基本介紹
- 中文名:王利娥
- 學位/學歷:碩士
- 職業:教師
- 專業方向:數據安全、對等網路、推薦系統、區塊鏈、機器學習
- 任職院校:廣西師範大學
個人經歷,研究方向,學術成果,
個人經歷
研究方向
數據安全、對等網路、推薦系統、區塊鏈、機器學習
學術成果
1.事務數據安全與隱私保護的若干關鍵問題研究,國家自然科學基金,No.61662008,2017.01-2020.12,主持
2.面向隱私保護的電子商務數據處理方法與技術研究,廣西自然科學基金,No.2015GXNSFBA139246,2015.09-2018.08,主持
3.高維事務型數據發布的隱私保護技術研究,校級科研青年基金,師政科技〔2014〕12號,2015.01-2016.12,主持
5.數據流發布中的隱私保護理論和方法研究,國家自然科學青年基金項目,No.61502111,2016.01-2018.12,排名第四
6.基於視覺顯著性結構的特徵提取和圖像檢索,國家自然科學基金,No.61202272,2013.01-2015.12,參與排名第四
代表性科研成果
[1]Li-e Wang,Xianxian Li. A graph-based multifold model for anonymizing data with attributes of multiple types [J]. Computers & Security, 2018, 72: 122-135.(SCI, EI, CCF-B,IF:2.849)
[2]Peng Liu, YuanXin Xu, Quan Jiang, Yuwei Tang, Yameng Guo,Li-e Wang*(通訊作者), Xianxian Li*doi:10.1016/j.neucom.2018.11.104.(SCI,EI, CCF-B, IF: 3.241).
[3]Xianxian Li, Peipei Sui, Yan Bai,Li-e Wang(通訊作者),M-generalization for multipurpose transactional data publication[J]. Frontiers of Computer Science, 2017(1):1-14.(SCI, EI)
[4]Li-e Wang, Xianxian Li: A clustering-based Bipartite Graph privacy-preserving approach for sharing high-dimensional data. International Journal of Software Engineering and Knowledge Engineering. 2014,Vol. 24, No. 7: 1091–1111(SCI,EI)
[5]Li-e Wang, Xianxian Li, A Hybrid Optimization Approach for Anonymizing Transactional Data, in Algorithms and Architectures for Parallel Processing. 2015, Springer. p. 120-132.(2015.11.18-20)(EI)
[6]Li-e Wang, Xianxian Li, Personalized Privacy Protection for Transactional Data, in Advanced Data Mining and Applications. 2014, Springer. p. 253-266.(EI)
[7]Li-e Wang, Yameng Guo and Xianxian Li. Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model[C]//Big Data Computing Service and Applications (BigDataService), 2017 IEEE Third International Conference on. IEEE, 2017: 204-209. (EI)
[8]王利娥,許元馨,李先賢,劉鵬:移動商務推薦系統中的一種基於P2P的隱私保護策略. [J].計算機科學,2017,44(9):178-183
[9]王利娥,黃昆,張大方:BitTorrent中一種基於全局貢獻的節點選擇策略.計算機工程與套用,2011,47(1):83-88
[10]劉鵬,李先賢,王利娥(通訊作者).社會網路分析軟體研究[J].計算機科學,2015,42(12):171-174
[11]王利娥,黃昆,張大方: BitTorrent系統中一種近似全局最少優先的檔案塊選擇策略.計算機套用研究,2008,(5):1419-1421
[12]Xiaoyi Hu,Li-e Wang, Jiaqi Tang, Cong Lei, Peng Liu, Xianxian Li. Anonymizing Approach to Resist Label-Neighborhood Attacks in Dynamic Releases of Social Networks. 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), 2017.10.12-15.(EI)
[13]Peng Liu,Li-e Wang, and Xianxian Li. Randomized Perturbation for Privacy-preserving Social Network Data Publishing[C]// 2017 IEEE International Conference on Big Knowledge, ICBK 2017: 208-213. IEEE ICBK 2017.8.9-10. doi:10.1109/ICBK.2017.34.(EI)
[14]Peng Liu, Yan Bai,Li-e Wang, et al., Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing. Int. J. Soft. Eng. Knowl. Eng. Vol. 27, No. 1 (2017) 71–90.(SCI)
[15]Chen L, Zhong S, Wang L, et al. A Sensitivity-Adaptive/rho-Uncertainty Model for Set-Valued Data[C]//International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2016: 460-473.(EI)
[16]Xianxian Li, Huaxing Zhao, Dongran Yu andLi-e Wang.(通訊作者).Multidimensional Correlation Hierarchical Differential Privacy for Medical Data with Multiple Privacy Requirements[C]//The International Conference on Healthcare Science and Engineering. Springer, Singapore, 2018: 153-173. (Best paper)
[17]Chunfeng Luo, Dongran Yu, Peng Liu, Li-e Wang*(通訊作者), Xianxian Li*. Injecting Differential Privacy in Rules Extraction of Rough Set[C]//The International Conference on Healthcare Science and Engineering. Springer, Singapore, 2018: 175-187.
