当前位置: X-MOL首页全球导师 国内导师 › 方贤进

个人简介

教育情况 2006/09 - 2010/06,安徽大学,计算机应用技术,博士 2000/09 - 2003/06,安徽大学,计算机应用技术,硕士 1989/09 - 1993/07,安徽师范大学,计算机应用,学士 荣誉和奖励 2005年, 荣获“安徽理工大学优秀教师”称号 2010年, 荣获“安徽理工大学师德先进个人”称号 2017年, "椭圆曲线加密教学中辅助软件的开发与应用"获第九届信息安全与密码学教学研讨会会议论文特等奖

研究领域

入侵检测系统, 隐私保护, 计算机安全与密码学,Linux系统及安全 人工免疫计算

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Fang, XJ ; Yu, FC ; Yang, GM ; Qu, YY . Regression Analysis With Differential Privacy Preserving. IEEE ACCESS, 卷:7,页:129353-129361. Yang, Gaoming; Yu, Xu; Xu, Lingwei; Xin, Yu; Fang, Xianjin. An intrusion detection algorithm for sensor network based on normalized cut spectral clustering.PloS one, 卷:14 期:10 页:e0221920, DOI:10.1371/journal.pone.0221920 杨高明; 朱海明; 方贤进*; 苏树智. 局部差分隐私约束的关联属性不变后随机响应扰动. 电子学报,2019, Vol. 47, No.5, pp:1079-1085. Su, Shuzhi;Fang, Xianjin*;Yang, Gaoming;Ge, Bin;Zhu, Yanmin. Self-balanced multi-view orthogonality correlation analysis for image feature learning. Infrared Physics and Technology,Vol.100(2019), pp:44-51. Yang, Gaoming; Dong, Tao; Fang, Xianjin*. Association Data Release with Randomized Response Based on Bayesian Networks.Int. J. of Computational Science and Engineering (IJCSE),Vol. 20, No. 1, 2019, pp: 120-129. 杨高明;龚晨;方贤进*;葛斌;苏树智. 面向频繁序列的局部差分隐私保护研究. 哈尔滨工程大学学报, 2019, vol. 40, No. 11, pp: 1903-1911. 杨高明,方贤进*,肖亚飞.局部差分隐私约束的链接攻击保护.计算机科学与探索. 2019, 13(2),pp:251-262. Peng, WangChun ; Wang, BaoNan ; Hu, Feng ; Wang, YunJiang ; Fang, XianJin ; Chen, XingYuan ; Wang, Chao. Factoring larger integers with fewer qubits via quantum annealing with optimized parameters. Science China: Physics, Mechanics and Astronomy, Volume: 62, Issue: 6, June 1, 2019, pp:060311-1:8 陈家明; 王丽*; 肖亚飞; 方贤进. k-匿名机制下查询隐私的一种度量方法. 中国科学技术大学学报,(06),pp 512-518,2018. Ji J., Fang Xianjin*., Chen D., Xiao Y., Wu Y. (2017) A Novel Grouping-Based WSN Clustering Data Transmission Protocol. In: Chen F., Luo Y. (eds) Industrial IoT Technologies and Applications. Industrial IoT 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 202, pp 152-162. Springer, Cham. (EI) X. Fang and Y. Wu*, Investigation into the elliptic curve cryptography, 2017 3rd International Conference on Information Management (ICIM), Chengdu, 2017, pp. 412-415. doi: 10.1109/INFOMAN.2017.7950418. (EI) Xianjin Fang, Gaoming Yang*, Yanting Wu. Research on the Underlying Method of Elliptic Curve Cryptography. Proc. of 2017 4th International Conference on Information Science and Control Engineering(ICISCE2017). July 21-23, 2017, Changsha, China, IEEE CS Press,pp:639-643, DOI 10.1109/ICISCE.2017.139. (EI) 方贤进,肖亚飞,杨高明. 大数据及其隐私保护. Big Data Research(大数据),2017,3(5):45-56. 杨高明,方贤进,陆奎,王静. 面向函数依赖的隐私保护研究. 计算机工程与科学,2015.11.15,(11):2154~2161. 王丽, 方贤进, 刘佳. 树突细胞算法的运行时间属性分析. 计算机应用研究, 2016, 33(1): 17~30. Li Wang, Xianjin Fang.The Detection of P2P Bots Using the Dendritic Cells Algorithm. Proc. of 2015 International Conf. On Estimation, Detection and Information Fusion(ICEDIF 2015).2015,pp:299-302. 方贤进, 王丽, 康佳, 刘佳.树突细胞算法及其理论研究.计算机科学.2015,42(2).131-133.

推荐链接
down
wechat
bug