当前位置: X-MOL首页全球导师 国内导师 › 王玉龙

个人简介

王玉龙 老师类型 硕导 所属中心 交换与智能控制研究中心 职称 副教授 承担课程 《高级神经网络原理及技术》(研究生课程)、《深度强化学习导论》(研究生课程)、《程序设计实践》(本科课程) 个人介绍 2010年毕业于北京邮电大学,获计算机科学与技术专业博士学位,后留校从事网络与智能等方面的教学与科研,重点关注神经网络、深度学习、网络技术等方面的研究,中国计算机学会会员。参加工作以来,发表学术论文30余篇,专利申请/授10余项。作为课题负责人主持过1个国家级科研项目,作为核心研究人员(排名第二)参与过3项国家级科研项目,此外还主持/参与了20余项省部级项目和企业合作项目。 承担课题 1. 国家242项目,基于深度学习的音频数据处理技术,起止时间:2019.5-2020.5,所负责人:项目负责人 1. 国家高技术研究发展计划(863计划)课题,“智能终端安全检测技术” ,项目编号:2015AA017201,起止时间:2015.1-2017.12,所负责任:课题骨干、北邮方负责人; 2. 国家高技术研究发展计划(863计划)重大项目,“面向下一代电信网的安全测试评估技术及工具” ,项目编号:2006AA01Z448,起止时间:2006.8-2009.8,所负责任:核心研究人员;

研究领域

人工智能、机器学习、深度学习、网络技术

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

1. Yulong Wang, Haoxin Zhang, Guangwei Zhang, cPSO-CNN: An efficient PSO-based algorithm for fine-tuning hyper-parameters of convolutional neural networks, Swarm and Evolutionary Computation 49 (2019) 114–123 2. Yulong Wang, Junjie Yi, Jun Guo, Yanbo Qiao, Mingyue Qi, and Qingyu Chen, A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network, Security and Communication Networks, Moving Target Defenses (MTD), 2018-03-26 3. Yulong Wang, Yi Li, An efficient and tunable matrix-disguising method toward privacy-preserving computation, Security and Communication Networks, Volume 8, Issue 17, 25 November 2015, Pages: 3099–3110, 4. Yulong Wang,Ji Ren ,WHIT: A More Efficient Hybrid Method for Single-Packet IP Traceback Using Walsh Matrix and Router Degree Distribution, IEICE Transactions on Communications, Vol.E96-B,No.7,pp.1896-1907,Jul. 2013 5. Yulong Wang, Junjie Yi, Jun Guo, Yanbo Qiao, Mingyue Qi, and Qingyu Chen, A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network, Security and Communication Networks, Moving Target Defenses (MTD), 2018-03-26 LU Ning, WANG Yulong, SHI Wenbo, LI Guorui and DIAO Ding, Filtering Location Optimization for Defending against Large-scale BDoS Attacks, Chinese Journal of Electronics, Vol.26, No.1, Jan. 2017,pp.1-10 Yingguang Zhang, Sen Su, Yulong Wang, Weifeng Chen and Fangchun Yang Privacy-assured substructure similarity query over encrypted graph-structured data in cloud Security and Communication Networks Article first published online : 18 NOV 2013, DOI: 10.1002/sec.907 Lu N, Wang Y.L, Su S, Yang F.C and Han R, "Filtering location optimization for the reactive packet filtering," SECURITY AND COMMUNICATION NETWORKS 卷: 7 期: 2 页: 309-321 出版年: FEB 2014 Lu N, Wang Y.L, Su S and Yang F.C, "A novel path-based approach for single-packet IP traceback," SECURITY AND COMMUNICATION NETWORKS 卷: 7 期: 7 页: 1150-1164 出版年: JUL 2014 10. Dong Yan, Yulong Wang, Sen Su, Fangchun Yang, A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging, JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, May 01, 2012, vol.28(3), pp. 453-470.

推荐链接
down
wechat
bug