尹春勇

尹春勇,男,博士,現為南京信息工程大學計算機與軟體學院教授、博導、碩導、虛擬仿真中心副主任,原網路工程系主任,中英雲網路安全研究所所長,江蘇省網路監控中心成員,貴州省人工智慧學會會員,IBM的Q1Lab信息安全研究項目組成員。

基本介紹

  • 中文名:尹春勇
  • 學位/學歷:博士
  • 職業:教師
  • 專業方向:計算機軟體與理論
  • 職務:虛擬仿真中心副主任
  • 任職院校:南京信息工程大學
個人經歷,研究方向,主講課程,學術成果,榮譽獎項,

個人經歷

學術與社會兼職
指導計算機碩士研究生、博士研究生30餘名,其中國內研究生18名,留學碩士生14名,指導的研究生獲得校長獎學金、研究生優秀獎學金和三好研究生榮譽等稱號。
Neural Networks、IEEE Internet of Things Journal、Multimedia Tools and Applications等國際1區2區頂級SCI期刊審稿人
計算機套用研究等國內期刊審稿人
IEEE ICCNT等國際會議審稿人
NCM等會議分會主席
江蘇省網路監控中心成員
貴州省人工智慧學會會員
IBM的Q1Lab信息安全研究項目組成員
中英雲網路安全研究所所長
育英二外校務委員會副主任
網路公司技術總監
區工信局副局長
虛擬仿真中心副主任
擔任國家重點研發計畫網路空間安全重點專項評審專家、國家重點研發計畫“戰略性國際科技創新合作”重點專項評審專家、國家自然科學基金評審專家,《Neural Networks》《IEEE Internet of Things Journal》等國際1區2區頂級SCI期刊審稿人,計算機套用研究等國內期刊審稿人,IEEE ICCNT等國際會議審稿人,NCM等會議分會主席。1998年以來先後獲得計算機套用專業碩士學位和網路及信息安全專業博士學位,並在加拿大新不倫瑞克大學信息安全研究中心從事博士後研究員工作。

