[J]. Int. J. Mod. Phys. C, 2013, 24(7): **.(SCI, cited times: 3)
[9]Jiang Z Y, Liang M G*, Guo D C.Improving network transport efficiency by edge rewiring[J]. Mod. Phys. Lett. B, 2013, 27(8):**.(SCI)
[8] Zhang S, Liang M G*,Jiang Z Yet al.,Queue resource reallocation strategy for traffic systems in scale-free network[J],Int. J. Mod. Phys. C 24, ** (2013) .(SCI)
2012:
[7]Jiang Z Y, Liang M G*, Huang J L, Li Q.An efficient weighted routing strategy for scale-free networks[J]. Mod. Phys. Lett. B,2012, 26: **.(SCI)
[6]Jiang Z Y, Liang M G*.Improved Efficient Routing Strategy on Scale-free Networks[J]. Int. J. Mod. Phys. C, 2012, 23: **.(SCI, WoS cited times:10)
[5]Jiang Z Y, Liang M G*, et al.An Efficient Bandwidth Allocation Strategy for Scale-free Networks[J]. Int. J. Mod. Phys. C, 2012, 23: **.(SCI, WoS cited times:8)
[4]Jiang Z Y, Liang M G*, Improving the Network Load Balance by Adding an Edge,Advanced Materials Research, 2012,433-440: 5147. (ISTP, cited tims: 1)
2011:
[3]Jiang Z Y, Liang M G*, Guo D C.Enhancing Network Performance by Edge Addition[J]. Int. J. Mod. Phys. C, 2011, 22: 1211-1226.(SCI, WoS cited times:14)
[2]Jiang Z Y, Liang M G*,A Network Connection Protection Mechanism Based on Random Node Identification[C], 2011 IEEE ICCT.
[1] Guo D C, Liang M G*, Li D D,Jiang Z Y,Effect of random edge failure on the average path length[J],J. Phys. A: Math. Theor., 2011,44: 415002.(SCI, cited times:1)






Team
团队教师




博士研究生
硕士研究生




Teaching
目前本人承担的教学任务:

课件下载 示例




Admission
~~~~~~~~~~~~~~~~~~~~~~~~~~
关于研究生招生的信息:
~~~~~~~~~~~~~~~~~~~~~~~~~~



相关话题/西安电子科技大学 网络