删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

西安电子科技大学网络与信息安全学院导师教师师资介绍简介-付玉龙

本站小编 Free考研考试/2021-07-10


基本信息
姓名 付玉龙
工作单位:网络与信息安全学院
硕士生导师

联系方式
通信地址:太白南路2号,西安电子科技大学,91号信箱
电子邮箱:ylfu@xidian.edu.cn
办公地点:新校区行政附楼227

主要研究方向
形式化安全理论与应用
5G网络安全(SDN/NFV安全,IoT安全)
异构网络数据采集、处理与分析
逻辑代数理论及应用

个人简介
本科毕业于哈尔滨工业大学,信息管理与信息系统专业,研究生时参加哈工大与法国波尔多一大的联合培养项目留学法国,并获得哈工大和波尔多一大的双硕士学历。硕士毕业后,曾经在巴黎Bruitparif公司工作过一年,从事软件工程师的工作,之后进入法国波城大学计算机系攻读博士学位。2014年博士毕业后回国,在西安电子科技大学通信工程学院从事信息安全方面的研究工作,后转入网络与信息安全学院。




基本信息
姓名 付玉龙
工作单位:网络与信息安全学院
硕士生导师

联系方式
通信地址:太白南路2号,西安电子科技大学,91号信箱
电子邮箱:ylfu@xidian.edu.cn
办公地点:新校区行政附楼227

主要研究方向
形式化安全理论与应用
5G网络安全(SDN/NFV安全,IoT安全)
异构网络数据采集、处理与分析
逻辑代数理论及应用

个人简介
本科毕业于哈尔滨工业大学,信息管理与信息系统专业,研究生时参加哈工大与法国波尔多一大的联合培养项目留学法国,并获得哈工大和波尔多一大的双硕士学历。硕士毕业后,曾经在巴黎Bruitparif公司工作过一年,从事软件工程师的工作,之后进入法国波城大学计算机系攻读博士学位。2014年博士毕业后回国,在西安电子科技大学通信工程学院从事信息安全方面的研究工作,后转入网络与信息安全学院。




承担项目情况
国家自然科学基金青年项目,**,面向多重协议组合实现的形式化安全检测理论和方法研究,2017/01-2019/12在研,主持
国家重点研发计划网络空间安全重点专项子课题,2016YFB**,安全度量理论与关键技术的典型应用,2016/07-2019/06在研,子任务负责人
中国博士后科学基金面上,2015M582618,面向PaaS类云系统的形式化安全分析方法的研究,2016/01-2017/12在研,主持
IBM访问****计划,Formal method research on security verification over cloud infrastructure, 2016/01-2016/05完成,主持
高等院校基本科研业务费项目,基于属性和角色的云存储访问控制机制及其在混合云系统上的实现,2015.1-2016.12在研,主持
西安电子科技大学科研启动经费项目,通信协议及其实现的安全检测理论与实践研究,2014.12-2016.126万元,完成,主持
高等院校基本科研业务费项目,5G网络跨域安全协议的安全性分析理论与实践研究,JB81503,2018.1-2019.12在研,主持




学术论文
2018年:
Guoquan Li, Zheng Yan, Yulong Fu*, Hanlu Chen, "Data Fusion for Network Intrusion Detection," Security and Communication Networks, accepted
Guoquan Li, Zheng Yan, Yulong Fu*, "A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network,"IEEE CNS 2018 - 1st International Workshop on System Security and Vulnerability (SSV), accepted
Xiaolong Xin, Yulong Fu, Yanyan Lai, Juntao Wang, "Monadic pseudo BCI-algebras and corresponding logics," Soft Computing, 12 April 2018
2017年:
Yulong Fu, Zheng Yan, Hui Li, Xiaolong Xin, Jin Cao, "A secure SDN based multi-RANs architecture for future 5g networks," Computer & Security, Vol. 70, Pages 648-662,WOS:0004**,SCI (CCF B)
Jin Cao,Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li, Trajectory Prediction-based Handover Authentication Mechanism for Mobile Relays in LTE-A High-Speed Rail Networks, Proceedings of IEEE ICC 2017, Paris, France, 2017, (CCF C)
Hanlu Chen, Yulong Fu and Zheng Yan, "Survey on Big Data Analysis Algorithms for Network Security Measurement," NSS 2017:: 128-142
Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao, "An Automata Based Intrusion Detection Method for Internet of Things," Mobile Information Systems, 2017: **:1-**:13 (2017),WOS:001,SCI
Xiao Long Xin, Yi Jun Li, Yu Long Fu, “States on pseudo-BCI algebras”, EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2017
Yulong Fuand Xiao long Xin, “Lattices and block codes,”University Politehnica of Bucharest Scientific Bulletin-Series A-Applied Mathematics and Physics,Vol. 79, Iss.3, 2017, page 11-18, SCI
2016年及以前:
Xiaolong Xin, Pengfei He, Yulong Fu, "States on hyper MV-algebras," Journal of Intelligent and Fuzzy Systems 31(3): 1299-1309 (2016), SCI
Xuefei Cao, Bo Chen, Hui Li, Yulong Fu, "Packet Header Anomaly Detection Using Bayesian Topic Models. IACR Cryptology," ePrint Archive 2016: 40 (2016)
李 晖,付玉龙(*), 5G 网络安全问题分析与展望[J],无线电通信技术,2015, 41(4):01-07
Yulong Fu(*),Ousmane Kone,"Model based security verification of protocol implementation," Journal of Information Security and Applications, 2015, 22: 17-27。EI
Yulong Fu(*),Ousmane Koné,"Security and Robustness by Protocol Testing," IEEE System Journal,2014,8(3):699-707, SCI
Yulong Fu(*),Ousmane Koné, "Validation of security protocol implementations from security objectives," Computer & Security,2013,36(1):27-39, 1,SCI
Yulong Fu(*), Xiaolong Xin, A Model based Security Testing Method for Protocol Implementation, "The Scientific World Journal," 2014, 2014 (632154), SCI
Xiaolong Xin, Yulong Fu, Some results of convex fuzzy sublattices, "Journal of Intelligent and Fuzzy Systems, " 2014, 27(1):287-298. SCI
Yulong Fu(*), Ousmane Koné, Using transition systems to model and verify the implementation of security protocol, "The 6th International Conference on Security of Information and Networks," Aksaray,2013.11.26-2013.11.28. EI
Yulong Fu(*),Ousmane Koné,A finite transition model for security protocol verification,The 6th International Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28. EI
Yulong Fu(*),Ousmane Kone,Network Securing Against Threatening Requests,Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop,Leuven,2011.9.15-2011.9.16. EI
Yulong Fu(*),Ousmane Kone,A Robustness Testing for Network Security,7th International and 4the-Democracy, Joint Conferences, ICGS3/e-Democracy 2011,Thessaloniki,2011.8.24-2011.8.26. EI 会议