[18]Dongran Yu, Huaxing Zhao,Li-e Wang, Peng Liu and Xianxian Li. A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing[C]//International Conference on Mobile, Secure, and Programmable Networking. Springer, Cham, 2018: 224-239.
[19]Xianxian Li, Yuwei Tang, Dongcheng Li, Peng Liu*, Li-e Wang*(通訊作者). Bayesian Differential Privacy for High-Dimensional Medical Data Optimization[C]//The International Conference on Healthcare Science and Engineering. Springer, Singapore, 2018: 205-218.
[20]Xianxian Li, Chunfeng Luo, Peng Liu, Li-e Wang*(通訊作者).Information entropy differential privacy: A differential privacy protection data method based on rough set theory[C]//2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 2019: 918-923.
發明專利
[1]王利娥,李先賢,張詩夢,移動電子商務實時推薦中的P2P隱私管理方法,專利申請號:201410195923.7,2014.05.12,專利號:ZL201410195923.7,授權公告日:2016.9.21。(已授權)
[2]王利娥,李先賢,郭亞萌,基於多維敏感數據發布的多部圖隱私保護方法,專利申請號:201610869530.9,申請日:2016.10.02,授權公告日:2019.4.26.(已授權)
[3]王利娥,李先賢,程民權,劉鵬,關聯數據的推薦系統中基於編碼的匿名推薦方法,專利申請號:201711099907.8,申請日:2017.11.9.(已受理)
[4]王利娥,李先賢,蔣權,劉鵬,瞿斌,區塊鏈中基於信譽機制的分區快速共識方法,專利申請號:201811189888.2,申請日:2018.10.12.(已受理)
[5]王利娥,李先賢,李東城,劉鵬,基於區塊鏈技術的匿名跨域推薦方法,專利申請號:201811189844.X,申請日:2018.10.12.(已受理)
[6]王利娥,李先賢,王藝匯,劉鵬,一種基於現金支付與信譽機制的移動推薦方法,專利申請號:201811415847.0,申請日:2018.11.26.(已受理)
[7]王利娥,王藝匯,李先賢,一種基於跨域關聯的興趣點推薦方法,專利申請號:201911156185.4,申請日:2019.11.22.(已受理)
[8]李先賢,郭亞萌,王利娥,劉鵬.學術社交網路科研合作者推薦方法,專利申請號:201711092851.3,申請日:2017.11.08(已受理)
[9]李先賢,趙華興,王利娥,劉鵬,於東然。分散式環境下高維數據發布的個性化差分隱私保護方法,專利申請號:201711092850.9,申請日:2017.11.08(已受理)
[10]李先賢,傅星珵,王利娥,劉鵬,褚宏光.非獨立同分布環境下的多相關性差分隱私矩陣分解方法,專利申請號:201711065040.4,申請日:2017.11.02(已受理)
[11]葛微,李先賢,王利娥,一種提高大數據上並行連線性能的負載平衡方法,(專利號:ZL201610019840.1)申請日:2016.01.13。(已受理)
[12]葛微,李先賢,王利娥,一種提高海量數據查詢性能的正交多哈希映射索引方法,專利申請號:201610019838.4,申請日:2016-01-13.(已受理)
[14]教學管理系統V1.0,著作權人:廣西師範大學,王利娥,韋丁銘,李春培,開發完成日期:2018.04.01,登記號:2019SR0398901.(軟體著作權)