热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
陈鸿龙
2023-05-17 14:54
  • 陈鸿龙
  • 陈鸿龙 - 副教授-中国石油大学-控制科学与工程学院-个人资料

近期热点

资料介绍

个人简历


教育背景
2015年11月-2016年11月,美国亚利桑那州立大学,博士后
2009年2月-2012年8月,香港理工大学电子计算学系,博士
2006年9月-2008年12月,浙江大学控制系,硕士
2002年9月-2006年7月,中国石油大学(华东)自动化系,学士
工作背景
2018年7月至今,中国石油大学(华东)自动化系,副教授,博士生导师
2015年1月至今,中国石油大学(华东)自动化系,副教授,硕士生导师
2012年9月-2014年12月,中国石油大学(华东)自动化系,讲师
2014年7月-8月,香港理工大学电子计算学系,高级研究助理
2007年12月-2008年9月,香港理工大学电子计算学系,研究助理

研究领域


1.物联网
2.无线传感器网络
3.移动自组织网络
4.安全与隐私保护
5.RFID
6.UAV

近期论文


[1].Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi and Lianhai Wang.Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. In IEEE Access, 2019. (SCI二区)
[2].Leyi Shi, Yang Li, Tianxu Liu, Jia Liu, Baoying Shan, and Honglong Chen*, Dynamic Distributed Honeypot Based on Blockchain. In IEEE Access, 2019. (SCI二区)
[3].Xuxin Zhang, Honglong Chen*, Kai Lin, Zhibo Wang, Jiguo Yu, and Leyi Shi. RMTS: A Robust Clock Synchronization Scheme for Wireless Sensor Networks. In Journal of Network and Computer Applications, 2019. (SCI二区, Top)
[4].Honglong Chen, Wei Lou, Zhibo Wang, and Feng Xia. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. In IEEE Transactions on Emerging Topics in Computing, vol. 6, no. 5, pp. 553-565, 2018. (SCI二区)
[5].Honglong Chen, Lu Liu, Rongjie Che, Kai Lin, Xin Ai, and Yanjun Li. On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems. In IEEE Access, 2018, vol. 6, pp.57095-57104. (SCI二区)
[6].Kai Lin, Honglong Chen*, Tianjiao Dai, Denghui Liu, Lu Liu, and Leyi Shi.Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags. In IEEE Access, 2018, vol. 6, pp.54435-54446. (SCI二区)
[7].Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, and Jiguo Yu. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9947-9958, Oct. 2018. (SCI二区)
[8].Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, and Leyi Shi. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. In IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2915-2926, Aug. 2018. (SCI一区, Top)
[9].Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu. Probabilistic Detection of Missing Tags for Anonymous Multi-Category RFID Systems. In IEEE Transactions on Vehicular Technology, vol. 66, pp. 11295-11305, Dec. 2017. (SCI二区)
[10].Honglong Chen, Guoliang Xue, and Zhibo Wang. Efficient and Reliable Missing Tags Identification for Large-Scale RFID Systems with Unknown Tags. In IEEE Internet of Things Journal, vol. 4, pp.736-748, 2017. (SCI一区, Top)
[11].Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, and Xiangyuan Jiang. Efficient 3-Dimensional Localization for RFID Systems Using Jumping Probe. In Elsevier Pervasive and Mobile Computing, vol. 41, pp. 300-318, Oct. 2017. (SCI三区)
[12].Honglong Chen, Wei Lou, Zhibo Wang, and Qian Wang. A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. In IEEE Transactions on Vehicular Technology,vol. 65, pp.6377-6388, 2016. (SCI二区)
[13].Honglong Chen, and Wei Lou. Contact Expectation Based Routing for Delay Tolerant Networks. In Elsevier Ad Hoc Networks, vol. 36, pp.244-257, 2016. (SCI三区)
[14].Honglong Chen, Wei Lou, and Zhi Wang. On Providing Wormhole Attack Resistant Localization Using Conflicting Sets.In Wiley Wireless Communications and Mobile Computing, vol. 15, pp.1865-1881, 2015.(SCI四区)
[15].Honglong Chen, and Wei Lou. On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing, vol. 16, pp.36-50, 2015.(SCI三区)
[16].Honglong Chen, Wei Lou, Junfeng Wu, Zhibo Wang, Zhi Wang, and Aihua Xia. Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. In Elsevier Pervasive and Mobile Computing. vol. 16, pp. 22-35, Jan. 2015. (SCI三区)
[17].Honglong Chen, and Wei Lou. GAR: Group Aware Cooperative Routing Protocol for Resource-Constraint Opportunistic Networks. In Elsevier Computer Communications, vol. 48, pp.20-29, 2014. (SCI三区)
[18].Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, and Yanjun Li. Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. In International Journal of Distributed Sensor Networks. 2014. (SCI四区)
[19].Honglong Chen, Wei Lou, Xice Sun, and Zhi Wang. A secure localization approach against wormhole attacks using distance consistency. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 627039, 11 pages, 2010. doi:10.1155/2010/627039. (SCI四区)
[20].Honglong Chen, Wei Lou, and Zhi Wang. A Novel Secure Localization Approach in Wireless Sensor Networks. In EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 981280, 12 pages, 2010. doi:10.1155/2010/981280.(SCI四区)

相关热点

扫码添加好友