研究方向

1. 計算機網路與信息安全
2. 雲計算
3. 大數據安全
4. 數據挖掘
5. 文本內容安全

主講課程

網路攻防技術;網路工程;網路工程課程設計;網路安全技術;計算機網路;C語言程式設計;信息網路安全

學術成果

主持項目:
面向高速數據流的新型異常入侵檢測技術研究,國家自然科學基金面上項目
面向大規模新型P2P 殭屍網路的檢測研究,國家自然科學基金面上項目
高速數據流異常檢測系統,國際合作項目
基於雲計算的智慧型數據安全存儲系統,國際合作項目
殭屍網路的檢測、分析、可視化,國際合作項目
一種新型入侵檢測模型的設計與實現,省教育廳項目
自動氣象信息服務系統,江蘇省氣象探測與信息處理中心基金項目
基於密態資料庫的安全研究,南京信息工程大學科研項目
基於秘密同態的實數的整數化表示理論與算法,校基金項目
一種新型自動防禦系統的研究.校重點項目
網路入侵檢測系統的設計.校青年項目
主研項目:
軟體可靠性與安全性綜合評估方法研究,國家自然科學基金項目
網路漏洞挖掘與分析研究.軍參部子項目
提高高校數據安全的實驗技術研究.校青年項目
城市交通地理信息系統的設計與實現.校重點項目
主要論文:
Selected Journal Publications:
1. C. Yin, S. Zhang, J. Wang and N. N. Xiong (2020). Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series. IEEE Transactions on Systems, Man, and Cybernetics: Systems, doi: 10.1109/TSMC.2020.2968516.
2. Yin, C., Ding, S., & Wang, J. (2019). Mobile marketing recommendation method based on user location feedback. Human-centric Computing and Information Sciences, 9(1), 14.
3. Yin, C., Ju, X., Yin, Z., & Wang, J. (2019). Location recommendation privacy protection method based on location sensitivity division. EURASIP Journal on Wireless Communications and Networking, 2019(1), 266.
4. Yin, C., Zhou, B., Yin, Z., & Wang, J. (2019). Local privacy protection classification based on human-centric computing. Human-centric Computing and Information Sciences, 9(1), 33.
5. Yin, C., Xi, J., Sun, R., & Wang, J. (2018). Location Privacy Protection based on Differential Privacy Strategy for Big Data in Industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 14(8), 3628-3636.
6. Yin, C., Xia, L., Zhang, S., Sun, R., & Wang, J. (2018). Improved clustering algorithm based on high-speed network data stream. Soft Computing, 22(13), 4185-4195.
7. Yin, C., Wang, J., & Park, J. H. (2017). An improved recommendation algorithm for big data cloud service based on the trust in sociology. Neurocomputing, 256, 49-55.
8. Yin, C., Zhang, S., Xi, J., & Wang, J. (2017). An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation: Practice and Experience, 29(7), e3902.
9. Yin, C., & Zhang, S. (2017). Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimedia Tools and Applications, 76(16), 16911-16927.
10. Yin, C., & Xi, J. (2017). Maximum entropy model for mobile text classification in cloud computing using improved information gain algorithm. Multimedia Tools and Applications, 76(16), 16875-16891.
11. Yin, C., Xi, J., & Sun, R. (2017). Location Privacy Protection Based on Improved-Value Method in Augmented Reality on Mobile Devices. Mobile Information Systems, 2017.
12. Yin, C., Zhang, S., & Kim, K. J. (2017). Mobile Anomaly Detection Based on Improved Self-Organizing Maps. Mobile Information Systems, 2017.
13. Yin, C., Zhang, S., Yin, Z., & Wang, J. (2017). Anomaly detection model based on data stream clustering. Cluster Computing, 1-10.
14. Yin, C., Feng, L., & Ma, L. (2016). An improved Hoeffding-ID data-stream classification algorithm. The Journal of Supercomputing, 72(7), 2670-2681.
15. Yin, C., Ma, L., & Feng, L. (2017). Towards accurate intrusion detection based on improved clonal selection algorithm. Multimedia Tools and Applications, 76(19), 19397-19410.
16. Yin, C., Ma, L., & Feng, L. (2016). A feature selection method for improved clonal algorithm towards intrusion detection. International Journal of Pattern Recognition and Artificial Intelligence, 30(05), 1659013.
17. Yin, C., Feng, L., Ma, L., Kim, J. U., & Wang, J. (2016). An effective feature selection and data-stream classification model HDP. Journal of Internet Technology, 17(4), 695-702.
18. Yin, C., Awlla, A. H., Yin, Z., & Wang, J. (2015). Botnet detection based on genetic neural network. International Journal of Security and Its Applications, 9(11), 97-104.
19. Yin, C., Zou, M., Iko, D., & Wang, J. (2013). Botnet detection based on correlation of malicious behaviors. International Journal of Hybrid Information Technology, 6(6), 291-300.
