当前位置: X-MOL首页全球导师 国内导师 › 梁刚

个人简介

专业:网络空间安全 学习和工作简历 2007年6月毕业于四川大学,获博士学位。2007年7月-2013年12月在四川大学(软件)学院工作计算机网络与安全所工作,2014年1月至2015年12月在加拿大麦吉尔大学信息物理系统实验室做博士后。2016年1月至今在四川大学计算机(软件)学院网络与可信计算研究所工作。一直从事计算机网络与网络安全的研究,研究领域为网络安全、网络舆情分析与预测,具体研究方向包括网络安全维系分析技术、网络舆情分析与预测、机器学习等。目前已在权威国际国内学术期刊和国际会议上发表论文50余篇,其中SCI收录11篇;申请国家专利5项,获得授权5项;作为负责人已主持项目2项。于2008年获得“四川科技进步一等奖”。2008年至2012年连续获“四川大学青年骨干教师”称号,指导学生多次获得国内信息安全大赛奖项,2012年-2013年连续两年指导学生获得“全国信息安全大赛”一等奖,并获得“全国信息安全大赛优秀指导教师“称号。 主要获的国家、省部级奖励奖及荣誉称号有: (1) 2008年获四川省科技进步奖。 论文、专著与专利 发表学术论文50余篇,大部分被SCI、EI收录;申请国家发明专利3项,获准授权1项,另外两项正在公示。 申请专利: 一种基于HTTP协议头的磁盘地理位置定位方法(已授权) 一种基于微博类型与用户行为的微博谣言检测技术(公示中) 一种基于正相似与反相似的推荐技术(公示中) 人才培养 为本科生讲授“操作系统“、“信息安全产品开发实践”、“竞赛专题“等课程。目前,培养硕士生14人。

研究领域

网络安全与智能计算

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Liang Gang,Rumor Identification in Microblogging Systems Based on Users' Behavior. IEEE Trans. Comput. Social Systems 2(3): 99-108 (2015) Yang, J., Liu, X., Li, T., Liang, G., & Liu, S. (2009). Distributed agents model for intrusion detection based on AIS. Knowledge-based systems, 22(2), 115-119. Gong, X., Li, T., Wang, T., Yang, J., Liu, S., & Liang, G. (2006). An immune mobile agent based grid intrusion detection model. In Simulated Evolution and Learning (pp. 112-119). Springer Berlin Heidelberg. Liu, S., Li, T., Wang, D., Zhao, K., Gong, X., Hu, X., ... & Liang, G. (2006). Immune multi-agent active defense model for network intrusion. In Simulated Evolution and Learning (pp. 104-111). Springer Berlin Heidelberg. Yang, J., Li, T., Liu, S., Wang, T., Wang, D., & Liang, G. (2007). Computer Forensics System Based on Artificial Immune Systems. J. UCS, 13(9), 1354-1365. Li, Q., Li, Z., Liang, G., Zhang, J. Y., Chen, L. Y., & Li, B. (2007, August). IDGSC: An Immunity-Based Approach for Dynamic Grid Service Classification. In Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007. Fourth International Conference on (Vol. 2, pp. 160-165). IEEE. Gong X, Li T, Liang G, et al. Immunity and mobile agent based grid intrusion detection[M]//Computational Intelligence and Bioinformatics. Springer Berlin Heidelberg, 2006: 651-659. Liang, G., Li, T., Ni, J., Jiang, Y., Yang, J., & Gong, X. (2006). An immunity-based dynamic multilayer intrusion detection system. In Computational Intelligence and Bioinformatics (pp. 641-650). Springer Berlin Heidelberg. Yang, J., Li, T., Liu, S. J., & Liang, G. (2007, November). A Novel Network Security Evaluation System Based on Immune Principle. In Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on(pp. 484-489). IEEE. Juan, L., Tao, L., & Gang, L. (2009, May). A Network Security Dynamic Situation Forecasting Method. In Information Technology and Applications, 2009. IFITA'09. International Forum on (Vol. 1, pp. 115-118). IEEE. Gong, X., Li, T., Lu, J., Wang, T., Liang, G., Yang, J., & Sun, F. (2006). Immunity and mobile agent based intrusion detection for grid. In Agent Computing and Multi-Agent Systems (pp. 187-198). Springer Berlin Heidelberg. Gong, X., Li, T., Wang, T., Yang, J., Liang, G., & Hu, X. (2006). Grid intrusion detection based on immune agent. In Advances in Natural Computation (pp. 73-82). Springer Berlin Heidelberg. Wang, D. G., Li, T., Liu, S. J., Liang, G., & Zhao, K. (2008). An immune multi-agent system for network intrusion detection. In Advances in Computation and Intelligence (pp. 436-445). Springer Berlin Heidelberg. Liang, G., Li, T., Gong, X., Jiang, Y., Yang, J., & Ni, J. (2006). NASC: a novel approach for spam classification. In Computational Intelligence and Bioinformatics (pp. 672-681). Springer Berlin Heidelberg. Wan, Z., Liang, G., & Li, T. (2012). Multi-core processors based network intrusion detection method. Journal of Networks, 7(9), 1327-1333. Liang G, He W, Xu C, et al. Rumor Identification in Microblogging Systems Based on Users’ Behavior[J]. IEEE Transactions on Computational Social Systems, 2015, 2(3): 99-108. Wan Z, Liu X, Liang G. A Pipeline Model Based Intrusion Protection Method[C]//Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering-Volume 01. IEEE Computer Society, 2012: 174-177. Ziqian, W., Tao, L., & Gang, L. (2009, September). A Prediction Method of Network Security Situation. In Management and Service Science, 2009. MASS'09. International Conference on (pp. 1-4). IEEE.

推荐链接
down
wechat
bug