发明专利
Zheng Yan, Huaqing Lin, Yulong Fu, Adaptive Security-Related Data Collection and Composition, Patent Application No. PCT/CN2017/084921, Filed Date 18-May-2017.
付玉龙,闫峥,李晖,一种基于有限自动机的物联网入侵检测方法及检测系统,申请号5.0,申请日期:2017年03月17日.
付玉龙,李晖,陈寒露,闫峥,基于SDN-5G网络架构的SDN组件间安全保护方法,申请号5.X,申请日期:2017年07月12日.
付玉龙,李国权,闫峥,李晖,一种基于SDN的多信道传输的5G网络架构,申请号7.8,申请日期:2017年07月20日.
陈寒露,闫峥,付玉龙,基于串并行结构网络安全数据处理方法及系统、社交网络, 申请号3.X, 申请日期:2017年08月25日
曹进,龚宇翔,魏澎琛,李晖,付玉龙,孙韵清,一种基于移动中继的群到路径移动切换认证方法,申请号:0.6




荣誉获奖
2016年青年教师讲课竞赛二等奖




课程教学
2017年秋,编译原理,网络与信息安全学院
2017年秋,概率论与数理统计,网络与信息安全学院http://cyber-engineering.top/probability/
2016年秋,概率论与数理统计,网络与信息安全学院http://cyber-engineering.top/probability/
2016年春,线性代数(助教),网络与信息安全学院
2015年秋,概率论与数理统计,国际交流学院中法班
2015年秋,编译原理(助教),网络与信息安全学院
2015年秋,IBM大数据与云计算(本科选修)
2014年秋,IBM大数据与云计算(本科选修)




招生要求
~~~~~~~~~~~~~~~~~~~~~~~~~~
关于研究生招生的信息:
~~~~~~~~~~~~~~~~~~~~~~~~~~





Profile
Name Fu Yulong
Title Lecturer
Department: School of Cyber Engineering

Contact Information
Address: No. 2 Taibai South, Xidian University
Email: ylfu@xidian.edu.cn
Tel: +86 **

Introduction
Fu Yulong was born in Sep. 24 1983 in QiQihar, China. He got his bachelor degree of IMS and master degree of software engineeringfrom Harbin Institute of Technology, and another master degree of Production Automation from University of Bordeaux 1. He recieved his PhD. degree of computer science from University of Pau in the year of 2014. Now, he is working as a lecturer in the research team of Prof. Li Hui of Xidian University.


Research Interests
Formal based security analysis
SDN and IoT in 5G Security
Security issues over Cloud System
Fuzzy Logic and Security
Intrusion Detection




Research
Research Project:
1.




Papers
[1]Yulong Fu(*),Ousmane Koné,Security and Robustness by Protocol Testing,IEEE System Journal,2014,8(3):699-707。SCI
[2]Yulong Fu(*),Ousmane Koné,Validation of security protocol implementations from security objectives,Computer & Security,2013,36(1):27-39。1,SCI
[3]Yulong Fu(*),Xiaolong Xin,A Model based Security Testing Method for Protocol Implementation,The Scientific World Journal,2014,2014(632154)。SCI
[4]Xiaolong Xin(*),Yulong Fu,Some results of convex fuzzy sublattices,Journal of Intelligent and Fuzzy Systems,2014,27(1):287-298。SCI
[5]Yulong Fu(*),Ousmane Kone,Network Securing Against Threatening Requests,Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop,Leuven,2011.9.15-2011.9.16。EI
[6]Yulong Fu(*),Ousmane Kone,Model based security verification of protocol implementation,Journal of Information Security and Applications。EI
[7]Yulong Fu(*),Ousmane Koné,Using transition systems to model and verify the implementation of security protocol,The 6th International Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28。EI
[8]Yulong Fu(*),Ousmane Kone,A Robustness Testing for Network Security,7th International and 4the-Democracy, Joint Conferences, ICGS3/e-Democracy 2011,Thessaloniki,2011.8.24-2011.8.26。EI
[9]Yulong Fu(*),Ousmane Koné,A finite transition model for security protocol verification,The 6thInternational Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28。EI




Honors
non




Team
Working in the research team of Prof. Li Hui.




Teaching
Non




Admission
~~~~~~~~~~~~~~~~~~~~~~~~~~
Pas encore
~~~~~~~~~~~~~~~~~~~~~~~~~~


相关话题/西安电子科技大学 网络