20. Yin, C., Yang, L., & Wang, J. (2013). Botnet detection based on degree distributions of node using data mining scheme. International Journal of Future Generation Communication and Networking, 6(6), 81-90.
21. Yin, C. (2014). Towards accurate node-based detection of P2P botnets. The Scientific World Journal, 2014..
22. Yin, C., Feng, L., Ma, L., Yin, Z., & Wang, J. (2015). A feature selection algorithm based on Hoeffding inequality and mutual information. Int J Signal Process Image Process Pattern Recognit, 8(11), 433-444.
23. Yin, C., Zhang, H., Xiang, J., Yin, Z., & Wang, J. (2015). A Mobile Recommendation Algorithm Based on Statistical Analysis of User Data. International Journal of Hybrid Information Technology, 8(12), 355-366.
24. Yin, C., Xiang, J., Zhang, H., Yin, Z., & Wang, J. (2015). Short text classification algorithm based on semi-supervised learning and SVM. International Journal of Multimedia and Ubiquitous Engineering, 10(12), 195-206.
25. Yin, C., Ma, L., Feng, L., Yin, Z., & Wang, J. (2015). A Feature Selection Algorithm towards Efficient Intrusion Detection. International journal of multimedia and ubiquitous engineering, 10(11), 253-264.
26. Yin, C., Zhang, S., Yin, Z., & Wang, J. (2015). An algorithm of clustering by density peaks using in anomaly detection. Int J Secur Appl, 9(12), 115-128.
Selected Conference Publications:
1. Chunyong Yin , Jun Xiang, Hui Zhang, Jin Wang, A New Classification Method for Short Text Based on SLAS and CART, CCITSA2015, 2015.12.10-2015.12.12.
2. Chunyong Yin , Sun Zhang, Jin Wang, An Improved K-Means Using in Anomaly Detection, CCITSA2015, 2015.12.10-2015.12.12.
3. Chunyong Yin, Ardalan Husin, Jin Wang, An Improved Transmission Control Protocol Effect on Router Performance, CCITSA2015, 2015.12.10-2015.12.12.
4. Chunyong Yin , Jinwen Xi, Jin Wang, The Research of Text Classification Technology Based on Improved Maximum Entropy Model, CCITSA2015, 2015.12.10-2015.12.12.
5. Chunyong Yin , Sun Zhang, Jin Wang, Zhichao Yin, Anomaly detection based on clustering by density peaks using, COMCOMS2015, 2015.10.22-2015.10.24.
6. Chunyong Yin , Ardalan Husin Awlla, Jin Wang, Zhichao Yin, A Novel framework towards Botnet Detection, COMCOMS2015, 2015.10.22-2015.10.24.
7. Chunyong Yin , Lu Feng, Luyu Ma, Jin Wang, Zhichao Yin, Jeong-Uk Kim, A Feature Selection Algorithm of Dynamic Data-Stream Based on Hoeffding Inequality, AITS2015, 2015.8.21-2015.8.23.
8. Chunyong Yin; Luyu Ma; Lu Feng; Jin Wang; Zhichao , A Hybrid Feature Selection Algorithm, AITS2015, 2015.8.21-2015.8.23.
9. Chunyong Yin; Hui Zhang; Jun Xiang; Jin Wang; Zhichao Yin , A New Mobile Recommendation Algorithm Based on Statistical Theory, AITS2015, 2015.8.21-2015.8.23.
10. Chunyong Yin; Jun Xiang; Hui Zhang; Jin Wang; Zhichao Yin , A New SVM Method for Short Text Classification Based on Semi-Supervised Learning, AITS2015, 2015.8.21-2015.8.23.
11. Chunyong Yin, P2P Botnet Detection Based on Association between Common Network Behaviors and Host Behaviors, 2011 International Conference on Multimedia Technology,ICMT2011, 2011.7.26-2011.7.28.
12. Chunyong Yin, Study on Data Field Content Security Based on OA, ETP/IITA World Congress in Applied Computing, Computer Science, and Computer, 2010.4.17-2010.4.18.
13. Chunyong Yin, Study on Protection Method Based on Document, the International Conference on System Science and Simulation in Engineering, 2010.9.1-2011.9.3.
14. Chunyong Yin, A Specific Implementation Based on Document Security Model, the International Conference on Optics, Photonics and Energy Engineering, 2010.5.10-2010.5.12.
15. Chunyong Yin, An Improved Method of C Learning Based on Individuation, the International Conference on Telecommunication and Information, 2010.6.22-2010.6.23.
16. Chunyong Yin, Study on Document Content Security, the International Conference on Optics, Photonics and Energy Engineering, 2010.5.10-2010.5.12.
