陈鸿龙
近期热点
资料介绍
个人简历
教育背景2015年11月-2016年11月,美国亚利桑那州立大学,博士后2009年2月-2012年8月,香港理工大学电子计算学系,博士2006年9月-2008年12月,浙江大学控制系,硕士2002年9月-2006年7月,中国石油大学(华东)自动化系,学士工作背景2018年7月至今,中国石油大学(华东)自动化系,副教授,博士生导师2015年1月至今,中国石油大学(华东)自动化系,副教授,硕士生导师2012年9月-2014年12月,中国石油大学(华东)自动化系,讲师2014年7月-8月,香港理工大学电子计算学系,高级研究助理2007年12月-2008年9月,香港理工大学电子计算学系,研究助理研究领域
1.物联网2.无线传感器网络3.移动自组织网络4.安全与隐私保护5.RFID6.UAV近期论文
[1].Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi and Lianhai Wang.Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. In IEEE Access, 2019. (SCI二区)[2].Leyi Shi, Yang Li, Tianxu Liu, Jia Liu, Baoying Shan, and Honglong Chen*, Dynamic Distributed Honeypot Based on Blockchain. In IEEE Access, 2019. (SCI二区)[3].Xuxin Zhang, Honglong Chen*, Kai Lin, Zhibo Wang, Jiguo Yu, and Leyi Shi. RMTS: A Robust Clock Synchronization Scheme for Wireless Sensor Networks. In Journal of Network and Computer Applications, 2019. (SCI二区, Top)[4].Honglong Chen, Wei Lou, Zhibo Wang, and Feng Xia. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. In IEEE Transactions on Emerging Topics in Computing, vol. 6, no. 5, pp. 553-565, 2018. (SCI二区)[5].Honglong Chen, Lu Liu, Rongjie Che, Kai Lin, Xin Ai, and Yanjun Li. On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems. In IEEE Access, 2018, vol. 6, pp.57095-57104. (SCI二区)[6].Kai Lin, Honglong Chen*, Tianjiao Dai, Denghui Liu, Lu Liu, and Leyi Shi.Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags. In IEEE Access, 2018, vol. 6, pp.54435-54446. (SCI二区)[7].Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, and Jiguo Yu. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9947-9958, Oct. 2018. (SCI二区)[8].Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, and Leyi Shi. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. In IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2915-2926, Aug. 2018. (SCI一区, Top)[9].Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu. Probabilistic Detection of Missing Tags for Anonymous Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology, vol. 66, pp. 11295-11305, Dec. 2017. (SCI二区)[10].Honglong Chen, Guoliang Xue, and Zhibo Wang. Efficient and Reliable Missing Tags Identification for Large-Scale RFID Systems with Unknown Tags. In IEEE Internet of Things Journal, vol. 4, pp.736-748, 2017. (SCI一区, Top)[11].Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, and Xiangyuan Jiang. Efficient 3-Dimensional Localization for RFID Systems Using Jumping Probe. In Elsevier Pervasive and Mobile Computing, vol. 41, pp. 300-318, Oct. 2017. (SCI三区)[12].Honglong Chen, Wei Lou, Zhibo Wang, and Qian Wang. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. In IEEE Transactions on Vehicular Technology,vol. 65, pp.6377-6388, 2016. (SCI二区)[13].Honglong Chen, and Wei Lou. Contact Expectation Based Routing for Delay Tolerant Networks. In Elsevier Ad Hoc Networks, vol. 36, pp.244-257, 2016. (SCI三区)[14].Honglong Chen, Wei Lou, and Zhi Wang. On Providing Wormhole Attack Resistant Localization Using Conflicting Sets.In Wiley Wireless Communications and Mobile Computing, vol. 15, pp.1865-1881, 2015.(SCI四区)[15].Honglong Chen, and Wei Lou. On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing, vol. 16, pp.36-50, 2015.(SCI三区)[16].Honglong Chen, Wei Lou, Junfeng Wu, Zhibo Wang, Zhi Wang, and Aihua Xia. Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing. vol. 16, pp. 22-35, Jan. 2015. (SCI三区)[17].Honglong Chen, and Wei Lou. GAR: Group Aware Cooperative Routing Protocol for Resource-Constraint Opportunistic Networks. In Elsevier Computer Communications, vol. 48, pp.20-29, 2014. (SCI三区)[18].Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, and Yanjun Li. Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. In International Journal of Distributed Sensor Networks. 2014. (SCI四区)[19].Honglong Chen, Wei Lou, Xice Sun, and Zhi Wang. A secure localization approach against wormhole attacks using distance consistency. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 627039, 11 pages, 2010. doi:10.1155/2010/627039. (SCI四区)[20].Honglong Chen, Wei Lou, and Zhi Wang. A Novel Secure Localization Approach in Wireless Sensor Networks. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 981280, 12 pages, 2010. doi:10.1155/2010/981280.(SCI四区) 相关热点
最新收录
- 吉高宁宁(吉高寧々 Nene 06-25
- 水咲优美(水咲優美) 06-25
- 三月光(三月ひかる) 06-21
- 澪川遥(澪川はるか) 06-21
- 冈本莉里 岡本莉里 (おか 06-21
- 宗像丽奈(宗像れな) 06-21
- 温碧霞 06-21
- 舒淇 06-21
- 叶玉卿 06-21
- 叶子楣 06-21