17. Chunyong Yin, A Model of Information Security Based on Office Automation, 5th International Joint Conference on INC, IMS and IDC, 2009.8.25-2009.8.27.
18. Chunyong Yin, A Model of Information Security Based on Office Automation, 5th International Joint Conference on INC, IMS and IDC, 2009.8.25-2009.8.27.
19. Chunyong Yin, The Design of Secure Document Management, 2009 ETP/IITA World Congress in Applied Computing, Computer Science, and Computer Engineering, 2009.8.8-2009.8.9.
20. Chunyong Yin, A Method of Automatic Key Generation Based on Handwriting, 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel, 2009.5.27-2009.5.29.
21. Chunyong Yin, A Modified Query Algorithm for Private Data Security Facing E-commerce, 2009 Pacific-Asia Conference on Circuits, Communications and System, 2009.5.16-2009.5.17.
主要專利:
文檔數據安全管理系統 ZL201020676507.6
基於節點殭屍網路檢測系統 ZL201220292800.1
自動氣象信息服務系統 01220680664.3
安全移動線上視頻監控系統 201320305370.7
殭屍網路檢測系統2012SR072502
數據包捕獲實驗數據採集系統 2015SR039711
安全移動線上視頻監控系統 2015SR071378
畢業設計管理系統2015SR056177
校園網物品交易平台系統2016SR028182
智慧型文檔分類系統2016SR028184
線上遊戲論壇系統2016SR028455
基於聚類的通用數據處理系統 2016SR028325
My Ph.D. and M.S. students
1. Sun Zhang
He received his bachelor degree in computer science and technology from Nanjing University of Information Science and Technology, China. Now he is studying for his master’s degree in there. His current research interests are in network security and intrusion detection.
Selected Journal Publications:
[1] Chunyong Yin, Sun Zhang. Parallel implementing improved k-means using mapreduce programming mode for mobile networks. Multimedia Tools and Applications, DOI: 10.1007_s11042-016-3638-1.
[2] Chunyong Yin, Sun Zhang, et al. An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation-Practice & Experience, DOI: 10.1002/cpe.3902.
[3] Chunyong Yin, Sun Zhang, et al. An algorithm of clustering by density peaks using in anomaly detection. International Journal of Security and Its Applications, Vol. 9, No. 12 pp.115-128DOI: 10.1002/cpe.3902.
Selected Conference Publications
[1] Chunyong Yin, Sun Zhang, et al. Anomaly detection based on clustering by density peaks using. COMCOMS2015, October 22-24, 2015, Hanoi, Vietnam.
[2] Chunyong Yin, Sun Zhang, et al. An Improved K-Means Using in Anomaly Detection. CCITSA2015, December 10-12, 2015, ILan, Taiwan.
2. Jinwen Xi
He received his bachelor degree in computer science and technology from Huaiyin Institute of Technology, China. Now he is studying for his master’s degree in computer science and technology from Nanjing University of Information Science and Technology, China. His current research interests are information processing, data mining and feature extraction algorithm.
Selected Journal Publications:
[1] Chunyong Yin, Jinwen Xi. Maximum entropy model for mobile text classification in cloud computing using improved information gain algorithm. Multimedia Tools and Applications, DOI: 10.1007/s11042-016-3545-5.
[2] Chunyong Yin, Sun Zhang, Jinwen Xi, et al. An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation-Practice & Experience, DOI: 10.1002/cpe.3902.
Selected Conference Publications
[1] Chunyong Yin, Jinwen Xi, Jin Wang. The Research of Text Classification Technology Based on Improved Maximum Entropy Model. CCITSA2015
3. Darious
Personal Information:
Full Name: Darius Iko
Nationality: Indonesia
Education Background:
September 2005 - March 2009 : Bachelor of Computer Science at Bina Nusantara University, Jakarta, Indonesia (GPA 3.61 out of 4.00 Scale)
February 2011 - June 2011 : Mandarin Chinese Language at Nanjing University of Information Science and Technology, Nanjing, China
September 2011 - Present : Master of Computer Application Technology at Nanjing University of Information Science and Technology, Nanjing, China
Academic Special Certification:
Achievement as Outstanding Student at Bina Nusantara University in 2007
Academic Experience:
February 2008 - May 2008 : Internship as ASP.NET Web Developer at Applied Technology Laboratories (ATL) at Bina Nusantara University, Jakarta, Indonesia
Design and develop a KPI (Key Performance Indicator) - based Performance Assessment System that is used by an organization to evaluate its success or the success of a particular activity in which it is engaged.
Professional Experience:
August 2006 & August 2007 : Internship as Hardware Technical Support at PT. Inti Sanho Utama Teknologi, Medan, Indonesia
Deal with customer complaining computer hardware, operating system, and computer software issue, as well as installation request.
August 2008 - December 2008 : PHP Web Developer at PT. Pacific Tractor Indonesia
Design and develop an Online Product Ordering System that provide convenient ordering system for customers and easy ordering management system for PT. Pacific Tractor Indonesia
April 2009 - January 2010 : C# .NET Web Developer at PT. Adicipta Inovasi Teknologi, Jakarta, Indonesia
Responsibility:
April 2009 : As a .NET Trainee learning various technical skill in C# language, .NET environment and MSSQL technologies related to the framework.
May 2009 - February 2010 : Car Rental Web-based Application Development for client company PT. Tunas Rental, Jakarta, Indonesia
Involve in development of Customer Billing module that can automatically generate bills that contain the detailed amount to be paid by the customer.
Involve in development of Treasury module that can record the payment and generate estimated amortization of loans from bank.
Involve in development of End-of-Period Processing Application that can conduct overall data processing during the off-work hour.
Involve in development of Agreement Contract process (Agreement Live)
Involve in SIT and UAT test, and User Manual documentation.
March 2010 – August 2010 : Involve in data migration from the database of the previous application into the Oracle-based database of new developed motorcycle financing application at PT. Bussan Auto Finance, Jakarta, Indonesia
September 2010 – January 2011 : Involve in designing and developing a new framework for the foundation of the upcoming projects:
Involve in providing Technical Development Training for Junior Programmer & AdIns Center of Excellence (ACE) Trainee
Develop Client Usage Application Licensing that strictly establishes the usage limit of the Application for the client company.
Develop Reporting Engine that can queuing report request asynchronously from the users in order to prevent several huge-data reports processing that can cause overload to server.
Involve in development of Batch Engine that will conduct distributed data processing and automatic/manual processing that can improve throughput of data processing.
Involve in development of Workflow Engine based on Workflow Foundation 4 that can model human or system flow, and perform state-oriented integration with the Application according to designed flow.
Develop Notification Engine that can process a template and an input, and send the result to single/multiple recipient via E-Mail, Mobile SMS, or the Application notification bar.
4. Bondzie Nanabanyin
Name: Bondzie Nanabanyin
Nationality: Ghanaian
Educational Details
Nanjing University of Info Sci and Tech 2011-Present Master’s Degree
Institute of Advance Computer Education (GHANA) 2008 Higher Diploma (MIS)
Institute of Advance Computer Education (GHANA) 2005 Diploma (MIS)
Educational Experience
2005- Diploma ProjectWebsite for online Ticket reservation
2008- Higher Diploma Project Network threats.
2005 Programming essentials with visual basic
5. Melvyn
Name: Melvyn
Problem Solving
Possess swift analytical capabilities and diagnostic skills.Made use of extensive knowledge gained to meet tight deadlines under pressure.
Computer Skills:Java,VB 6.0,C,Php and javascript,Python,SQL,SAP BW

榮譽獎項

市第八屆青年科技獎
市第九屆自然科學優秀學術成果二等獎
校教學優秀獎

相關詞條

熱門詞條

聯絡我們